Professional Documents
Culture Documents
INTRODUCTION
LEARNING OBJECTIVE
1. Define security
2. Explained the concepts of assets, risks, threats and vulnerabilities.
3. Enumerate the categories of security.
4. Discuss the importance of private security in organization.
LEARNING CONTENT
Definition of Security
The word secure is derived from the Latin word secures which means “safe” of “with
care” or from word se cura, wherein se means “free from” and cura means “care”.
To be secure could mean many different things. It could mean being free from danger,
risk, injury, fear, trouble, doubt, or anxiety. Being secure could also refer to being
dependable, strong, good, impregnable or inviolable. Or simply, it could mean having
peace of mind.
Related Concept
Risk is the uncertainty of financial loss, the probability that a loss has occurred or
will occur, the variations between actual and expected results, or the possible occurrence
of an undesirable event. The end result of risk is loss or a decrease in value.
Threat and vulnerability are sometimes interchangeably used with risk. A threat is
anything that could adversary affect assets; it can be classified into natural hazards (such
as floods), accidents (chemical spills), or intentional acts (domestic or international
terrorism).
Categories of Security
1. Public security refers to the way government are ensuring the protection of its
citizens, organization and institutions against threats to their well-being, as well as
maintaining the general security and peace in public places. This includes security
against problems that have a direct impact on people’s lives, such as gang
violence, cybercrime, or trafficking of illegal drugs and firearms.
2. National Security in the requirement to maintain the survival of a state through the
use of economic power, diplomacy, and political power. Security threats include
military foes from other nations, big drug cartels, or even national disasters that
cause severe environmental damage.
3. International security consists of the measures taken by nations and international
organizations to ensure mutual survival and safety. Example of measure are
military actions and diplomatic agreements.
In the private sphere, security can be even further categorized as shown below.
Bank Security – Is the protection resulting from the application of various measures
which safeguards cash and assets which in storage, in transit and during transaction.
Hotel Security – involves using various measures of protection for the guest, personnel
properties and functions in hotels, restaurants, bars and clubs.
V.I.P. Security – Involves the protection of top – ranking officials of the government,
visiting persons of illustrious standing and foreign dignitaries.
Operation Security – This involves the protection of processes, formulas, patents, and
industrial and manufacturing activities from espionage, infiltration, loss compromise of
photo copying.
Mall/ Commercial Security – Is the degree of protection against danger, loss, and crime
inside the malls. As a form of protection, it refers to systems, structures and processes
the provide or improve mall security as a condition.
History of Security
INTRODUCTION
Security by its own definition is the state of being free from danger or threat. A
concept that is I feel sometimes forgotten in the hustle and bustle of daily life in this
modern world.
We can go back in time to see early examples in the Ancient Egyptian Pharaohs
who hired private security guards for personal protection. Or to Ancient Rome where
emperors had security guards for personal, family and property security.
LEARNING OBJECTIVE
1. Trace the historical roots of security during the prehistoric times, the ancient period
and the Middle Ages.
2. Describe the evolution of security in England and the United States.
3. Discuss the history of security in the Philippines setting.
4. Identify current issues in security.
LEARNING CONTENT
The historical roots of private security agencies can be traced back to thousands
of years when the protection of the life and personal property were up to the individual,
and later on passed to the tribes, and then to cities.
In pre historic times, recognized the need to keep himself safe from both known
and unknown enemies such as animals, other inhabitants and the environment itself. He
used different methods to keep himself safe such as crafting weapons out of stone and
metal, building fire to ward off animals, staying in caves or tree houses, and even staying
int the middle of the lake for protection.
The Greeks of the ancient period were the ones who organized the first police force
in city states which they termed polis The Romans, on the other hand, established the
Praetorian Guards known as vigils who were tasked to be fire fighter.
In the Middle Ages during their invasion of England, the French formed a group of
carefully selected men called shires or sheriff to look after the peace and order of the
different regions.
The greatest influence in the history of the security came from England. In 1655,
Oliver Cromwell set up in England and Wales a police force that operated to capture and
punish criminals. In 1748, London magistrate Henry Feilding introduces the concept of
crime prevention by organizing citizen patrol or watchmen that not only chase criminals
for felony and misdemeanor but also served Feilding’s purpose of preventing crime ahead
of time with their patrolling function. Fifty years later, English Home Secretary Sir Robert
Peel formed the formal police department.
During the colonial period in the United States, immigrants from England, Ireland
and Scotland came to America shores bringing with them this British approach to policing.
At the time, law enforcement officers had to deal with rampant crime in U.S cities and had
little time and resources left to deal with the protection for their private property. Hence,
citizens who wanted protection for their private properties had to depend on the armed
immigrants who were prepared to deal with criminals. This watchman form of security
was to become the early version of private security practices that endure to this day.
During the pre-colonial period in the Philippines, the sovereign monarchs called
datu or lakan, had servants called aliping namamahay who acted their watchman or
protector.
The Spanish colonial government introduced the Guardia Civil in the Philippines
in 1868 to serve as the police force based on the Civil Guard of Spain. They performed
patrol functions in cities and towns, organized operations for the suppression of bandits
groups, and imposed penalties for infringement of laws and local ordinances.
The constanble of the American colonial period in the Philippines became the
forebear of the present national police. During that time, a couple of constable officers
were adequate to maintain the peace and order in the town or sitio.
After World War II, the Indian national or the Bombay pioneered as the watchman
who protected a specific building or commercial establishment.
Today, private security has a major role in the preservation and protection of peace
and order in the country. It complements police efforts by providing additional security
during emergency responses and public events as well as safety precaution and
protection of property and assets.
Security in the Present Time
History shows how public law enforcement and private security evolved from the
same roots but eventually took different directions. The police served the public’s interest
while the security force served private interests. As crime became a bigger problem
especially in urban areas, police departments who previously looked down at private
security are now beginning to see the benefits of building a partnership with them. Now,
police functions that did not involve enforcement, arrests or the use of force inside work
spaces are turned over to security. Traffic control around large commercial properties and
patrol functions around private neighborhoods are also now often provided by security
officers.
With the advent of terrorism in the countries around the globe, it becomes more
important to build a strong partnership between the police who respond to terrorist acts
and security officers who respond on the private premises that they protect. This
collaboration should also involve leaders and enforcers in other fields such as firefighting,
disaster management, emergency medical treatment and public health. This, of course,
entails a strong support and commitment from the national government.
With the combination of rising technology and the security industry’s growth and
recognition in organizations comes the necessary improvement in the professionalism
among security officers.
MODULE 3
PHYSICAL SECURITY
INTRODUCTION
Every day, in every installation and within the facilities, the security practitioner
protects a wide variety of assets from various types of threats. One way they do this
through the use of physical security to deter and detect intruders. In this module, you will
learn about physical security concepts and roles, as well as physical security planning
and implementation, including a review of the various types of physical security
countermeasures employed to deter, delay, detect, or prevent threats.
LEARNING OBJECTIVE
LEARNING CONTENT
Physical Security
Physical security involves the use of multiple layers of interdependent systems that
can include CCTV surveillance, security guards, protective barriers, locks, access control,
perimeter intrusion detection, deterrent systems, fire protection, and other systems
designed to protect persons and property.
Physical security refers to a logical set of tangible elements and measures adopted
to prevent unauthorized access to equipment's, facilities, materials, documents and
personnel. The purpose is to protect these assets from damage, compromise and loss.
In short, it is a system of barrier place between the potential intruder and the object to be
protected.
1. The type of access necessary will defend upon a number of variable factors and
therefor may be achieve in a number of ways.
2. There is no impenetrable barrier.
3. Defense is depth-barriers after barrier.
4. Delay provided against surreptitious and non-surreptitious entry
5. Each installation is different.
The following factor are factor that should be considered in determining the physical
security needs of a security facilities.
Site Characteristics
➢ Selection of safeguards can be influenced by the nature of the site such as the
size, layout, utilizes, internal activities and assets in the site. Other factor may
include company philosophy and workforce culture.
Environment
➢ This refers to the area, surrounding, and facilities. A bank inside a large
commercial complex in Makati City require safeguards different from those
required for an exclusive beach resort in an island in Cebu or a factory of fireworks
in an isolated area in Bulacan. For example, the bank may operate for electronic
locks and sensors, the resort may require a especially secure boat access, and
the fireworks factory may go with a perimeter fence.
Forces of Nature
➢ Also, at play in the selection of safeguards are the environment’s climate, weather,
and natural forces. Certain detection sensor devices may not work well in extreme
temperatures and are vulnerable to floods and earthquakes.
Crime
Terrorism is also an important factor for certain facilities that may be considered
target of terrorist groups such as airport, tourist destinations, research laboratories and
government building.
Physical Barrier
Manmade structural barriers and natural barriers are two general types of barriers.
Often, both types are used to secure Forest Service facilities. Other types of barriers
(human barriers, such as guards; animal barriers, such as dogs).
Natural barriers include berms, rocks, trees and other foliage, water features, sand
and gravel, and other natural terrain features that are difficult to traverse or that expose
an attacker.
1. To control the movement of people and vehicle into, out of and within the facilities.
2. To segregate or compartmentalize sensitive areas.
3. To provide physical protection to object, materials, and processes of critical nature.
Types of Fencing
1. Wire Fences (Solid or Full view) - wire fencing can be barbed wire, chain link or
concertina. Chain link are for permanent structure, barbed wire is for semi-
permanent and concertina for the least permanent, and also can be used as a
temporary road block or impediment during strikes and crowd control. Wire fences
are attractive and low in maintenance cost: they offer less hazard to people
because of the absence of barbs and the openings are small to prevent passage
of pilfered article.
Second Line of Defense - Doors, floors, windows, walls, roofs and grills.
Walls, floors, roofs or their combination serve also as barriers and they should be
of such construction to provide uniform protection just like the wire fencing.
Masonry walls as perimeter barrier should have the same height as the chain-link
and surmounted at the barbed wire top guard: if the height of the Masonry is less than
the prescribed, additional chain-link as “topping” is place to attain the minimum height
requirement.
Third Line of Defense: Interior Controls - Storage system like steel cabinets, safes,
vaults and interior files.
Establishing interior controls not only maximizes the efforts of security guards.
Such measures also allow or deny access to facilities or areas within the facility, as well
as track the identity and times of entry and exit.
Locks
➢ Installing locks on door is the easiest line of defense inside a facility. It is the
simplest way to impose a physical restraint as well as grant entry. It is the most
widely used physical security device, yet it is hardly foolproof. However, locks can
be also being vulnerable to physical force. A key-operated lock can be picked, or
its keys can be duplicated illegitimately.
➢ It is the only as good as the door, jambs, and walls around them. A look is therefore
useless if an intruder can simply kick a weak door to access a facility.
➢ Key management is important when dealing with a complete lock system. It is
important to make sure that only authorized personnel can obtain or make a key
to the lock.
➢ All locks ca be compromised by an expert in a very short period of time. It is
therefore wise to use locks together with other security measures and as part of
an overall physical protection system.
Identification Systems
Controlled entry into business facility usually begins with the identification of the
person entering. The identity of employees or visitors can be determined through the
following types of identification verification access control.
Biometric reader can be using a person’s physical property (such as retinal pattern
or fingerprint) to gain entry.
Types of protective alarm systems include local alarm system, auxiliary system,
central station system and proprietary system. These can serve the purpose of either
substituting other security measures for economic reasons or supplement these security
measures to provide additional controls.
PROTECTIVE LIGHTINGS
Protective lightings are designed to illuminate the perimeter barrier and the outside
approaches of an area. A threat cannot be detected, either by camera or in person, if
there is no light. Lightings can be also served as deterrence since a threat is more likely
to attack an asset in relative darkness than in bright lights.
PERSONNEL SECURITY
INTRODUCTION
LEARNING OBJECTIVE
LEARNING CONTENT
Of the three key security processes, personnel security in considered the most
important simply because security involves people, both as assets to be protected and as
sources of security threats.
Pre-Employment Screening
Interviews
The job interview portion of the application also help in the screening process
because it provides an opportunity to discuss the candidate’s suitability for employment.
This interview is important because:
➢ Is an inquiry into the character, reputation, discretion, integrity, morals and loyalty
of an individual in order to determine a person’s suitability for appointment or
access to classified matter.
Background Investigation
Factor to be consider in a BI
➢ Revenge
➢ Material Gain
➢ Personal Prestige
➢ Friendship
➢ Ideological Beliefs
➢ Application’s Name
➢ Date of Birth
➢ Present Residence Address
➢ Local Agency Check
➢ National Agency Check
➢ Personal History
➢ Marital History
➢ Residence History
➢ Citizenship History
➢ Physical Data
➢ Educational History
➢ Organization Membership
➢ Neighborhood Investigation
➢ Character References
➢ Employment History
➢ Military History
➢ Residence History
➢ Citizenship History
➢ Physical Data
➢ Education History
➢ Organization Membership
➢ Neighbor Investigation
➢ Character References
➢ Employment History
➢ Foreign Travel & Connection History
➢ Criminal Records
➢ Credit Records
➢ Applicant’s Signature
➢ Date of Application
Investigative Coverage
Investigative Standard
Investigative Review
Positive Vetting
Essence of Vetting
1. A personal interview
2. Conducted under stress
3. The interview is based upon answers previously by the applicant
4. Other information is used during the interview which confirms or denies that given
by the applicant
Basic Reasons for An Interview During Vetting
Profiling
1. The Polygraph
2. The Psychological Stress Evaluator
3. The Voice Analyzer
This type of investigation seeks to gather information on income and mode of living.
➢ In to be promoted
➢ Is to be assigned to more sensitive duties; and
➢ When it is already part of SOP for those assigned to sensitive positions
Undercover Investigations
The placement of an agent in a role where his true identity is unknown, in order to
obtain information for criminal prosecution or for recovery or limitation of asset losses.
➢ Initial Interview – The initial interview will be the individual’s first contact should
be formal and professional in nature. The interview should be made by the
installation security officer or his representative.
➢ Training Conference - The training conference should be held during the initial
processing or training period of the individual.
➢ Refreshal Conference – Should be conducted semi-annually and at least
annually. It designed to serve three purposes:
➢ Security Reminders – Another phase in security education program is concerned
with security reminders. This is a Direct or passable approach. The most common
and obvious approach is through the use of poster.
➢ Security Promotions – The fifth phase of security education is security promotion.
If the security reminder phase is considered to be a passive phase, then security
promotion must be considered active. Security promotion is a positive effort to sell
security.
➢ Special Interviews – The sixth phase is the special interview. One good element
of any approach is an appeal for help in overcoming a problem that is common to
the both security officer and the supervisors, that of the safeguarding of classified
information. This interview is important but it could develop into a delicate situation.
Therefore, the interview should be conducted by the most mature and experienced
individuals in the security organization.
Debriefing
INTRODUCTION
Many businesses around the world have had to face severe situations of data theft
and security breaches, forcing them to pay a heavy price. It is, therefore, a wise and
important decision to take security measures seriously when uploading important
documents of a business such as bookkeeping records and financial transactions.
LEARNING OBJECTIVE
LEARNING CONTENT
Protecting vital secrets from competitors and foes has become increasingly critical
in this high tech, nuclear age. The loss of document and information cost government,
Business, and Industry alike, billions of pesos. Business competitive badge and national
security have been jeopardized because the proper security precautions were not taken.
All too often the importance of document and information security is not realized until after
a loss have been discovered. In many instances one that has already cause irreparable
damage. For these reasons comprehensive document and information security program
is vital to operating and competing in our modern society.
Document and Information Security
Definition of Documents
Are any materials that contain marks, symbols or signs either visible, partially
visible or invisible that may presently or ultimately convey a meaning or message to
someone Pencil or ink writing, typewriting or printing on paper is its most usual form.
Kinds of Documents
Class III – Useful Documents – A records, the loss of which may cause inconvenience
but could be readily replace and may not present an insurmountable obstacle to the
prompt restoration of the business.
Class IV – Non-essential Documents - A records that may include daily files, routine in
nature, the loss of which will not affect the organization’s operation. This class represents
the bulk of the records which can be kept in ordinary files ready for reference if needed
and usually discarded after some period of time.
Factors to Consider
➢ Documents and information security is based on the premise that the government
has the right and duty to protect official papers form unwarranted and
indiscriminate disclosure.
➢ The authority and responsibility for the preparation and classification of classified
matters rest exclusively with the originating.
➢ Classified matter shall be categorized according to their content and not to the
classification of file in which they are held or other documents to which they are
referred.
➢ Classification shall be made as soon as possible by placing appropriate marks on
the matter to be referred.
➢ Each individual whose duties allow access to classified matter while it is in his
possession shall ensure the distribution of such matter on the “need to know” basis
only and to properly cleared person only.
Definition of Information
Information occurs through various stages. Familiarization of the different stages can
provide significant analysis on how it can be protected.
The security measures that must be taken depend on the type of storage center,
the storage means and the storage technologies used, more importantly, the
experience and dependability of the personnel who will handle the storage and
retrieval of information must be considered.
4. Transfer - This involves the transfer of information from active to inactive storage.
Inactive records are usually located in remote areas less accessible to users.
Special security precautions should be taken at the time of transfer and when
records are on the way from one place to another.
5. Disposition - This is the last stage of the cycle of information. During this stage,
a decision can be made to retain the information indefinitely at either an active or
inactive storage center or to dispose of it. The method of disposal should depend
on the amount of information and the type of media used.
Characteristics of Information
Information requires Barriers - Just a decade ago, information assets were stored in
computer systems with electronic barriers inside centrally controlled equipment and
located within the protected confines of a computer room. Nowadays, computer have
become widely dispersed through computer network protected through firewalls. The
future trend seems to rely on cloud-based information and data exchange (called internet
networks) protected by hosts through passwords and other computer security measures.
Information is coveted - When something has a value, someone will want an opportunity
to take it away. A new cellular phone technology being developed by a big
telecommunications company might not be accessible to the pickpocket who preys in
public places, but it can be vulnerable to an intelligent, clever and professional spy who
can steal the information and sell it to the company’s competition.
Information has a limited life - At some point in time certain information can lose all or
most of its value. If a business owner is in possession of valuable information, he will want
to extract from it the maximum worth possible by making it available only to those whose
talents can exploit it. When news of this information spreads to more and more people,
its value can diminish.
Sensitive Information
Sensitive information refers to information that has value and should be protected,
including the following:
1. Secret – This is information the unauthorized disclosure of which could cause serious
damage to the organization’s business. Its use and access to it are strictly limited.
➢ Trade Secret
➢ Plans to merge, divest, acquire, sell or reorganize
➢ Information that could affect the price of shares
➢ Information with high political or legal sensitivity
➢ Information prejudicial to the interests or reputation of the organization.
➢ Marketing Strategies
➢ Customer files
➢ Agreement and contracts
➢ Contentious or litigable matters
Trade Secret
A trade secret may consist of any formula, pattern, device or compilation of
information which is used on one’s business and which gives one an opportunity to gain
advantage over competitors who do not know or use it.
➢ It must be identifiable
➢ It must not be already available in any public sources.
➢ It must be disclosed by the owner only to persons who are under some duty to
protect its secrecy.
➢ Persons to whom it is disclose must know it is a secret
➢ There must be some objective indication that the owner is attempting to prevent
its unauthorized disclosure.
Patent
➢ The requirement for obtaining a patent are specific to qualify for a patent, the
invention has to represent a positive contribution beyond the skill of the average
person, whereas the trade secret needs a much lower novelty.
➢ A trade secret can remain a secret for as long as it continues to meet the “trade
secret test”, whereas an exclusive right patent after a period of 20 years.
➢ Since anyone can purchase a patent, they are not industrial espionage target
where trade secret is.