You are on page 1of 39

lOMoARcPSD|34853969

Security

BS in Criminology (Holy Cross of Davao College)

Scan to open on Studocu

Studocu is not sponsored or endorsed by any college or university


Downloaded by Ludia Faye Remigio (ludiafayeee@gmail.com)
lOMoARcPSD|34853969

A. HISTORICAL BACKGROUND OF SECURITY


Many thousand years ago, some form of law and consequently some form of
enforcement can be traced back to the dawn of civilization. Four thousand years before
the birth of Christ in the Nile Valley, man new law enforcement which is security. The
Chinese, the Greeks, the Hebrews, the Persians and the Roman empires are replete
with historical background of security.
In Christian era or after the birth of Christ the watchman, forerunner of the
security guard was known in the old testaments.
Security or law enforcement often than not appeared to be military troops.
During the time that the countries were govern by the royal families, bodyguards or
guardsmen picked from the elite troops comprise of the household troops assigned to
royal families. Famous among them the Praetorian Guards of Ancient and the
Mameluke of Egypt. Today, the only remaining are the Swiss Guards at the Vatican in
Rome.
During the Age of Feudalism , the Anglo-saxons brought with them the England
organizations made up of individuals to protect civil and military groups. The formal
system of security during the middle ages follows largely the refinements of existing
practices. The Anglo-Saxons from Germany , for six hundred years consolidated
England under a fairly legal system. The basic ties of society were kinship and the
voluntary association between lord and mqan. Kinship0 was bond on which the
individual depended for security and mutual aid in all his affairs. Between lord and man,
the fact was bilateral. In return for such relationship man provided the lord with
weapons, horses , land and treasures and gave total unswerving loyalty. The system of
social structure was known as the “frank-pledge”; groups of ten householders were
considered as a unit called “tithing”, ten “tithing” constituted the police organization in
criminal matters. During these times the Anglo- Saxons in the exercise of law used the
oath or the ordeal for a system or justice. Failure to appear before the court to answer a
charge made one on outlaw.

In the history of England , the Norman period administered by William of


Normandy brought about such personality as” shire reeves” whose duties are directed
toward preservation of peace and order within their jurisdiction. Under the rule of Henry
II, known as the “Law giver”, he established a truth between those crimes. Henry II
initiated the rule of law as distinct from the more arbitrary judgments of the Normans.
The Azzise of Claredon in 1166 provided the origin of trial by jury. After the Norm,an
period, in 1215 “the Magna Carta” was signed. It established the “ principle of due
process” by stating that no freeman could be arrested, imprisoned , deprived of hid
property , outlawed or exiled or in any way destroyed except by legal judgement of his
peers or by the law of the land. It established the important principle that everyone

Downloaded by Ludia Faye Remigio (ludiafayeee@gmail.com)


lOMoARcPSD|34853969

including the king is the subject of law. It was the time that a central court system was
established where in such institutions and courts like Coraners, Justice of Peace,
Chancery courts , the Privy Councils were established.
In 1784, author and magistrate Henry Fielding proposed a permanent profession
and adequately paid security force. His most valuable contribution was the “Foot Patrol “
to make the streets safe and mounted patrol for the highways.
The Industrial Revolution during the latter half of 18th Century began to gather
momentum. The people flocked to the cities lured by promises of work and wages. The
crowding of the cities with the influx of wealth seeker brought by theory, crimes of
violence and juvenile delinquencies. The came of “ Laisses Faire” which contented that
labor was the source of wealth; and it was by freedom of labor that the public wealth
would best be promoted. Crime rate spiraled the response to high crimes brought
citizens to escort carrying of firearms for protection and they continued to band together
to hire special police to protect homes and properties. This is the beginning of private
security.
In America, security practices in early days of the colonization followed those of
England. Mutual protection and accountability characterized the various groups. The
American Revolution sprang and the declaration of Independence was born. Police
power is bestowed upon the state to permit interference with the normal personal and
property rights in the interest of conducting government in the general public interest. In
1783, a police department was established in New York City followed by Detroit in 1801,
Cincinnati in 1803, Chicago in 1846, Los Angeles in 1850 Philadelphia in 1855 and
Dallas in 1856.
the advent of the World War II causes an even more dramatic development of
private security agencies. Security personnel constituted a large work force looking for
jobs involving security services and thus usher in the era of modern security.
In 1859, Allan Pinkerton, a cooper from Scotland and the Chicago’s Police
Department detective , established one of the oldest private security forces in the United
States. This company aside from providing investigation of crimes and security for
industrial concerns also serve as the intelligence gathering arm of the Union Army
during the civil war. In 1889, Brinks Incorporated started the business as a private
service to protect property payrolls. In 1990, the William J.Burns Inc. was formed to
become the sole investigating agency for the American Banking Association. Pinkerton
and Burns were the only national investigative bodies concerned with non-specialized
crime until the advent of the Federal Bureau of Investigation.
In the Philippines, it would be wise to trace the steps leading to the final signing
by President Ferdinand E. Marcos on June 13, 1969 of Republic Act 5487, the Private
Security Agency law. In this law was assigned the most important role of security Guard
Force assisting the police in its mission to safeguard lives and properties. Then the
Philippine Constabulary (PC) played a great role in supervising all Private constabulary
issued staff memo dated August 4, 1969 creating the Philippine Constabulary Security
and Investigation Agency Supervisory Office (PCSIASO). After barely two months

Downloaded by Ludia Faye Remigio (ludiafayeee@gmail.com)


lOMoARcPSD|34853969

another General Staff Memo was issued renaming PCSIASO to PCSOSIA( Philippine
Constabulary Supervisory Office for Security and Investigation Agencies. On June 29,
1970, it was renamed as PCSUSIA ( Philippine Constabulary Supervisory Unit for
Security and Investigation Agencies) However, the supervision later on transferred to
the National Intelligence Coordinating Agency (NICA). With the intention of continuously
professionalizing the security industry , several Presidential Decrees were issued such
as PD no. 11 issued on October 1972, amending certain sections of RA 5487
particularly Section 4 as to who may organize security and watchman agency; PD 100
on January 17,1973 further amended section 3,4,5,8,and 9 which permits the watchman
or security guard to assist in case of emergency disaster or calamity.
With the creation of Philippine National Police on January 1,1991 pursuant to
RA6975, PCSUSIA became Supervisory Office for Security and Investigation Agencies
(SOSIA) and on January 1, 1995 it was renamed as PNP SAGSD (Security Agencies
and Guard Supervision Division) This unit of the PNP was given the same function to
that of the PCSOSIA but a more challenging and expanding tasks . To date there are
more or less two thousand (2,000) registered security agencies operating in the
Philippines., Five Hundred Sixty Thousand (560,000) licensed security personnel and
one Hundred twenty four (124) Private Security Training Institutions.

B. Security in General

1. Definition of Security

Security, in a collective sense, is the same as protection and safety; the state of
being safe and the condition of being protected against physical, social, spiritual,
financial, political, emotional,occupational , psychological or other types of
consequences of failure, damage, error, accidents, harm or any other event which could
be considered not desirable.
Security is also a freedom from fear, harm, danger,loss, destruction or damages.
Basically, it is the action of man against man that led to many unsecured and unsafe
condition . Reasons could be economic, revenge, or unjust plain greed and avarice.

LESSON 2
At the end of this topic, the student should be able to :
a) Understand the different fields of Security
b) Know and understand the Types of security

2. Fields of Security

Downloaded by Ludia Faye Remigio (ludiafayeee@gmail.com)


lOMoARcPSD|34853969

The following are the fields of security classified according to its sphere or
subjects;
a) IT FIELDS
● Computing Security- is a branch of information security applied to both
theoretical and actual computer systems. Computer Security is a branch of computer
science that addresses enforcement to secure behavior on the operations of computers.
The definition of secure varies by application , and is typically define implicitly or
explicitly by a security policy that addresses confidentiality, integrity, and availability of
electronic information that is processed by or stored on computer systems.
● Data Security- is the means of ensuring that data is kept safe from corruption
and that access to it is suitably controlled. Thus data security helps to ensure privacy. It
also helps in protecting personal data.
● Application Security- encompasses measures taken to prevent exceptions in
the security policy of an application or the underlying system through flaws in the
design, development, or deployment of the application.
● Information Security- means protecting information and information system
from unauthorized access, use, disclosure, disruption , modification or destruction.

The terms information security, computer security and information assurance are
frequently used interchangeably. These field are interrelated and share the common
goals of protecting the confidentiality, integrity, and availability of information; however,
there are some subtle differences between them. These differences lie primarily in the
approach to the subject, methodologies used, and areas of concentration.Information
Security is concerned to the confidentiality, integrity and availability of data regardless of
the form of data may take: electronic, print or other forms.
● Network Security – consist of provisions made in the underlying computer
network infrastructure, policies adopted by the network administrator to protect the
network and the network accessible resources from unauthorized access and the
effectiveness (or lack ) of these measures combined together.

b) PHYSICAL SECURITY
● Physical Security – describes measures that prevent or deter attackers from
accessing a facility, resources, , or information stored on physical media. It can be
simple as a locked door or as elaborated as multiple layers of armed guard post.
● Shopping Center Security (Mall or Supermarket) – a type of security which
is concerned with the protection of the stores, warehouses, storage, its immediate
premises and properties as well as the supermarket personnel and costumers. Security

Downloaded by Ludia Faye Remigio (ludiafayeee@gmail.com)


lOMoARcPSD|34853969

personnel are trained to detect “shoplifter”, robbery, and bomb detection and costumer
relation.
● Airport Security- refers to the techniques and methods used in protecting
airports and by extension aircraft from crime and terrorism.
● Home Security- are methods used of protecting residential homes or town
sites which include the interior protection of houses against property losses or
damages.

c) POLITICAL FIELD
● International Security- consists of measures taken by nations and
international organizations such as United Nations, to ensure mutual survival and
safety. These measures include military action and diplomatic agreements such as
treaties and conventions. International and national security is invariably linked.
● National Security –refers to the requirement to maintain the survival of the
nation-state through use of economic, military and political power and the exercise of
diplomacy.
● Human Security – refers to an emerging paradigm for understanding global
vulnerabilities whose proponents challenge the traditional notion of national notion of
national security by arguing that the proper referent for security should be the individual
rather than the state. Human security holds that a people centered view of security is
necessary for national, regional and global stability.

d) MONETARY FIELD
● Financial Security- refers to the methods applied for the protection of fungible,
negotiable instrument representing financial value. It broadly categorized into debt
securities, such as banknotes, bonds and debentures, and equity securities, etc.

3. TYPES OF SECURITIY
a. Industrial Security- a type of security applied to business groups in industries
like manufacturing, assembling, research and development, processing, warehousing
and even agriculture.
b. Hotel Security –a type of security applied to hotels where its properties are
protected from pilferage, loss, damage and the function in the hotel restaurants are not

Downloaded by Ludia Faye Remigio (ludiafayeee@gmail.com)


lOMoARcPSD|34853969

disturbed and troubled by the outsiders or the quest themselves. This type of security
employs house detectives, uniforms guard and supervisor and insures that hotels
guests and their personal effects are safeguarded.
c. Bank security- this type of security is concern with bank operations. Its main
objective is the protection of bank cash and assets, its personnel and client. Security
personnel are trained to safeguard bank and assets while in storage,in transit and
during transactions.
d. VIP Security – a type of security applied for the protection of top-ranking
officials of the government or private entity, visiting persons of illustrious standing and
foreign dignitaries.
e. School Security- a type of security that is concern with the protection of
students, faculty members and school properties. Security personnel are trained to
protect the school property from theft, vandals, handling campus riots and detecting the
use of intoxicated drugs and alcohol by the students.

LESSON 3
At the end of this topic, the student should be able to :
a) Identify the different Division of security
b) Know what is Security management

4. PRINCIPAL DIVISIONS OF SECURITY

a. Personnel Security- this is as important as physical security. Personnel


security starts even before the hiring of an employee and remains to be maintained for
as long as the person is employed.
Its purpose is to ensure that a firm hires those best suited to assist the firm in
achieving the goals and objectives and once hired assist in providing necessary security
to the work force while carrying out their function.
b. Physical Security- this concern with the physical measures adopted to
prevent unauthorized access to equipment, facilities, materials, and document and to
safeguard them against espionage, sabotage, damage, loss and theft.
c. Document/Information Security- involves the protection of documents and
classified papers from loss, access by unauthorized persons, damage, theft and
compromise through disclosure.

Downloaded by Ludia Faye Remigio (ludiafayeee@gmail.com)


lOMoARcPSD|34853969

Classified documents need special handling. Lack of indoctrination and


orientation among personal handling them can result in the leakage, loss, theft, and
unauthorized disclosure of the documents.

5. SECURITY MANAGEMENT
In one sense, Security Management is the proper utilization of resources in a
security organization in order to meet organizational goals and objectives and to ensure
their achievements. In other sense, it is a broad field of management related to asset
management , physical security and human resource safety functions. It entails the
identification of an organization’s information assets and the development,
documentation and implementation of policies, standards, procedures and guidelines.
Management tools such as information classification, risk management and risk
analysis are used to identify threats, classify assets and to rate system vulnerabilities so
that effective control can be implemented.

LESSON 4. INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS

Objectives: At the end of the topic the students will be able to:

1. Define and explain the concepts of industrial security.


2. Understand the importance of security.
3. Analyze the terms and types of security.

In the ancient world, humans learned to unite into clans, then into tribes and later
into bigger communities with their primary reason of securing their lives and livelihood.

Human those times were only worried of;

Downloaded by Ludia Faye Remigio (ludiafayeee@gmail.com)


lOMoARcPSD|34853969

a. Natural causes of dangers.


b. Other tribes competing for survival.

Ancient tribesmen’s earliest from of security is assigning all of their able-bodied


males of the tribe to guard their crops and their territory against animal’s attack.

They used variety of means to protect themselves such as:

a. Weapons out woo, stone and then later those made of metal.
b. Traps or devices designed to catch animals.
c. Barriers like wooden fences, natural barriers like river and cliff.

In the 18th century, the Agricultural Revolution or the improved agricultural methods
paved way for the massive growth in crop production. Microsoft Encarta states that the
increased of population cases the increased demand for food. It has been noted that the
lack of food leads people to steal, hence, security is needed for those who have plenty
of stocks.

In Great Britain, economic progress started, “The Industrial Revolution” – the influx
of the rural people resulted to crime increase to the point that thief catchers were
recruited to aid the law enforcement officers in locating criminals.

This could be the onset of hiring private individual to do security works. As a result,
some business firm emerged, such as the Pinkerton’s Detective and Protective Agency,
which offered to protect property and pursue offenders for a fee.

Here in the Philippines, “hacenderos” or owners of large tracts of lands often hire
farm workers on often double as protectors of the property against cattle rustlers and
robbers.

In 1958, Philippine Association of Detective and Protective Agency Operators


(PADPAO) were established. They are the organization who endorsed to the Congress
a bill to regulate the organization and operation of private detectives, watchmen,
security guards and agencies. In June 13, 1969, Republic Act 5487 or the “Private
Security Law” was born. This event started the professionalization of security works in
the Philippines. “Sikyu” – blue clad individual.

GUARD FORCE AND GUARD SYSTEM

The security guard force is the key element in the overall security system of a
plant or installation. Its basic mission is to protect all the property within the limits of the
facility boundaries and protect employees and other persons on the installation.

Downloaded by Ludia Faye Remigio (ludiafayeee@gmail.com)


lOMoARcPSD|34853969

The security guard who will become a part of the guard force must be required to
meet minimum criteria to assure that they will effectively perform their assigned security
director of the installation to insure that its guard force is of a high caliber to make a
judgment that could save multi-million pesos facility from total destruction.

The security guard force must be ready to meet the new challenges with new
concepts, hold innovations, and unrelenting insistence on high standards.

Security Guard

A Security Guard is called a private security guard or watchman that include any
person who offers or renders personal service to watch or secure client either a
residence or business establishment or both for hire or compensation, with a license to
exercise profession.

Security Guard Force

It is a group of selected men, trained or grouped into functional unit for the
purpose of protecting operational processes from those disruptions which would impede
efficiency or halt operation at a particular plant, facility, installation or special activity.

Types of Security Guard Forces in the Philippines

1. Private Security Agency – any person, association, partnership, firm or private


corporation, who contracts, recruits, trains, furnishes or post any security guard,
to do its functions or solicit individual, business firms, or private, public or
government-owned or controlled corporations or those of his/its security guards,
for hire commission or compensation.
2. Company Security Force – a security force maintained and operated any
private company/corporation for its own security requirements only.
3. Government Security Unit – a security unit maintained and operated by any
government entity other than military and/a police, which is established and
maintained for the purpose of securing the office or compound and/or extension
such government entity.

Downloaded by Ludia Faye Remigio (ludiafayeee@gmail.com)


lOMoARcPSD|34853969

Desirable Qualities as a Security Guard

1. Alertness – a good guard must be alert in spotting violators. This can be attained
by being watchful, dedicated and diligence.
2. Judgment – sound and good judgment is more than the use of common sense. It
is the arriving at wise and timely decision.
3. Confidence – it is the state of being sure; a state of the mind free from doubt or
misgivings. This attribute attained by job knowledge. Thorough and proper
training plus good supervision instills confidence.
4. Tactfulness – ability of the guard to deal with others successfully without
offending. In short, he can be firm but pleasant.
5. Self-control – ability to take hold of oneself regardless of a provoking situation.
With self-control, the guard will do his work without being angry and the situation
will be on hand.
6. Interest, loyalty, responsible and trustworthy, is also important attributes of a
reliable guard.

LESSON 5. PHYSICAL SECURITY

Objectives: At the end of the topic the students will be able to:

1. Understand the purpose of physical security, the layers of physical security.


2. Determine the kinds of barriers and the type of fences.
3. Analyze the importance of physical security, the physical barriers and the like.

Physical Security

The physical security measures are being used to define, protect and monitor
property rights and assets. These measures consist of barriers and devices that would
detect, impede and prevent unauthorized access to equipment, facilities, material and
document and to safeguard them against espionage, sabotage, damage and theft.

Four Layers of Physical Security

Downloaded by Ludia Faye Remigio (ludiafayeee@gmail.com)


lOMoARcPSD|34853969

1. Environmental Design – the initial layer of security for a campus, building, office
or physical space uses environmental design to deter threats. Some of the most
common examples are also the most basic barbed wire, warning signs and
fencing, concrete bollards, metal barriers, vehicle heights restrictions site lighting
and trenches.
2. Mechanical and Electronic Access Control – includes gates, doors, and locks.
Key control of the locks becomes a problem with large user populations and any
user turnover. Keys quickly become unmanageable forcing the adaptation of
electronic access control. Electronic access control easily lifecycle times, dates
and individual access points.
3. Intrusion Detection – monitors for attacks. It is less a preventative measure and
more of a response measure. Although some would argue that it is a deterrent.
Intrusion detection has a high incidence of false alarms.

Barriers

A barrier can be defined as any structure or physical device capable of


restricting, deterring, delaying, illegal access to an installation.

Types of Barriers

1. Natural Barriers – it includes bodies of waters, mountains, marshes, ravines,


deserts or other terrain that are difficult to traverse,
2. Structural Barriers – these are features constructed by man regardless of their
original intent that trends to delay the intruder. Examples are walls, doors,
windows, locks, fences, safe, cabinets, or containers, etc.
3. Human Barriers – persons being used in providing a guarding system or by the
nature of their employment and location, fulfill security functions. Examples are
guards, office personnel, shop workers, etc.
4. Animal Barriers – animals are used in partially providing a guarding system.
Dogs are usually trained and utilized to serve as guard dogs. German Shepherds
are best suited for security functions. Goose and turkeys could also be included.
5. Energy Barriers – it is the employment of mechanical, electrical energy imposes
a deterrent to entry by the potential intruder or to provide warning to guard
personnel. These are protective lightning, alarm system and any electronic
devices used as barriers.

Downloaded by Ludia Faye Remigio (ludiafayeee@gmail.com)


lOMoARcPSD|34853969

Lines of Physical Defense

1. First Line of Defense – includes perimeter fence or barrier.


2. Second Line of Defense – include doors, floors, windows, walls, roofs, and grills
and other entries to the buildings.
3. Third Line of Defense – include storage systems like steel cabinets, safes,
vaults and interior files.

Perimeter Security

The purpose of perimeter barrier is to deny or impede access or exit of


unauthorized person. Basically, it is the first line of defense of an installation. This is
maybe in the form of fences, building walls or even bodies of water.

Types of Perimeter Barrier

1. Fences
2. Walls
3. Bodies of Water

Types of Fences

a. Solid Fences – constructed in such away that visual access through the fence is
denied. Its advantage is that it denies the opportunity for the intruder to become
familiar with the personnel, activities and the time scheduled of the movements of
the guards in the installation.
b. Full-view Fence – it is constructed in such a way that visual access is permitted
through the fence. Its advantages are that it allows the roving patrols and
stationary guard to jeep the surrounding area of the installation under
observation.

Types of Full-view Fence

1. Chain Link Fence


● It must be constructed of 7 feet material excluding top guard.

● It must be of 9 – gauge or heavier.

Downloaded by Ludia Faye Remigio (ludiafayeee@gmail.com)


lOMoARcPSD|34853969

● The mesh openings are not to be larger than 2 inches per side.

● It should be twisted and barbed selvage at top and bottom.

● It must be securely fastened to rigid metal or reinforced concrete.

● It must reach within 2 inches of hard ground or paving.

● On soft ground, it must reach below surface deep enough to compensate for
shifting soil or sand.

2. Barbed Wire Fence


● Standard barbed wire is twisted, double-strand 12 – gauge wire with 4 point
barbs spaces in an equal distance apart.
● Barbed wire fencing should not be less than 7 feet high excluding top guard.

● Barbed wire fencing must be affixed to post not more than 6 feet apart.

3. Concertina Wire Fence


● Standard concertina barbed wire is commercially manufactured wire coil of
high strength steel barbed wire clipped together at intervals to form a cylinder.
● Opened concertina wire is 50 feet long and 3 feet in diameter.

Perimeter Barrie Opening

1. Gates and Doors – when not in use and controlled by guards, gates and doors
in the perimeter should be locked and frequently inspected by guards. Locks
should be changed from time to time and should be covered under protective
locks and key control.
2. Side-walk-elevators – these provide access to areas within the perimeter barrier
and should be locked and guarded.
3. Utilities Opening – sewers, air intakes, exhaust tunnels and other utility
openings which penetrate the barrier and which have cross sectional areas of 96
square inches or more should be protected by bars, grills, water filled traps or
other structural means providing equivalent protection to that portion of the
perimeter.

Downloaded by Ludia Faye Remigio (ludiafayeee@gmail.com)


lOMoARcPSD|34853969

4. Clear Zones – an obstructed area or a “clear zone” should be maintained on


both sides of the perimeter barrier. A clear zone of 20 feet or more is desirable
between the barriers and exterior structures and natural covers that may provide
concealment for assistance to a person seeking unauthorized entry.

Additional Protective Measures

1. Top Guard – additional overhang barbed wire placed on vertical perimeter


fences upward and outward with a 45 degree angle with 3 to 4 strands of barbed
wire spaced 6 inches apart. This increases the protective height and prevents
easy access.
2. Guard Control Stations – this is normally provided at main perimeter entrances
to secure areas located out-of-doors, and manned by guards on full-time basis.
Sentry station should be near a perimeter for surveillance at the entrance.
3. Tower Guard – this is a house-like structure above the perimeter barriers. The
higher the tower, the more visibility it provides. It gives a psychological
unswerving effect to violators. By and large guard towers, whether permanent or
temporary, must have a corresponding support force in the event of need.
4. Barrier Maintenance – fencing barriers and protective well should always be
regularly inspected by security. Any sign or attempts to break in should be
reported for investigation. Destruction of fence or sections thereof should be
repaired immediately and guard vigilance should be increased.
5. Protection in Depth – in large open areas or ground where fencing or walling is
impracticable and expensive, warning signs should be conspicuously placed.
6. Signs and Notice – “control signs” should be created necessary in the
management of unauthorized access in the management of entry. Signs should
be plainly visible and legible from any approach and in understandable language.
Signs on entry shall also be posted at all principal entries.

General Types of Lightning Sources

1. Incandescent Lamp – it is the least expensive in terms of energy consumed and


has the advantage of providing instant illumination when the switch is on.
2. Mercury Vapor Lamp – it is considered more efficient that the incandescent and
used widespread in exterior lightning. This emits a purplish-white color, caused
by an electric current passing through a tube of conducting and luminous gas.
3. Metal Halide – it has similar physical appearance to mercury vapor but provides
a light source of higher luminous efficiency and better color rendition.

Downloaded by Ludia Faye Remigio (ludiafayeee@gmail.com)


lOMoARcPSD|34853969

4. Fluorescent – this provides good color rendition, high lamp efficiency as well as
long life. However, it cannot project light over long distance and thus are not
desirable as flood type lights.
5. High-pressure Sodium Vapor – this has gained acceptance for exterior
lightning of parking areas, roadways, buildings, and commercial interior
installations. Constructed on the same principle as mercury vapor lamps, they
emit a golden white to light pink color and this provide high lumen efficiency and
relatively good color rendition.

Types of Lightning Equipment

1. Floodlights – these can be used to accommodate most outdoor security


lightning needs, including the illumination of boundaries, fences, and buildings
and for the emphasis of vital areas or particular buildings.
2. Street Lights – these are highly focused incandescent lamp and are designed to
pinpoint potential trouble spots.
3. Fresnel Light – these are wide beam units, primary used to extend the
illumination in long, horizontal barrier. Fresnel projects a narrow, horizontal beam
that is approximately 180 degree in the horizontal and from 15-30 degrees in the
vertical plane.

LESSON 6

Objectives: At the end of the topic the students will be able to:

a. Understand the importance of protective alarms and communication system.


b. Know the basic parts of alarm system
c. Identify the Types of Protective Alarm System and kinds of alarms

Protective Alarms and Communication System

Protective alarms are one of the important barriers in security. It assists the
security in detecting, impeding or deterring potential security threat in the installation.
Basically, its function is to alert the security personnel for any attempt of intrusion into a
protected are, building or compound.

Three Basic Parts of Alarm System

Downloaded by Ludia Faye Remigio (ludiafayeee@gmail.com)


lOMoARcPSD|34853969

1. Sensor or Trigger Device – it emits the aural or visual signals or both.


2. Transmission Line – a circuit which transmit the message to the signaling
apparatus.
3. Annunciator – it is the signaling system that activities the alarm.

Types of Protective Alarm System

1. Central Station System – a type of alarm where the control station is located
outside the plant or installation. When the alarm is sounded or actuated by
subscriber, the central notifies the police and other public safety agencies.
2. Proprietary System – centralized monitor of the proprietary alarm system is
located in the industrial firm itself with a duty operator. In case of alarm, the duty
operator calls whatever is the primary need; firefighter, police, an ambulance or a
bomb disposal unit.
3. Local Alarm – this system consist of ringing up a visual or audible alarm near
the object to be protected. When an intruder tires to pry a window, the alarm
thereat goes off.
4. Auxiliary Alarm – company-owned alarm systems with a unit in the nearest
police station so that in case of need, direct call is possible. The company
maintains the equipment and lines both for the company and those in the police,
fire and other emergency agencies by special arrangement.

Kinds of Alarms

1. Audio Detectives Device –it will detect any sound caused by attempted force
entry. A supersonic microphone speaker sensor is attached to walls, ceilings or
floors of the protected area.
2. Vibration Detection Device – it will detect any vibration caused by attempted
force entry. A vibration sensitive sensor is attached to walls, ceilings or floors of
the protected area.
3. Metallic Foil or Wire – it will detect any action that moves the foil or wire. An
electrically charge strips of tinfoil or wire is used in the doors, windows or glass
surfaces of the protected area.
4. Laser Beam Alarm – a laser emitter floods a wall or fencing with a beam so that
when this beam is disturbed by a physical object, an alarm is activated,
5. Photoelectric or Electric Eye Device – an invincible/visible beam is emitted
and when this is disturbed or when an intruder breaks contact with the beam, it
will activate the alarm.

Downloaded by Ludia Faye Remigio (ludiafayeee@gmail.com)


lOMoARcPSD|34853969

LESSON 7

Objectives: At the end of the topic the students will be able to:

a. Define what is the meaning of lock


b. Know what are the different types of lock and keys and key control
c. Know what is security cabinet and its three types
d. Understand the Personal Identification and Movement Control
e. Know the types of personal Identification, the uses of pass system and visitor’s
movement control

Lock

A lock is defined as a mechanical, electrical, hydraulic or electronic device


designed to prevent entry into a building, room, container or hiding place.

Types of Locks

1. Key-operated Mechanical Lock – it uses some sort of arrangement of internal


physical barriers which prevent the lock form operating unless they are properly
aligned. The key is the device used to align these internal barriers so that the
lock may operate.

Three Types of Key-operated Lock


● Disc or wafer tumbler mechanism

● Pin tumbler mechanism

● Lever tumbler mechanism

2. Padlock – a portable and detachable lock having a sliding hasp which passes
through a staple ring and is then made fasten or secured.
3. Combination Lock – instead of using the key align the tumblers, the
combination mechanism uses numbers, letters or other symbols as reference
point which enables an operator to align them naturally.
4. Code-operated Lock – a type of lock that can be opened by pressing a series of
numbered buttons in the proper sequence.
5. Electronic Lock – a type of lock that can be opened and closed remotely by
electrical means.
6. Card-operated Lock – a type of lock operated by a coded card.

Downloaded by Ludia Faye Remigio (ludiafayeee@gmail.com)


lOMoARcPSD|34853969

Types of Keys

1. Change Key – a specific key which operates the lock and has a particular
combination of cuts which match the arrangement of the tumblers in the lock.
2. Sub-master Key – a key that will open all the lock within a particular area or
grouping in a given facility.
3. Master Key – a specific key capable of opening a series of lock.
4. Grand Master Key – a key that will open everything in a system involving two or
more master key groups.

Key Control

Once an effective key control has been installed positive control of all keys must
be gained and maintained positive control of all keys must be gained and maintained.
This can be accomplished only if it is established in conjunction with the installation of
new locking devices.

The following methods can be used to maintain effective key control:

1. Key Cabinet – a well-constructed cabinet will have to be procured. The cabinet


will have to be of sufficient size to hold the original key to every lock in the
system.
2. Key record – some administrative means must be set up to record code
numbers and indicated to whom keys to specific locks have been issued.
3. Inventories – periodic inventories will have to be made of all duplicate and
original keys in the hands of the employees whom they have been issued.
4. Daily report – a daily report should be made to the person responsible for key
control from the personnel department indicating all persons who have left or will
be leaving the company. It the event that a key has been issued, steps should be
initiated to insure that the key is recovered.

Security Cabinet

The final line of defense at any facility is in the high security storage where
papers, records, plans or cashable instrument, precious metals or others especially
valuable assets are protected.

Downloaded by Ludia Faye Remigio (ludiafayeee@gmail.com)


lOMoARcPSD|34853969

Three Types of Security Cabinet

1. Safe – a metallic container used for the keeping of documents or small items in
an office or installation. Safe can be classified as either robbery or burglary
resistance depending upon the use and need.
● It weight must be at least 750 lbs. and should be anchored to a building
structure.
● Its body should at least one inch thick steel.

2. Vault – heavily constructed fire and burglar resistance container usually a part of
the building structure used to keep and protect cash, documents and negotiable
instruments. Vaults are bigger that safe but smaller than a file room.
● The vault door should be made of steel at least 6 inches in thickness.

● The vault walls, ceiling, floor reinforce concrete at least 12 inches in


thickness.
● The vault must be resistive up to 6 hours.

3. File Room – a cubicle in a building constructed a little lighter than a vault but of
bigger size to accommodate limited people to work in the records inside.
● The file room should at most 12 feet high.

● It must have a watertight door and at least fire proof for one hour.

Personal Identification and Movement Control

In every installation, the use of protective barriers, security lightning,


communication and electronic hardware provides physical safeguards but these are
insufficient to maximize the effort of the guard force.

The most practical and generally accepted system of personnel identification is


the use of identification cards, badges or passes. Generally speaking, this system
designated when and where and how identification cards should be displayed, and to
whom.

Downloaded by Ludia Faye Remigio (ludiafayeee@gmail.com)


lOMoARcPSD|34853969

2 Types of Personnel Identification

1. Personal recognition
2. Artificial recognition – identification cards, passes, passwords, etc.

Uses of Pass System

1. Single Pass System – the badge or pass coded for authorization to enter
specific areas is issued to an employee who keeps it in his possession until his
authorization is terminates.
2. Pass Exchanged System – an exchange takes place at the entrance of each
controlled area. Upon leaving the personnel surrenders his badge or passes and
retrieve back his basic identification.
3. Multiple Pass System – this provides an extra measure of security by requiring
that an exchanged take place at the entrance of each restricted area.

Visitors Movement Control

1. Visitor’s Logbook – all visitors to any facility should be required to identify them
and should be given visitor’s ID by the security. Visitor’s logbook should be filled
up with named of visitors, nature and duration of visits.
2. Photograph – taking of photograph should also be considered. Extreme caution
must be exercised un areas where classified information is displayed to preclude
unauthorized taking of pictures of the installation.
3. Escort – if possible visitor should be escorted by the security to monitor their
activity within the establishment and guide them where to go.
4. Time-traveled – if there is a long delay or time lapse between the departure and
arrival, the visitors may be required to show cause of the delay.

Semi Final

LESSON 8

PERSONNEL SECURITY

Of the three major aspects of security, personnel security is considered as the


most important. The reason is that security involves people, both an asset to be
protected and at the same time a source of security threats. It is an acknowledge fact
that losses are attributed mainly to negligence or active participation of employees ,

Downloaded by Ludia Faye Remigio (ludiafayeee@gmail.com)


lOMoARcPSD|34853969

either through theft, and/ or sabotage this emphasizes the need to set up a system of
hiring the people for the company.

What is Personnel Security?

Personnel Security refers to those practices, technologies and/ or services used


to ensure that personnel security safeguards are applied.

Auditable Process refers to specific documentation which can be a manual or


an automated process that provides sufficient evidence that will allow one to trace the
events of an action that has taken place.

Sensitive Data/ Information refers to critical information for which an


unauthorized access, loss, misuse, modification, or improper disclosure could
negatively impact the ability of the entity or agency to provide services and benefits to
its customers.

Confidential Data/ information refers to the information that involves the


privacy to which individuals are entitled by law. This information may only be disclosed
to those individuals that are authorized and have a need to review the data or
information.

Purpose of Personnel Security

1. To insure that a firm hires those employees best suited for firm; and
2. Once hired, to assist in providing the necessary security to these employees
while they are carrying out their function.
Key Function of Personnel Security

1. It serves as a screening device in hiring suitable employees.


2. It provides background investigation services of both potential and present
employees, for possible assignment to sensitive position.
3. It handles investigation of employees suspected of wrongdoing.
4. It develops security awareness among employees.
5. It attempts to ensure the protection of employees from discriminatory hiring or
terminating procedure as well as unfounded allegations illegal or unethical
activities and conduct

Downloaded by Ludia Faye Remigio (ludiafayeee@gmail.com)


lOMoARcPSD|34853969

What is Personnel Security Investigation (PSI)?

Personnel Security Investigation (PSI) is a process of inquiry into character ,


reputation, discretion, integrity, morals, and loyalty of an individual to determine the
suitability for appointment of access to classified matters.

What are the general techniques in PSI?

1. Background Investigation (BI) – this technique is very expensive but necessary


in personnel security in personnel security. It serves to verify information on the
application from and to obtain other information pertinent to the decision to
employ. It consist of:
a. Partial Background Investigation (PBI)
b. Complete Background Investigation (CBI)
COMPONENTS OF COMPLETE BI

● Applicants Name

● Organization Membership

● Date of Birth

● Neighbourhood Investigation

● Present Residence Address

● Character References

● Personal History

● Employment History

● Marital History

● Military History

Downloaded by Ludia Faye Remigio (ludiafayeee@gmail.com)


lOMoARcPSD|34853969

● Residence History

● Foreign Travel History

● Citizenship

● Criminal Record

● Physical Data

● Credit Records

● Educational History

● Applicant’s Signature

● Date of Application

LOCAL AGENCY CHECK

Local Agency Check (LAC) is a BI activity where the sources of information


involve only the local agencies in the community such as the local government units.

a. Barangay Clearance
b. City or Municipal Clearance
c. Local Police Clearance
d. Court Clearance
NATIONAL AGENCY CHECK

Like Local Agency Check, NAC is also a BI activity but the sources of information
involve national government units.

a. National Bureau of Investigation (NBI) Clearance


b. PNP Directorate Intelligence (DI) Clearance
c. Intelligence Service , AFP (ISAFP) Clearance

2. Positive Vetting – is the process of inspecting or examining with the careful


thoroughness. The essence of vetting that is personal; interview conducted under
stress. It is based on information previously given by the applicant. Other

Downloaded by Ludia Faye Remigio (ludiafayeee@gmail.com)


lOMoARcPSD|34853969

information is sued during the interview, such as those discovered in the BI,
which confirms or denies this given by the applicant.

3. Profiling – is the process whereby a subject’s reaction in a future critical


situation is predicted by observing his behaviour, or by interview him, or
analysing his responses to a questionnaire such as an honesty test. The Reis
Report is an example of honesty test.

4. Deception Detection Techniques- this is a process of using devices in


detecting deception during the interview stage. This includes the use of a
Polygraph, Psychological Stress Evaluator and Voice Analyser.

5. Financial and Lifestyle Inquiry- this type of investigation seeks to gather


information on income and model of living sometimes referred to as the earning-
to-debt ratio.

6. Undercover Investigation- this is the placement of an agent in a role in which


the agent’s true identity and the role remains unknown, in order to obtain
information for criminal prosecution or for recovery or limitation of asset losses.

7. Exit Interview- this is a valuable tool because it gives departing employees an


opportunity to list grievances. It offers security managers an opportunity to learn
of problems not previously known. Incorporating a checklist of company-issued
property and confronting a departing employee of this has resulted in reducing
loses of company property. Debriefing an employee is also incorporated into the
exit interview to remind employees of their continuing obligations to safeguard
confidential company information.

What is Security Education?

Security Education is conducted to develop security awareness among


employees of the company. It should cover all employees, regardless of rank or
position.

Objectives of Security Education

1. Guidance for all supervisory and executive levels of the organization.


2. A mandatory indoctrination on security for all new personnel before their
assignment to their respective jobs.
3. Development of a high degree of security consciousness among the selected
supervisors and others key personnel in a program that should be continuing
and supported by the top management.

Downloaded by Ludia Faye Remigio (ludiafayeee@gmail.com)


lOMoARcPSD|34853969

4. A down-the–line security program aimed at installing consciousness and


dedication through demonstration, lectures, motivation and suggestions.
5. To let all employees force informed that they all belong to the organization
and that non- awareness to security program is tantamount to disloyalty.
6. That the program is also to develop discipline, loyalty and belongingness.

Phases of Security Education Program

1. Initial Interview- it is the first contact of the prospective employee wherein


the interviewer determine the suitability of the applicant for employment
through his give answers on the different type of questions being conducted.
It is in this stage where the interviewer may start providing the necessary
information as to the overview of the company security policies and at the
same time on the employee accountability and corresponding penalties that
could result from violation therefrom.
2. Orientation and Training- it is in this stage where the new employees
receive detailed presentation of personnel security policy. Usually hand outs
or references. New employees also requested to sign acknowledgement that
they have been aware of the existing company policies and will abide the
same.
3. Refresher Conference- it is design to remind employees of the company
about their responsibilities, review guidelines and policies, introduction of new
policies and regulations and a moment of getting employees feedback about
the company policies that is being implemented.
4. Security Remainders- a phase which employs an indirect approach of
educating the employees such as posting security posters and distributing
fliers.
5. Security Promotion- it is the act of emphasizing the importance and the role
of security achieving the company goals and objectives. It involves securing
employee cooperation and support.
GUIDELINES IN PERSONNEL SECURITY

AS TO TRUSTWORTHINESS

1. Physical Qualifications
Operators should pass a physical examination administered by a licensed
physician. The examination should be designed to measures the individual’s
physical ability to perform assigned job duties, as identified in the
organization’s job qualification program.

2. Mental Qualifications

Downloaded by Ludia Faye Remigio (ludiafayeee@gmail.com)


lOMoARcPSD|34853969

Individuals whose job duties are directly associated with the


effective implementation of the organization’s process controls should be
demonstrate mental alertness and the capability to exercise good
judgement, execute instructions and assimilate assigned task.

3. Psychological Qualifications
The entity should be required to evaluate the possible impact of any
noted psychological characteristics that may have bearing on
trustworthiness. Control system operates should have no emotional
instability or affiliations with organizations that pose a threat to security
that would interfere with the effective performance of assigned job duties.
This determination should be made by a licensed psychologist,
psychiatrist, physician or any other person professionally trained to identify
emotional instability.

4. Behavioural Observational
The entity should be required to observe individual behavioural
changes which, if left unattended, could lead to acts detrimental to the
public health and safety. Individual should have no established medical
history or medical diagnosis of habitual alcoholism or drug addiction or,
when such a condition has existed, the individual should provide certified
documentation of having completed a rehabilitation program that would
give a reasonable degree of confidence that the individual is capable of
performing assigned job duties.

5. Voluntary Assessment
The entity should give an individual an opportunity to report any
information concerning authorization and security to perform assigned job
duties.

6. Continuing Assessment
The entity should arrange for continued observation of individuals and
for appropriate corrective measures by responsible supervisors for
indications of emotional instability of individuals in the course of
performing assigned security job duties. Identification of emotional
instability reported by responsible supervisors should be subject to
verification by a licensed, trained person.

Downloaded by Ludia Faye Remigio (ludiafayeee@gmail.com)


lOMoARcPSD|34853969

As to Capability

1. Educational Experience
Individual should be required to poses a high school diploma or pass an
equivalent performance examination designed to measure basic job-related
mathematical, language and reasoning skills ,as well as ability and knowledge
required by assigned job duties. Individuals should be required to have the
defined minimum amount on-the-job experience for each appropriate level of
operator certification required by their experience assigned job duties as define
by the employer.

2. Training
Each individual who requires training to performed assigned job tasks or
job duties as identified by the organization’s operating or contingency plans
should prior to assignment be trained to perform those tasks and duties in
accordance with the organization’s documented training and qualification plan.
Individuals should be required to have the defined amount of training for each
appropriate level of operator’s certification.

3. Security Awareness
Each individual should receive ingoing employee awareness sessions and
training.

4. Updates on Current Trends


The entity should be required to remain current with the changes in
technology to understand new advances. Organizations should require an
individual to recertify if he individual fails to renew or qualify to renewal after the
date that the certification has expired.

5. Certification of Exam
Individuals should be certified before being allowed to operate control
systems.

Downloaded by Ludia Faye Remigio (ludiafayeee@gmail.com)


lOMoARcPSD|34853969

As to Securing Environment

1. Vulnerability and Risk Management


The entity should require a Security Vulnerability Assessment process to
assess risk and make decisions about operating risks and to make progress
towards the goal of reducing the risks associated with control system operations.

2. Internal Audits
The entity should collect information and periodically evaluate success of
their security assessment techniques and other mitigation risk control activities.
The organization should also evaluate the effectiveness of its management
systems and processes in supporting sounds security management decisions.

3. External Audits
The entity should require personnel security programs that will include
ongoing outside involvement in the revision and operations of the personnel
security program. A stakeholder board or advisory committee is strongly
recommended.

4. Enforcement
The entity should have the ability to suspend operator certifications or take
other appropriate enforcement action for operator misconduct.

5. Emergency Plan
Organization’s emergency plan should training of key participants to
ensure they have skills and knowledge to effectively carry those plans. A training
and orientation program for the key responders should be develop and
periodically reviewed.

6. Control System Access


Control system access should have personnel gates and or turnstiles with
electronic or biometric access control system that record ingress and egress to
physically secure control system areas such as motor control centers, server
rooms, telecommunication rooms and control system rooms.

Downloaded by Ludia Faye Remigio (ludiafayeee@gmail.com)


lOMoARcPSD|34853969

DOCUMENT AND INFORMATION SECURITY

WHAT IS DOCUMENT SECURITY?

It is the protection of records from its entire document cycle life. It also connotes
in this context the safeguarding classified matters.

Document Security System

Documents security is that aspect of security which involves the application of


security measures for the proper protection and safeguarding of classified information.

CLASSIFICATION CATEGORIES

TOP SECRET
SECRET
CONFIDENTIAL
RESTRICTED

In Document and Information Security a matter includes e, everything,


regardless of its physical character, or in which information is recorded or embodied.
Documents , equipment, projects, books, reports, articles, notes, letters, drawings,
drawings, sketches, plans, photographs, recording, machinery, models, apparatus,
devices, and all other products or substances fall within the general term matter.
Information, which is transmitted orally, is considered matter for purposes of security.

SECURITY CLEARANCE - is the certification by a responsible authority that the person


described is cleared for access to classify.

CERTIFICATED OF DESTRUCTION - is the certification by a witnessing officer that the


classified matters, describe therein has been disposed of in his presence, approved,
destruction of methods.

COMPARTMENTATION - is the grant of access to classified matter only to properly


cleaved persons in the performance of their official duties.

DECLASSIFY - is the removal of security classification from classified matters.

RECLASSIFY/ REGRADING - is the act of changing the assigned classification of


matter.

Downloaded by Ludia Faye Remigio (ludiafayeee@gmail.com)


lOMoARcPSD|34853969

UPGRADING - is the act of assigning to a matter of higher classification to a classified


document.

WHAT ARE TOP SECRET MATTERS?

These are information and material , the un authorize disclosure of which would cause
exceptionally grave damage to the nation, politically, economically, or from a security
aspect. This category is reserve for the nation’s closest secrets and to be used with
great reserve.

CLASSIFICATION AUTHORITY

The original classification authority for assignment of TOP SECRET classification rests
exclusively with the head of the department. This power may however, be delegated to
authorized offices in instances when necessity for such arises. Derivative classification
authority for TOP SECRET may be granted those officers who are required to give
comments or responses to a communication that necessities top secret response.

WHAT ARE SECRET MATTERS?

These information and material, the un authorized disclosure of which would endanger
national security , cause serious injury to the interest or prestige of the nation or of any
governmental activity or would be great advantage to a foreign nation.

A Secret grading is justified if:

1. It materially influences a major aspect of military tactics;


2. It involves a novel principle applicable to existing important projects;
3. It is sufficiently revolutionary results to result in a major advance in existing
techniques or in the performance of existing secret weapon;
4. It is liable to compromise some other projects so already graded.

Classification Authority – same as TOP SECRET matter.

WHAR ARE CONFIDENTIAL MATTERS?

These are information and material the un authorized disclosure of which, while not
endangering the national security , would be prejudicial to the interest or prestige of the

Downloaded by Ludia Faye Remigio (ludiafayeee@gmail.com)


lOMoARcPSD|34853969

nation or any governmental activity or would cause administrative embarrassment or


unwarranted injury to an individual or would be of advantage to a foreign nation.

Confidential grading is justified if:

1. It is more than a routine modification of logical improvement of existing materials


and is sufficiently advance to result in substantial improvement in the
performance of existing confidential weapons.
2. It is sufficiently important potentially to make it desirable to postpone knowledge
of its value reaching a foreign nation.
3. It is liable to compromise some other project already so graded.

Classification Authority – any officer is authorized to assign confidential classification


to any matter in performance of his duties.

WHAT ARE RESTRICTED MATTERS?

These are information and matter which requires special protection other than that
determined to be top secret, secret or confidential.

CATEGORIES OF DOCUMENT FOR SECURITY PURPOSES

1. Category A
⮚ Information which contains reportable time sensitive, order of battle and
significant information.
⮚ It should be given priority because it is critical information.

⮚ It must be forwarded without delay.

⮚ It is critical to friendly operation.

⮚ It requires immediate action.


2. Category B
⮚ Anything that contains communications, cryptographic documents, or
system that should be classified as secret and requires special handling.
⮚ Higher authorities should declassify it.
3. Category C
⮚ Other information, which contains something that could be an intelligence
value.

Downloaded by Ludia Faye Remigio (ludiafayeee@gmail.com)


lOMoARcPSD|34853969

⮚ Contains exploitable information regardless of its contents.

⮚ Categorized materials/documents should be categorized as category C.


4. Category D
⮚ No value, yet lower level will never classify documents as category D.

⮚ No decision must be made at the lower echelon that document has no


value. It is the responsibility of the higher headquarters.

INFORMATION SECURITY

Information Security means protecting information and information system from


unauthorized access, use, disclosure, disruption, modification, or destruction.

WHAT ARE THE BASIC PRINCIPLES OF INFORMATION SECURITY?

1. Confidentiality
Is a requisite for maintaining the privacy of the people whose personal
information the organization holds. Information that is considered to be
confidential in nature must only be accessed, used, copied, or disclosed by
person who have been authorized to access, use, copy or disclose the
information and then only when there is a genuine need to access ,use ,copy or
disclose the information.

2. Integrity
In information security, integrity means that data cannot be created,
change, or deleted without authorization. It also means that the data stored in
one part of database system is in agreement with other related data stored in
another part of the data base system.

3. Availability
The concept of availability means that the information, the computing
systems used to process the information, and the security controls used to
protect the information are all available and functioning correctly when the
information is needed. The opposite of availability denial services.

WHAT IS CRYPTOGRAPHY IN INFORMATION SECURITY?

Downloaded by Ludia Faye Remigio (ludiafayeee@gmail.com)


lOMoARcPSD|34853969

Cryptography is the practice and the study of hiding information. Information security
uses cryptography to transform usable information into form that renders it unusable by
anyone other than an authorized user; this process called encryption.

SECURITY HAZARDS AND RISK MANAGEMENT

WHAT IS HAZARD?

A hazard is a situation, which poses a level of a threat to life, health, property or


environment. Most hazards are dormant or potential with only a theoretical risk of harm,
however, once a hazard becomes active it can create an emergency situation. It is
usually used to describe a potentially harmful situation, although not usually the event
itself- once the incident has started it is classified as an emergency or incident.

WHAT ARE THE TYPES OF HAZARDS?

1. Natural Hazards- are hazards which arise from natural phenomena. The
following are types of natural hazards or disasters:
⮚ Floods caused by typhoons

⮚ Earthquakes

⮚ Fire (not causes by human action)

⮚ Storms (typhoons, cyclones, tornado and hurricane)

⮚ Lighting storms

⮚ Extreme temperature and humidity

2. Man-made Hazards- these are hazards which are the result of a state of mind,
attitude, weaknesses, or character traits of one or more persons. They can be
acts of commission or omission, both overt and covert which can disrupt
operation of a plant or installation. The following are types of human or man
made hazards:
⮚ Carelessness-accidents and dissatisfaction

⮚ Disloyalty-subversion and sabotage

⮚ Espionage, pilferage and theft

Downloaded by Ludia Faye Remigio (ludiafayeee@gmail.com)


lOMoARcPSD|34853969

⮚ Vandalism, etc.

WHAT IS AN INDUSTRIAL HAZARD?

In this context, industrial hazards are workplace hazards and are often grouped into
physical hazards, physical agents, chemical agents, biological agents and psychological
issues.

Physical hazards includes:

● Slips and strips

● Falls from height

● Workplace transport

● Dangerous machinery

● Electricity

● Heavy metals

Physical agents includes:

● Noise

● Vibration

● Ionizing radiation

Chemical agents include:

● Solvents

● Biological agents

Psychological issues include:

● Work related stress, whose casual factors include excessive working time and
overwork
● Violence from outside the organization

Downloaded by Ludia Faye Remigio (ludiafayeee@gmail.com)


lOMoARcPSD|34853969

● Bullying (sometimes called mobbing) which may include emotional, verbal, and
sexual harassment

Other issues include:

● Reproductive hazards

● Work environment factors, such as temperature, humidity, lighting, welfare

● Avoidance of musculoskeletal disorder by the employment of good ergonomic


design.

WHAT IS SABOTAGE AS A SECURITY HAZARD?

Sabotage is a deliberate action aimed at weakening an enemy, oppressor or employer


through subversion, obstruction, disruption and/or destruction.

WHAT IS ESPIONAGE AS A SECURITY HAZAARD?

Generally, espionage is the practice of gathering information about an organization or a


society that is considered secret or confidential without the permission of the holder of
the information.

WHAT IS PILFERAGE AS AN INDUSTRIAL OR BUSINESS HAZARD?

1. Pilferage is one of the most annoying and common human hazards which
security has to deal with. This activity if uncontrolled can become financial drain if
not a menace to smooth and orderly operation.
2. Failure to detect shortage and inaccurate inventories will cause inventory losses,
which may be labelled as pilferage.

Types of Pilferers

1. Casual Pilferer – one who steals due to his inability to resist the unexpected
opportunity and has little fear of detection is no plan or premeditation and he is
usually a “loner” on the job. The temptation and he up the article is due to poor
security measure. The implication of causal pilfering is the big cumulative cost if it
remains unchecked.

Downloaded by Ludia Faye Remigio (ludiafayeee@gmail.com)


lOMoARcPSD|34853969

2. Systematic Pilferer – one who steals with preconceived plans and takes away
any or all types pf items or supplies for economic gain. Pilferers of this kind can
be employees or outsiders of the establishment.

What is a Risk?

Risk is like likelihood that something bad will happen that causes harm to an
informational asset (or the loss of the asset). Vulnerability is a weakness that could be
used to endanger or cause harm to an informational asset. A threat is anything (man-
made or act of nature) that has the potential to cause harm.

What is Risk Management?

Risk management is the process of identifying vulnerabilities and threats from


resources used by an organization in achieving business objectives, and deciding what
countermeasures, if any, to take in reducing risk to an acceptable level.

What is Risk Analysis?

Analysis of risk includes examination of the vulnerability, probability and


criticality of potential threats and includes natural and man-made risk.

What is an Adversary?

An individual group, organization or government that conducts activities or has


the intention and capability to conduct activities detrimental to the individual, private or
government entity.

What is Asset?

Any information, facility, material, information, or activity which has appositive


value to its owner whether it is an individual, private or government entity.

What is Vulnerability?

Any weakness that can be exploited by an adversary to gain access to an asset.

What are Countermeasures?

An action taken or a physical entity used to reduce or eliminate one or more


vulnerabilities. The cost of possible countermeasure may be monetary, but may also
include non-monetary cost such as reduced operational efficiency. Adverse publicity
unfavourable working conditions, and political consequences.

What is Probability?

Downloaded by Ludia Faye Remigio (ludiafayeee@gmail.com)


lOMoARcPSD|34853969

It is the chance or likelihood that a loss will take place. Indicated by a


mathematical statement concerning the possibility of an event occurring.

What is Critically?

It is the impact of a loss measured in financial terms. How it is in terms of the


survival or existence of the organization.

Alternatives and Strategies in Risk Management

1. Risk Avoidance – eliminating or removing the risk totally from the business,
government or industrial environment for which the risk manager has
responsibility.
2. Risk Reduction – decreasing the risk by minimizing the probability of the
potential loss. The reduction of criminal opportunity is often accomplished by
situational crime prevention strategies to discourage, deter or deny criminal
incidents.
3. Risk Spreading – spreading the risk through compartmentation or
decentralization to limit the impact of the potential loss.
4. Risk Transfer – moving the financial impact of the potential loss-over to an
insurance company.
5. Risk Self-assumption – planned assumption and acceptance of the potential
risk by making a deliberate managerial decision of doing nothing about the threat
or setting aside resources for use in case of specific loss incident.

Downloaded by Ludia Faye Remigio (ludiafayeee@gmail.com)


lOMoARcPSD|34853969

Downloaded by Ludia Faye Remigio (ludiafayeee@gmail.com)

You might also like