Professional Documents
Culture Documents
Lea 211
Lea 211
INDUSTRIAL
SECURITY CONCEPTS
MARIBETH BAGUINGAN-ONSAT
Etymology of the word “security”
Safes and strong boxes have served as protected containers since ancient Egypt. Locks are among the
oldest mechanisms invented. Through the centuries the need to protect precious metals and stones created
that advanced safe and vault construction skills.
Mechanical locks were developed earlier than combination
mechanisms. Locks with keys were widely available for purchase
from artisans to the Middle ages.
Public Protection Forces
Considering the first duty of the community is to protect itself through
government and personal initiative, hierarchical stratification in early
society occurred partially to provide leadership for defensive purposes.
While the military, civilian police, private security, and indeed numerous other
organizations provided by the state offer protection, individual efforts are the
oldest, most prevalent and most difficult activity to assess. Programs provided
by the state and not for profit organizations have been developed to mitigate
risks in modern times.
Recently, innovative ways have helped communities reduce crime and increase the perception of
safety. These include private/ public programs like community policing. In addition to private
security services are volunteer programs. Numerous non-police developed anti-crime programs
to support security of individual homes, neighbourhoods, and commercial enterprises.
SECURITY IN GENERAL
SECURITY- in a collective sense, is the same as protection and
safety; the state of being safe and the condition of being protected
against physical, social, spiritual, financial, political, emotional,
occupational, psychological, or other types or consequences of
failure, damage, error, accidents, harm or any other event which
should be considered not desirable.
-is also a freedom from fear, harm, danger, loss, destruction or
damages. A state of the mind by which a person see or feel absence of
danger and presence of comfort.
FIELDS OF SECURITY
The following are the fields of security classified according to
each sphere or subject:
7. Bank security- this type of security is concerned with bank operations. Its main
objective is the protection of bank cash and assets, its personnel and clientele.
Security personnel are trained to safeguard bank assets while in storage, in transit
and during transactions.
8. School/ campus security- a type of security that is concerned with the protection
of students, faculty members, and school properties. Security personnel are trained
to protect the school property from theft, vandals, handling campus riots, and
detecting the use of intoxicated drugs and alcohols by the students.
C. POLITICAL FIELD
CBRN threats
Chemical threats, Biological threats, radiological and nuclear
threats
Improvised incendiary device (IID)
harmonization of activities in an
organization that leads to efficient
function. It aims at stimulating motivation
and discipline within the different units in
the organization.
5. Controlling
Centralization implies the top management. Sharing of
authorities for the decision- making process with middle
and lower management is decentralization and that an
organization should strive for a good balance in this.
9. Scalar Chain
Hierarchy presents itself in any given organization.
This varies from top management to the lowest levels
in the organization. This principle states that there
should be a clear line in the area of authority from
top to bottom and all managers at all levels.
10. Order
2.The coach- one who is like a sport coach, who brings high levels of
energy and discipline. He aims to bring high performance into the
workplace. He is highly people- focused and view the success of the
team as his own personal success. He usually set clear, realistic
goals for performance and discuss practical strategies on how the
team can achieve those goals.
3. The Sensitive Boss- bosses are genuinely concerned with the
emotional well being of their workers and are determined to
create a workplace that is as harmonious and responsive to
individual needs as possible. They aim to create close connections
between individual workers through shared team activities, while
minimizing stressful or confronting situations.
4. The Democratic Boss- one of the easiest types of managers to
work with, democratic bosses are focused on open collaboration
within their teams and are underpinned by a strong belief that the
best outcomes are achieved by all parties bringing their ideas to
the table in pursuit of a common goal. He contributes actively to
team discussions and give opinions on new ideas.
5.The Commander- one who just want the job to be done on time and
to the highest standards possible. Accordingly, one of the most difficult
management styles to work under, commander bosses know exactly
what outcomes they want from their team and ensures that everybody
knows about it. Commanders expect strong discipline and speed from
their team and may often shout commands in very clear terms.
6.The Pacesetter- one who is highly energetic and will often do their
best to bring motivation to the team in the fast-paced nature of modern
economy. He is focused in winning the race and winning it with pride.
Similar in personality to commanders, pacesetters can also be quite
direct and demanding, expecting the best from their team members and
impatient if tasks fall behind schedule.
THE NEXUS OF
CORPORATE
SECURITY, MILITARY
AND LAW
ENFORCEMENT
MILITARY SECURITY PERSPECTIVES
a. Political strength
b. Economic Strength
c. Cultural Strength
d. Military Strength
POLICE SECURITY PERSPECTIVES
When it comes to countering crime, it is the police that are on the front
lines in most societies but it has become apparent in recent years that
police have the difficulty in dealing with the involving internal threats of
internal threats of insurgency, terrorism and organized crimes.
When the threat looms that large, it becomes a national security issue,
that may justify a military or military-like rsponse. Thus, when human and
national security are under seige, governments may conclude that some
form of military intervention may be essential.
Law Enforcement Security Focus
1.Protection- protection of the community from violent and or
dangerous crimes.
2. Service- Serve a population by eliminating high- profile
offenders and ensuring the safety of said population.
3.Deterrence- deter criminals and crimes from occuring by
showing a highly visible police presence.
4.Customer service oriented- with emphasis on preservation of
peace and security within their community jurisdiction.
Corporate Security Perspectives
Corporate Security- refers to the resilience of
corporations against espionage, theft, damage and other
threats. System of law and sound approaches by which
corporations are directed and controlled focusing on the
internal and external corporate structures with the
intention of monitoring the actions of management and
directors and thereby, mitigating agency risks which may
stem from the misdeeds of corporate officers.
Corporate Security Environment
It is important to understand how security applies within the field of a corporate business. The following
activities are the main pillars of a corporate security function:
a. physical protection of assets
b. Physical protection of people
c. business continuity
d. Crisis response/management
e. Cyber security
f.Information and data protection
g. Internal investigations
h. Countering fraud and money laundering
i. counterespionage
j. brand protection
k. anticounterfeiting/piracy
Corporate Security Activities
1. Detection- detect any threat for prevention.
2. Deterrence- use all necessary procedures to deter sabotage,
intrusion, etc.
3. Engagement- respond to all and or any threat within their
jurisdiction.
4.Task driven- with the purpose of satisfying the requirements of
the client.
Corporate Security Key Objectives
1.Risk Management- manages at an early stage any developments
that may threaten the resilience and continued survival of a
corporation.
2.Business Continuity- it is a corporate function that overseas and
manages the close coordination of all functions within the company
that are concerned with security, continuity and safety.
3.Business Security- security risks have become more complex.
Many of the threats, such as security are asymmetric and
networked, making them more difficult to manage.
MAJOR DIVISION OF INDUSTRIAL SECURITY
1.PHYSICAL SECURITY- are those measures taken to
prevent physical access or entry to an installation or area
by unauthorized personnel.
2.PERSONNEL SECURITY- is applied to check the
background of persons as well as the protection of company
personnel against potenial harmful acts or conditions.
3. DOCUMENT SECURITY- this includes every measures
designed to safeguard company documents from
unintentional harmful acts or against unathorized disclosure
of the information contained therein.
PHYSICAL SECURITY SYSTEM
LAYERS OF PHYSICAL SECURITY:
2.
Second Line- include doors, floors, windows, walls,
roofs, and grils and other entries to the buildings
1.
Fixed Post- security guards are assigned in a
particular place of the compuond to guard and watch
the surroundings
2.
Patrol (Roving)- in this system, the securiy guard is
required to walk and go around regularly around the
company premises.
Protective Lightings-it provides sufficient illumination to the area during hours
of darkness, improve visibility, and sevrves as deterrent to would-be thieves.
Types:
Stationary Luminary (Continous lighting)- the most familiar type of outdoor
security lighting, this is designed to provide two specific results: Glare
projection or controlled lighting. It consists of a series of fixed luminaries at
range to flood a given area continously during the hours of darkness.
a. Glare projection type- being used in prisons and correctional institutions
to illuminate walls and outside barriers.
b. Controlled lighting- it is generally employed where, due to surrounding
property owners, nearby highways or other limitations, it is necessary for the
light to be more percisely focused.
standby lighting- it is designed to reserve or stanby use or to
supplement continous systems. A standby system can be
most useful to selectively light a particular area in an
occassional basis.
Fresnel lights-these are wide beam units primary used to extend the illumination
in long horizontal strips to protect the approaches to perimeter barrier.
Protective Alarms
Alarm
(signal)- is synonymous to warning of
emminent danger .
Protective
alarm- It is an aural or visual signal given
by the enunciator to security guard when intruder
actuates device in a protected area.
Enunciator- is a visual or audible-signaling device,
which initiates condition of associated circuits.
Basic parts of Alarm System:
3. Local Alarm- This system consist of ringing up a visual or audible alarm near the object to
be protected. When an intruder tries to pry a window, the alarm thereat goesoff.
4. Auxiliary Alarm- company-owned alarm systems with a unit in the nearest police station
so that in case of need, direct call is possible. The company maintains the equipment and
lines both for the company and those in the police, fire and other emergency agencies by
special arrangement. Radio,landlines, or cellphone can avail of the auxiliary system.
Kinds of Alarms
1. Audio Detection Device- it will detect any sound caused by attemted force
entry. A supersonic microphone speaker sensor is installed in walls, ceilings and
floors of the protected area.
2. Vibration Detection Device- it will detect any vibration caused by attempted
force entry. A vibration sensitive sensor is attached to walls, ceilings or floors
of the protected area.
3. Mettalic foil or wire- it will detect any action that moves the foil or wire. An
electrically charge strips of tinfoil or wire is used in the door, windows or glass
surfaces of the protected area.
4. Laser Beam Alarm- a laser emitter floods a wall or fencing with a beam so
that when a physical object disturbs this beam, an alarm is activated.
5. Photoelectric or Electric Eye Device- an invisible/ visible is emitted and when
an itruder breaks contact with the beam, it will activate the alarm.
Locks and key control
1. Key-operated locks
2. Combination locks- uses numbers, letters or symbols
3.
Code operated lock- a type of lock that can be opened
by pressing a series of numbered button in the proper
sequence.
4.Electrical lock- a lock that can be controlled and
closed remotely by electrical means.
5.
Card operated lock- a type of lock operated by a coded
card.
KEYING SYSTEMA
types of keys:
1. Change Key- a specific key, which operates the lock and has a particular
combination of cuts which match the arrangement of the tumblers in the
lock.
2. Sub- master key- a key that will open all the lock within a particular area
or grouping in a given facility.
3. Master Key- a special key capable of opening a series of lock.
4. Grand Master Key- a key that will open everything in a system involving
two or more master key groups.
Security Cabinets
the final line of defense at any facility
is in the high security storage where
papers, records,plans or cashable
instrument, precious metals or other
especially valuable assets are
protected.
Key Control
1. Key Cabinet- a well constructed cabinet will have to be procured. The cabinet
will have to be of sufficient size to hold the original key to every lock in the system.
It should be secured at all times.
2. Key record- some administrative means must be set up to record code numbers
and indicates to whom keys to specific locks have been issued.
3. inventories- periodic inventories will have to be made of all dupicate and original
keys in the hands of the employees whom they have been issued.
4. Audit- in addition to periodic inventory, an unannounced audit should be made of
all key control records and procedures by a member of management.
5. Daily report- a daily report should be made to the person responsible for key
control from the personnel department indicating all persons who have left or will
be leaving the company. In the event that a key have been issued, steps should be
initiated to ensure that key is recovered.
Types of Security Cabinets
1. Safe- a mettallic container used for the safekeeping of documents or small items in
an office or installation. Safe can be classified as either robbery or burglry resistant
depending upon the use and need. Its weight must be at least 750 lbs. and should be
anchored to a building structure. Its body should at least 1 inch thick steel.
2. Vault- heavily constructed fire and burglar resistance container usually a part of
the building structure used to keep protect cash, documents and negotiable
instruments. Vaults are bigger than safe but smaller than a file room. The vault door
should be made of steel at least 6 inches in thickness. The vault walls, ceiling,floor
reinforce concrete at least 12 inches in thickness. The vault must be resistive up to 6
hours.
3. File Room- a cubicle in a building constructed a little lighter than a vault but of
bigger size to accomodate limited people to work on the records inside. The file room
should at most be 12 feet high. It must have a watertight door and at least fire proof
for one hour.
Identification and Movement Control
Badge and Pass Control- the system should have a complete record
of all badges and identification cards issued, return, mutilated or
lost by serial number and cross-indexed alphabetically.
Types of Pass System
1. Single Pass System- the badge or pass coded for authorization to enter
specific areas is issued tonan employee who keeps in his possession until his
authorization is terminated.
3. Escort- if possible visitors should be escorted by the security to monitor their activity within
the establishment and guide them where to go.
4. Visitor Entrances- separate access for visitors and employees ofthe establishment should be
provided.
5. Time traveled- if there is a long delay or time lapse between the departure and arrival, the
visitor should show cause of the delay.
Package Control- no packages shall be authrized to be brought inside the industrial
installation, offices and work area without proper authority.
Vehicle Control- vehicles should be subjected for search at the entrance or exit of
the installation. All visitors with vehicles should provide the security as to the
complete details of their duration of stay, person to be visited and other
information.
Building Access Control- at any physical barrier, a security system must possess he
ability to distinguish among authorized persons, unauthorized visitors and other
unauthorized persons. This is to assist the security personnel protects sensitive
area and information within the installation.
Document and Information Security
Document Security- is the protection of records from its entire document life cycle. It also
connotes in this context the safeguarding of classified matters.
Standar rules- the authority and responsibility for the preparation and classification of classified
matter rest exclusively wih the originating office. Classifie matter should be classified according
to their contents. Classification should be made as soon as possible by placing the appropriate
marks of the matter to be classified.
Security Clearance- is the certification by a responsible authority that the person described is
cleared for access to classified matter tthe appropriate level.
Information Security- means protecting information system from unauthorized access, use,
disclosure, disruption, modification or destruction
Protection of sensitive information
Propriety Information- is the information that in some special way
relates to the status or activities of the possessor and over which
the possessors asserts ownership.
eg. trade secrets- which consist of any formula, pattern, device or
compilation of information which is used in one’s business and
which give them an oppurtunity to gain an advantage per
competitors who do not know or use it.
patents- which is grant made by the government to an inventor,
conveying or securing to him the exclusive right to make, use or
sell his invention for term of years.
Personnel Security
National Agency Check (NAC)- is also investigation activity but the source of
information involves clearances from national government units.
Deception Detection Techniques- This is a process of using devices in detecting deception during the
interview stage. This includes the use of a Polygraph, Psychological Stress Evaluator and Voice
Analyzer.
Financial and Lifestyle Inquiry- this type of investigation seeks to gather information on income and
mode of living, sometimes reffered to as earning-to-debt ratio.
Undercover Investigation- this is the placemant of an agent in a role in which the agent’s identity and
role remains unknown, in order to obtain information for criminal prosecution or for recovery or
limitation of asset losses.
Exit Interview- this is a valuable tool because it gives departing employees an opportunity to list
grievances. It offers security managers an opprtunity to learn the problems not previously known.
Debriefing an employee is also incorporated into the exit interview to remind them of their continuing
legal obligation to safeguard confiential company information.
END OF MIDTERM COVERAGE>>
Security Incident- a security-related occurrence or action likely to lead to death, injury,or monetary
loss. An assault against an employee, customer, or supplier on company property would be one
example of a security incident.
State-of-the-art- the most advanced level of knowledge and technology currently achieved in any
field at any given time.
Statistics- a branch of mathematics dealing with the collection, analysis, interpretation, and
presentation of massess of numerical data. In security, this could represent a collection of
quantitative data such as security incidents, crime reports, and related information that, together
with other like information, serves as security-related statistics used for a number of applications
including risk and vulnerability evaluations.
Natural Disaster- a naturally occurring calamitous event bringing great damage, loss, or destruction
such as tornadoes, hurricanes, earthquakes, and related occurences.
Probability- The chance or in some cases the mathematical certainty that a given event will occur;
the ratio of the number of outcomes in an exhaustive set of equally likely outcomes that produce a
given event to the total number of possible outcomes.
Qualitative- relating to that which characteristic of something and what makes it what it is.
Risk- the possibility of loss resulting from a threat, security incident or event.
1. RISK IDENTIFICATION
2. RISK ASSESSMENT
2. Repetition- information changes and apperas as the risk management process proceeds.
Keeping identified risks current and updated means the system is focused on mitigating the most
prevalent issues.
3. Approach- certain objectives require distinct approaches to best combat identification failure.
One method is to identify all root causes, undesirable events, and map their potential impacts.
Another is to identify essential performance fuctions the project must enact or goals it must
reach to be succesful, then find possible issues with each function or goal.
4. Documentation- consistent and exhaustive documentation leads to comprehensive and reliable
solutions for a specific project or future risk management team’s analysis. Most communication is
recorded by a project manager and data is copied, stored, and updated for continued risk
prevention.
5. Roots and Symptoms- It is essential in the risk identification phase to find the root causes of a
risk instead of mistaking them with the symptoms.
6. Project Definition Rating Index (PDRI)- is a risk assessment tool that helps develop mitigation
programs for high-risk areas. It facilitates the team’s risk assessment within the defined project
scope, budget, and deadlines. It also provides further detail of individual risks and their magnitude,
represented by a score. The summation of scores is statistically compared to the project
performance as a certainty level for the entire project.
7. Event Trees- commonly used in reliability studies and probabilistic risk assessments, event trees
reperent an event followed by all factors and faults related to it. The top of the tree is the event
and it is supported by any condition that may lead to that event, helping with likelihood visibility.
Types of Security Risks
Securityrisks is a term that indicates the risks associated
with the security of people, assets and information. These
includes the following risk groups:
1. Personal Security-property damage, health and life,
protection of personal data.
2. Physical security- equipment damage, disruption of objects
and systems.
3. Information security risks- breach of data security, network
or nformation system, data abuse or corruption.
Types of risk sources
types of risks are defined in terms of their severity in the field of
risk management, there are distinguished sources of risks:
1. Exposure
2. Failure
3. Crisis
4. Disaster
5. Opportunity
6. Attack
7. Human Stupidity
Risk Identification Tools and Techniques
1. Documentation Reviews- The standard practice is to identify risks is reviewing project related
documents such as lessons learned, articles, organizational process asses, etc.
2. Information Gathering Techniques- The given tecniques are similar to the techniques used to
collect requirements. This includes:
a. Brainstorming- is done with a group of people who focus on identification or risk for the
project.
b. Delphi technique- a team of experts is consulted anonymously. A list of required information is
sent to experts, responses are compiled, and results are sent back to them for further review until
a consensus is reached.
c. Interviewing- an interview is conducted with project participants, stakeholders, experts, etc. to
identify risks.
d. root cause analysis- root causes are determined for the identified risks. These root causes are
further used to identify additional risks.
e. SWOT Analysis- understanding and analysis of the internal( strength and-weaknesses) and the
external (opportunities-threats) factors.
f. Checklist analysis- checklist of risk categories used to come up with additional
risks for the project.
3. Crime Prevention Through Environmental Design (CPTED)- is a security concept that attempts to
influence offender decisions that precede criminal acts, through elements of the built environment.
It is based upon the theory that the proper design and effective use of the built environment can
reduce crime, reduce the fear of crime, and improve the quality of life. CPTED considers variables
that can be risk predictors such as: past crimes and threats,facility characteristics, current security
measures, existing vulnerabilities, and liability analysis.
4. RISK MONITORING AND CONTROL
Risk monitoring and control is required in order to ensure the execution ofthe risk plans and
evaluate their effectiveness in reducing risk. It keep track of the identified risks, including
the watch list. It monitors trigger conditions for contingencies and monitor residual risks and
identify new risks arising during project execution. It also updates the organizational process
assets.
Purposes: (To determine if:)
a. risk responses have been implemented as planned
b. risk response actions are as effective as expected or if new responses should be developed
c. project assumptions are still valid. Risk exposure has changed from its prior state with
analysis of trends.
d. risk trigger has occured
e. proper policies and procedures are followed.
f. New risks have occured that were not previously identified.
Inputs to Risk Monitoring and Control
2. Follow-up Survey- when recommendations are made in the initial physical security survey,
a follow up survey is conducted to ensure the completion of modifications. This survey
should be conducted before acceptance of the property or occupancy.
3. Supplemental Survey- is conducted when changes in the organization, mission, faciity, the
threat level of the facility alter or affect the security posture of the facility or area. This
survey is conducted at the discretion of either the facility manager or senior security officer.
4. Special Survey- the special survey is conducted to examine or resolve specific issue, such
as when there is a request for a Sensitive Compartmented Information (SCI) accredited
facility or there is a need to investigate or assess damage resulting from an incident.
SECURITY INSPECTION
Security Inspection is a check of how well existing security measures and
regulations are being carried out within a command. A secuity inspection may
also include an investigation of alleged or suspected
security violations.
1. Orientation Briefings-
2. Special Briefing
3. National Security Briefing- these are
information security briefings that apply o
individuals who handle classified information.
4. Special Access Briefings- briefings related
to the various special access programs such as
those administered by the higher
management or national offices.