You are on page 1of 10

Bulacan State University

COLLEGE OF CRIMINAL JUSTICE EDUCATION


City of Malolos, Bulacan
(044) 919-7800 to 99 Local 1062
1stSemester of AY 2023-2024

L.E.A 205: Introduction to Industrial Security Concepts


FINAL OUTPUT

Submitted by:
GROUP 2

Leader:
Roque, Maria Kristelena M.

Members:
Arcilla, Nezch Jerdenn D.
D e r d e r, J o n a t h a n T.
Domingo,John Paulo G.
E s t a b i l l o , J a n Wa y n e M .
Lanorias, Janmer S.
Limbaga, Alex Fatima Ashley A.
M e n d e z , E l a i z a M a r i P.
P a s c u a l , E d w i n J r.

Submitted to:
P ro f e s s o r : D r. A l e x a n d e r M . D i o n i s i o
Asst. Professor: Ms. Maria Angelica C. Mista
Unit 1
L e s s o n 3 : B a s i c Te r m i n o l o g i e s a n d C o n c e p t s r e l a t e d t o P r i v a t e a n d
Industrial Security
L e s s o n 4 : Ty p e s o f I n d u s t r i a l S e c u r i t y a n d M a j o r D i v i s i o n s o f
Security
Unit 1: Introduction to Industrial Security
Lesson 3: Basic Terminologies and Concepts related to Private and Industrial Security
• Safety:
- Safety primarily concerns the prevention of accidents, injuries, or harm to people,
property, or the environment. It focuses on reducing risks and hazards to ensure that
people and things are free from harm. Safety measures are proactive and are designed to
prevent accidents from happening in the first place.
- PROACTIVE - behavior addresses future conditions, circumstances, and being proactive
revolves around the anticipation of problems or issues to design plans that avoid negative
outcomes or prepare for positive results.
Example of Safety:
- Imagine you're riding a bicycle. Wearing a helmet to protect your head from injury, following
traffic rules, and using proper hand signals when turning are safety measures. These
precautions are taken to reduce the risk of accidents and ensure you stay safe while cycling.

• Security:
- Security, on the other hand, is more about protecting assets, information, or systems from
intentional harm, theft, or unauthorized access. It deals with safeguarding against deliberate
threats, such as theft, vandalism, cyberattacks, or unauthorized access to sensitive data.
Security measures are often reactive and focus on responding to threats.
- REACTIVE - Reactive behavior often refers to an immediate response to feelings about an
uncontrollable situation, a problem or other issue. Reactions often result from actions that
took place in the past
Example of Security:
• Consider your home's security. Installing locks on doors and windows, using a security
system with cameras and alarms, and having a strong password for your home's Wi-Fi
network are security measures. These measures are in place to protect your home and
belongings from burglars or unauthorized access.

• Importance of Technology towards Security


• The importance of information technology in enhancing national security against potential
threats and cyberattacks is substantial. Information technology, in particular, may
assistnations in recognizing possible threats, assist the sharing of information, and enhance
internal barriers, (Kamran Yeganegi et al 2020)

Basic Terminologies for Private and Industrial Security

1. Access List - Authorized personnel list for entry to a facility.


2. Alarm - Signaling devices.
3. Assets Protection Program- sum total of protection plan encompassing the entire security
spectrum, designed to eliminate, reduce or control threats, hazards or dangers to company
4. Clear Zone - Area near a perimeter for observation and patrols.
5. Controlled Area - Limited-access zone near exclusive areas.
6. Dry Run - practical test or exercise of a plan.
7. Ducks - in England, an owner used to protect his compound and they are not only effective
but cheap to maintain.
8. Duress Code - Code System for alerting security personnel in emergencies.
9. Duty Detail Order - Written assignment of security duties by a superior officer.
10. Exclusion Area - Restricted zone with sensitive materials.
11. Key Control - Methods to ensure authorized key usage. Involves tracking key holders and
preventing unauthorized key duplication.
12. Main Office - all agencies shall maintain a main office in their registered addresses
13. Master Keying system- Keys that open multiple locks.
14. PADPAO - Philippine Association of Detective and Protective Agency Operator
15. PCSUSIA - Philippine Constabulary Supervisory Unit for Security and Investigation Agencies
16. Perimeter Barrier - Initial defense line around a facility.
17. Peterman - a term used in England for lock pickers, safe crackers and penetrators of
restricted/prohibited areas.
18. Physical barrier- any physical means to hinder, delay, or prevent violation into a protected
area.
19. PNP FE/SAGS - PNP Firearm and Explosives/ Security Agency Guard Service
20. PNP SAG/SD - PNP Security Agency Guards/ Supervision Division - for national.
21. Private Detective - any person who does detective work for hire, reward or commission other
than members of the PNP, NBI, AFP, BJMP and other law enforcement agencies of the
government.
22. Private Detective Agency - is any person who for hire or reward or on commission conducts
or cares on or holds himself out as conducting on a detective agency or detective service.
23. RA 5487 - It is an act that regulates the organization and operation of the private detective.
watchmen or security guard agencies. It is known as Private Security Agency Law.
24. Relative Criticality of Operation - the importance of an establishment with reference to the
national economy and security.
25. Relative Vulnerability - the sensitivity of a plant or establishment to damage, loss, or
destruction of operation due to various hazards.
26. Remote Station System- Alarm system connected to remote monitoring.
27. Restricted Area - if access is limited only to the authorized.
28. Safe - a metallic container used for the safekeeping of documents or other small items in an
office or installation.
29. SAGSD - Security Agency in Guard Supervisory Division
30. Security Agency - any person, association, partnership or corporation who recruits, trains, or
business firms, private or government owned or controlled corporations to engage his services
or those of its watchmen.
31. Security Alarm System- combination of compatible intrusion and detection devices so
arranged and wired as to support one another.
32. Security Cabinet- added protection of important vital papers, plans, data, special
correspondence, cash, (e.g. such as vault, safe and file room.)
33. Security Education program- program given to employees of an installation by means of
lecture pertaining to measures and safeguards to be taken
34. Security Guard Force- group protecting operations.
35. Security Guard/ Watchmen - one who is a holder of a security guard license duly issued by
the PNP
36. Security Inspection- the process of conducting physical examination to determine agreement
with establishment security policies as a result of security survey
37. Security Lighting- providing of sufficient light to areas during hours of darkness to ensure
visibility and to act as a deterrent to intruders.
38. Security Planning- it involves knowing the objectives of the security and the means and the
method to reach these objectives or goal must then evolved
39. Security Service Contract - agreement/contract between the agency and client provides
among other things the money to be paid by the client and salary of the individual security
guard.
40. Security Supervisor- charged with directing the work and observing the behavioral
performance of the guard under his unit.
41. Security Survey - also known as security audit, risk assessment, and vulnerability
assessment.
42. Survey Reports - Documenting security vulnerabilities, existing preventive measures, and
suggestions for improvement.
43. Top Guard - Added security structure above the fence.
44. Vault - Secure container for cash and documents.
45. Victimology - a special study concerned with what makes an individual a victim of crime.

The Concepts of Security


The word "secure" is derived from the Latin word "secures," which means "safe" or
"without care," originating from "se cura," wherein "se" means "free from" and "cura"
means "care." Historically, criminology has explored security by directing its attention towards
what one might consider as harms involving "hitting and taking," commonly referred to as
"crimes." These crimes pose a threat to peaceful coexistence and the governance processes,
particularly the criminal justice system, which has been developed to address them.
1. Security:
- It is freedom from, or resilience against, potential harm caused by others. Beneficiaries
of security may be persons and social groups, objects and institutions, ecosystems or
any other entity or phenomenon vulnerable to unwanted change.
- The predictable state or condition which is free from harm, injury, destruction,
intimidation, or fear. Freedom from fear or danger or defense against crime

2. Purpose of Security:
• is to protect the establishment from any form of losses as a result of theft, robbery, pilferage,
sabotage, espionage, accident. fire and harmful activities.

Related Concepts: Understanding the concept of security requires further definition of other
related concepts such as asset, risk, threat and vulnerability.

1. Asset - is anything tangible or intangible that is capable of being owned or controlled to


produce value. If it holds positive economic value, it is considered an asset. More simply, if
its value can be converted into cash, it is also regarded as an asset.
2. Risk - is the uncertainty of financial loss, the probability that a loss has occurred or will
occur, or the possible occurrence of an unpleasant event. The ultimate outcome of risk is a
loss or a decrease in value, such as losing the life of a loved one.
3. Threat - is anything that could negatively affect assets. It can be categorized into natural
hazards (such as floods), accidents (like chemical spills), or intentional acts (both domestic
and international terrorism).
• For a threat to be effective, it must interact either directly or indirectly with the asset.
To separate the threat from the asset is to avoid a possible interaction. Therefore, it is
possible to have total (100%) security if the threat and the asset are completely separated
from each other. Otherwise, what you have is safety of the asset which is provided by
the controls you put on the asset or the degree to which you lessen the impact of the
threat.
4. Vulnerability - means a weakness, flaw, or virtually any aspect that could potentially be
exploited by a threat. Examples of vulnerabilities include gaps in a fence, an outdated key
system, or the introduction of a computer virus.

Basic Principles of Security:


1. Command Responsibility- Cannot be delegated but the security tasks can be assigned.
2. Compartmentation - Need to know basis
3. Balance between security and efficiency - Security prevails over efficiency
4. General principles of security remain constant - Specific measures to suit operations
5. Security is the concern of all personnel - Regardless of rank, position, designation

Lesson 4 – Types of Industrial Security and Major Divisions of Security

Types of Industrial Security


1. Physical Security System - a barrier system placed between the potential trespasser
and the matter to be protected. Protective threats, vulnerability and risks.
Different Types of Physical Security
1. Active - by using different types of barriers
2. Passive - by using psychological approach
3. Communication Security - is the protection resulting from the application of various
measures which prevents or delay the enemy or unauthorized persons in giving
information through the communication system.
• Cryptographic Security - is the result from the provisions of a technically sound
crypto- system and their proper use.
• Physical Security - providing a safeguard to equipment and material from access by
unauthorized persons.
4. Hotel Security - is the protection resulting from the application of various measures which
safeguards hotel guests and personnel, hotel property, and functions in hotel restaurants,
bars and clubs.
5. Bank Security - is the protection resulting from the application of various measures which
safeguards cash and assets which are in storage in transit and during transactions.
6. Document Security - is physical security that involves the protection of documents and
classified papers from loss, access to unauthorized persons, damage, theft and compromise
through disclosure.
7. Personal and VIP Security- involved in the protection of high officials of the
government, visiting persons of illustrious standing and foreign dignitaries.
8. Crisis Security- is the protection of the rich person, industrial magnates, political leaders
against kidnapping for economic, political, emotional or nationalistic purposes
9. Industrial Security - various measures to safeguard factories, manufacturing
establishments, etc.
10. Operational Security - is physical which deals with the protection of processes,
formulas, patents and other activities.
11. Other special types of security are adaptations, variations. innovations and
modifications of physical security which are follows:
• Air cargo security - Under the Aviation Transport Security Act of 2004, air cargo is
defined as goods, other than baggage or stores, that are transported by aircraft. Air
cargo security measures aim to protect cargo from theft, but they also secure cargo
against incoming materials such as bombs or drugs
• Supermarket Security - which is used by grocery stores for various safety purposes.
Our supermarket security services prevent shoplifting and internal theft, help secure
deliveries, and watch for suspicious activity during non-business hours.
• School Security - encompasses all measures taken to combat threats to people and
property in education environments. One term connected to school security is school
safety, which is defined as the sheltering of students from violence and bullying, as
well as exposure to harmful elements such as drugs and gang activity.
• Personnel Security - Personnel Security Program is to make a reasonable
determination that individuals granted access to classified information or assigned to
sensitive positions are and will remain loyal, trustworthy, and reliable.
• Protective Security - measures taken by an installation or unit to protect against
sabotage, espionage or subversion and at the same time provide freedom of action in
order to provide the installation or unit with the necessary flexibility to accomplish its
mission.

Three (3) Aspects of Security


1. Physical Security - measures taken to prevent physical access or entry to an installation
2. Personnel Security - measures taken to ensure that only authorized personnel have access to
classified documents or information.
3. Document and Information Security - Information security is a set of practices intended
to keep data secure from unauthorized access or alterations

Two (2) Method used in Physical Security


1. Overt - surveillance is performed using devices that are visible and obvious.
2. Covert - also known as undercover or plain clothes security, is a specialized service that
provides rare success in the apprehension of shoplifters, fraudsters and dishonest employees.
Covert security operatives pose as general shoppers and ensure that only customers are exiting
the stores. It means hidden or concealed. It cannot be observed.
How to deter potential intruders install the following:
1. Security Warning Signs - Let workers and visitors in your facility understand the system
you have in place. This is especially crucial if there are emergency exit doors that will trigger
alarms if they're opened. Security warning signs can also deter trespassing, theft, and other
illegal or suspicious activities.
2. Security Fences - Stating that it is fencing a piece of property to increase security.
3. Vehicle Barriers - A barrier meant to stop, disable. or destroy vehicles intentionally driven
into the perimeter of a protected area These barriers may be active (movable at the push of
a button) or static (permanently in a vehicle-stopping posture) and be located at gate
entrances or along perimeters between vehicle access points.
4. Vehicle Height Restriction - Are designed specifically to allow access to a site for and
smaller, lighter vehicles. This bar then pro-warns the vehicles wishing to gain access to the
area that their vehicle may be too high
5. Restricted Access Point - It means that you can allow only a number of people who will
enter the facility or a building or institution.
6. Sight Lighting and Trenches - Security lighting is lighting that is intended to deter or
detect intrusions or other criminal activity on a piece of real property. It can also be used to
increase a feeling of safety. Lighting is integral to crime prevention through environmental
design.

Principles of Physical Security

1. An intruder must be able to acquire access to the property in order to benefit.


2. The type of access necessary will depend upon a number of variable factors and
therefore may be achieved in a number of ways.
3. There is no inaccessible barrier.
4. Security is built upon a system of defense in depth resulting in assembly delay time which
may lead to the apprehension of the intruder.
5. Each installation is different from the others.

Continuation of Types of Industrial Security:

2. Security Hazard- any act or condition which may result in the compromise of information,
loss of life, loss or destruction of property or disruption of the objectives of the installation,

Two (2) Kind of Hazards


1. Man –Made Hazards – an act or conditions affecting the safety of operation of the facility
caused by human action, accidental or intentional. It includes sabotage, espionage,
pilferage and theft.
2. Natural Hazard – caused by natural phenomena which cause damage, disturbance and
problems of normal functioning activities, including security. It includes floods, lightning,
storms and volcanic eruptions.

Continuation of Types of Industrial Security:


3. Industrial Security- a form of physical security involving industrial plants and business
enterprises It involved the safeguarding of personnel, processes, properties and operations
4. Bank security- application of various measures in safeguarding cash and assets of the bank
from storage, during transit and transaction
5. Hotel security- application of various means in safeguarding hotel guests and valuables and
other hotel functions.
6. VIP security- involves the protection of high officials of the government, visiting persons
of illustrious standing and political dignitaries
7. Document Security- protection of document, classified papers, and vital records from loss,
access to unauthorized person, damage, theft and compromise through proper storage and
procedures
8. Operational Security- this involved the protection of processes, formulas, industrial
manufacturing activities from espionage, infiltration, loss, compromise or photocopying
9. Communication security- application of various measures which prevent or delay the
enemy or unauthorized person in gaining information through communication. This includes
transmission, and physical security.
• Each industry faces unique challenges and vulnerabilities that influence the scope of
services they need. A professional security system provider can offer recommendations
tailored to your needs. Here are some industrial security services to consider
implementing on your property.

1. Manned guards and mobile patrols - Guards can prevent unauthorized entries to certain
sites and handle threats as they arise. Plus, their presence can deter potential criminals. Simply
having a live guard on-site can make you and your employees feel safer. In addition, large and
remote sites can benefit from mobile patrols with guard dogs or marked security vehicles.
2. Bag checks - Employee theft is a problem that all industries must contend with. Random
inspections and bag checks can reduce shoplifting and prevent the entry of prohibited items
like weapons and illegal substances.
3. Cybersecurity - Cyberattacks are a growing concern for most industries. It’s crucial to take
measures to protect your computer networks from intruders. Ransomware, malware and
spyware are just some of the ways hackers will try to spy on you and steal your data. Proper
cybersecurity can help guard against these attacks.
4. Commercial access control systems - Various technologies can allow you to manage who
enters your building and when. Keypad entry systems, mobile apps and biometric devices are
just a few examples of commercial access control systems that restrict entries by unauthorized
individuals.
5. Commercial alarm systems - You can safeguard your business with a high-quality
commercial alarm system. A comprehensive system includes security monitoring, smoke
detection, video surveillance and more.
6. Closed-circuit television (CCTV) - Camera surveillance is essential for industrial security
due to its numerous benefits. CCTV systems aid in deterring burglaries, vandalism, and other
criminal activities. The captured video footage not only deters crimes but can also assist law
enforcement in identifying culprits in case of an incident on your property. Additionally,
CCTVs can be employed for inventory tracking and maintaining a record of all business
transactions.

Major Divisions of Security

Three (3) Major Divisions of Security:


1. Management Security - also known as administrative controls, involves clear rules,
guidance, and procedures. It safeguards a company's data and network and helps create plans
to keep the main operations safe from security attacks. This part of security deals with
evaluating threats, organizing information, assessing risks, and analyzing them. It's crucial
because it connects with the other two parts of security that also deal with protecting
information.
2. Operational Security - also called procedural security, was first used by the military to
prevent confidential information from becoming public. This is a way to manage risks where
managers supervise operations to prevent sensitive information from getting into the wrong
hands. Besides overseeing operations, this security part is also used by private companies to
keep an eye on social media sites.
Steps of Operational Security:
1. Identify confidential data or information - To be able to prepare, identify sensitive
information which may include financial statements, customer data sheets, employee
information, product research and other intellectual properties. Resources must be focused on
these data to ensure security.
2. Check for possible threats - Identify any single possibility of threats present in the company
or organization. This can be third parties who try to steal crucial information, or negligent
employees and irate workers who may become insider threats.
3. Analyze vulnerability and security lapses - Check and assess the present security within the
company. Determine if there are any lapses or loopholes that may be easily exploited to get the
company’s sensitive information.
4. Rank level of risk for each vulnerability - If a vulnerability is detected, ranking this based
on different factors such as the possibility of an attack, extent of damage, work and time
needed to get back up. If an attack is projected to have great damage, more preparation is
needed to mitigate the risk that comes along with it.
5. Set up countermeasures - To minimize and eliminate threats plus mitigating risks, a plan is
needed. An example would be updating the company’s hardware. Another way would be to
train employees on safeguarding the practices and policies of the company.

Continuation of Major Divisions of Security:


3. Physical security - is the set of measures taken to protect business assets, such as personnel,
data, and hardware, from physical threats that could harm, damage, or disrupt your operations.
It encompasses security measures such as surveillance, access control, environmental controls,
and contingency planning. Physical security is essential to maintain the confidentiality,
integrity, and availability of systems and data, and to ensure business continuity in the face of
unforeseen events.
Five (5) Components of Physical Security
1. Deterrence - These can be physical barriers that restrict entry into the company’s place
of business. Technology may be in the form of video security cameras and access control
systems. All of these keep unauthorized individuals from accessing entry to the company.
2. Detection - Deterrents are not enough to physically secure the place of business. Sensors,
alarms and other notifications help detect any intruder from penetrating into the company.
This way, detection components help signal for help when there is a potential attack.
3. Delay - To slow down the entry of intruders, security systems are installed in the place of
business. Access control systems and other smart security strategies delay any attack
making it convenient to mitigate a company breach. This also prevents a company from
incurring too much damage.
4. Response - Once an intruder or a breach happens, a physical security response helps in
responding such as communication systems and emergency services.

In summary, each major division of security plays a critical role in creating a comprehensive
security framework.
- Security has three main parts: management security, which sets rules and plans;
operational security, which oversees activities to prevent leaks; and physical security,
which safeguards the physical property.

Conclusion:
Importance of Security in General?
• In conclusion, the importance of security in general cannot be overstated. It serves as a
foundational pillar that safeguards individuals, organizations, and societies from a
multitude of threats. From protecting against physical harm to defending against
cyberattacks, security measures play a crucial role in maintaining privacy, confidentiality,
and trust. Adhering to security practices not only ensures compliance with legal
requirements but also fosters business continuity and preserves a positive reputation. In an
increasingly interconnected and digital world, prioritizing security is not just a matter of
prudence; it's an imperative for the well- being and prosperity of individuals and the broader
community.
REFERENCES:
https://criminologyboardexamreviewer.weebly.com/industrial-security-management.html
https://fliphtml5.com/kpkdc/fnzf/INTRODUCTION_TO_INDUSTRIAL_SECURITY_CONCEPTS/
https://www.studocu.com/ph/document/southville-international-school-and-colleges/life-and- works-of-
rizal/lea-3-lesson-1/21931515 https://www.scribd.com/document/475703657/important-terms-in-
industrial-security https://www.scribd.com/document/501349129/INDUSTRIAL-SECURITY-
MANAGEMENT-LEA3 https://www.lbmc.com/blog/three-categories-of-security-
controls/#:~:text=There%20are%20three%20primary%20areas,security%2C%20and%20physic
al%20security%20controls
https://nfsecurity.ca/what-are-the-major-divisions-of-
security/#:~:text=There%20are%20three%20major%20divisions,%E2%80%93%20management
%2C%20operational%20and%20physical
https://youtu.be/qVFLkeP6Y_0?si=ob912WFw8aZk9W-R
https://youtu.be/r86eidnpInU?si=i0JkodQOUM_sXUE9
https://youtu.be/-AkuKKJ8dN0
https://youtu.be/qVFLkeP6Y_0?si=waEVB_2HxnQoyW3J
https://youtu.be/r86eidnpInU?si=-BVtDxA6LJKIxl3I
https://youtu.be/78ESL84uChc?si=SVy9f5P0-Iy0U5GH
https://youtu.be/rwdvmlXHidc?si=IRWuEb8BHHSWzdNY
https://youtu.be/NHCN3rKcAcw?si=PKk94dwGQewXbdUh
https://youtu.be/L_AgLYKA_5w?si=uhINsIJ6YDidmDHL

You might also like