NAME:_____________
_________ DATE :_________ SCORE:
INDUSTRIAL – 1. Pertaining to or engaged in industry, relating to, used in, or created by
industry, industry’s workforce or relating to or involving workers in?
INDUSTRIAL SECURITY – 2. It is a security measures applied to business industries, or the
business providing security and protection to private individual, business enterprises, or
government and non- government industries.
Security –3. is a kind of state where people, institutions, authority or group feel fully secured,
free from any threat or vulnerability from somewhere or someone in his / her life, liberty, property
or activity?
Pinkerton National Detective Agency -4. The largest Private Law Enforcement Organization in
the world, which established in 1850 in U.S by Allan Pinkerton?
Special Watchman Agency 5. On March 11, 1933, what agency was first formally operated
licensed private security agency?
Philippine Association of Detective and Protective Agency Operators (PADPAO) 6. They
are the organization who endorsed to the Congress a bill to regulate the organization and
operation of private detectives, watchmen, security guards and agencies and it was established
in 1958?
Republic Act 5487 or the “Private Security Law” 7. On June 13, 1969, a law was signed for
the professionalization of security works in the Philippines, that set the standards and minimum
requirements for the operations of security agency?
PD 11 8. What law was passed on October 3, 1972, widening the coverage of RA 5487 to
include security guards employed in logging concessions, agriculture, mining and pasture
lands?
PD 100 9. issued on January 17, 1973, broadening the coverage of the security industry
employees of the national or local government or any agency who are employed to watch or
secure government building and properties?
Supervisory Office for Security & Investigation Agencies (SOCIA) 10. the Security Agencies
and Guards Supervision Division (SAGSD) was created as one division of Civil Security Group
(CSG) to exercise supervisory authority and implementation the Rules and Regulations
embodied in RA 5487 and was rename into ____?
Civil Security Group -11. It is the main regulatory office of the PNP that exercises
administrative and operational control over firearms, explosives and private security industries?
RA 11917 -12. The Private Security Services Industry Act. An Act Strengthening the regulation of
the private security services industry repealing RA 5487?
Physical Security –13. Type of Security which is a system of barriers placed between the
potential intruder and the matter to be protected. It is considered as the broadest type of
security. - is concerned with the physical measures adopted to prevent unauthorized access to
equipment, facilities, material, and documents, and to safeguard them against espionage,
sabotage, damage and theft?
Communication Security –14. Type of Security which is the protection resulting from the
application of various measures which prevents or delay the enemy or unauthorized person in
giving information through the communication system?
Hotel Security – 15. Type of Security which is the protection resulting from the application of
various measures which safeguards hotel guests and personnel, hotel property, and functions in
hotel restaurants, bars and clubs?
Bank Security – 16. Type of Security which is the protection resulting from the application of
various measures which safeguards cash and assets which are in storage in transit and during
transactions?
Document Security – 17. Type of Security which is physical security that involves the
protection of documents and classified papers from loss, access to unauthorized person,
damage, theft and compromised through disclosure?
Personal and VIP Security –18. Type of Security which involve in the protection of top ranking
official the government, visiting persons of illustrious standing and foreign dignitaries?
Personnel Security – 19. Type of Security, which is involved in the background checks of
individuals commensurate with the security requirements of their work?
Operational Security – 20. Type of Security which is physical which deals with the protection of
processes, formulas, patents and other activities?
21-25. Principles of Physical Security.
26-30. Purpose / Goals of Physical Security.
1. A pass or badge system is issued by security for personnel to be admitted
in the installation. This system precludes those visitors with escorts and
personnel in the access list.
2. Access list - an authenticated list of personnel given to security personnel
allowing them to gain entry to a compound or installation or part thereof.
3. Restricted Area-It refers to an area in which personnel or vehicles are
controlled for reasons of security.
4. Controlled Areas Are those areas where access is restricted as to entrance
or movement by all unauthorized personnel and vehicles.
5. PERSONNEL SECURITY? The second aspect of security is personnel security
which is considered the most important that involves people and assets to
be protected as a source of security threats.
6. Personnel Security Investigation (PSI) A process of inquiry into the character, reputation,
discretion, integrity, morals, and loyalty of an individual to determine 1 the suitability for
appointment or access to classified matter. 2
7. BACKGROUND INVESTIGATION This technique is very expensive but necessary for
personnel security. It serves to verify information on the application form and to obtain other
information pertinent to the decision to employ.
8. Loyalty The quality of faithfulness to the organization, superiors, subordinates, and peers.
9. Integrity The uprightness of character, soundness of moral principles, and truthfulness.
10. Discretion The ability to act or decide with prudence; habit of wise judgment.
11. Morals The distinctive identifying qualities that serve as an index to the essential nature of a
person.
12. Character The sum of traits impressed by nature, education, and habit of a person.
13. Reputation The opinion which one is generally held.
14. POSITIVE VETTING It is the process of inspecting or examining with careful thoroughness
and it is a personal interview conducted under stress.
15. PROFILING It is the process whereby a subject's reaction in a future critical situation is
predicted by observing their behavior, or by interviewing them, or analyzing their responses to
a questionnaire, such as an honesty test.
16. DECEPTION DETECTION TECHNIQUE
17. This is a process of using devices in detecting deception during the
interview stage.
18. This includes the use of a Polygraph, Psychological Stress Evaluator,
and Voice Analyzer. 1
19. FINANCIAL AND LIFESTYLE INQUIRY
20. This type of investigation seeks to gather information on income and
mode of living.
21. Sometimes referred to as the 1 earning-to-debt ratio.
22. UNDERCOVER INVESTIGATION
23. This is the placement of an agent in a role in which the agent's true
identity and role remain 1 unknown, in order to obtain information for
criminal prosecution or for recovery or limitation of asset losses.
24. EXIT INTERVIEW
25. This is a valuable tool because it gives departing employees an
opportunity to list grievances.
26. It offers security managers an opportunity to learn of problems not
previously known.
WHAT IS SECURITY EDUCATION?
27. It is conducted to develop security awareness among employees of the company. It should
cover all employees, regardless of rank or position. 1
SECURITY ORIENTATION
28. This consists of initial briefings made upon new personnel and employees on security and its
various aspects, and its importance.
29. They are also made aware of the security practices and procedures in the office or unit.
SECURITY INDOCTRINATION
It aims to train all personnel so that each shall possess the skills and vigilance in the
performance of their security responsibilities.
This security indoctrination program may take the form of lectures on appropriate subjects on
security, showing of films bearing on security, and other instructional devices
SECURITY REMINDERS
30. This is a phase of the security education program which makes use of security posters,
slogans, signs, and stickers.
31. This is an indirect approach to inculcating security on the personnel and employees, but it
does serve its purpose
SECURITY PROMOTION
32. This is another phase of the security education program which is a positive effort to sell
security.
33. This may take various forms such as personal recognition of personnel who have done an
effective security job. This personal recognition will go far in selling security to others.
34. SECURITY SEMINARS
35. Attending lectures on instructions and discussions on security will
widen the personnel's horizon, security-wise, and probably make 1 them
more security conscious and disciplined.
36.
37.
38. DOCUMENT AND INFORMATION SECURITY
39. This involves the protection of documents and classified papers from
loss, access by unauthorized persons, damage, theft, and 1 compromise
through disclosure.
40.
41.
42. DOCUMENT
43. Any recorded information, regardless of its physical form or characteristics, including but not
limited to the following:
44. a. written 1 matters whether handwritten, printed, or typed; b. all painted, drawn, or engraved
matters; c. all sound and voice recordings; d. all printed photographs and exposed or printed
films, 2 still or moving; and e. all productions of the foregoing for whatever purpose. 3
CLASSIFIED INFORMATION
45. It includes all information concerning documents, cryptographic devices, developed projects,
and materials, falling under the categories of Top Secret, Secret, Confidential, and Restricted.
CLASSIFY
46. This refers to the assigning of information or material to one of the four security categories
after a determination has been made that the information requires the security protection as
provided.
47. DECLASSIFY
48. The act of removing the security classification from classified
information or matter.
49. RECLASSIFY
50. It refers to the act of changing the assigned classification of
classified information or matter.
51. UPGRADING
52. It refers to the act of assigning information or matter to a higher
classification than that previously assigned to it.
53. NEED TO KNOW
54. It is the dissemination of classified information or matter to be
limited strictly to those people whose duties require 1 knowledge or
possession thereof.
55. COMPARTMENTATION
56. It refers to the grant of access to classified matter only to properly
cleared persons when such classified information is required in the
performance of their official duties.
57. COMPROMISE
58. This takes place through the loss of security which results from
unauthorized persons obtaining knowledge of classified matters. 1
59. PROPRIETARY INFORMATION
60. These are information that in some special way relates to the status
or activities of the possessor and over which the possessor asserts
ownership.
61. The information must have been developed by the company and not
be available to the Government or to the public without restriction from
another source.
62. Sources and related content
63.
64.
TRADE SECRETS
65. It consists of any formula, pattern, device, or compilation of information which is used in
one's business and which gives them an opportunity to gain an advantage versus competitors
who do not know or use it.
66. A trade secret is a process or device for continuous use in the operation of the business.
67. PATENT
68. This is a grant made by the government to an inventor, conveying or
securing to them the exclusive right to make, use, or sell their invention
for a term of 17 years.
69. TRADEMARKS
70. Is a word, phrase, symbol, or design, or a combination of words,
phrases, symbols, or designs, that identifies and distinguishes the source
of the goods of one party from those of others. 1
71.
72.
COPYRIGHT
73. Is a type of intellectual property that safeguards original works of authorship as soon as the
author fixes the work in a tangible form of expression.
74. Paintings, pictures, graphics, musical compositions, sound recordings, computer programs,
books, poems, 1 blog posts, movies, architectural works, plays, and a wide variety of other
works are all protected by copyright 2 laws.
SECURITY CLEARANCE CERTIFICATE
75. The certification by a responsible authority that the person described is cleared for access to
classified matter 1 at the appropriate level. 2
TWO (2) TYPES OF SECURITY CLEARANCE
1. FINAL
76. It is valid for five years unless sooner revoked by the issuing authority.
2. INTERIM
77. It is valid for two years unless sooner revoked by the issuing authority. 1
78. RELATIVE CRITICALITY
79. This pertains to the importance of the firm with reference to the
national economy and security.
RELATIVE VULNERABILITY
80. This is the susceptibility of the plant or establishment to damage, loss, or disruption of
operation due to 1 various hazards.
SECURITY HAZARDS
81. Any acts or conditions which may result in the compromise of information, loss of life, loss or
destruction of property, or disruption of the objective of the installation
PILFERAGE
82. Act of stealing small things or items of little value, especially habitually.
83. TWO (2) TYPES OF PILFERER
84. 1. Casual Pilferer
85. One who steals due to their inability to resist the unexpected
opportunity and has little fear of detection.
86. 2. Systematic Pilferer
87. One who steals with preconceived 1 plans and takes away any or all
types of items or supplies for economic 2 gain.
88.
89.
SABOTAGE
90. Intentional destruction or the deliberate damaging or destroying of property or equipment.
ESPIONAGE
91. The activity of spying or the use of spying or spies to gather secret information.
92. This is a hazard because people may come to know the confidential processes or procedures
of a certain organization or business 1 establishment.
SUBVERSIVE ACTIVITIES
93. These are activities designed to overthrow the government or intended or likely to undermine
or overthrow a government or other institutions.
94. It results 1 in the disruption of the normal operations of an institution or organization.
95.
96. SECURITY SURVEY
97. The basic instrument for determining security vulnerability.
98. Critical on-site examination and analysis of an industrial plant,
business, a home, or public or private 1 institution done to ascertain the
facility's current security status. 2
99.
100.
TWO (2) TYPES OF SECURITY SURVEY CONFERENCE
1. ENTRANCE CONFERENCE
101. An entrance conference is a dialogue between the survey team and
the management and officials of a plant before the security survey is
conducted. 1
2. EXIT CONFERENCE
102. The exit conference is similar to the entrance conference, and it is
done after the completion of the security survey.
103. .
SECURITY INSPECTION
104. This is conducted to check on the degree of compliance with the recommended
countermeasures and to determine the effectiveness and adequacy of the countermeasures 1
which are in effect.
ANNOUNCED SECURITY INSPECTION
105. Is one that has been published to the office so that all concerned personnel are usually
aware of its imminence and may consequently make such preparations as are necessary.
UNANNOUNCED SECURITY INSPECTION
106. It is an inspection whose imminence is known only to certain selected personnel,
normally the office head and intelligence personnel of the office to be inspected.
PENETRATION SECURITY INSPECTION
107. It is an inspection conducted in such a manner that office personnel are not aware that
such action is taking place.
108. SECURITY INVESTIGATION
109. A planned and organized determination of facts concerning specific
loss or damage of assets due to threats, 1 hazards, or unsecured conditions.
2
1. Pass or badge system
2. Access list
3. Restricted Area-
4. Controlled Areas
5. Personnel security
6. Personnel Security Investigation (PSI)
7. Background Investigation
8. Loyalty
9. Integrity
10. Discretion
11. Morals
12. Character
13. Reputation
14. Positive Vetting
15. Profiling
16. Deception Detection Technique
17. Financial and lifestyle inquiry
18. Undercover investigation
19. Exit interview
20. Security education
21. Security orientation
22. Security indoctrination
23. Security reminders
24. Security promotion
25. Security seminars
26. Document and information security
27. Document
28. Classified information
29. Classify
30. Declassify
31. Reclassify
32. Upgrading
33. Need to know
34. Compartmentation
35. Compromise
36. Proprietary information
37. Trade secrets
38. Patent
39. Trademarks
40. Copyright
41. Security clearance certificate
42. Final security clearance
43. Interim security clearance
44. Relative criticality
45. Relative vulnerability
46. Security hazards
47. Pilferage
48. Sabotage
49. Espionage
50. Subversive activities
51. Security survey
52. Security inspection
53. Announced security inspection
54. Unannounced security inspection
55. Penetration security inspection
56. Security investigation