Security Is defined as the state or quality of being secured, freedom from fear
or danger, assurance, or certainty. To secure is to make safe or be protected.
Security can also be defined as:
1. State or feeling of safety; the sate or feeling of being safe and protected.
2. freedom from worry about possible loss: the assurance that something of value
will not be taken away;
3. something giving assurance: something that provides a sense of protection
against loss, attack or harm
FUNDAMENTALS OF INDUSTRIAL SECURITY MANAGEMENT
CONCEPTS:
1. INDUSTRY – constant application to work or business
2. INDUSTRIAL – pertaining to or engaged in industry
3. SECURITY- state or quality of being secured
4. MANAGEMENT – skillful use of means to accomplish a purpose.
5. INDUSTRIAL SECURITY – security measures applied to business industries, or
the business of providing security.
6. INDUSTRIAL SECURITY MANAGEMENT – ISM could be defined as the “skillful
handling of the security and safety measures of business enterprises and
industrial establishments”
SECURITY AND SAFETY MEASURES
Active Measures – Designed to detect or impede hazards
physical barriers
security lighting
use of vaults,
locks and others
Passive Measures - Those that will deter man from committing such act for fear
of being caught charged in court or get dismissed.
Security education programs, investigation, fire prevention seminars, personal security
checks.
MAJOR DIVISIONS OF INDUSTRIAL SECURITY
Physical Security
This concern with the physical measures adopted to prevent
unauthorized access to equipment, facilities, material and document and to
safeguard them against espionage, sabotage, damage, loss and theft.
BROADEST TYPE OF SECURITY
Personnel Security
This is as important as physical security. Personnel security starts even
before the hiring of an employee and remains to be maintained for as long
as the person is employed.
Its purpose is to insure that a firm hires those best suited to assist the
firm in achieving its goals and objectives and once hired assist in providing
necessary security to the work force while carrying out their functions.
WEAKEST LINK IN SECURITY
Document and Information Security
This involves the protection of documents and classified papers from
loss, access by unauthorized persons, damage, theft and compromise through
disclosure.
Classified documents need special handling. Lack of indoctrination and
orientation among the personal handling them can result in the leakage, loss,
theft and unauthorized disclosure of the documents.
OTHER TYPES OF SECURITY
COMMUNICATION SECURITY
It is the protection resulting from various application of various measures that
prevent or delay the enemy or unauthorized persons in gaining information
through the communication system. This includes:
A. Transmission Security – protect transmission from interceptions
B. Cryptographic Security – result from the provisions of technically sound crypto-
systems and their proper use.
C. Physical Security – providing of safeguards to equipment and materials from
access by unauthorized person
HOTEL SECURITY
BANK SECURITY
DOCUMENT SECURITY – protection of documents and classified papers
PERSONAL SECURITY – protection of personnel especially ranking officials (VIP
security)
CRISES SECURITY – Part of VIP security involved in hostage or kidnapping of VIPs
INDUSTRIAL SECURITY
OPERATIONAL SECURITY – deals primarily with the protection of processes, formula
or patents and other industrial and manufacturing activities from espionage, infiltration,
loss, compromise or photocopying
SCHOOL SECURITY
SUPERMARKET SECURITY
ETC.
PHYSICAL SECURITY
a system of barriers placed between the potential intruder and the
objects/matter to be protected.
It is the broadest branch of security, which is concerned with physical
measures adopted to prevent unauthorized access to equipment, facilities,
materials and documents and to safeguard them against espionage, sabotage,
damage and theft.
PRINCIPLES OF PHYSICAL SECURITY
In every establishment, physical measures are needed to deny unauthorized
access or intrusion because of the following:
1. ENEMY AGENTS MUST/WILL ALWAYS SEEK ACCESS
2. THERE IS NO IMPENETRABLE BARRIER – they are willing to devote enough
time, money, personnel, materials and imagination in passing barriers.
3. DEFENSE IN DEPTH MEANS BARRIER AFTER BARRIER – there should be
integration of all barriers adopted in the installation.
4. SURREPTITIOUS VERSUS NON-SURREPTITIOUS ENTRY
SURREPTITIOUS (not observable) – the greatest hazard, because it is usually
difficult to determine
NON-SURREPTITIOUS (observable)
5. EACH INSTALLATION IS DIFFERENT – each installation will have different
problems to overcome. The security procedures will not be adequate for all
installation.
BARRIERS
can be defined as any structure or physical device
capable of restricting, deterring, delaying, illegal access to an installation
GENERAL TYPES OF PHYSICAL BARRIER:
1. NATURAL BARRIER – include mountains, rivers, seas, desserts or terrain
difficult to traverse. To be fully effective, these barriers must be under
surveillance of guards.
2. STRUCTURAL OR MAN-MADE BARRIER – structural constructions made by
man like fences, walls, floors, roofs, grill or other physical means to deter or
impede penetration.
SPECIFIC TYPES OF PHYSICAL
SECURITY BARRIERS
1. STRUCTURAL BARRIERS – constructed by man (walls, ceilings, doors)
2. HUMAN BARRIERS – guards who stand between intruder and the matter to be
protected.
3. ANIMAL BARRIERS – shepherd dogs (Geese – cheapest)
4. NATURAL BARRIERS – mountains, cliffs, rivers, seas etc.
5. ENERGY BARRIERS – electrical and electronic devices (protected lighting,
alarms, etc)
PERIMETER BARRIERS
It is a medium or structure which defines the physical limits of an installations or
area to restrict or impede access
LINE OF PHYSICAL DEFENSE/ Depth of Defense
1. FIRST LINE – includes all perimeter barriers, located in the outermost area of
an installation like fence.
2. SECOND LINE – includes the building exterior (doors, floors, windows, walls
and grills.)
3. THIRD LINE – includes those internal control measures (storage system like
safe, vaults and file room)
FENCE
Are independent structures designed to control physical and visual access
between outside areas.
TYPES OF FENCES
1. SOLID FENCE
Constructed in such away that visual access through the fence is denied. Its
advantage is that it denies the opportunity for the intruder to become familiar with
the personnel, activities and the scheduled movements of the security personnel.
On the other hand, it prevents the guards from observing the area around
the installation and it creates shadow that may be used by the intruder for cover and
concealment.
2. FULL VIEW
It is constructed in such a way that visuals access is permitted through the
fence. Its advantage is that it allows the security personnel to keep the surrounding
of the installation under observation.
On the other hand, it allows the intruder to become familiar with the
movements the security personnel.
WIRE FENCE – is a type of fence made of chain-link, barbed wire concertina
ADDITIONAL PROTECTIVE MEASURE
Top guard
Is an additional overhang of barbed wire fence placed on vertical perimeter
fences facing upward and outward with a 45 degree angle with 3 to 4 strands
of barbed wires spaced 6 inches apart.
Guard Control Stations
Normally provided at main perimeter entrance to secure areas located out of
doors and manned by guards on full time basis .
Towers or Guard Towers
Are house-like structures above the perimeter barriers. It gives psychological
effect to violators
PERIMETER GUARDS
Are also employed in augmenting the existing perimeter security or perimeter
barriers of a certain establishment
PROTECTIVE ALARMS
ALARM – is synonymous to warning of imminent danger.
Is an aural or visual signal given by the annunciator to the security when
intruder actuate certain devices in a protected area.
Terms used in Alarm Detection System
Actuator – button, magnetic switch or thermostat that cause system to alarm.
Enunciator – visual or audible signaling device which initiates condition of associated
circuits.
Capacitance – property of two or more objects which enables to store electrical energy.
Control unit – terminal box for all sensors.
Fail safe – a term applied to a system when a component fails to function properly.
Types of Alarm Detection System
Central Alarm System
A type of protective alarm system where the central station is located outside
the installation. When the alarm is sounded, central station notifies the police and
other agency.
Proprietary System
This functions they same way as the central station system except it is owned,
operated by the facility.
Response to all alarms is by the facilities own security or fire personnel.
Local Alarm System
Consist of ringing up a visual or audible alarm near the object to be protected.
In case of alarm, response be made by local guards and other personnel
within sight or hearing.
Auxiliary System
In this system, installation circuits are led into local police or fire department
by leased telephone lines.
High incidence of false alarms have made this system unpopular with public
fire and police personnel
Local Alarm by Chance System
This is a local alarm system in which a bell or siren is sounded with no
predictable response.
The hope is that a neighbor or passing patrol car will reach the alarm and
call for police assistance, but such a call is purely a matter of chance.
Dial Alarm System
This system is set to dial a predetermined numbers when the alarm is
activated.
When the phone is answered, a recording states that an intrusion is in
progress.
It could fail if line were busy or if the phone connection were cut.
DEFINITION OF TERMS
LOCK
defined as mechanical, electrical, hydraulic or electronic device designed to prevent
entry to a building or room.
PADLOCK
A portable and detachable lock having a pivoted or sliding hasp which possess through
a staple ring, or the like and is made fast or secured.
PETERMAN
A term used in England for lock picker, safecrackers, and penetrators of restricted areas
or rooms
FALSE KEY
Genuine key stolen from the owner
Types of Security Cabinets
Safe - A metallic container used for safekeeping of documents or small items in an
office or installation.
Vault - It is a heavily-constructed fire and burglar resistant container, usually a
part of the building structure, used to keep and protect cash, documents, and negotiable
instrument.
PERSONNEL SECURITY
Includes all the security measures designed to prevent unsuitable
individuals or persons of doubtful loyalty to the government, from gaining
access to classified matter or to any security facility, and to prevent
appointment, or retention as employees of such individuals
It is the “weakest link” in the security chain. This weakness can best be
minimized or eliminated by making the personnel security conscious through
good training program.
RESTRICTED AREA - Is any area in which personnel or vehicles are controlled for
reasons of security.
Is established to provide security for installation or facilities and to promote
efficiency of security operations and economy in the use of security personnel.
TYPES OF RESTRICTED AREAS
A. EXCLUSION AREA – is a restricted area which contains a security interest to Top
Secret importance.
The area should be under surveillance at all times.
B. LIMITED AREA CONTROL – is restricted area in which a lesser degree of control is
required than in an exclusion area
Controlled Area – an area near or adjacent to limited or exclusive areas where entry is
restricted;
Access List – authenticated list of personnel given to the security allowing entry
to a compound or installation or part thereof;
SECURITYEDUCATION
It is defined as the exposure and teaching of employees on security and its
relevance to their work.
Security education is conducted to develop security awareness among
employees of the company. It should cover all employees, regardless of rank or
position.
TYPES OF BUSINESS RECORDS
Class I – Vital Document – This is an irreplaceable records , reproduction of which
does not have the same value as the original;
Class II – Important Document- This is a record, reproduction of which cause
considerable expense and labor, or considerable delay.
Class III – Useful Document – This is a record, the loss of which may cause
inconvenience but could be readily replaced and may not present insurmountable
obstacle to the prompt restoration of the business;
Class IV- Non essential Document – This record may include daily files, routine in
nature, lost of which will not affect the organization.
1. CLASSIFIED – refers to assign information by one of the 4 classifications categories.
CLASSIFICATION OF DOCUMENTS-Memorandum Circular No. 196, dated
07/19/1968 (Security of Classified Matter in government offices.)
TOP SECRET – any information and material, the unauthorized disclosure of
which would cause exceptionally grave damage to the nation, politically,
economically or militarily;
SECRET- any information and material, the unauthorized disclosure of which
would endanger national security, cause serious injury to the interest or prestige of
the nation or any governmental activity.
CONFIDENTIAL – any information and materials, the unauthorized disclosure of
which would be prejudicial to the interest or prestige of the nation or governmental
activity or would cause administrative embarrassment or unwarranted injury.
RESTRICTED – any information and material which requires special protection
other than those determined to be Confidential, Secret, and Top Secret matters.
OPERATIONAL SECURITY
part of physical security that deals primarily with the protection of
processes, formulas, patents, and other industrial and manufacturing activities
from espionage, infiltration, loss, compromise or photocopying;
RELATIVITY OF RISK AND SECURITY
The extent and degree of risk to security is dependent on the following:
1. RELATIVE CRITICALITY OF OPERATION – pertains to importance of the firm with
reference to the natural economy and security.
EXAMPLES: gasoline depots, communication transmission lines and power plants
2. RELATIVE VULNERABILITY – This is the susceptibility of the plant or establishment
to damage, loss or disruption of the operation due to various hazards.
EXAMPLE: location of the building, the machine or presence of possible poisons.
SECURITY HAZARDS
Normally, loss of life and damage to properties are caused by human
negligence in their failure to recognize the adverse effect of a particular condition or
event.
Security interferes by REMOVING OR DETERRING the identified hazards.
TYPES OF HAZARDS
1. NATURAL HAZARDS – arise from natural phenomena
2. HUMAN-MAN MADE HAZARDS – result of a state of mind, attitude,
weaknesses or character traits of one or more persons. It includes but not limited
to the following:
A. SABOTAGE – deliberate destruction or the deliberate damaging or
destroying of property
Saboteur - One who destroy company properties or perform
other explicit activities which would result to disturbance, to
cause financial drain, postponement of operation, threaten, or
to attach negative impression.
The most dangerous foe that security will have to deal
with
B. ESPIONAGE – it is describe as the activity if SPYING or the use of spying or
spies to GATHER INFORMATION.
Espionage agent or spy
One who has allegiance to another company, oftentimes rival, whose
primordial mission is to obtain information useful in company’s operation.
C. PILFERAGE – stealing small things or items of little value, especially habitually.
It is one of the most common and annoying hazards which security has to deal
with.
Types of Pilferer
Casual Pilferer
One who steals due to his inability to resist the unexpected
opportunity and has little fear of detection.
Systematic Pilferer
One who steals with preconceived plans and takes away any or all
types of items or supplies for economic gain.
SECURITY SURVEY
This is also known as security audit which is actually a fact-finding probe to
determine a plant’s adequacy and deficiency in all aspects of security, with the
corresponding recommendations.
Refers to checklist, audits, or inventories of security conditions.
Security Surveys are often called ‘RISK ANALYSIS SURVEYS’ or ‘RISK
ASESSMENT SURVEYS
SECURITY SURVEY
PROCEDURES
2. INITIAL BRIEFING (ENTRANCE CONFERENCE)
-specialist is prepared to visit the office
-contract is made between security officer of the office
-It would be ideal to have at his conference not only the office head but his entire
staff and other key personnel of the office.
FINAL BRIEFING (EXIT CONFERENCE)
-is an oral to the chief wherein the specialist determines whether or not his
tentative recommendations can be realistically implemented.
-the specialist discusses the recommendations with the command.
Dry-run
practical test or exercise of plans or any activity to test its validity, an operational
readiness exercise;
SECURITY INVESTIGATION
This is a planned and organized determination of facts concerning specific loss or
damage of assets due to threats, hazards or unsecured conditions.
Kinds of License to Operate (LTO)
1. Regular LTO – renewable every after 2 years; 200-1000 guards for PSA and 30
guards for CGF.
2. Temporary LTO – valid for 1 year; less than the number of guards for Regular
LTO
SURETY BOND
Agency wit 1-199 guards= 50,000
Agency with 200-499= 100,000
Agency with 500-799= 150,000
Agency with 800-1000= 200,000
October 8, 1994 - Latest amendment of the implementing rules and regulations of
private security agency
Pre licensing training – the required type of training while applying for a new security
guard license.
February 28 every year – Deadline of filing of application of the renewal of license
Human guard – Key elements in the security survey system of a plant or installation.
CBI – COMPLETE BACKGROUND INVESTIGATION
PBI → PARTIAL BACKGROUND INVESTIGATION
100 thousand – surety Bond per firearm to be deposited
40 pesos – Surety bond per firearm to be deposited
SAMPLE Q/A
1. Involve the installation of physical barriers, security lighting, use of vaults, locks and others.
a. Active measures b. Passive measures c. All of the above d. None of the above
2. Those that will deter man from committing such act of fear of being caught, charge in court
or get dismissed
a. Active measures b. Passive measures c. All of the above d. None of the above
3. An act or condition which results in a situation conducive to a breach of the protection system
a. Security Hazard
b. Man Made Hazard- acts by men either thru negligence or intenational which
compromise security measures.
c. Natural Hazard - caused by natural phenomena such as typhoons, earthquakes or
floods.
d. Threat
4. A medium or structure which defines the physical limits of an installation.
a. Barrier b. Physical security c. Perimeter Barrier d. All of the above
5. Is a visual or audible signaling device, which initiates conditions of associated circuits.
a. Alarm b. Barrier c. Protective Alarm d. Annunciator
Nota Bene:
Major parts of Alarm
1. Sensor- device which detects intrusion or abnormal condition
2. Circuit- it the transmit the communication form sensor to annunciator
3. Annunciator- signaling device - provides sound and siren.
6. Portable and detachable lock having a pivoted or sliding hasp which passess through a staple
ring, or the like and is made fast or secured.
a. Combination lock b. Pin Tumbler lock c. Padlock
7. An area near or adjacent to limited or exclusive areas where entry is restricted.
a. Restricted area b. Exclusion area c. Controlled area d. Open area
8. Authenticated list of personnel given to the security allowing entry to a compound or
installation or part thereof
a. Employee List b. Access List c. Security List d. All of the above
9. Exposure and teaching of employees on security and its relevance to their work.
a. Security drill b. Security Survey c. Security education d. Security program
10.. It is done with employees about to abscond the company in order to help identify problems
contributing to employee turnover.
a. Interview b. Exit interview c. Farewell interview d. None of the above
11. Refers to the procedure followed, inquiries conducted, and criteria applied to determine the
work suitability of a particular applicant or the retention of a particular employee.
a. Personnel Security
b. Personal Security
c. Entrance interview
d. Exit interview
12. A metallic container used for safekeeping of documents or small items in office or
installation.
a. Safe b. Vault c. Cabinet d. All of the above
13. This is an irreplaceable records , reproduction of which does not have the same value as the
original;
a. Non essential document b. Useful document c. Vital document d. Important document
Types of Keying System
Change Key- it can open a single lock.
sub-master key- it can open groups of locks
master key- it can open series of locks
grand master key- capable to open all locks in
the facility- it can open 2 or more master
14. This is a form of physical security involving industrial plants and business enterprises.
a. Hotel Security b. V.I.P. Security c. Bank Security d. Industrial Security
15. The type of fence that is primarily designed to allow complete visual access between two
areas is:
a. Solid fence b. Full-view fence c. Semi-solid fence d. All of them
16. This type of security involves the protection resulting from the application of various
measures which prevent or delay the enemy or unauthorized person from gaining information
through communication.
a. Operational Security b. Communication Security c. Physical Security d. None of the
Above
17. Which of the following refers to physical barriers that are constricted by men for the purpose
of delaying any entry of an intruder?
A. Artificial B. Energy C. Natural D. Structural
18. It is a natural, man-made or physical device which is capable of restricting, deterring or
delaying illegal access to an installation.
A. Fence B. Barrier C. Wall D. Hazard
19. This concern with the physical measures adopted to prevent unauthorized access to
equipment, facilities, material and document and to safeguard them against espionage, sabotage,
damage, loss and theft.
a. Personnel Security
b. Physical Security
c. Document and Information
20. A Private Security Agency who is applying for regular license to operate must possess at
least 70 licensed firearms and a minimum of:
a. 100 Guards
b. 200 Guards
c. Guards
d. Guards
21. A classification of document which includes those documents that are irreplaceable and loss
of which would cause exceptionally grave damage to the establishment:
a. Class III- READILY AVAILABLE
b. Class II - IMPORTANT
c. Class IV - NON- ESSENTIALS NO EFFECT
d. Class I- VITAL
22. Who exercises the power to remove for cause, license issued to security guards?
A. Any of these B. Secretary, DILG C. Chairman, NAPOLOCOM D. C/PNP through the
Chief, SOSIA
23. GINA COLE is planning to build his house in one of the nicest subdivision in their town of
Tagaytay City; he plans to have many forms of security so that no one has an access to his
property. If GINA COLE going to include the quality of the building exterior of his dream
house this is considered as?
a. First line of defense b. Second line of defense c. Third line of defense d. All of these
24. Among the visitors movement control, which of the following is the most important?
A. Escort B. Time Travelled C. Visitor Logbook D. Visitor entrance
25. A branch of information security applied to both theoretical and actual computer system.
A. Data Security B. Information System C. Computing security D. Computer Security
GOOD LUCK!!
PREP BY: ROG