You are on page 1of 29

Saint Joseph College

CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte
INTRODUCTION TO INDUSTRIAL SECURITY
CONCEPTS

LESSON 1. PHILIPPINE SETTING SECURITY HISTORY

RA. NO. 5487

After World War II there was a tremendous influx of machineries and other heavy
equipment in the Philippines Following the Reparation act. Government-owned or
controlled corporation companies and their subsidiaries as well as private commercial
and industrial firms, could not provide adequate protection to these machineries through
their respective in house security personnel. Hence they resorted to the use of contract
private watchman and security guards.

The great demand for private watchman and security guards saw the
unprecedented growth in the private security agencies. Private detective, watchman and
security guard agencies grew in leaps and bounds. This resulted to a chaotic situation in
the security because there was no standard set of laws; rules and regulations that
government operation and business of private detective, watchman and security guard
agencies in the Philippines. Each city and municipality had its own ordinances, rules
and regulations covering the business of private detective watch man and security
guards which in most part were in variance to each other.

Then a group of private detective, watchman and security guard agencies


operators organized themselves into as association known as the “Philippine
Association of Detective and Protective Agency Operators, Incorporated” or short
“PADPAO”. Their main objective, among other things was to lobby to appropriate and
competent authorities for the enactment of laws, rules and regulations to standardize
the organization, operation, business of private detective, watchman and security guard
agencies in the Philippines. On June 13, 1969 during the 4 th session, 6th congress if the
Republic of the Philippines, RA 5487 was enacted. It is an act to regulate the
organization and operation of private detective watchman and security guard agencies.
In short, shall known as “The Private Security Agency Law”.

Presidential Decree No. 11

Prior to the promulgation of Procalamation No. 1081 (Martial Law) there was
pending before the congress House Bill No. 4606. The house bill sought to amend
Section 3(d) 4 and * of RA. 5478. The amendments were necessited because of the
following conditions.
Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte

Firstly, there were numerous private firms, companies, and corporations


including government owned and controlled corporations employing around 30,000
watchmen or security guards who armed with considerable number of firearms but who
are not covered by Section 3 of the RA no, 5487.
Secondly, RA 5487 did not establish adequate safeguards against intrusion of
personal interest in the issuance of licenses prescribed by said law.
Thirdly, there were no adequate regulatory powers of the Philippine Constabulary
(Now PNP) over the operations of the private security guard or watchman agencies and
their guards or watchmen.

PD. No. 100


Further amended Section3(d) 4,5,8,9,11 and 16 (par.1) because in the course of
the enforcement of RA5487 as amended, it has been observed that there was need for
additional amendments to make it more responsive to the demands of peace and order
especially after the promulgation of Proclamation No. 1081.

PD No. 1919
Further amended section 3(d) , 8 (par.3), 16 (par.1), 18 of RA 5487 as amended
in order to make it more responsive to the demands of the private security industry.
PD No. 1919 introduced the concept of administrative fines based on the degree
of delinquencies committed in order for the Chief executive of the Philippine
Constabulary (Now the PNP) not to result to drastic action of suspending or cancelling
the operations of private security agencies and company guard forces, afford them a
chance to continue their business operation and earn revenues for the government.
There was also necessary to redefine the meaning of watchman or security
guard into more specific terms to clarify the status of the three categories of security
guards covered by RA. 5487.

RA No. 6975
Established the Philippine National Police under the Reorganized Department of
the Interior and Local Government.
As a result, the Act abolished the National Police Commission (NAPOLCOM) and
the Philippine Constabulary – Integrated National Police (PC-INP).
The Act also created the Civil Security Unit under the PNP to provide
administrative services and general supervision over the organization, business
operation and activities of all organized private detectives, watchmen, security guard
agencies and company guard forces.

Definition of terms:
1. Administration – the supervision, direction and control of a security agency of its
human and other resources to carry out its functions.
Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte
2. Agency – an office, entity or bureau which can be private or government. In private
security work, this is the administering or directing the office for security guards.
3. Alarm System – combination of intrusion and detection devices arranged and wired
so as to support one another to detect intrusion or attempt threat.
4. Annunciator – a single device in an alarm system which initiates conditions by means
of associated circuitry. The signal may be an oral like bell, siren it may be visual like a
steady or blinking colored lamp.
5. Audio – referring to sound within human being.
6. Audio Alarm –a device using microphones or listening devices which can monitor
sounds or vibrations like hammering, explosions and other noises caused by man or
machines.
7. Badge System – a system used by security for personnel movement and control
within a plant/ facility whereby or identification tags are issued to employees, visitors,
contractual workers and even vehicles. These badges may be colored – coded,
temporary, semi-permanent or permanent.
8. EDPS – electronic data processing system; a computer
9. Safety Engineers – work in a field of accident prevention. They design structures and
equipment to male home, schools, jobs, highways and communication safer.
10. Management – is the process of directing and facilitating the work of people
organized in formal groups in order to achieve a desired goal.
11. Security Management – is the act of preparing, organizing and directing the efforts
of members of security force in order that they achieve the accomplishment of the
security purposes.
12. Supervision – is the direction accompanied by authority of the work of others. It is
the act of overseeing and instructing persons in the detailed performance of their work.
13. Security Supervision – is the direction and control of security personnel in the
performance of their studies and functions.
14. Scientific Management – the application of science to work which demands facts,
instead of guesswork, which establishes standards and methods which are scientifically
determined and through the aid of records sees that they are carried out.
15. Planning – the process of finding adequate solutions to management problems,
preparing outline the things to be done how they will be done to achieve results.
16. Organizing – the process of allocating authority, responsibility and accountability to
people establishment of channel of inter group communication to secure coordination
and efficiency.
17. Security Officer – any properly trained security officer shall be appointed in every
Department of the Government which handles classified matter. He shall undergo
training to be conducted by the National Intelligence Coordinating Agency or Armed
Forces of the Philippines Intelligence Agencies. He shall be responsible to the head of
the Department for the implementation and enforcement of these regulations and the
necessary action on breaches of security. Before appointment as a Security Officer, an
officer must first be cleared by the Head of the Department is authorized to handle.
Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte
18. Organization - is the arrangement of people with common objective or purpose,
manner to make possible the establishment if areas of responsibility with clearly defined
channels of communication and authority.
19. Staffing - the task of providing competent men to do the job and choosing the right
men through harmonious adjustments or functioning of tasks directed towards a
common goal.
20. Directing – the giving of authoritative instructions, orders, or commands to working
me, relative to specific , procedures or activities which are to be performed in a
particular manner or time.
21. Coordinating – the accomplishment of an orderly pattern of group of effort among
working men, relative to specific adjustment or functioning of tasks, directed toward a
common goal.
22. Reporting – the making detail account of activities, work progress, investigation and
unusual things in order to keep everyone informed of what is going on.
23. Budgeting – the forecasting in detail of the results of an officially recognized
program of operations based on the highest reasonable expectations of operating
efficiency.
24. Security Clearance – is the certification be a reasonable authority that the person
described is cleared for access to classified matter as the appropriate level.
25. Custodian – an individual who has possession of or in otherwise charged with the
responsibility for safeguarding and accounting of classified material.
26. Officer – includes government or Armed Forces Official or officer permanently or
temporarily employed in a department defined.
27. Department – used to cover any Philippine Government Service or Instrumentality.
28. Trade Secret – consists of formula, pattern, devise or compilation of information
which is used in one’s business and which gives him opportunity to gain an advantage
over competitors who do not know or to use it.
29. Order/ Mission – a written authority issued by the agency directing a guard to
perform certain lawful task.

These are the important points you have to take note for Lesson 1 that will come out
during premid and midterm examinations.

- Purpose of RA 5487
- Composition of Philippine Association of Detective and Protective Agency Operations
( PADPAO)
- Objectives of PADPAO
- Why did Presidential Decree No.11 amended RA 5487?
- What are those Presidential Decrees that further amended RA 5487.
Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte
- Purpose of PD. No. 1919
- Purpose of Republic Act No. 6975

- Definition of Terms.
• Alarm System
• Audio Alarm
• Badge System
• Safety Engineers
• Security Management
• Security Supervision
• Security Officer
• Order/Mission
Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte

LESSON 1 ACTIVITY NO.1

Draw your own concept of the evolution of the Philippine Setting Security History.
Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte
LESSON 1. ACTIVITY NO. 2

What is the relevance of learning the Philippine Setting Security History in the
study of Industrial Security Concepts?
Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte
LESSON 2. SECURITY

Security Defined

Take note on the definition of Security.

Is a protection against any type of crime to safeguard life and property and assist
various methods and devices.

Is the state of equality of being secure, freedom from fear or danger assurance ,
certainty. This means that to be secure is to make safe or protected.

Security in a collective sense, is the same as protection and safety, the state of
being safe and the condition of being protected against physical , social, spiritual ,
financial, political, emotional, occupational , psychological or other types or
consequences of failure, damage, error, accidents harm or any other event which could
be considered not considerable.

Basically it is the action of man against man that led to many unsecured and
unsafe conditions. Reasons could be economic, revenge or just plain greed and
avarice. Whatever the motives, the civilized man needs adequate protection.

Security has its main purpose to safeguard life and property by the use of methods and
devices.

When can you say that you are already secure? – you are secured when there is
freedom from fear, there is freedom from fear when you feel safe from your
surroundings that danger will not arise from it.

Based on the above definition, it stated that some reasons why there is unsecured and
unsafe situations is also due to acts of men.

For example, unsecured situations due to crime of theft, theft is mainly caused by acts
of men due to their personal wants to benefit from someone. So this is when need of
security arise. In order to deter acts of theft others will install CCTV cameras in order to
mitigate or stop these acts.

Industrial Security defined


Is a form of security involving industrial plants and businesses enterprises and
the like. This includes the safeguarding of personnel, premises, processes, documents
properties and operation.
Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte
The 2 private organizations who will build effective large scale security services
in the middle of 19th century;

1. Philip Sorensen of Sweden – provided personnel trained to deal with in the limited
kingdom and Wester Europe.

Ex.
a. loses from crime.
b. fire
c. accident
d. flood waste

Philip Sorensen’s way to deal with security is by training his personnel who to deal with
unsecured situations.

2. Allan Pinkerton of United States – built security measures to private and government
until the advent of collective bargaining.

Ex.
a. intelligence
b. counter intelligence
c. investigators
d. internal security
e. law enforcement services

Allan Pinkerton’s way to achieve security is by building security measures like


intelligence, counter intelligence, investigators, internal security and law enforcement
services.

Intelligence in the study of criminology is just like a Spy, wherein a person keeps a
secret watch on a person or thing to obtain information.

Counter Intelligence is gathering information against crime of espionage and other


intelligence activities, sabotage or assassinations.

Investigators conducts thorough search of facts, especially those that are hidden.

Internal security is providing security against internal threats like those that are harmful
to company’s information system.

Law Enforcement are group of people who enforce laws, investigate crimes and make
arrest for those who violate laws.
Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte

Field of Security

1. IT Field

Take note on the definitions below. These are the methods of securing important
Informations.

a. Computing Security – is a branch of information security applied to both theoretical


and actual computer systems. Computer security is a branch of computer science that
addresses enforcement of secure behavior on the operation of computers.

For computing security this is mainly focused on the measures how to protect
information that will pass through a computer system,

b. Data Security – is the means of ensuring that the data is kept safe from corruption
and that access to it is suitably controlled. It also helps in protecting personal data.

For Data Security this is focused on the ensuring that datas or documents that are kept
are safe, that no person may able to access it aside from those who have authority to
do so.

Example for this is like Viruses from USB’s, for data security they will ensure that none
of these may get into datas to avoid corruption.

c. Application Security - encompasses measures taken to prevent exceptions in the


security policy of an application or the underlying system through flaws is the design
development of the application.

Application Security this where they apply or enforce the security system they have
made and to check whether it is effective or not.

d. Information Security – means of protecting information systems from unauthorized


access, use, disclosure, disruption, modification or destruction.

For information security the same as well, it also involves the measures on how to
protect information from unauthorized access.

e. Network Security – consist of provision made in an underlying computer network


infrastructure, policies adopted by the network administrator to protect the network and
the network – accessible resources from unauthorized access and the effectiveness of
these measures combined together.
Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte

Network Security involves the measures on how to protect the network of information or
group of information related with each other against unnecessary access

2. Physical Field

For Physical Field this involves security for the prevention of crimes committed against
infrastructures like shopping centers, warehouses, airports and also houses for home
security. Take note on the definitions below.

a. Physical Security – describes measures that prevent or deter attackers form


accessing a facility resources or information stored on physical media. It can be as
simple as locked door or as elaborate as multiple of armed guard posts.

Involves measures to avoid, prevent or mitigate attacks from buildings or facilities from
its physical features like doors, windows and others.

b. Shopping Center Security – concern with the protection of the stores, warehouses,
storage its immediate premises and properties as well as the supermarket personnel
and customer relation.

Measures to avoid theft in shopping centers and other business related facilities.
Protect the storage of goods and other things inside warehouses.

c. Airport Security – techniques and methods used in protecting airports and by


extension aircraft from crime and terrorism.

Involves measures to protect airports and prevent terrorist attack.

d. Home Security – methods use of protecting residential homes or town sites which
includes the interior protection of houses against property losses or damages.

Involves measures for prevention of attacks from home especially against robbers. This
will involve providing protections on the external and internal parts of houses.

3. Political Field

For political field this involves security measures taken by nations to maintain peace
and order between other nations and deter commission of crimes.

a. International Security – consists of the measures taken by nations and international


organizations to ensure mutual survival and safety. These measures includes military
action and diplomatic agreements such as treaties and conventions.
Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte
International Security measures made by nations and international organization. Its
main purpose is to ensure that peace is maintained between nations.

b. National Security – refers to the requirement to maintain the survival of the nation
state through the use of economic, military and political power and the exercise of
diplomacy.

Security are measures taken by nations to protect their lands and people against any
attacks from other nations. One way of providing such is by putting up a strong military
power to fight against any attack.

c. Human Security - for understanding global vulnerabilities whose proponents


challenge the traditional notion of national security by arguing that the proper referent
for security should be the individual rather than the state.

For human security, they will study herein what are the reasons why human are
vulnerable to attacks. They will determine herein their weakness and formulate ideas
how to avoid such.

4. Monetary Field

a. Financial Security – refers to the methods applied for the protection of fungible
negotiable instrument representing financial value, it broadly categorized into debt
securities such as banknotes, binds and debentures and equity securities.

For Financial Security, they will determine herein what measures are to be applied to
protect those instruments containing money.

Common Concepts among the field of Security


1. Risk – a risk is a possible event which could cause a loss.
2. Threat – a threat is a method of triggering a risk event that is dangerous.
3. Vulnerability – a weakness in a target that can potentially be exploited by a threat.
4. Countermeasure - is a way to stop a threat from triggering a risk event.
5. Defense in Depth – never rely on one single security measure alone.
6. Assurance – assurance level of guarantee that security system will behave as
expected.

Other Types of Security


1. Industrial Security – applied to business grips engaged in industries like
manufacturing, assembling, research and development, processing, warehousing and
even agriculture.

Security measures to be applied to buildings related to businesses.


Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte

2. Hotel Security - applied to hotels where its properties from pilferage, loss, damage
and the function in the hotel restaurants are not disturbed, troubled by outsiders or
guests themselves are safe guard and supervisor and insures that hotel guests and
their personal effects are safeguarded.

Security measures applied to hotels in order to prevent attacks from outsiders in order
to maintain peace and order for their guests and important information are remained
confidential. As Hotel’s maintain confidentiality on those who went in and out of their
facilities.

3. Bank Security –concern with bank operations. Its main objective are the protection of
bank case and assets, its personal clientele.

Measures taken for protection of their personnel and money inside banks.

4. VIP Security – a type of security applied for the protection of Top Ranking officials of
the government or private entity, visiting persons of illustrious standing and foreign
dignitaries.

Measures taken for protection of very important person, example President.

5. School Security – concerns with the protection of students, faculty members and
school properties.

Measures taken to protect personnel and students in school.

Divisions of Security

1. Personnel or personal Security – starts even before the hiring of an employee and
remains to be maintained for as long as the person is employed. This division is
important than physical security. Its purpose is to ensure that a firm hires those best
suited to assist the firm in achieving its goals and objectives and once hired assist in
providing necessary security to the work force while carrying out their functions.

Security starts from the moment of hiring of security personnel. They have to see to it
that personnel they will be hiring contains all the qualifications the looked for and
capable of enforcing directions they will give thereto in order to achieve their goals.

2. Physical security – concerns with the physical measures adopted to prevent


unauthorized access to equipment, facilities material and document and to safeguard
them against espionage, sabotage, damage, loss and theft.
Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte
Measures applied to protects forcible entry or unauthorized access to facilities to
prevent loss or damage.

Physical controls as usually designed to influence the movements, activities or conduct


of people, employees of all classes m customers, visitors and outsiders such as
burglars, robbers, spies, etc.

3. Document of Information Security – this involves the protection of documents and


classified papers from loss, access by unauthorized persons, damage theft and
compromise through disclosure.

Classified documents need special handling. Lack of indoctrination and orientation


among the personal handling them can result in the leakage, loss theft and
unauthorized disclose of the documents.

Measures applied to protect unnecessary access of important or confidential


informations.
Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte
LESSON 2. ACTIVITY NO.1

Give one actual scenario related to the following concepts among the field of
security.

1. Risk
2. Threat
3. Vulnerability
4. Exploit
5. Countermeasure
7. Assurance
Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte
LESSON 2. ACTIVITY NO.2

In your own words what is the importance of Security? How does it affects our
daily lives?
Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte
LESSON 3. SECURITY HAZARD AND RISK MANAGEMENT

Lesson 3 is pure definitions, familiarize and memorize the following important definitions
hereinafter.

Definition of:
Security Hazard
Hazard
Types of hazard
Sabotage
Saboteur
Types of Sabotage
Espionage as Security Hazard
Electronic Surveillance as Security Hazard
Pilferage
Subversive Activity

Security Hazard Defined


An act or condition which result in a situation conducive to a breach of the
protection system and the subsequent loss or compromise of defense information,
company secrets or damage to personnel, property or facilities.

Security hazard and risk management are two interrelated fields in the context of
industrial security. Many organization and businesses by nature are exposed to hazard.
Thus, in order to prevent industrial hazards, risk management is necessary.

Take note on the definition of Hazard.

Hazard Defined
Is a situation which poses a level of threat to life, health, property or environment.
Most hazards are dormant or potential with only a theoretical risk of harm. However
once a hazard becomes active, it can create emergency situation.

Dormant - the situation has the potential to be hazardous but no people property or
environment is currently affected by this. For instance, a hillside may be unstable with
the potential for landslide but there is nothing below or on the hillside that could be
effected.

Potential – this is a situation where the hazard is in the position to effect persons,
property or environment. This type of hazard is likely to require further risk
management.
Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte

Active – the hazard is certain to cause harm as no intervention is possible before the
incident occurs.

Mitigated – a potential hazard has been identified but actions have been taken into
order to ensure it does not become an incident. This may not be an absolute guarantee
of no risk but it is likely to have been undertaken to signify reduce the danger.

Types of Hazard

1. Natural Hazard – these are hazard which arise from natural phenomena like as:

Floods caused by typhoons


Earthquakes
Fire
Storms
Lightning storms
Extreme temperature and humidity

2. Man-made Hazard

Carelessness
Disloyalty
Espionage
Vandalism

Industrial Hazard defined


Workplace hazards and are often grouped into physical hazards, physical agents,
chemical agents and psychological issues.

Physical Hazards examples:

Slips and trips falls from high


Workplace transport
Damage machinery
Electricity
Heavy metals

Physical agents include:

Noise
Vibration
Radiation
Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte

Chemical agents include:

Solvents

Pyschosocial issues include:

Work related stress


Violence outside the organization
Bullying which may include emotional, verbal and sexual harassment

Other issues include:

Reproductive hazards
Work environment factors such as temperature, humidity, lighting, welfare

Sabotage as Security Hazard


Sabotage is a deliberate action aimed at weakening an enemy, oppressor or
employer through subversion, obstruction, disruption and or destruction.

Saboteur Description
He is an ordinary looking guy but in his mind he has the training in deception,
knowledgeable in mechanics and psychology. He is the most dangerous for whom
security will have to deal with while planning and implementing security measures and
techniques.
Can work alone, in groups or simultaneously us several places , also a fact
“saboteur” no matter how trained has also his limit actions weaknesses and therefore he
cannot be deterred and denied access to get his target.

Categories of Saboteur
1. trained agents of an outside agency. Like as:
a. hostile power in time of war
b. power politically opposed to our country in peacetime
c. representative of an unscrupulous business rival
d. in case of labor disputes

2. Disaffected employees. Like as:


a. victims of hostile propaganda including racism or other political subversion.
b. these with real or imagined grievance
c. those who consider that they have been unfairly dismissed
d. those who wish to conceal evidence of crime such as fraud or theft.
Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte
3. Mentally Deranged. Like as:
a. pyromaniacs – sexually psychopathic person who desire sexual pleasure from seeing
large fire.

Possible targets of Saboteur


1. armed forces installations
2. natural resources
3. industries
4. warehouses, depots, communications, public utitlities.
5. transportation – railroads, water, air, highway transport and transportation facilities.
6. communication – telephone, telegraph, tv, radio etc
7. Power Sources

Types of Sabotage
1. Mechanical Method – done by means of breakage failure to lubricate, insertion of
abrasive parts and substitution or contamination. Etc

2. Chemical Method – insertion of destructive chemicals to the product or plant or in the


cause of an explosive inert.

3. Incendiary Method – use of fire, anything flammable is a target. The tools are many. It
can be ,match, cigarette, lighter or anything that you can think of start a fire.

4. Electrical Method – use of electrical powers sources to damage the plant or its
products or to interfere with communications.

5. Psychological Method – inciting employees unrest, creating disaffection among


employees comprising for later blackmail or any attack on the minds of the workforce
with the intent of disrupting production.

6. Subtle Method – a wide range of acts, it separately considered amount of nuisance. If


collectively considered amount to disruption of the facility role.

7. Bacteriological Method

8. Explosive method –use of explosive devices to damages the facility products.

Countermeasure against sabotage


A preventive and security measures designed to expose or stop any act of sabotage. A
measure designed to neutralize or proides advance warning of any projected sabotage
activity.

Espionage as a Security Hazard


Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte
The practice of gathering information about an organization or a society that is
considered secret or confidential without the permission of the holder of the information.

Electronic Surveillance as Security Hazard


The process of clandestine listening to conversation real or by telephone is a threat to
privacy of any persons.

Subversive Activity as Security Hazard


An attempt to overthrow structures, authority, including the state. Subversive activity is
lending of aid, comfort and moral support to individuals , groups or organizations that
advocate the overthrow of incumbent governments by force and violence. All willful acts
that are intended to be detrimental to the best interest of the government and that do
not fall into categories of treason, sedition, sabotage or espionage are places in the
category of subversive activity.

Pilferage as a Business Hazard


The unlawful taking of someone’s property without the consent of the owner.

Countermeasure of Pilferage
1. Spot check on outgoing surveillance on all exits.
2. An aggressive security education and indoctrination program with emphasis that cime
does not pay.
3. Superiors should set sample of integrity and desirable moral climate for employees in
the establishment.
4. All employees must be enjoined to report of any loss to security.
5. Inventory and control methods should be done especially to pilferage items.
6. Control of tools equipment and set.
Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte
LESSON 3. ACTIVITY NO.1

Make one scenario on the following security hazards:

1. Sabotage
2. Espionage
3. Electronic Surveillance
4. Subversive Activity
5. Pilferage
Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte
LESSON 3 ACTIVITY NO. 2

Why do we need to study security hazards?


Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte
LESSON 4 RISK, VULNERABILITY AND THREAT

Risk is the likelihood that something bad will happen that causes harm to an
informational asset.

Vulnerability is a weakness that could be used to endanger or cause harm to an


informational asset.

Threat is anything that has the potential to cause harm. Threat will use
vulnerability to inflict harm, it has an impact.

Risk Management
The process of identifying vulnerabilities and threats from resources used by an
organization in achieving business objectives and deciding what countermeasures if any
to take in reducing risk to an acceptable level.

Risk Analysis
Includes examination of the vulnerability, probability and criticality of potential
threat and includes natural and manmade risk.

The entity should assess the risk of a terrorist attack. The assessment should
include a determination of the likelihood of an attack, the type of terrorist action and
consequences, deepening on the size and location of the system. The assessment
should include potential risks to the following.

Workers
Environment and surrounding community
Impact and/or interdependent facilities and infrastructure

Alternative strategies in Risk Management


1. Risk avoidance – eliminating or removing the risk totally from the business,
government or industrial environment for which the risk manager has responsibility.
2. Risk reduction – decreasing the risk by minimizing the probability of the potential loss.
The reduction of criminal opportunity is often accomplished by situational crime.
3. Risk spreading – spreading risk through compartmenting or decentralization to limit
the impact.
4. Risk transfer – moving the financial impact of the potential loss-over to an insurance
company.
5. risk self- assumption – planned assumption and acceptance of the potential risk by
making deliberate managerial decision of doing nothing about the threat or setting aside
resources for use in case of specific loss incident.
Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte
Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte
LESSON 4. ACIVITY NO.1

Site one example of a risk to security, and resolve the same by using the
alternative strategies in risk management.
Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte
Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte
LESSON 4 ACTIVITY 2.

In your own words, what is the importance of knowing what is risk, vulnerability
and threat? How is it related to the study of industrial security concepts?
Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte

“All your dreams will come true if you have the courage to pursue them.”
- Cloie Anne C. Sulla, RC

INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS


(S.Y. 2021)

You might also like