0% found this document useful (0 votes)
17 views

Chapter 2

The document outlines the importance and components of protective alarm systems, including types, kinds, and desirable characteristics for effective security. It also discusses locks and key control, emphasizing the need for proper management of keys and security cabinets. Additionally, it covers personnel identification, movement control, and building access control to enhance overall security measures.

Uploaded by

Jimwell Delaluz
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

Chapter 2

The document outlines the importance and components of protective alarm systems, including types, kinds, and desirable characteristics for effective security. It also discusses locks and key control, emphasizing the need for proper management of keys and security cabinets. Additionally, it covers personnel identification, movement control, and building access control to enhance overall security measures.

Uploaded by

Jimwell Delaluz
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 15

PROTECTIVE ALARMS

Protective alarm - is one of the important barriers in


security. It assists the security in detecting, impeding or
deterring potential security threat in the installation.

Three Basic Parts of Alarm System


1. Sensor or trigger device - it emits the aural or visual
signals or both.
2. Transmission line - a circuit which transmit the
message to the signaling apparatus.
3. Annunciator - it is the signaling system that activates
the alarm.

Types of Protective Alarm System


1. Central Station System - a type of alarm where the
control station is located outside the plant or
installation.
2. Proprietary system - centralized the proprietary
alarm system is located in the industrial firm itself with
a duty operator.
3. Local Alarm – this system consists of ringing up a
visual or audible alarm near the object to be When an
intruder tries to pry a window the alarm thereat goes
off.
4. Auxiliary alarm – company-owned alarm syste with a
unit in the nearest police station so that’s case of need,
direct call is possible

Kinds of Alarms
Audio Detection Device
Vibration Detection Device
Metallic foil or wire
Laser Beam Alarm
Photoelectric or Electric Eye Device

Utilization of Alarm Devices


1. Nature of the area or installation
2. Criticality of the area or complex
3. Vulnerability of the area or complex
4. Accessibility
5. Location of installation and areas to be protected
6. Constructions and types of buildings
7. Hours of normal operations
8. Availability of other types of protection
9. Initial and recurring cost of installed alarm system
10. Design and salvage value of desired equipment
11. Response time of the security force and local police
12. Savings in manpower and money for a period of
time if alarm is used.

Desirable Characteristics of Intrusion Alarm System


1. A detection unit should initiate the alarm upon
intrusions of a human being in the area or vicinity upon
intrusion of a human being in the area or vicinity to the
protected area or object.
2. Panel board central annunciator operating console -
monitoring activities should be manned at all times.
3. An annunciator console indication the audible
and/or aural signal and the specific location of incident
so that proper action can be made by security and
other units.
4. Fail-safe features which give alarm in the
annunciator when something is wrong with the system.
5. System should be difficult to tamper or render
ineffective by outsiders, competitors or saboteurs.
Summing up Protective Alarm Devices
1. Alarm devices are physical. Safeguards used to assist
security but not a replacement in the protection of
assets and lives in the installation.
2. It assists the guards to extend their hearing a vision
even in areas where the are not physically present.
3. The alarm system whether a local, a 、Central
proprietary, or auxiliary type are to inform the guard
either visually or aurally of an attempt or a break-in
within the premises being protected.
4. Maintenance of alarm system must be regularly
made, the signal line must be protected, and there
must be alternate source of power.
5. New and improve intrusion hardwires are being
developed and placed in the market but again, the
human guard is irreplaceable in spite of
computerization and the arrival of super sophisticated
devices in security alarm systems.

PROTECTIVE LOCKS AND KEY CONTROL


Lock is one of the most widely used physical security
devices in the asset protection program of an
installation. It complements other physical safeguards
of the installation against any possible surreptitious
entry.

Lock Defined
A lock is defined as a mechanical, electrical, hydraulic
or electronic device designed to prevent entry into a
building, room, container or hiding place.
Types of Locks
1.Key operated mechanical lock
Disc tumbler lock
Pin tumbler lock
Lever tumbler lock
The warded lock
2. Padlock
3. Combination lock
4. Code-operated lock
5. Electrical lock
6. Card operated lock
Key Control
1. Key Cabinet – a well- constructed cabinet will have
to be procured. The cabinet will have to be of sufficient
size to hold the original key to every lock in the system.
2. Key record - some administrative means must be set
up to record code numbers and indicates to whom
keys to specific locks have been issued.
3. Inventories periodic inventories will have to be made
of all duplicate and original keys in the hands of each
employee whom they have bee issued.
4. Audits – in addition to periodic inventory
unannounced audit should be made of all K control
records and procedures by a member of management.
5. Daily report – a daily report should be made to the
person responsible for key control from the personnel
department indicating all persons who have left or will
be leaving the company.

Security Cabinet
The final line of defense at any facility is in the high
security storage where papers, records, plans or
cashable instrument, precious metals or other
especially valuable assets are protected.
Three (3) Types of Security Cabinet
Safe
Vault
Fire room

Guard and Guard System:


A. Four basic function that must be accomplished by
this guard system:
1. Detect intruders;
2. Sound Alarm;
3. Apprehend unauthorized personnel; and
4. Identify authorized personnel.
B. Human Barriers:
1. Guard Procurement: Selection criteria:
a. Must eligible for security clearance;
b. Vigorous and physically able to serve in the capacity
of a guard;
c. Intelligence necessary to accomplished the guard
function;
d. The ability to make rapid decisions and react in a
calm way to emergencies:
e. Loyalty and discretion are required attributes; and
f. Experience is highly desirable although not usually
mandatory.
2. Guard training: Programs of training should include:
a. General orientation
b. Instruction in security procedures of the installation,
first aid, and communication
c. Instruction in traffic control, riot control, self
defense.
d. Weapons qualifications to include maintenance and
safety.
e. Refresher course and advance training in specific
subjects.
3. Guard employment: Two basic techniques of guard
employment:
a. Fixed post
b. Patrols
4. Guard supervision: a. Personal supervision: Personal
all guards prior to their staring their tour inspection
Periodic checks of guards tour of duty, by the senior
member of each relief or his representative.
Artificial Supervision:
1. Recorded Tour – guard takes with him on his tour of
duty a form which must have the time punched on it at
each station
2. Supervisory Tour – This is where the guards sends
signals to guard headquarters from each station that
he checks.
5. Guard Equipment:
a. distinctive uniform
b. credentials
C. weapons
d. whistle
e. notebook
f. flashlights g. nightsticks
h. other uniform or equipment’s as may be directed by
the unit.
6. Guard Communication:
a. Primary Communication – direct line telephone or in
some instance radio.
B. Emergency Communication- ex. Messengers

C. Animal Barriers
This is where an animal is used to provide or partially
provide a guard system. The animals is used are limited
to dogs which known guard or sentry dogs.
D. Energy Barriers
This is where employment of a a deterrent to entry by
the potential or to provide mechanical, electrical or
electronics energy to impose advertisement of his
presence.

PERSONNEL IDENTIFICATION AND MOVEMENT


CONTROL
2 Types of Personnel Identification
1. Personal Recognition
2. Artificial Recognition identification cards, passes,
passwords, etc.

Uses of Pass System


Single Pass System
Pass Exchange System
Multiple Pass System
Badge and Pass Control
1. The system should have a complete record of all
badges and identification cards issued, return,
mutilated or lost by serial number and cross indexed
alphabetically.
2. The supervisor from time to time for its accuracy and
authenticity should check the lists
3. Passes and badges reported lost should be validated
and security at entrance be informed through
conspicuous posting.

Types of Controlled Areas


Controlled Areas
Limited Areas

Traffic Control System:


Controlling traffic in and out within a facility is essential
to its security program. Perimeter barriers, locked
doors and screened windows prevent or deter the
entry of authorized visitors, since some traffic essential
to every operation, no matter how highly, classified it
maybe, provision must be made for the control of this
movement.
Personnel Identification: The most practical and
generally accepted system is the use of badges and
identification cards. Generally speaking, this system
designates when and where and how passes should be
displayed, and to whom, what is to be done in case of
the loss of the pass; procedure for taking a pass from
terminating significant number of badges have
reported lost or stolen.

Visitors Movement Control


Security should establish proper methods of
establishing the authority for admission of visitors as
well as the limitation thereat.
Visitor’s logbook
Photograph
Visitor’s entrances
Time traveled

Package Movement Control


Every facility must establish a system for the control of
package entering or leaving the premises.
1. No packages shall be authorized to be brought
inside the industrial installation, offices and work
area without proper authority. This basic precept
help reduce if not eliminate pilferage, industrial
espionage or sabotage.
2. Outgoing packages carried by personnel should
be closely inspected and those in vehicles should
also be checked as many pilfered items are hidden in
the surface of the vehicles leaving the compound.
3. Any personnel/ visitor entering the installation
with a package should deposit the same to the
security and in return receives a numbered ta which
he/she will use in claiming his/her pack upon
departing.

Vehicular traffic within the boundaries of any facility


must be carefully controlled for safety as well as to
control the transporting of pilfered goods from the
premises. Thus;
1, Privately owned vehicle of personnel/ visitor
should be registered and are subject to the
identification and admittance procedure. )
2. Vehicles should be subjected for search at the
entrance and exit of each installation.
3. All visitors with vehicle should provide his security
as to the complete details of their duration of stay,
person to be visited, and other information.
4. All vehicles of visitors should be given a sign
sticker to be placed on the windshield.
5. Traffic warning signs should be installed in all
entrances in order to guide the visitors in their
destination as well to provide them with the
necessary safety precautions while they are inside
the installation.
6. Security personnel must constantly supervise
parking areas and make frequent spots searches of
vehicles found there.

Building Access Control


At any physical barrier, a security system must
possess the ability to distinguish among authorized
persons, unauthorized visitors, and other
unauthorized persons. This is to assist the security
personnel who protects sensitive area and in
Appropriate warning signs should be posted at the
building perimeter. Special restricted entry facilities’
to public access should be provided. This will De
dependent on the degree of security needed for the
protection of property, activity and other processes
within the building formation within the installation.

You might also like