Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
7 views16 pages

Security Reviewer Midterm

The document defines security as the state of being secured and outlines the fundamentals of industrial security management, including active and passive security measures. It details various types of security, such as physical, personnel, document, and communication security, while emphasizing the importance of security education and risk assessment. Additionally, it discusses the principles of physical security, types of barriers, alarm systems, and the classification of documents based on their sensitivity.

Uploaded by

paprintpo012345
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views16 pages

Security Reviewer Midterm

The document defines security as the state of being secured and outlines the fundamentals of industrial security management, including active and passive security measures. It details various types of security, such as physical, personnel, document, and communication security, while emphasizing the importance of security education and risk assessment. Additionally, it discusses the principles of physical security, types of barriers, alarm systems, and the classification of documents based on their sensitivity.

Uploaded by

paprintpo012345
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Security Is defined as the state or quality of being secured, freedom from fear

or danger, assurance, or certainty. To secure is to make safe or be protected.

Security can also be defined as:


1. State or feeling of safety; the sate or feeling of being safe and protected.
2. freedom from worry about possible loss: the assurance that something of value
will not be taken away;
3. something giving assurance: something that provides a sense of protection
against loss, attack or harm

FUNDAMENTALS OF INDUSTRIAL SECURITY MANAGEMENT


CONCEPTS:
1. INDUSTRY – constant application to work or business
2. INDUSTRIAL – pertaining to or engaged in industry
3. SECURITY- state or quality of being secured
4. MANAGEMENT – skillful use of means to accomplish a purpose.
5. INDUSTRIAL SECURITY – security measures applied to business industries, or
the business of providing security.
6. INDUSTRIAL SECURITY MANAGEMENT – ISM could be defined as the “skillful
handling of the security and safety measures of business enterprises and
industrial establishments”

SECURITY AND SAFETY MEASURES

Active Measures – Designed to detect or impede hazards


 physical barriers
 security lighting
 use of vaults,
 locks and others

Passive Measures - Those that will deter man from committing such act for fear
of being caught charged in court or get dismissed.
Security education programs, investigation, fire prevention seminars, personal security
checks.

MAJOR DIVISIONS OF INDUSTRIAL SECURITY

Physical Security
 This concern with the physical measures adopted to prevent
unauthorized access to equipment, facilities, material and document and to
safeguard them against espionage, sabotage, damage, loss and theft.
BROADEST TYPE OF SECURITY

Personnel Security
 This is as important as physical security. Personnel security starts even
before the hiring of an employee and remains to be maintained for as long
as the person is employed.
 Its purpose is to insure that a firm hires those best suited to assist the
firm in achieving its goals and objectives and once hired assist in providing
necessary security to the work force while carrying out their functions.
WEAKEST LINK IN SECURITY

Document and Information Security


 This involves the protection of documents and classified papers from
loss, access by unauthorized persons, damage, theft and compromise through
disclosure.
 Classified documents need special handling. Lack of indoctrination and
orientation among the personal handling them can result in the leakage, loss,
theft and unauthorized disclosure of the documents.

OTHER TYPES OF SECURITY


COMMUNICATION SECURITY
 It is the protection resulting from various application of various measures that
prevent or delay the enemy or unauthorized persons in gaining information
through the communication system. This includes:
A. Transmission Security – protect transmission from interceptions
B. Cryptographic Security – result from the provisions of technically sound crypto-
systems and their proper use.
C. Physical Security – providing of safeguards to equipment and materials from
access by unauthorized person

HOTEL SECURITY
BANK SECURITY
DOCUMENT SECURITY – protection of documents and classified papers
PERSONAL SECURITY – protection of personnel especially ranking officials (VIP
security)
CRISES SECURITY – Part of VIP security involved in hostage or kidnapping of VIPs
INDUSTRIAL SECURITY
OPERATIONAL SECURITY – deals primarily with the protection of processes, formula
or patents and other industrial and manufacturing activities from espionage, infiltration,
loss, compromise or photocopying
SCHOOL SECURITY
SUPERMARKET SECURITY
ETC.

PHYSICAL SECURITY

 a system of barriers placed between the potential intruder and the


objects/matter to be protected.
 It is the broadest branch of security, which is concerned with physical
measures adopted to prevent unauthorized access to equipment, facilities,
materials and documents and to safeguard them against espionage, sabotage,
damage and theft.

PRINCIPLES OF PHYSICAL SECURITY


In every establishment, physical measures are needed to deny unauthorized
access or intrusion because of the following:
1. ENEMY AGENTS MUST/WILL ALWAYS SEEK ACCESS
2. THERE IS NO IMPENETRABLE BARRIER – they are willing to devote enough
time, money, personnel, materials and imagination in passing barriers.
3. DEFENSE IN DEPTH MEANS BARRIER AFTER BARRIER – there should be
integration of all barriers adopted in the installation.
4. SURREPTITIOUS VERSUS NON-SURREPTITIOUS ENTRY
SURREPTITIOUS (not observable) – the greatest hazard, because it is usually
difficult to determine
NON-SURREPTITIOUS (observable)

 5. EACH INSTALLATION IS DIFFERENT – each installation will have different
problems to overcome. The security procedures will not be adequate for all
installation.
 BARRIERS
 can be defined as any structure or physical device

capable of restricting, deterring, delaying, illegal access to an installation

GENERAL TYPES OF PHYSICAL BARRIER:


1. NATURAL BARRIER – include mountains, rivers, seas, desserts or terrain
difficult to traverse. To be fully effective, these barriers must be under
surveillance of guards.

2. STRUCTURAL OR MAN-MADE BARRIER – structural constructions made by


man like fences, walls, floors, roofs, grill or other physical means to deter or
impede penetration.

SPECIFIC TYPES OF PHYSICAL


SECURITY BARRIERS

1. STRUCTURAL BARRIERS – constructed by man (walls, ceilings, doors)


2. HUMAN BARRIERS – guards who stand between intruder and the matter to be
protected.
3. ANIMAL BARRIERS – shepherd dogs (Geese – cheapest)
4. NATURAL BARRIERS – mountains, cliffs, rivers, seas etc.
5. ENERGY BARRIERS – electrical and electronic devices (protected lighting,
alarms, etc)

PERIMETER BARRIERS
It is a medium or structure which defines the physical limits of an installations or
area to restrict or impede access

LINE OF PHYSICAL DEFENSE/ Depth of Defense


1. FIRST LINE – includes all perimeter barriers, located in the outermost area of
an installation like fence.
2. SECOND LINE – includes the building exterior (doors, floors, windows, walls
and grills.)
3. THIRD LINE – includes those internal control measures (storage system like
safe, vaults and file room)

FENCE
Are independent structures designed to control physical and visual access
between outside areas.

TYPES OF FENCES
1. SOLID FENCE
Constructed in such away that visual access through the fence is denied. Its
advantage is that it denies the opportunity for the intruder to become familiar with
the personnel, activities and the scheduled movements of the security personnel.
On the other hand, it prevents the guards from observing the area around
the installation and it creates shadow that may be used by the intruder for cover and
concealment.

2. FULL VIEW
It is constructed in such a way that visuals access is permitted through the
fence. Its advantage is that it allows the security personnel to keep the surrounding
of the installation under observation.
On the other hand, it allows the intruder to become familiar with the
movements the security personnel.

WIRE FENCE – is a type of fence made of chain-link, barbed wire concertina

ADDITIONAL PROTECTIVE MEASURE

Top guard
 Is an additional overhang of barbed wire fence placed on vertical perimeter
fences facing upward and outward with a 45 degree angle with 3 to 4 strands
of barbed wires spaced 6 inches apart.

Guard Control Stations


 Normally provided at main perimeter entrance to secure areas located out of
doors and manned by guards on full time basis .

Towers or Guard Towers


 Are house-like structures above the perimeter barriers. It gives psychological
effect to violators

PERIMETER GUARDS
Are also employed in augmenting the existing perimeter security or perimeter
barriers of a certain establishment

PROTECTIVE ALARMS
ALARM – is synonymous to warning of imminent danger.
Is an aural or visual signal given by the annunciator to the security when
intruder actuate certain devices in a protected area.

Terms used in Alarm Detection System

Actuator – button, magnetic switch or thermostat that cause system to alarm.


Enunciator – visual or audible signaling device which initiates condition of associated
circuits.
Capacitance – property of two or more objects which enables to store electrical energy.
Control unit – terminal box for all sensors.
Fail safe – a term applied to a system when a component fails to function properly.

Types of Alarm Detection System


Central Alarm System
A type of protective alarm system where the central station is located outside
the installation. When the alarm is sounded, central station notifies the police and
other agency.

Proprietary System
This functions they same way as the central station system except it is owned,
operated by the facility.
Response to all alarms is by the facilities own security or fire personnel.

Local Alarm System


Consist of ringing up a visual or audible alarm near the object to be protected.
In case of alarm, response be made by local guards and other personnel
within sight or hearing.

Auxiliary System
In this system, installation circuits are led into local police or fire department
by leased telephone lines.
High incidence of false alarms have made this system unpopular with public
fire and police personnel

Local Alarm by Chance System


This is a local alarm system in which a bell or siren is sounded with no
predictable response.
The hope is that a neighbor or passing patrol car will reach the alarm and
call for police assistance, but such a call is purely a matter of chance.
Dial Alarm System
This system is set to dial a predetermined numbers when the alarm is
activated.
When the phone is answered, a recording states that an intrusion is in
progress.
It could fail if line were busy or if the phone connection were cut.

DEFINITION OF TERMS

LOCK
defined as mechanical, electrical, hydraulic or electronic device designed to prevent
entry to a building or room.
PADLOCK
A portable and detachable lock having a pivoted or sliding hasp which possess through
a staple ring, or the like and is made fast or secured.

PETERMAN
A term used in England for lock picker, safecrackers, and penetrators of restricted areas
or rooms
FALSE KEY
Genuine key stolen from the owner

Types of Security Cabinets


Safe - A metallic container used for safekeeping of documents or small items in an
office or installation.
Vault - It is a heavily-constructed fire and burglar resistant container, usually a
part of the building structure, used to keep and protect cash, documents, and negotiable
instrument.

PERSONNEL SECURITY
Includes all the security measures designed to prevent unsuitable
individuals or persons of doubtful loyalty to the government, from gaining
access to classified matter or to any security facility, and to prevent
appointment, or retention as employees of such individuals
It is the “weakest link” in the security chain. This weakness can best be
minimized or eliminated by making the personnel security conscious through
good training program.

RESTRICTED AREA - Is any area in which personnel or vehicles are controlled for
reasons of security.
Is established to provide security for installation or facilities and to promote
efficiency of security operations and economy in the use of security personnel.

TYPES OF RESTRICTED AREAS

A. EXCLUSION AREA – is a restricted area which contains a security interest to Top


Secret importance.
The area should be under surveillance at all times.

B. LIMITED AREA CONTROL – is restricted area in which a lesser degree of control is


required than in an exclusion area

Controlled Area – an area near or adjacent to limited or exclusive areas where entry is
restricted;

 Access List – authenticated list of personnel given to the security allowing entry
to a compound or installation or part thereof;

SECURITYEDUCATION

It is defined as the exposure and teaching of employees on security and its


relevance to their work.
Security education is conducted to develop security awareness among
employees of the company. It should cover all employees, regardless of rank or
position.

TYPES OF BUSINESS RECORDS


Class I – Vital Document – This is an irreplaceable records , reproduction of which
does not have the same value as the original;
Class II – Important Document- This is a record, reproduction of which cause
considerable expense and labor, or considerable delay.
Class III – Useful Document – This is a record, the loss of which may cause
inconvenience but could be readily replaced and may not present insurmountable
obstacle to the prompt restoration of the business;
Class IV- Non essential Document – This record may include daily files, routine in
nature, lost of which will not affect the organization.

1. CLASSIFIED – refers to assign information by one of the 4 classifications categories.

CLASSIFICATION OF DOCUMENTS-Memorandum Circular No. 196, dated


07/19/1968 (Security of Classified Matter in government offices.)

 TOP SECRET – any information and material, the unauthorized disclosure of


which would cause exceptionally grave damage to the nation, politically,
economically or militarily;
 SECRET- any information and material, the unauthorized disclosure of which
would endanger national security, cause serious injury to the interest or prestige of
the nation or any governmental activity.
 CONFIDENTIAL – any information and materials, the unauthorized disclosure of
which would be prejudicial to the interest or prestige of the nation or governmental
activity or would cause administrative embarrassment or unwarranted injury.
 RESTRICTED – any information and material which requires special protection
other than those determined to be Confidential, Secret, and Top Secret matters.

OPERATIONAL SECURITY
 part of physical security that deals primarily with the protection of
processes, formulas, patents, and other industrial and manufacturing activities
from espionage, infiltration, loss, compromise or photocopying;

RELATIVITY OF RISK AND SECURITY


The extent and degree of risk to security is dependent on the following:
1. RELATIVE CRITICALITY OF OPERATION – pertains to importance of the firm with
reference to the natural economy and security.
EXAMPLES: gasoline depots, communication transmission lines and power plants
2. RELATIVE VULNERABILITY – This is the susceptibility of the plant or establishment
to damage, loss or disruption of the operation due to various hazards.
EXAMPLE: location of the building, the machine or presence of possible poisons.

SECURITY HAZARDS
Normally, loss of life and damage to properties are caused by human
negligence in their failure to recognize the adverse effect of a particular condition or
event.
Security interferes by REMOVING OR DETERRING the identified hazards.

TYPES OF HAZARDS

1. NATURAL HAZARDS – arise from natural phenomena


2. HUMAN-MAN MADE HAZARDS – result of a state of mind, attitude,
weaknesses or character traits of one or more persons. It includes but not limited
to the following:
A. SABOTAGE – deliberate destruction or the deliberate damaging or
destroying of property
 Saboteur - One who destroy company properties or perform
other explicit activities which would result to disturbance, to
cause financial drain, postponement of operation, threaten, or
to attach negative impression.
The most dangerous foe that security will have to deal

with
B. ESPIONAGE – it is describe as the activity if SPYING or the use of spying or
spies to GATHER INFORMATION.
Espionage agent or spy
One who has allegiance to another company, oftentimes rival, whose
primordial mission is to obtain information useful in company’s operation.

C. PILFERAGE – stealing small things or items of little value, especially habitually.


It is one of the most common and annoying hazards which security has to deal
with.

Types of Pilferer
Casual Pilferer
One who steals due to his inability to resist the unexpected
opportunity and has little fear of detection.

Systematic Pilferer
One who steals with preconceived plans and takes away any or all
types of items or supplies for economic gain.

SECURITY SURVEY
This is also known as security audit which is actually a fact-finding probe to
determine a plant’s adequacy and deficiency in all aspects of security, with the
corresponding recommendations.
Refers to checklist, audits, or inventories of security conditions.

 Security Surveys are often called ‘RISK ANALYSIS SURVEYS’ or ‘RISK


ASESSMENT SURVEYS

SECURITY SURVEY
PROCEDURES

2. INITIAL BRIEFING (ENTRANCE CONFERENCE)


-specialist is prepared to visit the office
-contract is made between security officer of the office
-It would be ideal to have at his conference not only the office head but his entire
staff and other key personnel of the office.

FINAL BRIEFING (EXIT CONFERENCE)


-is an oral to the chief wherein the specialist determines whether or not his
tentative recommendations can be realistically implemented.
-the specialist discusses the recommendations with the command.

Dry-run
 practical test or exercise of plans or any activity to test its validity, an operational
readiness exercise;
SECURITY INVESTIGATION
This is a planned and organized determination of facts concerning specific loss or
damage of assets due to threats, hazards or unsecured conditions.

Kinds of License to Operate (LTO)

1. Regular LTO – renewable every after 2 years; 200-1000 guards for PSA and 30
guards for CGF.

2. Temporary LTO – valid for 1 year; less than the number of guards for Regular
LTO

SURETY BOND
Agency wit 1-199 guards= 50,000
Agency with 200-499= 100,000
Agency with 500-799= 150,000
Agency with 800-1000= 200,000

October 8, 1994 - Latest amendment of the implementing rules and regulations of


private security agency
Pre licensing training – the required type of training while applying for a new security
guard license.
February 28 every year – Deadline of filing of application of the renewal of license
Human guard – Key elements in the security survey system of a plant or installation.
CBI – COMPLETE BACKGROUND INVESTIGATION
PBI → PARTIAL BACKGROUND INVESTIGATION
100 thousand – surety Bond per firearm to be deposited
40 pesos – Surety bond per firearm to be deposited

SAMPLE Q/A
1. Involve the installation of physical barriers, security lighting, use of vaults, locks and others.

a. Active measures b. Passive measures c. All of the above d. None of the above

2. Those that will deter man from committing such act of fear of being caught, charge in court
or get dismissed

a. Active measures b. Passive measures c. All of the above d. None of the above

3. An act or condition which results in a situation conducive to a breach of the protection system

a. Security Hazard

b. Man Made Hazard- acts by men either thru negligence or intenational which
compromise security measures.

c. Natural Hazard - caused by natural phenomena such as typhoons, earthquakes or


floods.

d. Threat

4. A medium or structure which defines the physical limits of an installation.

a. Barrier b. Physical security c. Perimeter Barrier d. All of the above

5. Is a visual or audible signaling device, which initiates conditions of associated circuits.

a. Alarm b. Barrier c. Protective Alarm d. Annunciator

Nota Bene:

Major parts of Alarm

1. Sensor- device which detects intrusion or abnormal condition

2. Circuit- it the transmit the communication form sensor to annunciator

3. Annunciator- signaling device - provides sound and siren.

6. Portable and detachable lock having a pivoted or sliding hasp which passess through a staple
ring, or the like and is made fast or secured.

a. Combination lock b. Pin Tumbler lock c. Padlock

7. An area near or adjacent to limited or exclusive areas where entry is restricted.


a. Restricted area b. Exclusion area c. Controlled area d. Open area

8. Authenticated list of personnel given to the security allowing entry to a compound or


installation or part thereof

a. Employee List b. Access List c. Security List d. All of the above

9. Exposure and teaching of employees on security and its relevance to their work.

a. Security drill b. Security Survey c. Security education d. Security program

10.. It is done with employees about to abscond the company in order to help identify problems
contributing to employee turnover.

a. Interview b. Exit interview c. Farewell interview d. None of the above

11. Refers to the procedure followed, inquiries conducted, and criteria applied to determine the
work suitability of a particular applicant or the retention of a particular employee.

a. Personnel Security

b. Personal Security

c. Entrance interview

d. Exit interview

12. A metallic container used for safekeeping of documents or small items in office or
installation.

a. Safe b. Vault c. Cabinet d. All of the above

13. This is an irreplaceable records , reproduction of which does not have the same value as the
original;

a. Non essential document b. Useful document c. Vital document d. Important document

Types of Keying System

Change Key- it can open a single lock.

sub-master key- it can open groups of locks

master key- it can open series of locks

grand master key- capable to open all locks in


the facility- it can open 2 or more master

14. This is a form of physical security involving industrial plants and business enterprises.

a. Hotel Security b. V.I.P. Security c. Bank Security d. Industrial Security

15. The type of fence that is primarily designed to allow complete visual access between two
areas is:

a. Solid fence b. Full-view fence c. Semi-solid fence d. All of them

16. This type of security involves the protection resulting from the application of various
measures which prevent or delay the enemy or unauthorized person from gaining information
through communication.

a. Operational Security b. Communication Security c. Physical Security d. None of the


Above

17. Which of the following refers to physical barriers that are constricted by men for the purpose
of delaying any entry of an intruder?

A. Artificial B. Energy C. Natural D. Structural

18. It is a natural, man-made or physical device which is capable of restricting, deterring or


delaying illegal access to an installation.

A. Fence B. Barrier C. Wall D. Hazard

19. This concern with the physical measures adopted to prevent unauthorized access to
equipment, facilities, material and document and to safeguard them against espionage, sabotage,
damage, loss and theft.

a. Personnel Security

b. Physical Security

c. Document and Information

20. A Private Security Agency who is applying for regular license to operate must possess at
least 70 licensed firearms and a minimum of:

a. 100 Guards

b. 200 Guards

c. Guards
d. Guards

21. A classification of document which includes those documents that are irreplaceable and loss
of which would cause exceptionally grave damage to the establishment:

a. Class III- READILY AVAILABLE

b. Class II - IMPORTANT

c. Class IV - NON- ESSENTIALS NO EFFECT

d. Class I- VITAL

22. Who exercises the power to remove for cause, license issued to security guards?

A. Any of these B. Secretary, DILG C. Chairman, NAPOLOCOM D. C/PNP through the


Chief, SOSIA

23. GINA COLE is planning to build his house in one of the nicest subdivision in their town of
Tagaytay City; he plans to have many forms of security so that no one has an access to his
property. If GINA COLE going to include the quality of the building exterior of his dream
house this is considered as?

a. First line of defense b. Second line of defense c. Third line of defense d. All of these

24. Among the visitors movement control, which of the following is the most important?

A. Escort B. Time Travelled C. Visitor Logbook D. Visitor entrance

25. A branch of information security applied to both theoretical and actual computer system.

A. Data Security B. Information System C. Computing security D. Computer Security

GOOD LUCK!!

PREP BY: ROG

You might also like