100% found this document useful (1 vote)
2K views

Introduction To Industrial Security Concepts

This course covers Industrial Security Management and is focused on the organization, administration, and operation of security agencies as governed by Republic Act No. 5487, also known as the Private Security Agency Law of the Philippines. The course objectives are to explain the legal basis of industrial security, describe the types and divisions of security, discuss security ethics and qualifications, and identify security management methods. The document provides an overview of key concepts including definitions of industry, industrial, security, and management. It also outlines the legal basis of security, types of security, and three major divisions of security which are physical, personnel, and document/information security.

Uploaded by

john gooco
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
2K views

Introduction To Industrial Security Concepts

This course covers Industrial Security Management and is focused on the organization, administration, and operation of security agencies as governed by Republic Act No. 5487, also known as the Private Security Agency Law of the Philippines. The course objectives are to explain the legal basis of industrial security, describe the types and divisions of security, discuss security ethics and qualifications, and identify security management methods. The document provides an overview of key concepts including definitions of industry, industrial, security, and management. It also outlines the legal basis of security, types of security, and three major divisions of security which are physical, personnel, and document/information security.

Uploaded by

john gooco
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 32

INDUSTRIAL SECURITY MANAGEMENT

JMC

COURSE CODE: LEA 2


COURSE TITLE: Industrial Security Management
COURSE CREDIT: 3 UNITS
COURSE DISCRIPTION: This course is one of the aspects of Law Enforcement with
emphasis in the organization, administration and operation
of Security Agencies covered by Republic Act No. 5487
otherwise known as the “Private Security Agency Law of the
Philippines”.

GENERAL OBJECTIVES: At the end of the course, the students should be able to:
1. explain the legal basis of industrial security in the Philippines;
2. elucidate the different types as well as the three major divisions of security;
3. memorize the professional code of ethics and code of conduct for security
personnel and security agencies, as well as the general orders for security
guards;
4. discuss the qualifications, attributes, functions and the different types of security
agencies authorize by law;
5. identify the authorized ranks, positions and staffing patterns of security agencies;
and
6. identify the different methods and techniques employed in the management of
security agencies.

Specific Objectives:
At the end of the unit, the students should be able to:
1.Define industrial security management
2.explain the legal basis of security;
3.identify the different types of security:
4.enumerate the three major divisions of security; and explain the three major divisions
of security.

Course Outline
UNIT I.INTRODUCTION TO INDUSTRIAL SECURITY
1. Basic Concepts
2. Legal bases of Industrial Security in the Philippines
3. Types of Security

4. Major Divisions of Security

INTRODUCTION INDUSTRIAL SECURITY


Session 1
Introduction
The practice of utilizing workers and equipment to protect people and property has
been in existence since time immemorial.
In addition to being concerned about their own safety, people have wanted to protect
their belongings and the lives of others important to them.
INDUSTRIAL SECURITY MANAGEMENT

JMC

Throughout the ages, two conditions have been both necessary and sufficient for
people to adopt safety measures: felt need and use of resources.

Concept of Industrial security management


Defining the terms involved in the course would understand the concepts of industrial
security management.

Industry is defined as the Earnest or constant application to work or business. or simply


anything that pertains to business or a special branch of productive work, or the capital
or workers employed in it.

Industrial in the other side is defined as “pertaining to or engaged in industry.

Security pertains to or the State or condition of being safe or free from harm, danger,
loss, or damage.

Management refers to the Skillful use of resources to accomplish a purpose. It is also A


process of properly utilizing available resources to achieve organizational goals and
objectives.

Industrial Security is the Security measures applied to business industries. In some


terms it isThe business of providing security and protection to private individuals,
business and enterprises.

Industrial Security Management involves the Skillful handling of the security and
safety measures of business enterprises and industrial establishments.

Legal Bases
A. Natural Authority
1. Self-preservation
B. Constitutional Authority
C. Statutory Authority
1. R.A. 6975(DILG ACT OF 1990)
2. R.A. 8551 (PHILIPPINE NATIONAL POLICE REFROM AND
REORGANIZATIONAL ACT OF 1998)
3. Act 3815 ( AN ACT CREATING THE REVISED PENAL CODE OF THE
PHILIPPINES)
4. R.A. 5487
5. R.A. 9372

Session 2
The Types of Security (0.Gatchalian)
The security involves huge typologies that include the following but not limited to:
Industrial Security; Hotel Security; Bank Security; VIP Security; School Security; Mall or
INDUSTRIAL SECURITY MANAGEMENT

JMC

supermarket security; Physical security; Personal security; Document security;


Operational security ;Communication security; Major Divisions of Security.
1. PHYSICAL SECURITY

It is the broadest branch of security which is concerned principally with the


physical measures adopted to prevent unauthorized access to equipment, facilities,
materials, and documents, and to safeguard then against theft, damage, sabotage, or
espionage. It also encompasses protection of personnel from any criminal act.

2. COMMUNICATIONS SECURITY

It is the protection resulting from the application of various measures which


prevent or delay the enemy or unauthorized person in gaining information through the
communication system. This includes transmission, cryptographic, and physical
security.

3. HOTEL SECURITY

This is another specialized physical security. Hotel detectives, uniformed guards,


and security supervisors see to it that the guests and their personal effects are
safeguarded, hotel properties are protected from pilferage, loss, damage, and the
functions in the hotel restaurants, bars and clubs are not disturbed and troubled by
rowdy outsiders, or by the guests themselves.

4. BANK SECURITY

“Bank security” is another specialized line in physical security. Due to the


peculiar nature of bank operations, the main objective of the bank security force is the
protection of the life of employees and assets of the bank. The physical size of the
banking institution, its location, volume of the cash handed, number of personnel
employed and its clientele are the main considerations in determining the strength and
type of the security unit.

5. DOCUMENT SECURITY

“Document security” is physical security involving the protection of documents


and classified information from loss, access by unauthorized persons, damage, theft,
and compromise through disclosure. Safeguarding vital records is one of the most
difficult tasks that can be assigned to security personnel.

6. PERSONAL AND VIP SECURITY

The protection of top ranking officials of the government, visiting persons of


illustrious standing, and foreign dignitaries is no easy job. This calls for a real “pro” in
security field. VIP security is part of personal security.
INDUSTRIAL SECURITY MANAGEMENT

JMC

7. CRISES SECURITY

Another new specialized field is “crises security” which is allied if not a part of VIP
security. Crises security is now involved in kidnapping of VIPs like dignitaries, rich
scions, industrial magnates, political leaders. Motives can be economic, political,
emotional, nationalistic, religious, or their combinations.

9. INDUSTRIAL SECURITY

Industrial security is physical security as applied to business groups engaged in


industries, like manufacturing, assembling, research and development, processing,
warehousing, and even agriculture. Usually, industrial enterprises are located in a
complex, with separate buildings for work, storage, administration, and other activities.

10. OPERATIONAL SECURITY

Operational security is part of physical security that deals primarily with the
protection of processes, formulas, patents, and other industrial and manufacturing
activities from espionage, infiltration, loss, compromise, or photocopying.

11. OTHER SPECIAL TYPES OF SECURITY

Due to peculiarities of different business activities, specialized types of security


appeared. These types are adaptations, variations, innovations, and/or modifications of
physical security, i.e., air cargo security, school security, supermarket security, and
personnel security.

The Three Major Divisions of Security


a. Physical Security
b. Personnel Security
c. Document and Information Security
1. Physical Security
 measures taken to prevent physical access or entry to an installation or
area by unauthorized personnel.
 Broadest type of security.
 Physical measures adopted to prevent unauthorized access to equipment,
facilities, material and document and to safeguard them against
espionage, sabotage, damage, loss and theft
2. Personnel Security
 measures applied to insure suitability for appointment or access to
classified matter as well as the protection of company personnel against
potential harmful acts or conditions.
3. Document and Information Security
INDUSTRIAL SECURITY MANAGEMENT

JMC

 measures designed to safeguard company documents from unauthorized


disclosure of the information.

WHAT ARE HAZARDS


-conditions that may cause damage to property, injury, or loss of life.
-“exposure to the chance of loss or injury.

Types of hazard
1. Human hazards
2. Natural hazards

WHAT IS NEEDED TO COUNTER POTENTIAL HAZARDS?

 SECURITY AND SAFETY MEASURES


1. Active measures
 physical barriers, security lightings, safes and vaults, locks and other
devices.
2. Passive measures
 deter mans from committing acts for fear of being caught.
 Ex: Security education programs, security investigation, fire
prevention seminars, safety drills, etc.

UNIT II. PHYSICAL SECURITY


1. Physical security Defined
2. Principles of physical Security
3. Barriers
a. Natural Barrier
b. Structural Barrier
c. Human Barrier
d. Energy Barrier
e. Animal Barrier
4. Protective Lighting
a. Requirements of Protective Lighting
b. Characteristics of Protective Lighting
c. Principles of Protective Lighting
d. Types of Protective Lighting
e. Types of Lighting Sources
f. Types of Lighting Equipment
g. General Considerations in Protective Lighting
. Protective Alarms and Communication System
a. Types of Alarm System
b. Types of Alarm Detection System
c. Parts of an Alarm System
6. Protective Locks and Key Control
a. Basic Concepts
INDUSTRIAL SECURITY MANAGEMENT

JMC

a.1 Lock
a.2 Padlock
a.3 Peterman
a.4 Keys
b. Types of Locks
c. Types of Keys
d. Key Control
7. Protective Cabinets
a. Safe
b. Vault
c. File Room
8. Guard Force System (Salient provisions of R.A. 5487)
a. Qualifications of Security Guard
b. Ranks, positions and staffing patterns of Security
c. General Orders for Security Guard
d. Professional Code of Conduct and Ethics for Security
e. Types of Security Guard Forces
f. Limitations, Restrictions and Prohibitions
9. Personnel Identification and Movement Control
a. Types of Personnel Identification
b. Use of Pass System
c. Badge and Pass Control
d. Visitor’s Movement Control
e. Package Movement Control
f. Vehicular Movement Control and Identification
g. Building Access Control
10. Film showing (National Treasure/The Pacifier/The Bodyguard)

At the end of this unit, the students should be able to:


1.define physical security;
2.understand the principles of physical security;
3. identify barrier and its types;
4.explain and differentiate the principles of lighting;
5.Discuss the different protective alarms and communication system:

6.Explain the principles of protective locks and key control


7.dicuss the major protective cabinets
8.discuss guard force and guard system; know the qualifications of security guards; and
memorize the professional code of conduct and ethics, as well as the general orders for
security personnel.

PHYSICAL SECURITY
INDUSTRIAL SECURITY MANAGEMENT

JMC

Physical security defined:


The Physical measures adopted to prevent unauthorized access to equipment,
material and document. It involves the use of physical measures to define, protect and
monitor property rights against potential security threats.

Physical security concerns the physical means used to:


1) control and monitor the access of persons and vehicles;
2) to prevent and detect unauthorized intrusions and surveillance; and
3) safeguard negotiable documents, proprietary information, merchandize, and
buildings. For certain entities, the minimum standards of security and protection are
mandated by a governing authority.

Personnel Security defined:


The most important aspect of security which starts even before hiring an employee
and remains as long as the person is employed to insure that the firm hires those best
suited to assist in achieving its goals and objectives.

Document and Information Security defined:


It involves the protection of documents and classified papers from loss, access by
unauthorized persons, damage, theft and compromise through disclosure.

PHYSICAL SECURITY
Defined: The Physical measures adopted to prevent unauthorized access to equipment,
material and document. It involves the use of physical measures to define, protect and
monitor property rights against potential security threats.

PRINCIPLES OF PHYSICAL SECURITY

 Defense in depth means barrier after barrier


 Surreptitious versus Non-Surreptitious Entry
 Each Installation is Different
 There is No Impenetrable Barrier
 Enemy Agents Must Access
BARRIERS
- May be Man-Made or Natural used to restrict, impede, deter or delay unauthorized
access to the installation that creates a physical and psychological deterrence to would
be offenders.

1. Natural Barriers
It includes mountains, cliffs, canyons, rivers, seas, marshes, deserts or terrain difficult to
traverse.

2. Man-Made Barriers
INDUSTRIAL SECURITY MANAGEMENT

JMC

Are structural constructions like fences, walls, floors, roofs, grills, bars, road blocks, or
other physical means to deter or impede penetration.

Types of Security
 Natural Barrier- It includes bodies of waters, mountains, mashes, ravines,
deserts or other terrain that are difficult to traverse.
 Structural Barrier- These are features constructed by man regardless of their
original intent that tends to delay the Intruder.
 Energy Barrier- Persons being used in providing a guarding system or by the
nature of their employment and location, fulfil security functions.
 Human Barrier- Animals are used in partially providing a guarding system. Dogs
are usually trained and utilized to serve as guard dogs.
 Animal Barrier- It is the employment of mechanical, electrical, electronic energy
imposes a deterrent to entry by the potential intruder or to protective lighting,
alarm system and any electronic devices used as barriers.
Lines of Physical Defense
1st line of defense: perimeter fences
2nd line of defense: doors, floors, windows, walls, roofs and grills
3rd line of defense: storage system

Perimeter Barrier Defined:


It is a medium or structure which defines the physical limits of an installations or
area to restrict or impede access thereto. It is any physical barrier used to supplement
the protection of an inside or outside perimeter.

Specific Types of Perimeter Barriers

Hereunder are the specific types of perimeter barriers to form part of the three basic
lines of physical security control.

1. Wire Fences

Is a type of perimeter barrier made of chain link design with mesh openings
design not larger than two inches square, and made of gauge wire or heavier, twisted
and barbed selvage at top and bottom. The minimum height of chain link portion of the
fence should be eight (8) feet.

2. Building Walls

Walls, floors, roofs or their combination serve also as barriers and they should be
of such construction to provide uniform protection just like the wire fencing. Masonry
walls as perimeter barrier should have the same height as the chain-link and
surmounted by the barbed wire top guard. If the height of masonry is less than the
INDUSTRIAL SECURITY MANAGEMENT

JMC

prescribed, additional chain-link as “topping” is placed to attain the minimum height


requirement.

3. Bodies of Water

A river, lake, marsh, cataract, sea, pond, or any bodies of water forming a part of
the wall, building or fencing should never be considered adequate natural perimeter
barrier. Additional security measures like wire-fence, concrete walling, roving guards,
and floodlighting at night may be necessary for the portions of the perimeter.

4. Perimeter Barrier Openings

The following are some types of perimeter barrier openings which needed to be
given considerations in physical security control:
1. Gates and Doors
When not in active use and controlled by guards, gates and doors in the perimeter
should be locked and frequently inspected by guards. Locks should be changed from
time to time.

2. Sidewalk Elevators
These provide access to areas within the perimeter barrier, and should be locked or
guarded.

3. Utilities Openings
Sewers, air intakes, exhaust tunnels and other utility openings which penetrate the
barrier, and which have cross sectional area of ninety-six (96) square inches or more
should be protected by bars, grills, water-filled traps or other structural means providing
equivalent protection to that portion of the perimeter barrier.

4. Clear Zones
An unobstructed area or a “clear zone” should be maintained on both sides of the
perimeter barrier. A clear zone of twenty feet or more is desirable between the barrier
and exterior structure and natural covers which may provide concealment or assistance
to a person seeking unauthorized entry. Whenever possible a clear zone of at least fifty
(50) inches should be maintained between the barrier and the structure within the
perimeter.

Additional Protective Measures

The perimeter barrier may be provided with the following additional protective
measures:

1. Top Guard
INDUSTRIAL SECURITY MANAGEMENT

JMC

A top guard is an additional overhang barbed wire placed on vertical perimeter


fences facing upward and outward with a forty-five degree angle with three to four
strands of barbed wire spaced six inches apart. This will increase the protective
height and prevent easy access.

2. Guard Control Stations

This is normally provided at main perimeter entrance to secure areas located out
of doors and manned by guards on a full-time basis. Sentry stations should be near
a perimeter for surveillance at the entrance.
3. Towers

Guard towers are house-like structures above the perimeter barriers. As the
height of tower increases, visibility, likewise improves. During inclement weather,
especially at night, even with spotlights, the visibility will be limited. However, a tower
gives a psychological unnerving effect to the violators.

4. Barrier Maintenance

Fencing barriers and protective walls should always be regularly inspected by


security. Any sign of attempts to break in should be reported for investigation.
Destruction of fence or sections thereof should be repaired soon, and guard
vigilance increased.

5. Protection in Depth

In large open areas o ground, where fencing or walling is impracticable and


expensive, warning signs should conspicuously placed. The depth itself is
protection. Reduction of access roads, and sufficient notices to warn intruders
should be done. Use of animal guards and intrusion devices can also be done.

6. Signs and Notices

Control signs should be erected where necessary in the management of


unauthorized ingress, and preclude accidental entry. Signs should be plainly visible
and legible from any approach and in understandable language. Such signs should
inform the entrants regarding body search, packages, “ID” tags, and other
prohibitions against cameras, lighters, and other regulations.

Protective Lighting and its purposes


 It creates a psychological deterrence to would-be offenders.
 It is designed to provide illumination during hours of reduced visibility.
 It facilitates the identification and apprehension of intruders.
Purpose of Security Lightings
INDUSTRIAL SECURITY MANAGEMENT

JMC

Security lightings provide sufficient illumination to areas during hours of


darkness. Among its other purpose are:

1. It improves visibility so that intruders can be seen, identified or


apprehended.

2. It gives psychological fear which serves as a deterrent to thieves,


pilferers, trespassers, and saboteurs.

3. It makes the routine work of guard easier of identifying employees,


vehicles,etc. during nighttime.

4. If placed in certain areas, may even reduce the number of


stationary guards, and instead, may require roving patrol only at night.

Security Lightings Techniques

Hereunder are some of the techniques in ensuring the effectiveness of


security lightings:

1.Security lightings should enable a guard to observe clearly the activities


around, and inside the premises within his jurisdictions.

2.In planning, high contrast between intruder and background should be


provided. Increase intensity will improve guard’s ability to see.

3.Lightings boundaries and approaches, as well as the area and structure is


useful to discourage unauthorized entries and reveal identity of persons. Good
lighting should reveal well specified areas, glaring to intruders and adequate for
the guard to observe his positions.

4.Effective lightings should, i.e., discourage attempts to enter the premise, and
detections were likely if entry is attempted.

5.If lightings at night cannot be provided due to impracticability, other means of


protection have to be made like additional guard posts, roving patrols and animal
guards
Types of Protective Lighting
1. Stationary Luminaries.-It is otherwise known as continuous lighting. This
consists of a series of fixed luminaries to continuously flood a given area.
Types:
a. Glare Projection Type
b. Controlled lighting
INDUSTRIAL SECURITY MANAGEMENT

JMC

Glare Projection.-The intensity is focused to the intruder while the observer


remained in the comparative darkness. This is often found in correctional
institutions.
Controlled lighting- Lighting is focused on the pile of items rather than the
background. Width of the lighting strip can be controlled and adjusted to suit the
security needs.
2. Standby lighting-This system is similar to continuous lighting but it is turned on
manually or by a special device or other automatic means.
3. Movable or Portable Lighting-Manually operated. May be lighted continuously
during hours of darkness or only as needed. Supplementary to other types of
security lighting.
4. Emergency lighting-This is utilized in the event of electronic failure either due to
local equipment or commercial power failure.
Types of Lighting Source
1. Incandescent lamp- Common light bulbs of the type found in the home. This
provides instant illumination when the switch is on. Limited in its use since they
require a period from two to five minutes to light when they are cold and even
longer to relight when hot or after a power interruption.
2. Mercury vapor lamp-It is widely used for interior and exterior lighting. It is more
efficient than incandescent lamp and gives more light. It emits a purplish-white
color caused by an electric current passing through a tube of conducting
luminous gas.
3. Metal Halide-Similar physical appearance to mercury vapor. It provides a light
source of higher luminous efficiency and better color rendition.
4. Fluorescent lamp-Provides good color rendition has. High lamp efficiency as well
as long life. It cannot project light over long distance and thus, are not desirable
as floodlights.
5. High sodium vapor lamp-Constructed on the same principle as mercury vapor
lamps. It emits a golden white to light pink color. It provides high lumen efficiency
and relatively good color rendition.
6. Quartz lamp-It emits a very bright white light and snap on almost as rapidly as
the incandescent lamp. Frequently used at very high voltage. Excellent for use
along the perimeter barrier and in troublesome areas.
Types of lighting equipment
1. Floodlights-Used to accommodate most outdoor security lighting needs.
2. Street lights-It received widespread notoriety in its value in reducing crime. It
produces diffused rather than directional beam.
3. Search lights-These are highly focused incandescent lamp and are designed to
pinpoint potential trouble spots.
4. Fresnel light-It emits wide horizontal beam and is often used in a light house.
Protective Alarms defined:
These are designed to alert security personnel to consummated or attempted
intrusion into an area, building or compound. It can be electrical, mechanical or
electronic.
Parts of an Alarm System
INDUSTRIAL SECURITY MANAGEMENT

JMC

1. sensor or triggering device which emits oral or visual signal or both


2. Transmission line which transmits the message to signaling apparatus
3. Enunciator or the signaling system that activates the alarm.
Types of Alarms
 Metallic foil or wire-All point of entry can be wired by using electrically charge
strips of tinfoil wire. Any actions that will move the foil or wire break the circuit
and activate an alarm.Used in windows or glass surfaces.
 Photoelectric eye device-It emits either visible or invisible beam and when an
intruder crosses the beam he makes contact with the photo electronic coil which
thus activates the alarm.
 Audio Detection Device- It has a supersensitive microphone speaker sensor
which detects sound caused by attempted forced entry.
 Vibration detection device- It has a vibration detection sensor which detects any
vibration caused by attempted forced entry.
 Double Squeeze Button-Pressure is required on both side of the device and
therefore the probability of accidental alarm is reduced.
 Other Types
 Foot rail activator
 Bill traps
 Knee or thigh button
 Foot button
Types of Alarm Detection System
 Central Station System- A type of protective alarm system where the central
station is located outside the installation.
 Proprietary System-It function in the same way as the central system except that
it is owned by, operated and located in the facility.
 Local Alarm System-In this case, the sensor activates the circuit, which in turn
activates a horn or siren or even flashing light located in the immediate vicinity of
the alarmed area.
 Auxiliary Alarm System-Installation circuits are led into local police or fire
department by lease telephone lines.
 Local Alarm by Chance System-A bell or siren is sounded with no predictable
response. This system is used in residence or small retail establishment which
cannot afford a respond system.
 Dial Alarm System-This system is set to dial a predestined number when the
alarm is activated.

Definition of Locks

Locks are a simple type of detachable lock, with a hinged or sliding shackle
designed to pass through a ring or staple on a door, chest, etc. While some modern
locks do not require a key to be closed, others do require it, most often as a security
measure against leaving the key inside the location being locked.
INDUSTRIAL SECURITY MANAGEMENT

JMC

Protective Locks and Keys


Considered as the cheapest security investment that can be made. It
complements other types of security device. Used as a delaying device
Lock
A mechanical, electrical, hydraulic or electronic device used to prevent entry into a
building, room, container or hiding place and to prevent the removal of items without the
consent of the owner.
Padlock
A portable and detachable lock having a sliding hasp which passes through a staple
ring and it is then made fastened or secured.
Peterman
An English term for a lock picker.
Key
A device used for locking or unlocking.
Types of Locks

Available types of locks to physically control access top an area, a building, a


room, or container are the following:

1. Key-Operated Locks

Key-operated locks are most frequently used and are simple to operate. A
key is inserted into a keyway and turned to insert or withdraw a bolt from a strike.
The keyway contains obstacles that must be bypassed to withdraw or insert the
bolt. It can be housed in doorknob or in the door itself.

2. Combination Locks

Combination locks are often used on padlocks as well as on safe and


vault doors. Dial combination locks usually have from two to six notched
tumblers. Turning the dial to pre-specified numbers align the notches to create a
slot, allowing an arm to drop into it so that the locking bar can be withdrawn from
the strike.

3. Card-Operated Locks

Card operated locks are inserted into a card reader installed near door or
passageway that is restricted. When an authorized card is inserted into the slot, a
minicomputer activates the locking device, thereby opening the door, traffic
control arm, gate, or turnstile.

4. Electronic Locks
INDUSTRIAL SECURITY MANAGEMENT

JMC

Electronic locks are frequently used in apartment buildings and in offices


where strict physical security is required. For example, in an apartment building,
the doorway between the foyer and hallways to the apartment can be
electronically locked.

5. Other Locks

In addition to the preceding types of locks, clam shell locks, such as those
used in windows, bars, bolts, chains, and time locks can also be used to provide
additional security. Whatever type of lock is used, it will be only secure as the
material into which it is mounted and the integrity of the unlocking mechanism, be
it a key, combination, code, or card.

Protective Cabinet
The final line of defense of any facility.High security storage area for valuable asset.
 Safe
-Small metallic container used for the safekeeping of documents or small items in
an office or installation.
-The standard weight is 750 lbs.
 Vault
-Heavily constructed fire and burglar resistant container usually a part of the
building structure.
-Vault door – 6 inches thick
-Walls, ceiling, floor – 12 inches thick
-Fire resistant up to 6 hours
 File Room
-A cubicle in a building constructed a little lighter than a vault but bigger size to
accommodate limited people to work on the records inside.
-Standard height – 12 feet
-Fire resistant for 1 hour
Use of Pass System
1. Single Pass System
The badge or pass coded for authorization to enter specific areas is
issued to an employee who keeps it in his possession until his authorization is
terminates.

2. Pass Exchange System


An exchange takes place at the entrance of each controlled area.
3. Multiple Pass System
This provides an extra measure of security by requiring that an exchange
take place at the entrance of each restricted area.

Visitor Movement Control


INDUSTRIAL SECURITY MANAGEMENT

JMC

Security should establish proper methods or establishing the authority for


admission of visitors as well as the limitation thereat. This security measure would
depend on the sensibility of the Installation, but could include the following:

1. Visitor’s Logbook
All visitors to any facility should be required to identify themselves and
should be given a visitor’s ID by the security.

2. Photograph
Taking of photographs should also be considered. Extreme caution must
be exercised in areas where classified information is displayed to preclude
unauthorized taking of pictures of the installation.

3. Escort
If possible visitors should be escorted by the security to monitor their
activity within the establishment and guide them where to go.

4. Visitor Entrances
Separate access for visitors and employees of the establishment should
be provided.

5. Time-Traveled
If there is a long delay or time lapse between the departure and arrival, the
visitors maybe required to show cause for the delay.

Building Access Control


At any physical barrier, a security system must possess the ability to distinguish
among authorized persons, unauthorized visitors, and other unauthorized persons. This
is to assist the security personnel protect sensitive are and information within the
installation.

CHAPTER IV

Personnel Security

Personnel Security
Refers to those practices, technologies and/or services used that personnel
security safeguards are applied.
Guidelines in Personnel Security:

As to Trustworthiness
1. Physical Qualifications
Operators should pass a physical examination administered by a licensed
physician.
INDUSTRIAL SECURITY MANAGEMENT

JMC

2. Mental Qualifications
Individuals whose job duties are directly associated with the effective
Implementation of the organization’s process controls should demonstrate mental
alertness and the capability to exercise good judgment, execute instructions, and
assimilate assigned tasks.

3. Psychological Qualifications
The entity should be required to evaluate the possible impact of any noted
psychological characteristics that may have a bearing on trustworthiness.

4. Behavioral Observation
The entity should be required to observe individual behavioral changes which, if
left unattended, could lead to acts detrimental to the public health and safety.

5. Voluntary Assessment
The entity should give an Individual an opportunity to report any information
concerning authorization and security to perform assigned job duties.

6. Continuing Assessment
The entity should arrange for continued observation of individuals and for
appropriate corrective measures by responsible supervisors for indications of emotional
instability of individuals in the course of performing assigned security job duties.

As to Capability
1. Education and Experience
Individuals should be required to possess a high school diploma or pass an
equivalent performance examination designed to measure basic job-related
mathematical, language, and reasoning skills, as well as the ability and knowledge
required by assigned job duties.

2. Training
Each individual who requires training to perform assigned job tasks or job duties
as identified by organization’s operating or contingency plans should, prior to
assignment, be trained to perform those tasks and duties in accordance with the
organization’s documented training and qualification plan.

3. Security Awareness
Each individual should receive ongoing employee awareness sessions and
training.

4. Updates on Current Trends


The entity should be required to remain current with changes in technology to
understand new advances.
As to Securing Environment
1. Vulnerability and Risk Assessment
INDUSTRIAL SECURITY MANAGEMENT

JMC

The entity should require a Security Vulnerability Assessment (SVA) process to


Progress towards the goal of reducing the risks associated with control system
operations.
2. Internal Audits
The entity should collect information and periodically evaluate the success of
their security assessment techniques and other mitigation risk control activities.
3. External Audits
The entity should require personnel security programs revision and operations of
the personnel security program.
4. Enforcement
The entity should have the ability to suspend operator certifications or take other
appropriate enforcement action for operator misconduct.

5. Emergency Plan
Organization’s emergency plans should require training of key participants to
ensure they have the skills and knowledge to effectively carry out those plans.

6. Control System Access


Control system areas should have personnel gates and/or turnstiles with
electronic or biometric access control systems that record ingress and egress to
physically secure control system areas such as motor control centers, server rooms,
telecommunication rooms, and control system rooms
The entity should also control access to system areas using physical controls
such as:
• Sign in Logs
• Photo ID badges
• Key cards and/or number pads
• A close-circuit television system.
Organizations should also consider cyber security measure such as:
• Firewalls with effective configurations
• Virus protection with current updates
• Intrusion detection systems
• Encryption modules.

UNIT III. PERSONNEL, DOCUMENT AND INFORMATION SECURITY


1. Personnel Security
a. Purpose of Personnel Security
b. Personnel Security Investigation
b.1 Background Investigation
b.2 Positive Vetting
b.3 Profiling
b.4 Deception Detection Technique
b.5 Financial and Lifestyle Inquiry
b.6 Undercover Assignment
b.7 Exit Interview
INDUSTRIAL SECURITY MANAGEMENT

JMC

c. Security Education
c.1 Objectives of Security Education
c.2 Phases of Security Education Program
2. Document and Information Security
a. Basic Concepts
a.1 Document
a.2 Information
a.3 Document and Information Security
a.4 Classified Matter
a.5 Classified Information
a.6 Classify
a.7 Declassify
a.8 Reclassify or Regarding
a.9 Upgrading
a.10 Compartmentation
a.11 Need to Know
a.12 Compromise
b. Document and Information Cycle
b.1 Creation
b.2 Classification
b.3 Storage
b.4 Retrieval
b.5 Retention or Purging
b.6 Transfer
b.7 Disposition
c. Types of Classified Matter
c.1 Top Secret
c.2 Secret
c.3 Confidential
c.4 Restricted
d. Protection of Sensitive Materials
d.1 Trade Secrets
d.2 Patents
At the end of this unit, the students should be able to:
1.explain the different types of personnel security;
2. understand the basic concepts of personnel security;

3. discuss the importance of document and information security; and


INDUSTRIAL SECURITY MANAGEMENT

JMC

4. enumerate the types of classified documents and the extent of protection


extended.
Personnel Security

Personnel Security
Refers to those practices, technologies and/or services used that personnel
security safeguards are applied.
Guidelines in Personnel Security:

As to Trustworthiness
1. Physical Qualifications
Operators should pass a physical examination administered by a licensed
physician.

2. Mental Qualifications
Individuals whose job duties are directly associated with the effective
Implementation of the organization’s process controls should demonstrate mental
alertness and the capability to exercise good judgment, execute instructions, and
assimilate assigned tasks.

3. Psychological Qualifications
The entity should be required to evaluate the possible impact of any noted
psychological characteristics that may have a bearing on trustworthiness.

4. Behavioral Observation
The entity should be required to observe individual behavioral changes which, if
left unattended, could lead to acts detrimental to the public health and safety.

5. Voluntary Assessment
The entity should give an Individual an opportunity to report any information
concerning authorization and security to perform assigned job duties.

6. Continuing Assessment
The entity should arrange for continued observation of individuals and for
appropriate corrective measures by responsible supervisors for indications of emotional
instability of individuals in the course of performing assigned security job duties.

As to Capability
1. Education and Experience
Individuals should be required to possess a high school diploma or pass an
equivalent performance examination designed to measure basic job-related
mathematical, language, and reasoning skills, as well as the ability and knowledge
required by assigned job duties.
INDUSTRIAL SECURITY MANAGEMENT

JMC

2. Training
Each individual who requires training to perform assigned job tasks or job duties
as identified by organization’s operating or contingency plans should, prior to
assignment, be trained to perform those tasks and duties in accordance with the
organization’s documented training and qualification plan.

3. Security Awareness
Each individual should receive ongoing employee awareness sessions and
training.

4. Updates on Current Trends


The entity should be required to remain current with changes in technology to
understand new advances.
As to Securing Environment
1. Vulnerability and Risk Assessment
The entity should require a Security Vulnerability Assessment (SVA) process to
Progress towards the goal of reducing the risks associated with control system
operations.
2. Internal Audits
The entity should collect information and periodically evaluate the success of
their security assessment techniques and other mitigation risk control activities.
3. External Audits
The entity should require personnel security programs revision and operations of
the personnel security program.
4. Enforcement
The entity should have the ability to suspend operator certifications or take other
appropriate enforcement action for operator misconduct.

5. Emergency Plan
Organization’s emergency plans should require training of key participants to
ensure they have the skills and knowledge to effectively carry out those plans.

6. Control System Access


Control system areas should have personnel gates and/or turnstiles with
electronic or biometric access control systems that record ingress and egress to
physically secure control system areas such as motor control centers, server rooms,
telecommunication rooms, and control system rooms
The entity should also control access to system areas using physical controls
such as:
• Sign in Logs
• Photo ID badges
• Key cards and/or number pads
• A close-circuit television system.
Organizations should also consider cyber security measure such as:
INDUSTRIAL SECURITY MANAGEMENT

JMC

• Firewalls with effective configurations


• Virus protection with current updates
• Intrusion detection systems
• Encryption modules.

CHAPTER V

Documents and Information Security

Documents Security
It is the protection of records from its entire document life cycle. It also connotes
in this context the safeguarding classified matters.
Document Security Systems
Document Security is that aspect of security which involves the application of
security measures for the proper protection and safeguarding of classified information.

TOP SECRET- SECRET


CONFIDENTIAL- RESTRICTED
Security Clearance
Is the certification by a responsible authority that the person described is cleared
for access to classified matter the appropriate level.

Certificated of Destruction
Is the certification by a witnessing officer that the classified matters described
therein has been disposed of in his presence, approved destruction methods.
Classified
Refers to assign information by one of the four classification categories.

Security Clearance
Refers to the administrative determination that an individual is eligible for access
to classified matter.

Secret Matters
These information and material (matter), the unauthorized disclosure of which
would endanger national security, cause serious to the interest or prestige of the nation
or any governmental activity, or would cause administrative embarrassment or
unwarranted injury to an individual or would be advantage to a foreign nation.
INDUSTRIAL SECURITY MANAGEMENT

JMC

Information Security
Means protecting information and information systems from unauthorized
access, use, disclosure, disruption, modification, or destruction.

Three types of control in information Security


1. Administrative Control
Consist of approved written policies, procedures, standards and guidelines.

2. Logical Controls (also called technical controls)


Use software and data to monitor and control access to information and
computing system.

3. Physical controls
Monitor and control the environment of the work place and computing facilities.

UNIT IV.RISK ANALYSIS AND SECURITY HAZARD


1. Risk Analysis
a. Basic Concepts
a.1 Risk
a.2 Risk Management
a.3. Risk Analysis
a.4 Asset
a.5 Adversary
a.6 Countermeasures
a.7 Vulnerability
a.8 Probability
a.9 Criticality
2. Security Hazards
a. Natural Hazards
b. Man-made Hazards
b.1 Pilferage
b.2 Espionage
b.3 Sabotage
b.4 Subversion

3. Risk Management Alternatives and Strategies


b.1 Risk Reduction
b.2 Risk Spreading
b.3 Risk Avoidance
b.4 Risk Transfer
b.5 Risk Self-assumption
At the end of the unit, the students should be able to:
INDUSTRIAL SECURITY MANAGEMENT

JMC

1. understand risk and hazard;

2. enumerate the different types of hazard; and


explain the different tips in managing risk and hazard.

Personnel Security

Personnel Security
Refers to those practices, technologies and/or services used that personnel
security safeguards are applied.
Guidelines in Personnel Security:

As to Trustworthiness
1. Physical Qualifications
Operators should pass a physical examination administered by a licensed
physician.

2. Mental Qualifications
Individuals whose job duties are directly associated with the effective
Implementation of the organization’s process controls should demonstrate mental
alertness and the capability to exercise good judgment, execute instructions, and
assimilate assigned tasks.

3. Psychological Qualifications
The entity should be required to evaluate the possible impact of any noted
psychological characteristics that may have a bearing on trustworthiness.

4. Behavioral Observation
The entity should be required to observe individual behavioral changes which, if
left unattended, could lead to acts detrimental to the public health and safety.

5. Voluntary Assessment
The entity should give an Individual an opportunity to report any information
concerning authorization and security to perform assigned job duties.

6. Continuing Assessment
The entity should arrange for continued observation of individuals and for
appropriate corrective measures by responsible supervisors for indications of emotional
instability of individuals in the course of performing assigned security job duties.
INDUSTRIAL SECURITY MANAGEMENT

JMC

As to Capability
1. Education and Experience
Individuals should be required to possess a high school diploma or pass an
equivalent performance examination designed to measure basic job-related
mathematical, language, and reasoning skills, as well as the ability and knowledge
required by assigned job duties.

2. Training
Each individual who requires training to perform assigned job tasks or job duties
as identified by organization’s operating or contingency plans should, prior to
assignment, be trained to perform those tasks and duties in accordance with the
organization’s documented training and qualification plan.

3. Security Awareness
Each individual should receive ongoing employee awareness sessions and
training.

4. Updates on Current Trends


The entity should be required to remain current with changes in technology to
understand new advances.
As to Securing Environment
1. Vulnerability and Risk Assessment
The entity should require a Security Vulnerability Assessment (SVA) process to
Progress towards the goal of reducing the risks associated with control system
operations.
2. Internal Audits
The entity should collect information and periodically evaluate the success of
their security assessment techniques and other mitigation risk control activities.
3. External Audits
The entity should require personnel security programs revision and operations of
the personnel security program.
4. Enforcement
The entity should have the ability to suspend operator certifications or take other
appropriate enforcement action for operator misconduct.

5. Emergency Plan
Organization’s emergency plans should require training of key participants to
ensure they have the skills and knowledge to effectively carry out those plans.

6. Control System Access


Control system areas should have personnel gates and/or turnstiles with
electronic or biometric access control systems that record ingress and egress to
physically secure control system areas such as motor control centers, server rooms,
telecommunication rooms, and control system rooms
INDUSTRIAL SECURITY MANAGEMENT

JMC

The entity should also control access to system areas using physical controls
such as:
• Sign in Logs
• Photo ID badges
• Key cards and/or number pads
• A close-circuit television system.
Organizations should also consider cyber security measure such as:
• Firewalls with effective configurations
• Virus protection with current updates
• Intrusion detection systems
• Encryption modules.

CHAPTER V

Documents and Information Security

Documents Security
It is the protection of records from its entire document life cycle. It also connotes
in this context the safeguarding classified matters.
Document Security Systems
Document Security is that aspect of security which involves the application of
security measures for the proper protection and safeguarding of classified information.

TOP SECRET- SECRET


CONFIDENTIAL- RESTRICTED
Security Clearance
Is the certification by a responsible authority that the person described is cleared
for access to classified matter the appropriate level.

Certificated of Destruction
Is the certification by a witnessing officer that the classified matters described
therein has been disposed of in his presence, approved destruction methods.
Classified
Refers to assign information by one of the four classification categories.

Security Clearance
INDUSTRIAL SECURITY MANAGEMENT

JMC

Refers to the administrative determination that an individual is eligible for access


to classified matter.

Secret Matters
These information and material (matter), the unauthorized disclosure of which
would endanger national security, cause serious to the interest or prestige of the nation
or any governmental activity, or would cause administrative embarrassment or
unwarranted injury to an individual or would be advantage to a foreign nation.

Information Security
Means protecting information and information systems from unauthorized
access, use, disclosure, disruption, modification, or destruction.

Three types of control in information Security


1. Administrative Control
Consist of approved written policies, procedures, standards and guidelines.

2. Logical Controls (also called technical controls)


Use software and data to monitor and control access to information and
computing system.

3. Physical controls
Monitor and control the environment of the work place and computing facilities.

UNIT V. SECURITY SURVEY, INSPECTION AND INVESTIGATION


1. Security Survey
a. Objectives of Security survey
b. Significance of Security Survey
c. Security Survey Report
2. Security Inspection
a. Formal Inspection
b. Informal Inspection
c. Structured Inspection
d. Unstructured Inspection
e. Security Inspection Report Format
3. Security Investigation
a. Elements of Investigation
b. Tools of Investigation
c. Three Fold Aims of an Investigator
At the end of the unit, the students should be able to:

1.define the basic terminologies that is used in the subject;


2.memorize the different parts of an investigation and inspection report;
INDUSTRIAL SECURITY MANAGEMENT

JMC

3.discuss the types of security inspection; and explain the tools of investigation, as well
as the threefold aims of investigation.
Security Hazard and Risk Management

Hazard
Is a situation, which poses a level of threat to life, health, property or
environment. It is usually used to described a potentially harmful situation, although not
usually the event itself – once the incident has started it is classified as an emergency
or incident has started it is classified as an emergency or incident.

There are a number of modes for a hazard, which include:


• Dormant
The situation has the potential to be hazardous, but no
people, property or environment is currently affected by this. For
instance, a hillside may be unstable, with the potential for a
landslide, but there is nothing below or on the hillside that could be
affected.
• Potential
This is a situation where the hazard is in the position to
affect persons, property or environment. This type of hazard is
likely to require further risk assessment.
• Active
The hazard is certain to caused harm, as no intervention is
possible before the incident occurs.
• Mitigate
A potential hazard has been Identified, but Actions have
been taken in order to ensure it does not become an incident.
This may not be an absolute guarantee of no risk, but it is
likely to have been undertaken to significantly reduce the
danger.

Types of Hazard:
1. Natural Hazard
These are hazards which arise from natural phenomena.
2. Man-Made Hazard
These are hazards which are the result of a state of mind, attitude,
weaknesses or character traits of one or more persons.

Industrial Hazard
In this context, Industrial hazards are workplace hazards and are often grouped
into physical hazards, physical agents, chemical agents, biological hazards, physical
agents, chemical agents, biological agents, and psychological issues.

Sabotage
INDUSTRIAL SECURITY MANAGEMENT

JMC

Is a deliberate action aimed at weakening an enemy, oppressor or employer


through subversion, obstruction, disruption, and/or destruction.

Espionage
Generally, espionage is the practice of gathering information about an
organization or a society that is considered secret or confidential without the
permission of the holder of the information.

Subversion
Refers to an attempt to overthrow structures of authority, including the state.

Pilferage
Is one of the most annoying and common human hazards which security has to
deal with. This activity if uncontrolled can become financial drain if not a menace to
smooth and orderly operation.
Risk Management
Is the process of identifying vulnerabilities and threats from resources used by an
organization in achieving business objectives, and deciding what countermeasures, if
any, to take in reducing risk to an acceptable level.

Risk
Is the likelihood that something bad will happen that causes harm to an
informational asset.

Adversary
An individual, group, organization, or government that conducts activities or has
the intention and capability to conduct activities detrimental to the individuals.

Asset
Any information, facility, material Information, or activity which has a positive
value to its owner whether it is an individual, private or government entity.

Vulnerability
Any weakness that can be exploited by an adversary to gain access to an asset.

Countermeasures
An action taken or physical entity used to reduce or eliminate one or more
vulnerabilities.

Criticality
It is the impact of a loss as measured in financial terms. How important it is in
terms of the survival or existence of the organization.
INDUSTRIAL SECURITY MANAGEMENT

JMC

Alternatives and Strategies in risk Management


1. Risk Avoidance
Elimination or removing the risk totally from the business, government, or
industrial environment for which the risk manager has responsibility.

2. Risk Reduction
Decreasing the risk by minimizing the probability of the potential loss.

3. Risk Spreading
Spreading the risk through decentralization to limit the impact (criticality) of the
company.
4. Risk Transfer
Moving the financial impact of the potential loss-over to an insurance company.
5. Risk Self-assumption
Planned assumption and acceptance of the potential risk by making a deliberate
managerial decision of doing nothing about the threat, or setting aside resources for use
in case of a specific loss incident.

CHAPTER VII
Security Survey and Inspection

Security Survey
It is an estimate of the security standards of unit, and is conducted to enable the
responsible officer to recognize and evaluate security hazards and determine protective
measures necessary to the prevention of sabotage, espionage, subversive, activities
and other criminal acts towards the interest and/or mission of the unit and/or command.

Purpose of Security Survey


It will be used by the senior facility manager or industrial planners in determining
the type and extent of security controls for the facility or areas.

Steps in conducting Security Survey


1. Initial Survey
The initial physical security survey is conducted before constructing , leasing,
acquiring, modifying, or occupying a facility or area.

2. Follow-up Survey
When recommendations are made in the initial physical security survey, a follow-
up survey is conducted to ensure the completion of modifications.

3. Supplemental Survey
Is conducted when changes in the organization, mission, facility, or the threat
level of the facility alter or affect the security posture of the facility area.
INDUSTRIAL SECURITY MANAGEMENT

JMC

4. Special Survey
It is conducted to examine or resolve a specific issue, such as when there is a
request for a Sensitive Compartmented Information (SCI) accredited facility or there is a
need to investigate or assess damage resulting from an incident.

Stage in conducting Security Inspections:


1. Evaluation
the evaluative or fact-finding inspection is generally positive in tone and promotes
liaison and security awareness while taking a board, general outlook of a facility or
program.

2. Compliance
The full compliance inspection generally is conducted for enforcement purposes.

3. Follow-up
Another form of compliance inspection is the follow-up inspection, conducted to
ensure that facility officials have complied with recommendations from earlier
inspections.

4. After-hours Room Check


It is a form of compliance inspection.

5. Self-inspection
It is initiated by the security officer or facility manager to evaluate his/her own
security program.

6. Closeout
A closeout self-inspection is accomplished immediately prior to the action to
administratively terminate an authorized Top Secret Station, Classified Control Station,
or Sensitive Compartmented Information Facility if any.

Types of briefing in a Security Inspection


1. Initial Orientation Briefing
Simply providing printed security regulations is not an effective way to promote
complete understanding of security responsibilities.
2. Special Briefings
National Security Briefings – this are information security briefings that apply to
individuals who handle classified information.
INDUSTRIAL SECURITY MANAGEMENT

JMC

Special Access Briefing – these are briefing related to the various special access
programs such as those administered by the higher management or national offices.

You might also like