Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
2 views

Security Report Grp 2

Chapter Four discusses various aspects of physical security management, including risk assessment, emergency response planning, and the implementation of barriers, alarms, and locks to protect assets. It outlines the principles of physical security, types of barriers, and the importance of personnel security in preventing unauthorized access. The chapter also emphasizes the role of protective lighting and alarm systems in deterring crime and ensuring safety.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Security Report Grp 2

Chapter Four discusses various aspects of physical security management, including risk assessment, emergency response planning, and the implementation of barriers, alarms, and locks to protect assets. It outlines the principles of physical security, types of barriers, and the importance of personnel security in preventing unauthorized access. The chapter also emphasizes the role of protective lighting and alarm systems in deterring crime and ensuring safety.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 71

CHAPTER FOUR

PHYSICAL
SECURITY
GROUP 2 REPORT
Members of Cabangon, John Andrey

Group 2 Camatoy, Leo


Carpio, Jhon Carlo
Democrito, Kurt Cebidie
Fetalco, Andrew Vin
Hilario, Jhames Cyrrish
Martinez, Alison Jazlyn
Santos Jr., Manuel
Physical Security
Management
Professionals working in physical security
management could be responsible for assessing
security risks and developing strategies to prevent or
mitigate threats, such as terrorist threats, fire or
break-ins that can harm people and property. They
also design emergency response plans should these
events occur, assess program effectiveness and
familiarize their coworkers with an organization's
security protocol.
Information
Security
Management
One of the largest challenges to security
management is through IT and computer networked
systems. Professionals working in this sector attempt
to ensure the integrity of individual or organizational
data via tools used to classify information prevent
unauthorized access to networked systems and ward
off computer viruses and other threats.
(BARRIERS, ALARMS,
LIGHTING AND
LOCKS)
Measures being used to define, protect and monitor
property rights and assets. These measures consist of
barriers and devices that would detect, impede, and
prevent unauthorized access to equipment, facilities,
material, and document and to safeguard them
against espionage, sabotage, damage, pilferage,
embezzlement fraud or another dishonest criminal
act.
PRINCIPLES OF PHYSICAL SECURITY

The type of access There is no Defense-in-dept. is Delay ls provided Each installation is


necessary will impenetrable barrier barrier after barrier against different BARRIER
depend upon a surreptitious and Any structure or
number of variable non-surreptitious physical device
factors and entry capable of
therefore maybe restricting,
achieved in a deterring, delaying,
number of ways. illegal access to
installation
DEFINE THE PHYSICALLY LIMITS OF AN

PURPOSE OF AREA.

BARRIER CREATE A PHYSICAL AND PSYCHOLOGICAL


DETERRENT TO UNAUTHORIZED ENTRY.

PREVENT PENETRATION THEREIN OR


DELAY INTRUSION, THUS, FACILITATING
APPREHENSION OF INTRUDERS.

ASSIST IN MORE EFFICIENT AND


ECONOMICAL EMPLOYMENT OF GUARDS.

FACILITIES AND IMPROVE THE CONTROL


OF VEHICULAR TRAFFIC.
NATURAL BARRIERS
It includes the body of waters, mountains, marshes, ravines, deserts or
other terrain that are difficult to traverse. In addition, all those exist on
earth as to water and land formation.
1. Waters
2. Mountains
3. Marshes
4. Ravines
5. Desserts
STUCTURAL BARRIERS
These are constructed by men
or bar or delay entry.
HUMAN BARRIERS
Persons being used in providing
guarding system or by nature of
employment and location.
ANIMAL BARRIERS
Animals are being used in
providing a guarding system
ENERGY BARRIERS
It is the employment of the
mechanical; electrical energy
imposes a deterrent to any
illegal intruder.
01 FIRST LINE OF DEFENSE
PERIMETER ➢ FENCES/BARRIERS
➢ fences/barriers

THREE LINES
OF PHYSICAL 02 SECOND LINE OF DEFENSE
➢ Doors
DEFENSE ➢ Windows
➢ Walls and Roofs.
➢ Grills and other entries to the building

03 THIRD LINES OF DEFENSE


➢ Storage System
➢ Steel cabinets
➢ Safes
➢ Vaults
THE TYPE OF ACCESS NECESSARY WILL DEPEND UPON A
NUMBER OF VARIABLE FACTORS AND THEREFORE
PRINCIPLES OF MAYBE ACHIEVED IN A NUMBER OF WAYS.

PHYSICAL THERE IS NO IMPENETRABLE BARRIER

SECURITY
DEFENSE-IN-DEPT IS BARRIER AFTER
BARRIER

DELAY IS PROVIDED AGAINST SURREPTITIOUS AND


NON-SURREPTITIOUS ENTRY.

EACH INSTALLATION IS DIFFERENT.


01 GATES AND DOORS
~ If frequently used should be controlled by
guard, while inside the perimeter should be locked.

TYPES OF
PERIMETER 02 SIDEWALK OR UTILITY ELEVATOR
~ It should be manned and lock at all times.
BARRIER
OPENING
03 UTILITY OPENING
~ Sewer, air intake, exhaust tunnels should be
protected by bar grills.
WHAT IS RESTRICTED
AREA?
~ This refers to any area which personnel; vehicles
are controlled for reason of security. Such area is
restricted in which provided by the security in the
installation to maximize its efficiency during security
operation of the entire area.
TWO TYPES OF RESTRICTED AREAS

1. EXCLUSION AREA
~ A restricted area which contains a security interest to TOP SECRET importance and which
requires the highest degree of protection

2. LIMITED AREA
~ A restricted area in which a lesser degree of control is required than in an exclusion area
but which the security interest would be compromised by uncontrollable movement.
INCLUSION OF LIMITED AREA CONTROL

1. Interior area control. 3. Key control.


Refers to the time element
of visitor’s arrival and
departure while in the
course of transaction within
the installation.

2. Visitors identification 4. Fire prevention.


and movement control.
PASS SYSTEM
01 ➢ FENCES

TYPES OF
PERIMETER 02 ➢ WALLS

BARRIER AND
ITS
INCLUSION 03 ➢ BODIES OF WATER
TYPE OF FENCES
1. SOLID FENCE
~ Visual access through fence is denied.

2. FULL-VIEW FENCE
~ It is constructed in such a way that visual access is permitted.
01 CHAIN LINK FENCE.
CONSTRUCTED OF 7 FEET
MATERIAL INCLUDING TOP

TYPE OF GUARD.

FULL-VIEW 02 BARBED WIRE FENCE.

FENSE

03 CONCERTINA WIRE FENCE.


PROTECTIVE LIGHTING
~ Their single most cost-effective deterrent to crime
because it creates a psychological deterrent to the
intruders.
PURPOSE OF PROTECTIVE
LIGHTING
1. It provides sufficient illumination to areas during
hours of darkness.
2. Lighting can help improve visibility so that
intruder can be seen and identified and if possible,
apprehended.
3. It serves as deterrent to would be thieves.
01 CONTINUOUS LIGHTING
~ Designed to provide rear projection or
controlled lighting.

TYPES OF 02 STANDBY LIGHTING

PROTECTIVE ~ Light the particular area in an occasional basis.

LIGHTING 03 MOVEABLE OR PORTABLE LIGHTING


~ This can be located in selected or special location
which will require lighting in short period of time.

04 EMERGENCY LIGHTING
~ This system is use in times in power failure.
GENERAL TYPES OF
LIGHTING SOURCES
INCANDESCENT
LAMP
Providing instant illumination when the switch is on.
MERCURY VAPOR
LAMP
More efficient than incandescent and use wide
spread in exterior lighting.
METAL HALIDE
LAMP
It has similar appearance in mercury vapor but
provides a light source of higher luminous efficiency.
FLOURESCENT
High lamp efficiency has long life.
HIGH- PRESSURE
SODIUM VAPOR
It mixes a golden white to light pink color and provide
high lumen efficiency.
TYPES OF LIGHTING
EQUIPMENT
FLOODLIGHTS
Used for outdoor security lighting focused in vital
areas in particular building.
STREET LIGHTS
Is lighting equipment that illuminates roadway, alley,
its value in reducing crime.
SEARCH LIGHTS
A design to pinpoint potential trouble spots.
FRESNEL LIGHTS
Are wide beam units that illuminates in long,
horizontal strips to protect the approaches to the
perimeter barrier.
AREAS TO BE LIGHTED

Perimeter fence Building face Pedestrian and Parking area Storage, large
perimeter vehicle entrance opened working
area, pier, docks,
and other sensitive
areas.
PROTECTIVE
ALARM
~ Are devices and contrivance
installed inside and outside a facility
or building to compliment and
provide additional security measure
and operates the advertise entry into
protective areas. It signals alerts the
security personnel to intrusion within
the compound.
01 SENSOR OR TRIGGER DEVICE
~ it emits the aural or visual signal or both.

THREE BASIC
PARTS OF 02 TRANSMISSION LINE
~ a circuit which the message to the signaling
ALARM apparatus.

SYSTEM
03 ENUNCIATOR/ANNUNCIATOR
~ - it is the signaling system that activates the
alarm.
TYPES OF PROTECTIVE
ALARM SYSTEM
CENTRAL
STATION SYSTEM
Used for outdoor security lighting focused in vital
areas in particular building.
PROPRIETARY
SYSTEM
The alarm is located in industrial firm itself which
activated the presence of police, ambulance and
other responding units.
LOCAL ALARM
Consist of ringing up a visual or audible near the
object to be protected
AUXILIARY
ALARM
Company own alarm system with a link to the nearest
police station for immediate assistance.
KINDS OF ALARM
1. Audio Detection Device
~ Detect any sound post by force entry with the use of supersonic microphone speaker sensor that installed in walls,
ceiling, floors, of protective area.
2. Vibration Detection Device
~ Detect any vibration post by attempted entry.
3. Metallic foil or wire
~ Detect any actions that moves the foil or wire.
4. Laser Beam Alarm
~ A laser emitter floods the wall or fencing with a beam so that the beam is disturbed or cut, an alarm is activated.
5. Photoelectric or Electric Eye Device
~ An invisible beam is emitted and once it breaks it will activate the alarm.
LOCKS
~ Are mechanical device used for
fastening doors, chests and lids
consisting essentially of a volt
guarded by a mechanism released by
a key or a combination. It is designed
entry into the installation and
safeguards the removal of materials
contained therein.
TYPES OF LOCKS
WARDED LOCKS
~ Does simplest form of lock is a ward
lock which uses a vault containing
notch called talon.
DISC TUMBLER LOCKS
~ Contains one or more pieces of metal
of different height known as tumblers.
LEVER LOCKS
~ it is commonly installed in safe
deposits boxes and are operated by
means of dial.
CYLINDER LOCK
~ Operated by a key on the outside and
a knob in the inside.
MAGNETIC LOCKS
~ Similar in designed in cylinder locks
to return to release the bolt which pin
needs a suitable magnetized key for
alignment
ELECTROMAGNETIC
LOCKS
~ When the power is on and the door is
lock, it beams operated by electricity
and which it will close by the
magnetism.
COMBINATION LOCK
~ For installation in seek in bank vaults
which has 1 million possible
combinations.
CODE OPERATED
LOCKS
~ It can be open by pressing a series of
button on proper sequences
CARD OPERATED
LOCKS
~ Utilize card which are coded in
notched, electromagnetic strips.
imbedded
01 KEY CABINET
~ Should be secure at all time

KEY CONTROL
~ Once an effective key control 02 KEY RECORD
has been installed, positive
~ Must be set up record of all numbers which keys
control key must be gained and specific lock have been Issued
maintained. This can be
accomplished only if it is
established in conjunction with
03 INVENTORIES
the installation of new locking ~ Should be made of all duplicator or duplicated
devices. Methods in order to
maintain effective key control

04 AUDITS
~ Should be made of all key control records 5.
Daily report. Should be made to the person
responsible for a key control
01 CHANGE KEY
~ - A specific key, which operates the locks and
has a particular combination of cuts which match
the arrangement of the tumblers in the lucks.

02
TYPE OF KEYS SUB-MASTER KEY
~ a key that will open all the locks within a
particular area or grouping in a given facility.

03 MASTER KEY
~ A special key capable of opening a series of lock.

04 GRAND MASTER KEY


~ A key that will open everything in a system
involving two or more master key groups.
WHAT IS SECURITY
CABINET?
~ The final line of defense at any facility is in the
high storage where paper, records, plan or
cashable instrument, precious metal or other
especially valuable assets are protected. These
security containers will be of a size quantity,
which the nature of the business dictates.
THREE TYPES OF
SECURITY CABINET
SAFE
metallic containers used for the safekeeping
documents or small items in an office or installation.
VAULT
heavily constructed fire and burglar resistant
containers usually a part of the building structure
used keep and protect cash, document and
negotiable instrument.
FILE ROOM
a cubicle in a building constructed lighter than a vault
but of bigger size to accommodate limited people to
work on the records inside.
PERSONNEL SECURITY
~ Personnel security includes all the
security measures designed to prevent
unsuitable individual or persons of doubtful
loyalty to the government, from gaining
access to classified matter or to any facility,
and to prevent appointment, or retention as
employees of such individuals. It is also
composed of conducting personnel security
investigation and security education
programs.
PERSONNEL SECURITY
INVESTIGATION
~ Is an inquiry into the reputation,
character, integrity, discretion, morals and
loyalty of an individual in order to
determine a person's suitability for
appointment or access to classified matters
Revenge
MOTIVES Material gain
Prestige
THAT CAUSE Ideological belief
Friendship
PEOPLE TO
BE DISLOYAL
Weakness of character
WEAKNESS Jealousy
Gullibility

THAT CAUSE Indebtedness


Investment
Addiction to narcotics
PEOPLE TO Alcoholism
Gambling problems

BE DISLOYAL Moral depravity such lesbianism and


homosexuality
INITIAL INTERVIEW - it is the first contact with security and

SEVEN
should be formally conducted.
TRAINING CONFERENCE - it is normally held in the training
period conducted for at least a period of four hours; its concern is

PHASES OF
to reiterate to employees that security is an additional burden
imposed on them as part of the company.
REFRESHER CONFERENCE - it reminds individuals of their job

SECURITY responsibility.
SECURITY REMINDERS - it commonly manifested in office
memorandum

EDUCATION SECURITY PROMOTION - it is positive effort to sell security or


make the employees more involved in the implementation of
security measures
SPECIAL INTERVIEW - It is conducted with the aid of senior
company official to facilitate compliance by means of example.
DEBRIEFING - serve to place the person on special notice of his
continuing responsibility to protect classified information which
he has knowledge of.
The first step to securing
anything is understanding
the risks.

KEVIN MITNICK
Any Questions?
Clarifications?
Feel free to ask!
On behalf of Group 2

Thank you
for your
cooperation!
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

You might also like