Chapter 4
Chapter 4
This chapter presents the various security systems that are interlinked with each other in
the so called “security chain”. It provides information on the importance of integrating
security systems as a bundle of protecting company assets from risks, harm or losses.
PRELIMINARY NOTE
Integration means that security managers can create a tailored-fit security system within
their respective facilities, incorporating products to control access and security across
one or many sites at local, national and even global levels.
INTEGRATED SECURITY SYSTEMS
Integrated Security System-is the synergy of the system in an installation linked to
other products recognition and system, such as CCTV, automatic number plate
recognition and key lockers and personnel programs. The security system acts as a hub
that allows the integration and operation of all systems from as one place such as well
as monitoring real-time event via CCTV, controlling access to assets and areas via HR
and active directory systems and tracking assets and personnel as needed.
PURPOSE AND IMPORTANCE OF INTEGRATING SECURITY SYSTEM
An integrated security system provides flexibility to incorporate what is needed
only for ease and comfortable use. Integrated system means you can manage all aspects
of security and access from one place through one program. This is usually something
you can control remotely, often via an app on your smartphone to give you extra ease
of use. It is also easy to run reports, make changes, view previous changes and by
whom.
1. Efficiency-an integrated security in any industry will allow businesses to flourish more
effectively and efficiency.
2. Centralization- integrated security systems allow business security operations to
become more centralized.
3. Loss Prevention- no matter what kind of industry one works in, they always have to
prepare for external theft. Whether internal theft or external theft, it can be over
whelming.
4. Real Time Monitoring- with multiple security systems, business management teams are
able to see what is going on with in their facilities and areas of work instantly, if needed.
This also allows business owners to monitor their employee activities as it is one of the
most essential points in protecting their business from unwanted actions at the
workplace.
5. Conflict Resolution- integrated security systems come with a package of video
surveillance, access control, intrusion alarms, and uniformed guard services. All of this
element will come forth if a problem were to arise in a workplace, whether it will be
external \internal burglary, attempted break-ins or just about any security threat that can
occur at a business.
6. Productivity- an integrated security system is a guarantee to boosting productivity in
the workspace. Study revealed that that employee monitoring is being used to increase
customer satisfaction, improve employee performance and enhance productivity.
7. Business Savings- having an integrated system will allow business to save money and
be protected. Otherwise, in the case of the theft, burglary or robbery, the business
owners\management team would be held liable for all the losses with nowhere to turn
to.
PHYSICAL SECURITY SYSTEM
Physical security measures are being used to define, protect and monitor property rights
and assets. These measures consist of barriers and devices that would detect, impede
and prevent an authorized access to equipment, facilities, material, and document and
to safeguard them against espionage, sabotage, damage and theft.
Physical security has three important elements:
the obstacles to frustrate trivial attackers and delay serious ones; alarms, lighting, CCTV
and
guard patrols to make it likely that attacks will be noticed,
and security response to repel, catch or frustrate attackers when an attack is detected.
FOUR LAYERS OF PHYSICAL SECURITY
1. Environmental Design- the initial layers of security for a campus, building, office, or
physical space uses environmental design to deter threats.
2. Mechanical and Electronical Access Control- includes gates, doors, and locks.
3. Intrusion detection- monitors for attacks. It is less preventative measure and more of a
response measure.
4. Video Monitoring-are more useful for incident verification and historical analysis.
Physical access controls are implemented to prevent unauthorized entry to your
computer facility or remote terminal areas.
Physical access to data files and media libraries such as magnetic disk, tape files,
microforms, and so on to authorized only to those personnel requiring access to
perform their job.
Natural disasters must be prevented, controlled, and minimized to extent economically
feasible by the use of detection equipment such as heat sensors, smoke detectors,
extinguishing systems, and well-conceived and tested contingency plan.
PHYSICAL BARRIERS
A barrier is any structure or physical device capable of restricting deterring, delaying,
illegal access, to an installation.
Generally, a barrier is use for the following purposes:
1. Define the physical limits of an area.
2. Create a physical and psychological deterrent to unauthorized entry.
3. Prevent penetration therein or delay intrusion, thus, facilitating apprehension of
intruders.
4. Assist in more efficient and economical employment of guards.
5. Facilitate and improve the control the vehicular traffic.
TYPES OF PHYSICAL BARRIERS
1.Natural barriers - it includes bodies of waters, mountains, marshes, ravines, deserts or
other terrain that are difficult to traverse.
2. Structural barriers – these are features constructed by man regardless of their
original intent that tends to delay the intruder.
3. Human barriers – person being used in providing and guarding system by the nature
of their employment and location, fulfill security functions.
4. Animal barriers – animals are used in partially providing a guarding system. Dogs are
usually trained and utilized to serve as guard dogs.
5. Energy barriers – it is the employment of mechanical, electrical, electronic energy
imposes a deterrent to entry by the potential intruder or to provide warning to guard
personnel.
PERIMETER SECURITY
The main purpose of perimeter barrier is to deny or impede access or exit of
unauthorized person. Basically, it is the first line of defense of an installation. This is
maybe in the form of fences, building walls or even bodies of water. The function and
location of the facility itself is usually determine the perimeter of the installation.
Lines of Physical Defense
First line – includes perimeter fence or barrier
Second line – include doors, floors, windows, walls, roofs and grills and other entries to
the buildings.
Third line – include storage systems like steel cabinets, safes, vaults and interior files.
PERIMETER FENCES
A fence is a freestanding structure design to restrict or prevent movement across a
boundary. It is generally distinguished from a wall by the lightness of its construction:
Types of fences
Solid fence – constructed in such a way that visual access through the fence is denied.
Its advantage is that it denies the opportunity for the intruder to become familiar with
the personnel, activities and the time scheduled of the movements of the guards in the
installation.
Full-view fence – it is constructed in such a way that visual access is permitted through
the fence. Its advantages are that it allows the roving patrols and stationary guard to
keep the surrounding area of the installation under observation.
Additional Protective Measures
Top Guard – additional overhang of barbed wire placed on vertical perimeter
fences upward and outward with a 45-degree angle with 3 to 4 strands of barbed wires
spaced 6 inches apart. This increases the protective height and prevents easy access.
Guard Control Stations – this is normally provided at main perimeter entrances
to secure areas located out-of-doors and manned by guards on full time basis.
Tower Guard – this is a house-like structure above the perimeter barriers. The
higher the tower the more visibility it provides.
Barrier Maintenance – Fencing barriers and protective walls should always be
regularly inspected by security. Any sign or attempts to break in should be reported for
investigation.
Protection in Depth –The depth itself protection Reduction of access roads, and
sufficient notices to warm intruders should be done. Use of animals, as guards and
intrusion device, can also be good as barriers.
Sign and Notices – “control signs” should be erected where necessary in the
management of unauthorized ingress to preclude accidental entry. Signs should be
plainly visible and legible from any approach and in an understood language or dialect.
PROTECTIVE LIGHTINGS
Protective lightning is the single most cost-effective deterrent to crime because it
creates a psychological deterrent to the intruders.
Purpose of Protective Lightning
-It provides sufficient illumination to the areas during hours of darkness.
-Lightning can help improve visibility so that intruder can be seen and identified, and, if
possible apprehended. It serves as deterrent to would-be thieves.
Types of Protective Lightning
Continuous lighting – the most familiar type of outdoor security lightning, this is
designed to provide two specific results: glare projection or controlled lighting. It
consists of a series of fixed luminaries at range to flood a given area continuously during
the hours of darkness.
Glare projection type – it is being used in prison and correctional institutions to
illuminate walls and outside barriers.
Controlled lighting – it is generally employed where, due to surrounding
property owners, nearby highways or other limitations, it is necessary for the light to be
more precisely focused.
Standby lighting – it is design for reserve or standby use or to supplement
continuous systems.
Movable or portable lighting – this system is manually operated and is usually made
up of movable search or floodlights that can be located in selected or special locations
which will require lighting only for short period of time.
Emergency lighting – this system is used in times of power failure or other
emergencies when other systems are in operative.
GENERAL TYPES OF LIGHTING SOURCES
1. Incandescent Lamp-it is the least expensive in terms of energy consumed and has
the advantage of providing instant illumination when the switch is on.
2. Mecury Vapor Lamp-it is considered more efficient that the incandescent and used
widespread in exterior lighting. This emits a purplish-white color, caused by an electric
current passing through a tube of conducting and luminous gas.
3. Metal Hallide-it has similar physical appearance to mercury vapor but provides a
light source of higher luminous efficiency and better color rendition.
4. Fluorescent-this provides good color rendition, high lamp efficiency as well as long
life. However, it cannot project light over long distance and thus are not desirable as
flood type light.
5. High Pressure sodium vapor-this has gained acceptance for exterior lighting of
parking areas, roadways, buildings and commercial interior installations. Constructed on
the same principle as mercury vapor lamps, they emit a golden white to light pink color
and this provide high lumen efficiency and relatively good color rendition.
TYPES OF LIGHTING EQUIPMENT
1. Floodlights-these can be used to accommodate most outdoor security lighting
needs including the illumination of boundaries, fences and buildings and for the
emphasis of vital areas or building.
2. Streetlights- these are lighting equipment received the most widespread notoriety
for its value in reducing crime.
3. Search Lights- these are highly focused incandescent lamp and are designed to
pinpoint potential trouble spots.
4. Fresnel Lights-these are wide beam units, primary used to extend the illumination in
long, horizontal strips to protect the approaches to the perimeter barrier. Fresnel
projects a narrow, horizontal and from 15 to 30 degrees in the vertical plane.
PROTECTIVE ALARM
Protective alarm is one of the important barriers in security. It assists the security in
detecting, impeding or deterring potential security threat in the installation. Its function
is to alert the security personnel for any attempt of intrusion into a protected area,
building or compound.
BASIC PARTS OF ALARM SYSTEM
1. Sensor or Trigger Device-it emits the aural or visual signals or both.
2. Transmission Line- a circuit, which transmit the message to the signaling apparatus.
3. Annunciator-the signaling system activates the alarm.
Protective Alarm System
1. Central Station System – a type of alarm where the control station is located outside
the plant or installation.
2. Proprietary system – centralized monitor of the proprietary alarm system is located in
the industrial firm itself with a duty operator.
3. Local Alarm – This system consists of ringing up a visual or audible alarm near the
object be protected
4. Auxiliary alarm – company-owned alarm system with a unit in the nearest police station
so that in case of need, direct call is possible.
KINDS OF ALARMS
1. Audio Detection Device-it will detect any sound caused by attempted force entry. A
supersonic microphone speaker sensor is installed in walls, ceilings and floors of the
protected area.
2. Vibration Detection Device-it will detect any vibration caused by attempted force entry.
A vibration sensitive sensor is attached to walls, ceilings and floors of the protected area.
3. Metallic Foil Wire- it will detect any action that moves the foil or wire. An electrically
charge strips of tinfoil or wire. An electrically charge strips of tinfoil or wire is used in the
doors, windows or glass surfaces of the protected area.
4. Laser Beam Alarm-a laser emitter floods a wall or fencing with a beam so that when a
physical object disturbs this beam, an alarm is activated
5. Photoelectric or electric Eye Device-an invisible/visible beam is emitted and when this
is disturbed or when intruder breaks contact with the beam; it will activate the alarm.
LOCKS AND KEY CONTROL
A lock is defined as mechanical, electrical; hydraulic or electronic device design to
prevent entry into building, room, container or hiding place. Lock is one of the most
widely used physically security devices in the asset protection program of an installation.
KEYING SYSTEMS
A key is a device used to open door. A key consists of two parts: the blade which
is inserted into the lock, and the bow, left protruding so that torque can be applied.
IDENTIFICATION AND MOVEMENT CONTROL
In every installation, the use of protective barriers, security lighting,
communication and electronic hardware provides physical safeguard, but these are
insufficient to maximize the effort of the guard force.
The most practical and generally accepted in personnel identification is the use of
identification cards badges or passage.
Personnel Identification
The use of practical personal recognition, artificial recognition such as the use of
identification cards, passes, passwords, etc.
Badge and pass Control
The system should have a complete record of all badges and identification cards
issued, returned mutilated or lost by serial number and cross-indexed alphabetically.
Visitors Movement Control
Security should establish proper methods of establishing the authority for
admission of visitors as well as the limitation thereat. This security measure would
depend on the sensibility of the installation, but could include the following:
Visitor’s logbook-all visitors to any facility should be required to identify themselves
and should be given a visitor’s ID by the security. Visitor’s logbook should be filled up
with the named visitors, nature and duration of visit.
Photograph-taking of photographs should also be considered. Extreme caution must
be exercised in areas where classified information is displayed to preclude unauthorized
taking of pictures of the installation. If a visitor has camera and it is prohibited to take
picture, said camera should be left in the care of security with corresponding receipt.
Escort- if possible, visitors should be escorted by the security to monitor their activity
within the establishment and guide them where to go.
Visitor entrances- separate access for visitors and employees of the establishment
should be provided.
Time traveled- if there is a long delay or time lapse between the departure and arrival,
the visitors may be required to show cause for the delay.
Package Control
Every facility must establish a system for the control of package entering or
leaving the premises. Since the transporting of packages through the portals is a fact of
life, people entering or leaving the installation premises should be dealt with the
following in order to prevent theft and misappropriation of company properties.
Vehicle Control
Vehicular traffic with in the boundaries of any facility must be carefully controlled
for safety as well as to control the transporting of pilfered goods from the premises.
Privately owned vehicle of personnel/visitor should be registered and are subject to the
identification and admittance procedure.
Building access control
At any physical barrier, a security system must possess the ability to distinguished
among authorized persons, unauthorized visitors, and other unauthorized persons. This
is to assist the security personnel protects sensitive area and information within the
installation.
DOCUMENT AND INFORMATION SECURITY
In every installation, document and information are dispensable for their daily
operation and activities, be it in the form of a paper, film, and magnetic media or in the
computer system. Once there is a leakage in the contents of company’s document and
information, the business operational stability is at stake. It may lead to disclosure due
to bankruptcy. The leakage of document and information cost government, business
industry alike, billions of pesos. Protection of document and information entails a
massive task on the part of the executives and the staff of the installation.
Document Security is the protection of records from its entire document life
cycle.
Standard Rules – the authority responsibility for the preparation and
classification of classified matter rest exclusively with the originating office.
Document Security Systems
Documents Security is that aspect of security that involves the application of security
measures for the protection and safeguarding classified information.
Security Clearance is the certification by a responsible authority that the person
described is cleared for access to classified matter the appropriate level.
Information Security
Information security means protecting information and information systems from
unauthorized access, use, disclosure, disruption, modification, or destruction.
The terms information security, computer security and information assurance are
frequently used interchangeable. These fields are interrelated and share the common
goals of protecting the confidentiality, integrity and availability of information.
PERSONNEL SECURITY
Among the major aspects of security, personnel security is considered as the
most important. The reason is that security involves people, both an asset to be
protected and at the same time a source of security threats.
Personnel Security refers to those practices, technologies and/or services used to
ensure that personnel security safeguards are applied.
Sensitive Data/Information refers to critical information for which the unauthorized
access, loss, misuse, modification, or improper disclosure could negatively impact the
ability of the entity or agency to provide services and benefits to its customers.
Confidential Data/Information refers to the information that involves the privacy to
which individuals are entitled by law. This information may only be disclosed to those
individuals that are authorized and have a need to review the data or information.
Personnel Security Investigation (PSI) is a process of inquiry into the character,
reputation, discretion, integrity, morals and loyalty of an individual to determine the
suitability for appointment or access to classified matter.
Background Investigation serves to verify information on the application form and to
obtain other information pertinent to the decision to employ. It could be in the form of
partial background investigation or complete background investigation. Background
Checks, Vetting and Profiling
Local Agency Check (LAC) is background investigation activity where the sources
information involve only the local agencies in the community such as the local
government units such as clearances from the barangay, city or municipality, local
police, and the courts.
National Agency Check (NAC) is also an investigation activity, but the sources
information involves clearance from national government units.
Positive Vetting – is the process of inspecting or examining with careful thoroughness.
The essence of vetting is that it is personal interview conducted under stress.
Security Profiling – is a process whereby a subject reaction in a future critical situation
is predicted by observing his behavior, or by interviewing him, or analyzing his
responses to a questionnaire, such as an honesty test.
Deception Detection Techniques – this is a process of using devices in detecting
deception during the interview stage. This includes the use of a Polygraph, Psychological
stress Evaluator and Voice Analyzer.
Financial and Lifestyle Inquiry – this type of investigation seeks to gather information
on income and mode of living, sometimes referred to as earning-to-debt ratio.
Undercover Investigation – this is the placement of an agent in a role in which the
agent’s true identity and role remains unknown in order to obtain information for
criminal prosecution or for recovery or limitation of assets losses.
Exit Interview – this is a valuable tool because it gives departing employees an
opportunity to list grievances. It offers security managers an opportunity to learn of
problems not previously known.