Cri 215 Sim Industrial Security Management
Cri 215 Sim Industrial Security Management
Cri 215 Sim Industrial Security Management
Tagum College
Assessment Task Submission Submission of assessment tasks shall be on 3 rd, 5th, 7th
and 9th week of the term. The assessment paper shall
be attached with a cover page indicating the title of the
assessment task (if the task is performance), the
name of the course coordinator, date of submission and
name of the student. The document should be emailed
to the course coordinator. It is also expected that you
already paid your tuition and other fees before the
submission of the assessment task.
2
Since this course is included in the licensure examination
for criminologist, you will be required to take the
Multiple- Choice Question exam inside the University.
This should be scheduled ahead of time by your course
coordinator. This is non-negotiable for all licensure-
based programs.
Turnitin Submission To ensure honesty and authenticity, all assessment
(if necessary) tasks are required to be submitted through Turnitin
with a maximum similarity index of 30% allowed. This
means that if your paper goes beyond 30%, the
students will either opt to redo her/his paper or explain
in writing addressed to the course coordinator the
reasons for the similarity. In addition, if the paper has
reached more than 30% similarity index, the student
may be called for a disciplinary action in accordance
with the University’s OPM on Intellectual and Academic
Honesty.
3
standards or other reasonable circumstances e.g.
illness, accidents financial constraints.
Re-marking of Assessment You should request in writing addressed to the program
Papers and Appeal coordinator your intention to appeal or contest the score
given to an assessment task. The letter should explicitly
explain the reasons/points to contest the grade. The
program coordinator shall communicate with the
students on the approval and disapproval of the
request.
4
Contact Details of the Dean Gina Fe G. Israel, EdD
Email:[email protected]
Phone: 0915 832 5092 / 0909 994 2314
Contact Details of the Program Jun Mark A. Asis, MSCrim
Head Email: [email protected]
Phone: 0938 493 1993
Students with Special Needs Students with special needs shall communicate with the
course coordinator about the nature of his or her
special needs. Depending on the nature of the need,
the course coordinator with the approval of the program
coordinator may provide alternative assessment tasks
or extension of the deadline of submission of
assessment tasks. However, the alternative
assessment tasks should still be in the service of
achieving the desired course learning outcomes.
Help Desk Contact Globe: 0917 466 709
Smart: 09308920005
Library Contact [email protected]
0927 395 1639
CC’s Voice: Hello there! Good day! Welcome to this course CRI 215: Industrial Security
Management. As a criminology student it is imperative to gain literacy regarding
security management as it is considered as an important knowledge that should
be learned by future security providers who are regarded as a closed partner of
our law enforcement agencies in combating criminality in our country. An old
adage states that, “Security in every organization is everybody’s business.” Thus,
as a responsible citizen and a Criminology student this course will help you in
understanding the fields of security business and its role in the prevention and
reduction of criminal acts committed against privately-owned and government-
owned enterprises and agencies. This would be of great help considering that the
bulk of security providers are Criminology graduates. Studying this course maybe
challenging but it will equip you with essential knowledge that will help you not
just in practicing your profession but of everyday life. Thus, enjoy while learning
this course.
CO As a student of this course you are expected to explain the general concept of
industrial security management; the types and major divisions of security applied in
modern industries and enterprises; the methods of conducting security survey and
security inspection as well as security investigation; the qualifications, attributes,
functions of security personnel; memorize the different security agencies
authorized by law.
Let us begin!
5
Big Picture
Week 1-3: Unit Learning Outcomes (ULO): At the end of the unit, you are expected to
a. Understand the general concept of the need for security, the types of security applied
in modern industries, the basic principles of Industrial security management, and the
major divisions of security.
b. Explain the various types of physical security, barriers that are placed between the
potential intruder and the matter to be protected.
c. Comprehend the methods of conducting survey and security inspection.
Metalanguage
Below are the essential terms that you are going to encounter in the pursuit of ULOb.
1. Cryptography - is associated with the process of converting ordinary plain text into
unintelligible text and vice-versa. It is a method of storing and transmitting data in a
particular form so that only those for whom it is intended can read and process it.
2. Law Enforcement Agency – A government agency responsible for enforcing the law.
3. Security Agency - A private security company is a business corporation, which provides
armed and unarmed security services and expertise to private and public clients.
Essential Knowledge
It is innate to human beings to seek security and protection from dangers for them to
survive and continue existing free from anything that may cause damage to their properties or
may result to injury or death. In the ancient world, humans learned to unite themselves into
clans, then into tribes, and later into bigger communities. As they organized themselves, their
primary reason is security of their life, their livelihoods and security of their existence.
1. Security
It is defined as the state or quality of being secured, freedom from fear or danger,
assurance or certainty. To secure is to make safe or be protected.
It is any measures taken to keep an individual or group from dangers or hazards that
may cause harm, injury, loss of life, and or loss or damage of property.
2. Necessity of Security. Security measures are necessary for the attainment of goals
and objectives of a certain individual, group or organization. It follows that when an
individual or organization is exposed to hazards, their productivity is adversely
affected. We have this so called internal and external threat. Internal threats include
communist aggressions, Muslim separatists, extreme rightists such as the threat of
military takeover of the government and the restless mass actions like strikes and
protests by civil organizations. External threats include the country’s incapability to
defend itself in case of war. All of these threats if not deterred or reduced, will bring
political instability which surely hampers the economy of the country.
3. The Role of PNP and other Government Law Enforcement Agencies. Industrial
security is indispensable part of the Philippine economy because it serves as a
partner of Law Enforcement agencies in the country such as PNP.
4. Hazards – refer to conditions that may cause damage to property, injury, or loss of
life. It is also defined as “exposure to the chance of loss or injury”. Hazards are
caused either by nature or by man himself. The role of security is to prevent or stop
these hazards in causing unintentional or intentional damage to property, injury or
loss of life.
5. RA 5487 – Philippine legislative body enacted this Act governing the organization and
management of private security agency, company guard forces and government
security forces.
7. Types of Security. Various types of security are applied depending on the installation
and the security needs of the installation.
7.1 Physical Security – the broadest branch of security which is concerned with the
physical measures adopted to prevent unauthorized access to equipment,
facilities, materials, and documents, and to safeguard them against espionage,
sabotage, damage and theft.
7.2 Communication Security – it is the protection resulting from the application of
various measures that prevent or delay unauthorized person in gaining
information through the communication system. This includes:
a 62
7.2a Transmission security – a component of communications security that
results from all measures designed to protect transmission from the interception,
traffic analysis and imitative deception.
7.2b Cryptographic Security – Result from the provisions of technically sound
crypto-systems and their proper use.
7.2c Physical Security – providing of safeguards to equipment and materials
from access by unauthorized persons.
7.3 Hotel Security – it refers to the protection of assets, guests, personal effects and
other properties in hotels, inns and other similar establishments.
7.4 Bank Security - a specialized type of physical security protecting the asstes,
personnel, and operation of a bank, with special emphasis on the precaution and
measures to safeguard the cash and assets while the storage, in transit, and during
transaction.
7.6 Personal Security – protection of personnel especially ranking officials from any
harm, kidnap and other acts. Very Important people(VIP) security type is a type of
personal security.
7.7 Crises Security – This is a part of VIP security involved in hostage and kidnapping
of VIPs.
7.9 Operational security – a type of security that deals with the protection of processes,
formula, patents and other industrial and manufacturing activities from espionage,
infiltration, loss, compromise, or photocopying.
Self-Help: You can also refer to the sources below to help you further
understand the lesson
Ajero J.M. (2014). Industrial and Corporate Security Management. Wiseman’s Books Trading.
Quezon City Philippines.
Let’s Check
Let us try the following activities to check your understanding in this unit.
Activity 1. Multiple Choice. Please encircle the letter under each item which you think is the correct
answer.
1. A type of security that deals with the protection of processes, formula, patents and other
industrial and manufacturing activities from espionage, infiltration, loss, compromise, or
photocopying.
a. Document security
b. Strategic security
c. Tactical security
d. Operational security
2. This includes the background checks of individuals commensurate with the security
requirements of their work and measures designed to protect employees of an organization or
business establishment.
a. Employee security
b. Personal security
c. Air cargo security
d. Personnel security
3. In the field of industrial security, different types of security are applied depending on the
a. Financial capabilities of the installation
b. Time and season
c. Installation and security needs
d. People and environment
a 62
4. The skillful handling of the security and safety measures of business enterprises and industrial
establishments.
a. Industrial security management
b. Security operations
c. Security enterprises
d. Security administration
5. What is the broadest branch of security which is concerned with the physical measures
adopted to prevent unauthorized access to equipment, facilities, materials and documents, and
to safeguard them against espionage, sabotage, damage and theft.
a. VIP security
b. Physical security
c. Industrial security
d. Communication security
6. The act governing the organization and management of private security agency, company
guard forces and government security forces is known as
a. RA 8551
b. RA 8553
c. RA 5487
d. RA 6975
8. The state or quality of being secured or freedom from fear on danger is referred to as
a. liberty
b. security
c. dangerless
d. security
9. These are conditions or acts that may cause damage to property, injury, or loss of life.
a. danger
b. risks
c. warning
d. hazards
Let’s Analyze
Let us try the following activities to know how deep your understanding about the topics
a 62
of this unit.
2. Make a scenario affecting the security of our country in terms of Internal Threat.
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
3. Make a scenario affecting the security of our country in terms of External Threat.
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
a 62
In a Nutshell
In this part you are going to jot down what you have learned in this unit. The said
statement of yours could be in a form of concluding statements, arguments, or perspective you
have drawn from this lesson. I have indicated my arguments or lessons learned.
1. To achieve the objectives of effective security management, the company concerned and the
security personnel assigned should work hand in hand.
2. Security in every organization is everybody’s business. This means that the avoidance of loss
and damage to properties as well as the prevention of injury or loss of life because of
hazards is not possible without the active support of all individuals within an organization.
4.
Q&A List
In this section you are going to list what boggles you in this unit. You may indicate your
questions but noting you have to indicate the answers after your question is being raised and
clarified. You can write your questions below.
Questions/Issues Answers
1.
2.
3.
4.
5.
a 62
Keywords Index
Air Cargo Security Industrial Security Management
Bank Security Internal Threats
Communication Security Law Enforcement Agency
Crises Security Operational Security
Cryptographic Security Personal Security
Cryptography Personnel Security
Document and Information Security Physical Security
Document Security School Security
External Threats Security
Hazards Security Agency
Hotel Security Supermarket Security
Industry Transmission Security
Industrial Security
Metalanguage
The following are terms to be remembered as we go through in studying this unit. Please
refer to these definitions as supplement in case you will encounter difficulty in understanding the
basic concepts of special crime investigation.
1. Intensity - The unit for the quantity of light flowing from a source in any one second
(the luminous power, or luminous flux) is called the lumen.
2. Luminous - relating to light as it is perceived by the eye, rather than in terms of its
actual energy.
3. Portable - able to be easily carried or moved, especially because being of a lighter
and smaller version than usual.
Essential Knowledge
Physical security is the protection of personnel hardware, programs, networks, and data
from physical circumstances and events that could cause serious losses or damage to
a 62
corporation, agency, or institution. This includes protection from fire, natural disasters, burglary,
theft, vandalism, and terrorism.
1. PHYSICAL SECURITY: Principles of Physical Security.
In every establishment, physical measures are needed to deny unauthorized access
or intrusion because of the following:
1.1 Enemy agents must access – acquisition of information is the ultimate results,
and the means and form in which the information is obtained.
1.2 There is no impenetrable barrier – for the unfriendly government or
organization, they are willing to spend enough time, money and material in
passing barriers. So physical security attempts to build defense by using a certain
barrier.
1.3 Defense in depth – barrier after barrier. In order that barrier could prevent
unauthorized access and serve its purpose well, there should be an integration of
all barriers adopted in the installation.
1.4 Surreptitious versus Non-surreptitious entry – the possibility of surreptitious
entry is the greatest hazard from the standpoint of counterintelligence security
because it is actually difficult to determine that the formation has been
compromised. Surreptitious entry means not observable while non-surreptitious
entry is observable. Observable or not, intruders usually find the right place and
right opportunity to gain access. Physical security then is needed to detect or deny
unauthorized entries.
1.5 Each installation is different – since each installation is different, each will have
different problems to overcome.
3.1 Natural Barriers – these are offered by nature which could obstruct or delay the
passage way of potential intruders. These also refer to natural structures that
serve as deterrents or obstructions to intruders such as high cliff, desert or bodies
of water.
3.2 Man-made Barriers – these are structural constructions like fences, walls, floors
grills, bars, roadblocks or other physical means to deter or impede penetration.
5. Levels of Physical Security. It also varies depending on the type and location and
a 62
facility, and other factors needing security. The levels of physical security could be
any of the following.
5.1 Minimum security – a system designed to impede unauthorized external activity
such as simple intrusion to armed attack.
5.2 Low level security – a system designed to impede and detect some
unauthorized external activity such as on small retail store, storage warehouses.
5.3 Medium security – designed to impede, detect and asses most external activity
and some unauthorized internal activity that range from simple shoplifting to
conspiracy to commit sabotage. This include the
a. Use of advance intrusion alarm system
b. Establishment of perimeter and perimeter barriers
c. Use of an unarmed guard
5.4 High level security – designed to impede, detect and assess most unauthorized
external and internal activities of certain prisons, defense contractors,
pharmaceutical companies and sophisticated electronic manufacturers.
5.5 Maximum security – the application of the following:
a. Sophisticated alarm system
b. On-site response force
Ex. Water sprinkler, smoke detector
7. Line of Physical Defense. Security managers and security personnel also consider
the various lines of defense that could help delay or stop intruders. These are:
a 62
i. Specifications for using Barbed wire
I. Standard barbed wire is twisted, double-stand 12 gauge wire with 4
point barbs spaced on equal distance apart.
II. Barbed wire fencing must be firmly affixed to posts high excluding top
guard.
III. Barbed wire fencing should not be less than 7 ft. high excluding top
guard.
IV. The distance between stands will not exceed 6 inches and midway
between parts.
9.2 Building Walls - includes walls, floor, roofs or their combinations serve also as
barriers and they should be of such constructions to provide uniform protection
just like wire-fencing.
9.3 Bodies of Water- like river, cataract and etc
a 62
10. Additional Protective Measures
1. Top guard- is an
additional overhang of
barbed wire placed on
vertical perimeter fences
upward and outward with
a 45-degree angle with
three to four strands of
barbed wire spaced 6-
inches apart.
3. Towers or Guard
Towers- are house-like
structures above the
perimeter barriers. It gives
a psychological effect to
the violators.
a 62
4. Sign and Notices or
Control Sign- should be
erected where necessary
in the management of
unauthorized ingress and
preclude accidental entry.
It includes entry, ID
prohibited and exclusive
areas sign.
11. Perimeter Guards. They also augment the existing perimeter security or perimeter
barriers of a certain establishment.
11.1 Fixed post - security guards are assigned in a particular place of the compound
to guard and watch the area surrounding.
11.2 Patrol (Roving)- in this system the security guard is required to walk and go
around regularly around the company premises.
a 62
16. Protective Lightings Significance to Security Forces
When properly employed, protective lightings offers the following:
16.1 Reduction of the need for security forces
16.2 Personal protection for forces by reducing the advantages of concealment and
surprise for a determined intruder.
16.3 Relieved security forces could be used to better advantage elsewhere.
21. Operation and Types of Intrusion Alarm Systems. Alarms work in various types
and they emit signals through a variety of mechanisms. With their methods of
operations, alarms could be classified into the following:
21.1 Breaking an Electrical Circuit through a Metallic Foil or Wire – All possible
point of entry can be wired by using electrically charge strips of tinfoil wire. Any
actions that will move the foil or wire will break the circuit and activate the alarm.
Metallic foil or wire is used in window or glass surfaces.
21.2 Interruption of Light Beam of Photo-Cell through a Photoelectric or Electric
Eye Device – an invisible light beam is transmitted at a frequency of several
thousand per second to a special receiver. An infrared filter over the light source
makes the beam invisible to intruders. It is connected by a wire to control station
and when an intruder crosses the beam he makes contact with the photo
electronic coil which thus activates the alarm.
21.2a Disadvantage of photo-cell:
I. Can be bypassed by crawling underneath or climbing over it
II. It is not fit for external or outdoor installations because of fog, smoke, dust,
rain and other vision obstructions when devise enough can interrupt the
light and trigger false alarms
21.3 Detecting Sound and Vibration through an Audio Detection Device –
supersensitive microphone speaker sensors are installed in walls; floors and
ceilings of the protected area of any sound caused by attempted forced entry
inspected by the sensor. This can be effectively used in enclosed areas, vaults,
safes, file rooms, warehouse and similar enclosures.
21.3a Disadvantage:
I. Limited application to enclosed vaults, and depositories where minimum
external sound exists.
21.4 Vibration Detection Device – the vibration sensitive sensor is attached to walls,
ceilings or floors of the protected areas. The sensor detects any vibration caused
a 62
by attempted forced entry.
21.5 Space and Motion Detectors – Constant sound waves in a cubicle disturbed by
an object will cause change of frequency and wave motion thereby causing an
alarm to trigger.
21.6 Penetration of an Electron or Electromagnetic Fence – it is an electronic
fence consisting of 3 to 5 strands of wire spaced from 9 to 24 inches above one
another which serves as antenna, a monitor panel, and an electric circuitry. When
power is put on, an Electromagnetic field is set among the wires from the top to
the ground. An intruder about two feet from this field will trigger the alarm.
21.7 Foot Rail Activator – placing the front of their foot to engage the activation bar
placed on the floor in such a position that tellers may activate the alarm. Foot rails
do not acquire obvious use of teller’s hand and their hands may be kept in full
view of the robbers for reason of safety. Foot rail can be activated safely, it is
frequently found in the banks where tellers normally operate while standing up.
21.8 Bill traps – Bill traps or currency activation devices are usually placed in the
teller’s cash drawer and connected to the alarm system using a wire connector.
When currency is removed from the devices, the alarm is activated. The
advantage of these devices is that the robbers frequently remove the currency
and activate the alarm. This is particularly helpful when the employees are forced
immediately to leave their station without having an opportunity to activate the
alarm safely.
21.9 Knee or Thigh Button – installed inside the desk or teller station so they can be
activated by knee or thigh pressure. They are commonly found in location where
personnel usually perform their duties from a seated position.
21.10 Foot Button – like the foot rail permit alarm activation safely while both
hands remain clear in view of the robber.
21.11 Double Squeeze Button – pressure is required on both side of the
device and therefore the probability of accidental alarm is reduced.
23. Fire Alarms - devices installed to help detect fires or detect anything that causes fire
such as smoke or unusual rising of a temperature.
23.1 Automatic Sprinkling System – an integrated network of hydraulically designed
piping installed in a building structure or area with outlets arranged in a systematic
pattern which discharges water when activated by heat or combustion. Automatic
sprinkler – is a type of built-in sprinklers which works by the increase of room
temperature and which automatically operates the system to put out the fire. It
goes into action when the fire starts and those will open are directly above the fire.
l. Wet Pipe System- is a fully charge with water coming from reliable
water supply. The piping has water with pressure
ll. Dry pipe system - the pipes are filled with air under pressure which
holds the water at a valve located in a room.
23.2 Fire Pumps - is a part of fire sprinkler system’s water supply and powered by
electric, diesel or steam. It is either connected to the public underground water
piping, or a static water source. (river, tank, reservoir, lake)
a 62
23.3 Standpipes - located inside the building from lowest to the top floor with water
under pressure for use in case of fire.
23.4 Fire hydrant - Located in installations or street where fire hose is connected so
water with pressure will be available to put out fire.
23.5 Portable hand extinguisher - Fire fighting equipment which can be portable or
in a cart that is used to put out fire depending on the contents to extinguish certain
types of fire. This is the most important and useful piece of fire fighting equipment
in a plant, building or facility.
a 62
23.6 Alarm system - Equipped with detection systems that will transmit an alarm.
Some detectors are designed to respond to smoke and others to heat.
24. Fire Detection System - A system that provides sensor in fire-prone areas in
building whereby smoke or heat will actuates these strategically located sensors or
automatic fire detectors so that alarm is automatically sounded warning the
employees and summoning fire fighting units.
25. Smoke Detectors - these detectors trigger an alarm ahead of the heat-actuated
device or detector. Smoke detectors are classified into the following types.
a 62
Photo taken from http://bhadrafiresafety.blogspot.com/2012/12/ionization-vs-
photoelectric.html
a 62
Photo taken from http://bhadrafiresafety.blogspot.com/2012/12/ionization-vs-
photoelectric.html
26. Protective Locks and Key Control and Protective Cabinets - Lock is one of the
most widely used physical security devices in the asset protection program of an
a 62
installation. It complements other physical safeguards of the installation against any
possible surreptitious entry.
26.1 Lock - is defined as a mechanical, electrical, hydraulic or electronic device
designed to event entry into a building, room, container or hiding place.
26.2 Key – instrument for locking and unlocking: a metal bar with notches or grooves
that, when inserted into a lock and turned, operates the lock’s mechanism
26.3 Padlock – a portable and detachable lock having a sliding hasp which passes
through a staple ring or the like and is then made fast or secured.
26.4 Peterman – an English term used to describe a lock picker
27.2 Padlock - a portable and detachable lock having a sliding hasp which passes
through a staple ring and is then made fasten or secured.
27.3 Combination Lock - instead of using the key to align tumblers, the combination
mechanism uses numbers, letters or other symbols as reference point which
enables an operator to align them manually.
a 62
27.4 Code-Operated Lock - a type of lock that can be opened by pressing a series
of numbered button in the proper sequence.
27.5 Electrical Lock - a type of lock that can be opened and closed remotely by
electrical means.
a 62
27.6 Card-opened Lock - a type of lock operated by coded card.
28. What is Key? It is a device which is used to open a door. Consists of two parts: the
blade which is inserted into the lock, and the bow, left protruding so that the torque
can be applied. The blade of a key is normally designed to open one specific lock,
although master keys are designed to open sets of similar locks.
28.1 Change key - a specific key, which operates the lock and has a particular
combination of cuts which match the arrangement of the tumblers in the lock.
28.2 Sub-master key - a key that will open all the lock within a particular area or
grouping in a given facility.
28.3 Master key - a special key capable of opening a series of lock.
28.4 Grand Master Key - a key that will open everything in a system involving two or
more master key groups.
29. Key Control. Once an effective key control has been installed, positive control of all
keys must be gained and maintained. This can be accomplished only if it is
established in conjunction with the installation of new locking devices.
29.1 Key Cabinet - a well-constructed cabinet will have to be procured. The cabinet
will have to be of sufficient size to hold the original key to every lock in the system.
It should be secured at all times.
29.2 Key Records - some administrative means must be set up to record code
numbers and indicates to whom keys to specific locks have been issued.
29.3 Inventories - periodic inventories will have to be made of all duplicate and
original keys in the hands of the employees whom they have been issued.
29.4 Audits – in addition to periodic inventory, an unannounced audit should be
made of all key control records and procedures by a member of management.
29.5 Daily Report - should be made to the person responsible for key control from
the personnel department indicating all persons who have left or will be leaving
the company. In an event that a key has been issued, steps should be initiated to
insure that the key is recovered.
30.3 File Room - a cubicle in a building constructed a little lighter than a vault but of
bigger size to accommodate limited people to work on the records inside. The file
room should at most be 12 ft. high. It must have a watertight door and at least fire
proof for 1 hour.
31. Security Survey - a physical security is an in-depth analysis to determine the extent
of security measures, which will be needed for protecting the personnel, property, and
a 62
information. It is also known as security audit which is actually a fact-finding probe to
determine a plant’s adequacy and deficiency in all aspects of security, with the
corresponding recommendations. In the field of police and military intelligence,
Security survey is defined as a counterintelligence service to assist heads of office in
determining the security measures required to protect key installations from possible
sabotage, espionage, subversion, and unauthorized disclosures of, or access to,
classified information or material contained therein.
Self-Help: You can also refer to the sources below to help you further
understand the lesson
a 62
Ajero J.M. (2014). Industrial and Corporate Security Management. Wiseman’s Books Trading.
Quezon City Philippines.
Let’s Check
Let us try the following activities to check your understanding in this unit.
Activity 1. Identification. In the space provided, write the term/s being asked in the following
statements: (One point each)
1. It is any physical structure whether natural or man-made capable of
restricting, deterring, delaying or preventing illegal and unauthorized access to an installation.
2. These barriers are usually shepherd dogs trained for and used as
guards.
3. The broadest branch of security which is actually a system of barriers
placed between potential intruders and the matters to be protected.
4. These barriers include mountains, cliffs, canyons, ravens, seas,
marshes, deserts, or terrain difficult to traverse.
5. A medium of structure which defines the physical limits of an
installations or area to restrict or impede access thereto.
6. It is an unobstructed area maintained o both sides of the perimeter
barrier.
7. These are independent structures designed to control physical and
visual access between outside areas.
8. Employment of mechanical, electrical, electronic energy imposes a
deterrent to entry by the potential intruder or to provide warning to guard personnel.
9. Additional protective measures normally provided at main perimeter
entrances to secure areas located out-of-doors, and manned by guards on full time basis.
10. A type of protective lighting being used in prisons and correctional
institutions to illuminate walls and outside barriers.
11. A stand-by lighting which can be utilized in the event of electrical
failure, either due to local equipment or commercial power failure.
12. Similar to continuous lighting but in turned on manually or by special
device or other automatic means, when there is suspicion of entry.
13. This system consists of ringing up a visual or audible alarm near the
object to be protected.
14. A kind of alarm wherein a visible or an invisible beam is emitted and
when this is disturbed or when an intruder breaks contact with the beam, it will activate the
alarm.
15. A type of protective alarm system where the central station is located
outside the installation.
Activity 2. True or False. In the space provided, write T if the given statement is true and F if
false. (One point each).
a 62
1. Safe are bigger than vault but smaller than security file room.
2. The master key is a key that could open all the lock within a particular area or
grouping in a particular facility.
3. Peterman is an English term used to describe a lock picker.
4. File room is made of steel at least 6 inches in thickness; the vault walls, ceiling, floor
reinforce concrete at least 12 inches in thickness and the vault must be resistive to fire up to 6
hours.
5. The master key is a special key that is capable of opening a series of locks.
Let’s Analyze
Let us try the following activities to know how deep your understanding about the topics
of this unit. At this juncture, you will be required to ELABORATE your answers about the
following questions:
1. Which type of smoke detector do you prefer to use in your establishment and why?
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
2. Which do you think is the better type of fence? Solid fence or full-view fence? And why?
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
a 62
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
In a Nutshell
In this part you are going to jot down what you have learned in this unit. The said
statement of yours could be in a form of concluding statements, arguments, or perspective you
have drawn from this lesson. I have indicated my arguments or lessons learned.
1. One barrier is not enough. Therefore, we have this so called defense in depth meaning
barrier after barrier. This is of great advantage and a must so that if one barrier will be
penetrated there will still be other barriers protecting the things/ installation to be
protected and it would lessen the opportunity of the intruder to execute his/her plan.
2. There are two types of fences: sold and full-view fence. Each type has its advantages
and disadvantages. Choosing what type of fence to be used depends on the type of
installation. Full-view fence is commonly used in residential area or houses while solid
fence is commonly used in factories, warehouses so that inside activities will not be seen
outside.
4.
5.
Q&A List
In this section you are going to list what boggles you in this unit. You may indicate your
a 62
questions but noting you have to indicate the answers after your question is being raised and
clarified. You can write your questions below.
Questions/Issues Answers
1.
2.
3.
4.
5.
Keywords Index
Audio Detection Device Low level security
Audits Luminous
Auxiliary System Non-surreptitious entry
Card-opened Man-made Barriers
Central Station System Master key
Change key Maximum security
Clear zone Medium Security
Code-Operated Metallic Foil or Wire
Combination Lock Minimum security
Continuous Inspection Movable lighting
Controlled lighting Mutually Supporting Fixed Post
Daily Report Natural Barriers
Defense in depth Padlock
Dial Alarm System Patrol (Roving)-
Double Squeeze Button Perimeter Barrier Openings
Electric Eye Device Perimeter Guards
Electrical Lock Perimeter Guard Employment
Electromagnetic Fence Personal Inspection
Emergency lighting Peterman
Employing guards as patrols Physical Security
Enemy agents must access Portable hand extinguisher
Energy barriers Protective Alarms
Enunciator Protective Cabinets
a 62
Fenced Perimeter Lighting Protective lighting
Fences Protective Locks
File Room Propriety System
Fire Alarms Safe
Fire Detection System Searchlights
Fire hydrant Second line of defense
First line of defense Security Inspection
Fixed post Security Survey
Floodlights Security Lightings
Flood lighting Sidewalk elevators
Follow-up Survey Sign and Notices or Control Sign
Foot Button Smoke Detectors
Foot Rail Activator Special Survey
Formal Inspection Standpipes
Full-view Fence Stand-by Lighting
Gate House Lighting Stationary Luminary (Continuous)
Gates and doors Street lights
Glare-projection type Structural barriers
Grand Master Key Structured Inspection
High level security Solid Fence
Human barriers Space and Motion Detectors
Informal Inspection Sub-master key
Initial Survey Supplemental Survey
Installation Surreptitious Entry
Intensity Third line of defense
Inventories Top guard
Key Topping-up Lighting
Key Control Towers or Guard Towers
Key Operated Mechanical Lock Utilities openings
Key Records Unstructured Inspection
Knee or Thigh Button Vault
Levels of Physical Security Guard control station-
Line of Physical Defense Vibration Detection Device
Local Alarm-by-chance System Wire fence
Local Alarm System Windows and similar openings
Lock
a 62
Big Picture
Week 4-5: Unit Learning Outcomes (ULO): At the end of the unit, you are expected to
Metalanguage
The following are terms to be remembered as we go through in studying this unit. Please
refer to these definitions as supplement in case you will encounter difficulty in understanding the
basic concepts of special crime investigation.
Essential Knowledge
Personnel Security includes all the security measures designed to prevent unsuitable
individuals or persons of doubtful loyalty to the government, from gaining access to classified
matter or to any security facility, and to prevent appointment, or retention as employees of such
individuals. The Security Chain: Personnel security is the “weakest link” in the security “chain”.
a 62
This weakness can be best minimized or eliminated by making the personnel security conscious
through good training program. Security depend the action of the individuals. The superior must
instruct his subordinates so that they will know exactly what security measures to take in every
instance, a safe will not lock itself. An individual must be properly instructed and must do the
locking.
a 62
check the lists.
3.3C Passes and badges reported lost should be validated and security at
entrance be informed through conspicuous posting.
Components of BI:
a 62
Applicant’s name Foreign travel history
Organization membership Citizenship
Date of Birth Physical data
Neighborhood check Credit records
Present residence address Criminal records
Character references Educational history
Personal history statement Applicants signature
Marital history Date of application
Residence history
3.7 Insider
An insider is someone (a permanent, temporary or contract worker) who
exploits, or has the intention to exploit, their legitimate access to assets for
unauthorized purposes. Insider motivations vary greatly and are often a
combination of factors which can be hard to determine. Examples include
political or religious ideology, revenge, notoriety and financial gain or even fear
or coercion (where external pressure is exerted on an employee).
3.7A Innocent Insider – an employee who causes damage to an
organization through carelessness or ineptitude.
a 62
candidate. Screening is often done to determine if employees can be trusted to
manage financial resources or protect sensitive or confidential information.
a 62