0% found this document useful (0 votes)
14 views

RESA - LESSON 3 & 4

Uploaded by

harlyndaile26
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

RESA - LESSON 3 & 4

Uploaded by

harlyndaile26
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

LESSON 3 with wireless remote controls called key fobs.

 What is a security system?  Door and Window Sensors: Door and window sensors are comprised of
two parts installed adjacent to each other. One part of the device is
The most basic definition of any security system is found in its installed on the door or window and the other on the door frame or
name. It is literally a means or method by which something is secured window sill. When a door or window is closed, the two parts of the
through a system of interworking components and devices. sensor are joined together, creating a security circuit.
When the security system is armed at the control panel, these
In this instance, we’re talking about home security systems, sensors communicate with it by reporting that the point of entry is
which are networks of integrated electronic devices working together secure. Should a monitored door or window suddenly be opened, the
with a central control panel to protect against burglars and other security circuit is broken and the control panel interprets this as a
potential home intruders. breach of a secured zone. A high- decibel alarm is sounded and in most
instances the alarm monitoring company is automatically notified.
A typical home security system includes:
 Motion Sensors: These security components, when armed, protect a
 A control panel, which is the primary controller of a home’s given space by creating an invisible zone that cannot be breached
security system without sounding an alarm. These are typically used to protect rooms
containing valuables, as well as areas less frequented in larger homes.
 Door and window sensors
 Motion sensors, both interior and exterior  Surveillance Cameras: Available in both wired and wireless
 Wired or wireless security cameras configurations, surveillance cameras can be used in several different
ways as part of an overall security system.
 A high-decibel siren or alarm
 A yard sign and window stickers Typical uses include monitoring:

 How does a security system work? a) Hard to see or distant areas of your property.
Home security systems work on the simple concept of securing
b) Remote buildings like garages, barns, and workshops.
entry points into a home with sensors that communicate with a control c) Entry points, both exterior and interior, like garage doors and
panel or command center installed in a convenient location somewhere front doors.
in the home. The sensors are typically placed in doors that lead to and Surveillance cameras can be accessed remotely on computers,
from a house as well as easily accessible windows, particularly any that smartphones, and tablets. They are often used in this method when
open, especially those at ground level. Open spaces inside of homes homeowners are out of town, to watch for deliveries and other service
can be secured with motion sensors. personnel like caregivers and landscapers, and to monitor the arrival of
children after school. They can also be used to record any security
 Control Panel: The control panel is the computer that arms and breaches, which could result in having footage of a home invasion,
disarms the security systems, communicates with each installed including a good look at the burglars and perhaps even the vehicle they
component, sounds the alarm when a security zone is breached, and drove
communicates with an alarm monitoring company.

They typically feature a touchpad for easy programming and


interaction, is where pass codes are entered to arm and disarm the
system, can work on voice commands, and can be programmed to work
 High-decibel Alarm: Loud enough for neighbors to hear, home security  Emergency and fire safety systems—Commercial building security
alarms serve a few different purposes. First, they alert the people inside systems need proper fire safety, like a business fire alarm
the house that a problem occurred. They’re also shrill enough to send a system, and emergency detection equipment installed to be
burglar running while also notifying nearby neighbors to the situation. compliant with current local safety requirements.

 Yard Sign and Window Stickers: On the surface, these items might seem  Cybersecurity systems—Many businesses choose to add security
like nothing more than marketing tools for alarm companies, but they for their networks designed to protect proprietary information
play important roles in home security. When you place a security and private data. Commercial cybersecurity systems can include
company’s sticker in a front window and plant their sign in your front anti-virus software, data encryption, traffic monitoring, and
yard, you are telling burglars you home is professionally protected and firewall protection.
not a wise choice for an attempted burglary. They are effective at
conveying this message and should be used as recommended by the
security company.  WHAT HAPPENS WHEN AN INTRUSION OCCURS?

 Types of commercial security systems Security systems are designed to perform certain tasks when a
secured zone is breached. What your security systems does in the
In a commercial setting, there are a few common security event of an intrusion depends on the type of system you’re using.
systems that businesses can choose to employ. Because not every
business will require every type of system, it’s a good idea to consult
with an office building security systems installer who can perform a  Professionally Monitored Security Systems: If your security system
security audit to determine the specific needs of a space. is professionally monitored by an alarm company, they are
alerted when a security problem arises in your home. Along with
The most frequently used office security systems are: the high- decibel alarm that sounds, the monitoring company is
alerted. A trained security expert might attempt to communicate
 Access control—An access control system determines who can with the homeowner via the control panel if it’s setup for 2-Way
gain entry to office buildings and commercial spaces, usually Voice communication, or will call the emergency contact number
with authorized credentials that can unlock a door. listed on the account.

 Security cameras and video surveillance—Mounted cameras in In the event of an actual emergency, the monitoring company
commercial buildings help security teams see what’s happening will notify the appropriate emergency response personnel in
in key areas to monitor office security through video footage. your area. This includes police, firefighters, and paramedics.
The monitoring company will also try to maintain
communication with you until emergency response teams
Alarm systems—Office security alarm systems can deter criminal
arrive at your home.
activity, and notify personnel of a breach. Alarms can be directly
connected to locking mechanisms and an office door security
Monitored systems typically allow for the homeowners (or
system, or triggered by certain events on the property.
designees) to be notified by text message and email when .

 Sensors—Door contact sensors are installed to notify businesses


 Non-monitored Security Systems: There are plenty of DIY security
when a door opens, or if it’s left ajar. For high-security spaces,
systems available today that don’t include professionally
some businesses may use infrared, laser, or microwave sensors
monitored services. In the event of a home intrusion when this
for more advanced commercial building security.
type of security system is installed, a high-decibel alarm sounds
(provided one is installed). Contacting police, fire, or other 23. Don't leave a house key under your door mat
emergency response personnel must be initiated by the
homeowner by dialing the appropriate number, typically 911. 24. Lock the gate(s) to your backyard
25. Lock up grills, lawn mowers, bikes, and other outdoor valuables
These types of systems may or may not allow for text messages 26. Lock all doors at night and every time you leave the house
or email notifications to be sent to the homeowner in the event of a
security breach, depending on the provider and the system you opted 27. Shred documents with personal information
for.
28. Check that doors fit tightly in their frames
 Home safety assessment checklist 29. Get involved in your neighborhood watch program
30. Rekey all of your doors when you move in
1. Make sure valuables aren't visible from the street 31. Keep tabs on neighborhood break-ins
2. Don't give burglars hiding spots near doors and windows 32. Secure mail slots, dryer vents, and pet entrances where a burglar
3. Upgrade doors to solid wood or metal clad could enter
4. Light up entryways and pathways at night 33. Make sure your home’s exterior is well lit
5. Make sure your house number is clearly visible from the street 34. See how well-lit your street is at night
6. See who’s at the door before you open it 35. Get monitored home security
7. Have a cell phone handy in case of cut wires 36. Add outdoor security cameras
8. Give a neighbor a spare set of keys to your home 37. Make sure all carbon monoxide detectors are working
9. Put your mail on hold when you travel 38. Regularly test smoke detectors
10. Have an emergency escape plan in case of a break-in 39. Store ladders and tools in a locked garage or shed
11. Display yard signs or window decals that state your home is
monitored
12. Have fire extinguishers easily accessible throughout your home
13. Install keyed deadbolt locks on all of your doors
14. Add motion-sensor lights
15. Use secondary locks or a rod in the track on sliding glass doors
16. Add secondary locks to windows
17. Use timers with your lights
18. Use timers with your lights
19. Keep an inventory of your personal property in case of theft
20. Keep medications out of sight
21. Store valuables in a safety deposit box or safe
22. Get to know your neighbors across the street and on all three sides
of your home
a. Close Circuit Television;
PHYSICAL SECURITY
b. Perimeter alarm system;
 A system of barriers placed between the potential intruder and c. High security lighting;
the object/matter to be protected.
 It is the broadest branch of security, which is concerned with
d. Highly trained armed guards;
physical measures adopted to prevent unauthorized access to e. Control designs; and
equipment, facilities, materials and documents and to safeguard f. Coordination with local law enforcement agencies.
them against espionage, sabotage, damage and theft.
 Describes the measures that are designed to deny access to
unauthorized personnel from physically accessing a building, 5. MAXIMUM SECURITY - includes the application of the following:
facility, stored information and guidance on how to design
structures to resist potentially hostile acts. a. Sophisticated alarm system; and
 It is the sum total of all physical safeguards employed or installed
to secure the assets.
b. On – site response force

Physical Security System - a barrier or system of barriers placed between


the potential intruder and the matter to be protected. Protective device
against hazards, threats, vulnerability and risks.

LEVELS OF PHYSICAL SECURITY

1. MINIMUM SECURITY - is a system designed to impede


unauthorized external activity such as simple intrusion to armed
attack.
2. LOW LEVEL SECURITY - is a system designed to impede and
detect some unauthorized external activity such as on small
retail store, storage warehouse.
3. MEDIUM SECURITY - is designed to impede, detect and assess
most external activity and some unauthorized internal activity
that range from simple shoplifting to conspiracy to commit
sabotage. This includes the:
a. Use of advance intrusion alarm system;
b. Establishment of perimeter and perimeter barriers; and
c. Use of an unarmed guard.
4. HIGH LEVEL SECURITY - is designed to impede, detect and
assess most unauthorized external and internal activities of
certain prisons, defense contractors, pharmaceutical companies
and sophisticated electronic manufactures. This includes the
utilization of the following:
LESSON 4 2. To assist in providing the necessary security to the employees
WHAT IS PERSONNEL SECURITY? while they carry out their functions.
3. To minimize the likelihood of employees becoming a security concern.
4. Implement security measures in a way that is proportionate to the risk
 Refers to the procedure followed, inquiries conducted, and criteria
applied to determine the work suitability of a particular applicant or
5. Reduce risk of insider activity, protect the organization’s assets and,
the retention of a particular employee. where necessary, carry out investigations to resolve suspicions or
 Is a term used to describe the policies and procedures put in place provide evidence for disciplinary procedures.
to eliminate or minimize risk.
 It includes all security measures designed to prevent unsuitable PRINCIPLES IN PERSONNEL SECURITY
individuals or persons of doubtful loyalty to the government, from Security must start from a given foundation or basis and this basis
gaining access to classified matter or to any security facility, and to shall be referred to as the principles of security. Security principles are
prevent appointment, or retention as employees of such normally disseminated by regulations or directives to ensure uniformity of
individuals. purpose, logical and similar methods of operation and appropriate and
 Is a system of policies and procedures that manages the risk of continuous placement of responsibility.
employee/staff or contractors exploiting legitimate access to an
organization’s assets or premises for unauthorized purposes. It is OBJECTIVES OF PERSONNEL SECURITY
important to distinguish between this and personal security, which 1. To provide the standards and procedures necessary to insure the
seek to reduce the risks to the safety or well-being of individual appointment, employment of retention of suitable and loyal
employees. individuals.
2. To develop the necessary and proper security discipline among
PURPOSE OF PERSONNEL SECURITY the applicants and employee as well as protect and preserve the
1. To ensure that hired employees are best suited to assist the security interest of the organization.
organization in achieving its mission and vision; 3. Inculcate the desirable security attitudes and habits among the
applicants and employees.
RESTRICTED AREA
 It refers to an area in which personnel or vehicles are controlled for CONTROL OF PERSONNEL
reasons of security. As responsible individual, we need to make sure that the workers
 It is established to provide security for installation or facilities and to are well controlled in accessing the valuable information and entering into
promote efficiency of security operations and economy in the use the restricted areas. Let them practice the standard operating
of security personnel. procedures, guidelines, principles and the “need to know concept” inside
the company.

TYPES OF RESTRICTED AREA PERSONNEL CONTROL IDENTIFICATION


a. CONTROLLED AREAS – access is restricted to entrance or 1. Personal Recognition - is the most effective
movement by only authorized personnel and vehicles. 2. Artificial Identification - badges, passes etc.
b. EXCLUSION AREAS - it refers to a restricted area which contains a
security interest to TOP SECRET importance and which requires the SYSTEM OF EMPLOYMENT OF PERSONNEL CONTROL IDENTIFICATION
highest degree of protection. The area should be under surveillance at all 1. ACCESS LIST - it contains the names of authorized persons or
times. personnel and is checked against identification cards such as
c. LIMITED AREAS – it is a restricted area in which lesser degree of drivers’ licenses, draft registration etc.
control is required than in an exclusion area but which the security 2. GROUP PASS AND BADGE SYSTEM - one ID for one group.
interest would be compromised by uncontrolled movement. 3. MULTIPLE PASS SYSTEM - separate pass is required for access to
various areas in need ex. color coding secure.
4. PASS SYSTEM - a method used by security to screen visitors or 6. SPOT MAGNETIZED IDENTIFICATION PASSES - a code may be
person admitted into building premises. placed in the device and when passes through a machine, the code
5. SINGLE PASS OR BADGE SYSTEM - the least expensive and the least on the device is read, if it contains wrong code or no code at all, it
will alarm.
PURPOSE OF SCREENING
Screening employees to determine their “vulnerability to”, or INSIDERS
active “involvement in”, insider activity involves identifying those people  Is the term used to refer to staff or a contractor who tries to use
who give cause for concern by demonstrating suspicious behaviors or their
possessing individual vulnerabilities. However, this process must then be legitimate access in the organization’s assets for unauthorized
complemented by the effective resolution or management of these purposes.
concerns.  This includes many forms of criminal activity, from minor theft
The first stage of identifying individuals who may give cause for through to terrorism.
concern involves a basic level of screening for all employees, which acts as  Is someone (a permanent, temporary or contract worker) who
an initial filter. The tools or techniques used should therefore be suitable exploits, or has the intention to exploit, their legitimate access to
for application across sizeable numbers of people and might, for example, assets for unauthorized purposes.
take the form of:
1. Automated monitoring of employee activities to identify INNOCENT INSIDER
anomalous behavior.  An employee, who causes damage to an organization through
2. Using the appraisal process as an opportunity for line managers to carelessness or ineptitude, is not an area of focus because measures
identify signs and behaviors of concern. put in place to prevent deliberate insider activities should also
guard against the accidental acts.
3. Application of more detailed assessment by trained practitioners
when a concern is raised by a line manager or colleague outside
SECURITY PASS
of the appraisal process.
Many organizations or corporations within the national
4. Securing the involvement of all employees in the screening infrastructure will encourage staff to wear security passes, which also permit
process by raising awareness of personnel security and the insider entry to their premises. If this is the case there should be no exceptions,
threat. even for senior management, security staff or visitors.
5. Providing reporting mechanisms through which they can express
their concerns. ISSUING PASSESS
There should be safeguards in place to prevent any employee morals, and loyalty of an individual in order to determine a
from fraudulently obtaining a pass on behalf of the third party. These are person’s suitability for appointment or access to classified matter.
easier to manage if pass issue is controlled from a central location.
Possible safeguards include:
1. Confirm identity with document verification check before issuing APPROACH IN CONDUCTING PSI
1. Rapport - Establishing good and wholesome relationship with
pass to new employee.
interviewee in order to develop mutual confidence and cooperation.
2. Require dual authorization from HR and Security manager before
issuing any pass. How establish rapport.
3. Restrict the physical production of passes, so that no individual can a. Talk of pleasant and common association.
bypass the authorization process.
b. Be in proper deportment/ appearance.
c. Be professional in your approach
WHAT IS PERSONNEL SECURITY INVESTIGATION (PSI) d. Create an atmosphere of ease
 It is an inquiry into the character, reputation, discretion, integrity,
e. Establish contact well in advance.  Refers to the investigation of the records and files of agency in
f. Apply the principles of interrogation. the area of principal residence of the individual being
investigated like clearances from Mayor, Police, Prosecutor and
1. Interview proper:
Courts.
a. Be sure you are interviewing the right person
b. Identify yourself BACKGROUND INVESTIGATION (BI)
c. Identify the subject of PSI  It is an inquiry which aims to verify applicant’s information written
d. State your purpose at the applicant’s form, to ascertain his/her past employment
e. Establish area of knowledge experiences and to obtain other information pertinent to the
decision to employ.
f. Establish the nature of the person’s knowledge while on official or  A check made on an individual usually seeking employment
non- official business, social or causal information through subject’s record in the police, educational institutions,
g. Develop nreference or names of persons who know subject with place or residence and former employers.
their addresses or names or of persons who may know the leads to be  These checks are often used by employers as means of objectively
proven or disproving evaluating a job candidate’s qualifications, character, fitness, and
h. Request for the recommendation on the subject to identify potential hiring risks for safety and security reasons.
i. Obtain a signed statement if derogatory information is developed
KINDS OF BACKGROUND INVESTIGATION
TYPES OF PERSONNEL SECURITY INVESTIGATION (PSI) 1. Complete Background Investigation (CBI)
 a type of BI which is more comprehensive, particularly
all the circumstance of his personal life.
1. National Agency Check (NAC) –  Is performed for business or personal reasons. This profile report
 This is an investigation of an individual made upon the basis of provides the essential facts you must know.
written information supplied by him in response to official
inquiry, and by reference to appropriate national agencies. COMPONENTS OF CBI
 It consists of Local Agency Check supplemented by investigation a. Applicants Name
of the records and files of the following agencies: PNP, ISAFP, b. Organization membership
NBI, CSC, National Intelligence Coordination Agency (NICA). c. Date of Birth
d. Neighborhood check
1. Local Agency Check (LAC) – e. Present residence address
 This type of investigation consist of the first type plus written inquiries f. Character references
sent to appropriate local government agencies, former g. Personal history statement
employees, references and schools listed by the person under h. Marital history
investigation.
i. Foreign travel history m. Criminal records
j. Citizenship n. Educational history
k. Physical data o. Applicants signature
l. Credit records p. Date of application
1. Partial Background Investigation (PBI) 1. Loyalty – faithful allegiance to the Philippine government and its
 Investigation of the background of the individual but limited duly constitutional authorities;
only to some circumstances of his personal life which are 2. Integrity – uprightness in character, soundness of moral principle,
deemed pertinent to investigation. freedom from moral delinquencies.
3. Discretion – the ability or tendency to act or to decide with
FACTORS TO BE CONSIDERED IN THE CONDUCT OF BI prudence, the habit of wise judgment;
4. Morals – distinctive identifying qualities which serve as an index to
the essential or intrinsic nature of a person;
5. Character – the sum of traits that have been impresses by
nature, education and habit upon the individual;
6. Reputation – opinion or estimation in which one is generally held. It is
what a person is reported to be whereas character is what a
person is.
c. P

You might also like