Professional Documents
Culture Documents
Learning Objectives
● Define security;
● Explain the concepts of asset, risk, threat and vulnerability;
● Enumerate the categories of security; and
● Discuss the importance of private security in organizations.
DEFINITION OF SECURITY
Lesson 3
The word secure is derived from the Latin securus which mean:
Related Concepts
Physical assets: These are tangible assets that have a physical form.
Examples include:
Risk is the uncertainty of financial loss, the probability that a loss has
occurred or will occur, the variations between actual and expected
results, or the possible occurrence of an undesirable event. The end
result of risk is loss or a decrease in value (Sennewald, 2003).
Natural Hazards: These are threats that arise from natural events or
disasters. Examples include floods, earthquakes, hurricanes, wildfires,
or severe weather conditions. These events can cause damage to
property, disrupt operations, and pose risks to the safety of people.
Categories of Security
2. Bank and armor security involves the protection resulting from the
application of various measures which safeguards
1.Site Characteristics
2. Environment
3. Forces of Nature
4. Crime
Physical Barriers
A barrier is a natural or manufactured obstacle to the
movement of persons, animals, vehicles, or materials. It defines
physical limits to and delays or prevents penetration of an area
(POA Publishing LLC,2003).
2. Animal Barriers
2. Building Walls
Walls, floors, roofs or their combinations serve also as
barriers and must be of such construction to provide uniform
protection just like the wire fencing.
3. Bodies of Water
Bodies of water like rivers, lakes, marsh, ponds or other
bodies of water forming part of the wall, building or fencing
should never be considered an adequate natural perimeter
barrier. Additional security measures like wire fence, concrete
walling, security patrolling and floodlighting at night may be
necessary for the portion of the perimeter.
Second Line of Defense: Building Exteriors
Building surfaces such as walls, ceilings, floors and roofs
are not constructed primarily as security barriers, but they have
the potential to deter penetration. The following is a list of
building exteriors and their construction and vulnerability, as
discussed in the Asset Protection and Security Management
Handbook (POA Publishing LLC, 2003).
Roofs
The roof usually has sheathing placed over the rafters;
often horizontal wooden boards placed flush on the rafters.
Sheathing may be covered with felt or other insulating material,
and these foundation layers covered with shingles, metal sheet,
tar paper, tile or other weather-resistant material.
Exterior Walls
Exterior walls may be similarly constructed, with sheathing
placed diagonally on vertical studs and covered with sheathing
paper. This is usually topped with an exterior material such as
stucco, or siding composed of overlapping horizontal boards or
vinyl siding. Exterior surfaces of buildings constructed of such
materials as brick, concrete block, stone block, cinder block or
reinforced concrete offer greater resistance to penetration than
those made of wood.
Concrete Structures
An ordinary concrete building wall, because of its rugged
and formidable appearance, may give the impression that it
offers good protection against penetration, but may not.
Standard poured concrete or concrete block walls are utilized
to support structural loads or are used as curtain walls to
enclose spaces between load bearing walls, but are not
normally designed to prevent or delay penetration. Concrete
walls that are six inches or less in thickness are vulnerable to
penetration with hand tools and small amounts of explosives.
Floors
Wooden floors normally have flush sheathing covering the
joists diagonally. This surface may then be covered with
building paper and flooring such as tile, cork, rubber, linoleum,
or wood.
Interior Walls
Interior walls and ceilings may be constructed of lath and
plaster.
Ceilings
Ceilings may be covered with acoustic or decorative tile. It
is a common modern building technique to construct ceiling
plenums. that do not have security barriers between rooms and
areas. As a result, an intruder who can gain access to the
plenum space can work from there to achieve access to rooms
or spaces below.
Doorways
Doorways, including the frame, jambs and stops, are
constructed of either wood or metal. Doorways are of two
general applications: personnel and vehicular.
Windows
Windows are designed to provide ventilation, natural
illumination or visual access through a wall, or any combination
of the three. Most windows are equipped with clear glass and
can often be opened to provide access. Other windows, in areas
where it is necessary to deny visual access, are glazed with
frosted, pebbled or other opaque or translucent glass. Picture
windows or those installed in air-conditioned buildings are
permanently fixed in place. While they allow illumination and
visual access, they do not open to provide ventilation.
Other Openings
In addition to doors and windows, a wide variety of other
openings in the roof, walls and floor may require consideration.
These include openings for shafts, vents, ducts or fans; utility
tunnels or chases for heat, gas, water, electric power and
telephone; sewers and other types of drains; and other small
service openings.
Locks
Installing locks on doors is the easiest line of defense
inside a facility.
Identification System
Controlled entry into a business facility usually begins with
the identification of the person entering:
Protective Lighting
Protective lighting is designed to illuminate the perimeter
barrier and the outside approaches of an area. A threat cannot
be detected, either by camera or in person, if there is no light.
Lighting can also serve as deterrence since a threat is more
likely to attack an asset in relative darkness than in bright light.
HISTORY OF SECURITY
Learning Objectives
The Greeks of the ancient period were the ones who organized
the first police force in city states which they termed polis. The
Romans. on the other hand, established the Praetorian Guards
known as vigiles who were tasked to be firefighters.
Fifty years later, English Home Secretary Sir Robert Peel formed
the first formal police department.
After World War II, the Indian national or the Bombay pioneered
as the watchman who protected a specific building or
commercial establishment.
The police served the public's interest while the security force
served private interests. As crime became a bigger problem
especially in urban areas, police departments who previously
looked down at private security are now beginning to see the
benefits of building a partnership with them. Now, police
functions that did not involve enforcement, arrests, or the use of
force inside workspaces are turned over to security. Traffic
control around large commercial properties and patrol
functions around private neighborhoods are also now often
provided by security officers (Fay, 2006).
Prehistoric times:
● Recognition of the need for personal safety from known
and unknown enemies.
● Methods of self-protection included crafting weapons,
building fires, staying in caves or tree houses, and seeking
refuge in the middle of lakes.
Ancient period:
● Greeks organized the first police force called "polis."
● Romans established the Praetorian Guards known as
"vigiles" for fire-fighting.
Lesson 4
Middle Ages:
● French formed a group called "shires" or "sheriffs" to
maintain peace and order in different regions during the
invasion of England.
England's Influence:
● Oliver Cromwell established a police force in 1655 to
capture and punish criminals.
● Henry Fielding introduced crime prevention through citizen
patrols or watchmen in 1748.
● Sir Robert Peel formed the first formal police department in
1829.
Security in the United States:
● British approach to policing brought by immigrants from
England, Ireland, and Scotland.
● Watchman form of security emerged due to limited law
enforcement resources.
Pre-colonial period:
● Monarchs had servants called "aliping namamahay" who
acted as watchmen or protectors.
Spanish colonial period:
● Guardia Civil introduced as the police force in 1868,
performing patrol functions and enforcing laws.
American colonial period:
● Constables maintained peace and order in towns or sitios.
Post-World War II:
● Indian nationals or Bombay pioneers served as watchmen
for specific buildings or establishments.
Lesson 4
1. Physical security
2. Property security including cash and valuables, buildings
security, security guards
3. Personal Security including human resources management
4. Information security, in terms of protection of the law or
contractually protected or valuable information
5. Computer security, in terms of use and set of hardware and
software, including special tools (e.g. protection, and
deployment tracking and interception)
6. Occupational safety and health, including fire
7. Fraud management and forensic auditing
LEVELS OF MANAGEMENT
The process of management is becoming complicated with
the growing complexities of business.
This calls for a higher degree of skills and abilities. In view
of the technological features influencing the size and the scale
of modern enterprise, management cannot be a simple task
that can be performed by an individual or a few persons
interested therein as proprietors.
1. Determination of Objectives
2. Formulation of Policies
3. Long Range Planning and Strategy
4. Organizing for Action
5. Developing of Major Resources
6. Selecting Key Personnel
7. Coordination and Controlling
Middle Level Management
This level of management is concerned with the execution of the
policies and plans designed by the top management. Therefore,
the middle level management comprises departmental heads
and other executives. Though the top management forms the
head and brain of the organization, the personnel in the middle
management actually take part in the execution of the plans
and experience the difficulties involved in it. The principal
functions of the middle level management are.
● Analyze findings
● Assemble and communicate security policy
● Assess business policies and plans
● Assess new technology
● Assess regulations and standards
● Define overall security objectives
● Deny request
● Document security violation
● Initiate incident
● Monitor and detect for security violation
● Validate security request
● Provide access to authorized user
● Perform protection request
● Collect feedback
● Produce process measurements
● Research trends and best practices
● Review existing documentation
● Assess Process Execution
● Audit Process
● Assess process framework
● Collect evaluation results
● Produce gap analysis
● Recommend initiatives
● Complete evaluation
● Communicate to stakeholders
● Assess process framework
● Collect evaluation results
● Produce gap analysis
● Recommend initiatives
● Complete evaluation
● Communicate to stakeholders services in exchange, and
keep quality high for customer satisfaction.
Security managers
Security managers are persons in the organization who are
responsible for monitoring the security operations for any
organization or company. They implement security policies,
regulations, rules and norms and make sure that the
environment in their organization is safe for employers and
visitors. These managers are required to hire new members for
the staff and delegate tasks and duties to them. One of their
main duties is to check and monitor the access control of the
people who are visiting the company. They perform many of the
following tasks:
1. Communication skills
2. Physical fitness
3. Knowledge of security environments and hazards
4. Excellent attitude
5. Interpersonal skills
6. Analytical skills
7. Leadership skills
8. Initiative and being proactive
9. Good negotiation skills
10. Being able to work with a team
1. The Visionary - one who listens to ideas and take note of what
they're trying to achieve. They Jump right in and help
brainstorm ideas with a team. They provide practical advice
and options for how their ideas turned into a reality.
2. The Coach - one who is like a sports coach, who bring high
levels of energy and discipline. He aims to bring high
performance into the workplace. He is highly people-focused
and views the success of the team as his own personal success.
He usually sets clear, realistic goals for performance and
discusses practical strategies on how the team can achieve
those goals.
Loss Prevention
Loss prevention focuses on what your critical assets are and
how you are going to protect them. A key component to loss
prevention is assessing the potential threats to the successful
achievement of the goal. This must include the potential
opportunities that further the object (why take the risk unless
there's an upside?) Balance probability and impact determine
and implement measures to minimize or eliminate those threats.
Loss Prevention Program
Types of risks:
External
● Strategic: like competition and customer demand...
● Operational: Regulation, suppliers, contract
● Financial: FX, credit
● Hazard: Natural disaster, cyber, external criminal act
Compliance: new regulatory or legal requirements are
introduced, or existing ones are changed, exposing
the organization to a non-compliance risk if measures
are not taken to ensure compliance
Internal
● Strategic: R&D
● Operational: Systems and process (HaR, Payroll)
● Financial: Liquidity, cash flow
● Hazard: Safety and security; employees and
equipment Compliance: Actual or potential changes
in the organization's systems, processes, suppliers,
etc. may create exposure to a legal
● or regulatory non-compliance.
Risk options:
Risk avoidance (Removal of target all together)
The first choice to be considered. The possibility of
eliminating the existence of criminal opportunity or
avoiding the creation of such an opportunity is always the
best solution, when additional considerations or factors
are not created as a result of this action that would create
a greater risk. As an example, removing all the cash from a
retail outlet would eliminate the opportunity for stealing
the cash-but it would also eliminate the ability to conduct
business.
1. Denial
2. Detection
3. Deterrence
a. Physical
b. Psychological
● Alarm device
Access control
Physical Security
● Environmental elements (ex. Mountains, Trees, etc.)
● Barricade
● Security guards (armed or unarmed) with wireless
communication devices (e.g., two-way radio)
● Security lighting (spotlight, etc.)
● Security Cameras Motion Detectors
● IBNS ( Integrated Banking Network System) containers
for cash in transit.
Procedures
Learning Objectives
Section 9, Article III. Private property shall not be taken for putt
use without just compensation.
Section 16, Article XII. The Congress shall not, except by genes
law, provide for the formation, organization, or regulation of pr
corporations. Government-owned or controlled corporations
may created or established by special charters in the interest of
the cons good and subject to the test of economic viability.
Private security forces play a vital role in this regard as they are
a potent force in crime prevention. They have contributed to the
improvement of peace and order and the protection of lives and
properties in all areas of the country
Republic Act No. 5487, also known as “The Private Security Agency Law,”
regulates the organization and operation of private detective, watchmen,
or security guards agencies in the Philippines. Here are the key points from
RA 5487:
1.Site Characteristics
Selection of safeguards can be influenced by the nature of the
site such as the size, layout, utilities, internal activities and
assets in the site. Other factors may include company
philosophy and workforce culture.
2. Environment
3. Forces of Nature
4. Crime
2. Animal Barriers
2. Building Walls
Walls, floors, roofs or their combinations serve also as
barriers and must be of such construction to provide uniform
protection just like the wire fencing.
3. Bodies of Water
Bodies of water like rivers, lakes, marsh, ponds or other
bodies of water forming part of the wall, building or fencing
should never be considered an adequate natural perimeter
barrier. Additional security measures like wire fence, concrete
walling, security patrolling and floodlighting at night may be
necessary for the portion of the perimeter.
Roofs
The roof usually has sheathing placed over the rafters;
often horizontal wooden boards placed flush on the rafters.
Sheathing may be covered with felt or other insulating material,
and these foundation layers covered with shingles, metal sheet,
tar paper, tile or other weather-resistant material.
Exterior Walls
Exterior walls may be similarly constructed, with sheathing
placed diagonally on vertical studs and covered with sheathing
paper. This is usually topped with an exterior material such as
stucco, or siding composed of overlapping horizontal boards
or vinyl siding. Exterior surfaces of buildings constructed of
such materials as brick, concrete block, stone block, cinder
block or reinforced concrete offer greater resistance to
penetration than those made of wood.
Concrete Structures
An ordinary concrete building wall, because of its rugged
and formidable appearance, may give the impression that it
offers good protection against penetration, but may not.
Standard poured concrete or concrete block walls are utilized
to support structural loads or are used as curtain walls to
enclose spaces between load bearing walls, but are not
normally designed to prevent or delay penetration. Concrete
walls that are six inches or less in thickness are vulnerable to
penetration with hand tools and small amounts of explosives.
Floors
Wooden floors normally have flush sheathing covering the
joists diagonally. This surface may then be covered with
building paper and flooring such as tile, cork, rubber, linoleum,
or wood.
Interior Walls
Interior walls and ceilings may be constructed of lath and
plaster.
Ceilings
Ceilings may be covered with acoustic or decorative tile. It
is a common modern building technique to construct ceiling
plenums. that do not have security barriers between rooms and
areas. As a result, an intruder who can gain access to the
plenum space can work from there to achieve access to rooms
or spaces below.
Doorways
Doorways, including the frame, jambs and stops, are
constructed of either wood or metal. Doorways are of two
general applications: personnel and vehicular.
Windows
Windows are designed to provide ventilation, natural
illumination or visual access through a wall, or any combination
of the three. Most windows are equipped with clear glass and
can often be opened to provide access. Other windows, in areas
where it is necessary to deny visual access, are glazed with
frosted, pebbled or other opaque or translucent glass. Picture
windows or those installed in air-conditioned buildings are
permanently fixed in place. While they allow illumination and
visual access, they do not open to provide ventilation.
Other Openings
In addition to doors and windows, a wide variety of other
openings in the roof, walls and floor may require consideration.
These include openings for shafts, vents, ducts or fans; utility
tunnels or chases for heat, gas, water, electric power and
telephone; sewers and other types of drains; and other small
service openings.
Locks
Installing locks on doors is the easiest line of defense
inside a facility.
Identification System
Controlled entry into a business facility usually begins with
the identification of the person entering:
Protective Lighting
Protective lighting is designed to illuminate the perimeter
barrier and the outside approaches of an area. A threat cannot
be detected, either by camera or in person, if there is no light.
Lighting can also serve as deterrence since a threat is more
likely to attack an asset in relative darkness than in bright light.
Pre-Employment Screening
Personnel security measures are usually undertaken
during the recruitment process. This is because companies
believe that it is better to spot dangerous or dishonest
individuals before they are hired. This means that the human
resource department should not simply trust the correctness of
information written in a very impressive resume. Hence, a
proper background employment screening on job applicants
must be carried out.
Apparently, companies in financial services have 'long
been carrying out such background checks, and only recently
have other industries followed. Such an interest could be
attributed to the rising instances of applicants who lie on their
job applications (Condon, 2010). Many of these lies might be
considered trivial, such as exaggerating the responsibilities of a
job role, or making educational qualifications look more
impressive. Nevertheless, these small lies are suspicious enough
when evaluating the character of a prospective employee who
will be handling high security functions if hired.
Through pre-employment screening the credentials of job
applicants and their preconditions for employment are verified.
These checks should establish whether the applicant has
concealed important information or otherwise misrepresented
himself. The objective is to collect information and use that
information to identify individuals who present security
concerns.
The pre-employment screening should include checks on
the following:
✔ Financial check
APPLICATION FORM
Using a standardized application form to be completed by job
applicants requires them to provide all relevant information and
confirm its correctness with a signature. The form should
include a provision that pre-employment screening will be
carried out. By signing the form, the applicant provides consent
for background checks to be undertaken. It should also include
a clear statement that lies of omissions are grounds to
terminate the hiring process or employment even if it is
discovered when the applicant is already hired. Such
statements in the standardized application form not only
protect the organization legally; they also serve as deterrent to
the applicant signing the document.
INTERVIEWS
The job interview portion of the application also helps in the
screening process because it provides an opportunity to
discuss the candidate's suitability for employment. This
interview is important because:
✔ A face-to-face discussion encourages applicants to be
honest.
IDENTITY VERIFICATION
Verifying the applicant's identity is a critical measure in the
screening process. In fact, other measures in the screening
process should only come second after the applicant's identity
has been satisfactorily proven. The key is to verify that the
individual is not committing fraud by using false identities.
There are four main reasons why individuals use false
identities:
✔ Difficult to forge
✔ Course dates
✔ Grades/marks awarded
✔ Dates of employment
✔ Positions held
✔ Duties
✔ Salary
MEDIA SEARCHES
Media searches involve the evaluation of an individual
based their online reputation. It includes searching for what
they say or what others say about them on the internet. This
could be a useful tool if the position to be filled up involves
access to sensitive material that the applicant might
compromise. For example, if the position requires working
closely with several TV and movie personalities, it would not be
ideal to hire an individual who enjoys heavy gossiping in social
media sites. on
Media searches can also help verify identity, confirm or
resolve concerns about suspicious behavior, or establish how
security aware the applicant is. An individual who posts photos
of drunkenness in parties and allows public viewing of such
photos could indicate poor judgment, especially if the position
being applied for involves working in a religious foundation or a
prominent conservative politician. Potential conflicts of interest
may also be identified, such as being personally related to the
owner of a competing business.
There are risks, however, in using media searches.
Employers might obtain information about someone with the
same name as the applicant. It is also possible that the positive
information available online were staged by the applicant in
order to appear qualified. Third party views or opinions about
the applicant are also not completely reliable, especially if these
cannot be verified to be true.
✔ Uniforms
✔ Security passes and/or identification cards
✔ Mobile phones