0% found this document useful (0 votes)
122 views7 pages

Chapter 4

The document discusses integrated security systems and their importance. It explains that integrated security allows companies to centrally manage access control, surveillance cameras, and other systems from one location. Integrated systems provide benefits like efficiency, real-time monitoring, loss prevention, and increased productivity. The document then describes various physical security measures, including perimeter barriers, fences, lighting, and multiple lines of physical defense to protect company assets.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
122 views7 pages

Chapter 4

The document discusses integrated security systems and their importance. It explains that integrated security allows companies to centrally manage access control, surveillance cameras, and other systems from one location. Integrated systems provide benefits like efficiency, real-time monitoring, loss prevention, and increased productivity. The document then describes various physical security measures, including perimeter barriers, fences, lighting, and multiple lines of physical defense to protect company assets.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

CHAPTER 4

CHAPTER CESCRIPTION
This chapter presents the various security systems that are interlinked with each other in the so called
“security chain”. It provides information on the importance of integrating security systems as a bundle
of protecting company assets from risks, harm or losses.

PRELIMINARY NOTE
Integration means that security managers can create a tailored-fit security system within their
respective facilities, incorporating products to control access and security across one or many sites at
local, national and even global levels. 

INTEGRATED SECURITY SYSTEMS


Integrated Security System-is the synergy of the system in an installation linked to other products
recognition and system, such as CCTV, automatic number plate recognition and key lockers and
personnel programs. The security system acts as a hub that allows the integration and operation of all
systems from as one place such as well as monitoring real-time event via CCTV, controlling access to
assets and areas via HR and active directory systems and tracking assets and personnel as needed.

PURPOSE AND IMPORTANCE OF INTEGRATING SECURITY SYSTEM


An integrated security system provides flexibility to incorporate what is needed only for ease and
comfortable use. Integrated system means you can manage all aspects of security and access from one
place through one program. This is usually something you can control remotely, often via an app on
your smartphone to give you extra ease of use. It is also easy to run reports, make changes, view
previous changes and by whom.

1. Efficiency-an integrated security in any industry will allow businesses to flourish more
effectively and efficiency.
2. Centralization- integrated security systems allow business security operations to become more
centralized.
3. Loss Prevention- no matter what kind of industry one works in, they always have to prepare for
external theft. Whether internal theft or external theft, it can be over whelming.
4. Real Time Monitoring- with multiple security systems, business management teams are able to
see what is going on with in their facilities and areas of work instantly, if needed. This also
allows business owners to monitor their employee activities as it is one of the most essential
points in protecting their business from unwanted actions at the workplace.
5. Conflict Resolution- integrated security systems come with a package of video surveillance,
access control, intrusion alarms, and uniformed guard services. All of this element will come
forth if a problem were to arise in a workplace, whether it will be external \internal burglary,
attempted break-ins or just about any security threat that can occur at a business.
6. Productivity- an integrated security system is a guarantee to boosting productivity in the
workspace. Study revealed that that employee monitoring is being used to increase customer
satisfaction, improve employee performance and enhance productivity.
7. Business Savings- having an integrated system will allow business to save money and be
protected. Otherwise, in the case of the theft, burglary or robbery, the business owners\
management team would be held liable for all the losses with nowhere to turn to.

PHYSICAL SECURITY SYSTEM


Physical security measures are being used to define, protect and monitor property rights and assets.
These measures consist of barriers and devices that would detect, impede and prevent an authorized
access to equipment, facilities, material, and document and to safeguard them against espionage,
sabotage, damage and theft.

Physical security has three important elements: 

 the obstacles to frustrate trivial attackers and delay serious ones; alarms, lighting, CCTV and 
 guard patrols to make it likely that attacks will be noticed, 
 and security response to repel, catch or frustrate attackers when an attack is detected.

FOUR LAYERS OF PHYSICAL SECURITY


1. Environmental Design- the initial layers of security for a campus, building, office, or physical
space uses environmental design to deter threats.
2. Mechanical and Electronical Access Control- includes gates, doors, and locks.
3. Intrusion detection- monitors for attacks. It is less preventative measure and more of a
response measure.
4. Video Monitoring-are more useful for incident verification and historical analysis.

Physical access controls are implemented to prevent unauthorized entry to your computer facility or
remote terminal areas.

Physical access to data files and media libraries such as magnetic disk, tape files, microforms, and
so on to authorized only to those personnel requiring access to perform their job.

Natural disasters must be prevented, controlled, and minimized to extent economically feasible by the
use of detection equipment such as heat sensors, smoke detectors, extinguishing systems, and well-
conceived and tested contingency plan.

PHYSICAL BARRIERS
A barrier is any structure or physical device capable of restricting deterring, delaying, illegal access, to
an installation.

       Generally, a barrier is use for the following purposes:

1. Define the physical limits of an area.


2. Create a physical and psychological deterrent to unauthorized entry.
3. Prevent penetration therein or delay intrusion, thus, facilitating apprehension of intruders.
4. Assist in more efficient and economical employment of guards.
5. Facilitate and improve the control the vehicular traffic.

TYPES OF PHYSICAL BARRIERS


1.Natural barriers - it includes bodies of waters, mountains, marshes, ravines, deserts or other terrain
that are difficult to traverse.

2. Structural barriers – these are features constructed by man regardless of their original intent that
tends to delay the intruder.

3. Human barriers – person being used in providing and guarding system by the nature of their
employment and location, fulfill security functions.

4. Animal barriers – animals are used in partially providing a guarding system. Dogs are usually
trained and utilized to serve as guard dogs.

5. Energy barriers – it is the employment of mechanical, electrical, electronic energy imposes   a


deterrent to entry by the potential intruder or to provide warning to guard personnel.

PERIMETER SECURITY
The main purpose of perimeter barrier is to deny or impede access or exit of unauthorized
person. Basically, it is the first line of defense of an installation. This is maybe in the form of fences,
building walls or even bodies of water. The function and location of the facility itself is usually
determine the perimeter of the installation.

Lines of Physical Defense


First line – includes perimeter fence or barrier

Second line – include doors, floors, windows, walls, roofs and grills and other entries to the buildings.

Third line – include storage systems like steel cabinets, safes, vaults and interior files.

PERIMETER FENCES
A fence is a freestanding structure design to restrict or prevent movement across a boundary. It is
generally distinguished from a wall by the lightness of its construction:

TYPES OF FENCES
Solid fence – constructed in such a way that visual access through the fence is denied. Its advantage is
that it denies the opportunity for the intruder to become familiar with the personnel, activities and the
time scheduled of the movements of the guards in the installation.

Full-view fence – it is constructed in such a way that visual access is permitted through the fence. Its
advantages are that it allows the roving patrols and stationary guard to keep the surrounding area of the
installation under observation.

Additional Protective Measures


Top Guard – additional overhang of barbed wire placed on vertical perimeter fences upward and
outward with a 45-degree angle with 3 to 4 strands of barbed wires spaced 6 inches apart. This
increases the protective height and prevents easy access.

Guard Control Stations – this is normally provided at main perimeter entrances to secure areas
located out-of-doors and manned by guards on full time basis.

Tower Guard – this is a house-like structure above the perimeter barriers. The higher the tower the
more visibility it provides.

Barrier Maintenance – Fencing barriers and protective walls should always be regularly inspected by
security. Any sign or attempts to break in should be reported for investigation.

Protection in Depth –The depth itself protection Reduction of access roads, and sufficient notices to
warm intruders should be done. Use of animals, as guards and intrusion device, can also be good as
barriers.

Sign and Notices – “control signs” should be erected where necessary in the management of
unauthorized ingress to preclude accidental entry. Signs should be plainly visible and legible from any
approach and in an understood language or dialect.

PROTECTIVE LIGHTINGS  
Protective lightning is the single most cost-effective deterrent to crime because it creates a psychological
deterrent to the intruders.
Purpose of Protective Lightning
 It provides sufficient illumination to the areas during hours of darkness.

 Lightning can help improve visibility so that intruder can be seen and identified, and, if possible
apprehended. It serves as deterrent to would-be thieves.

Types of Protective Lightning


Continuous lighting – the most familiar type of outdoor security lightning, this is designed to provide two
specific results: glare projection or controlled lighting. It consists of a series of fixed luminaries at range to
flood a given area continuously during the hours of darkness.

Glare projection type – it is being used in prison and correctional institutions to illuminate walls and
outside barriers.

Controlled lighting – it is generally employed where, due to surrounding property owners, nearby
highways or other limitations, it is necessary for the light to be more precisely focused.

Standby lighting – it is design for reserve or standby use or to supplement continuous systems.

Movable or portable lighting – this system is manually operated and is usually made up of movable
search or floodlights that can be located in selected or special locations which will require lighting only for
short period of time.

Emergency lighting – this system is used in times of power failure or other emergencies when other
systems are in operative.
GENERAL TYPES OF LIGHTING SOURCES
1. Incandescent Lamp-it is the least expensive in terms of energy consumed and has the advantage of
providing instant illumination when the switch is on.

2. Mercury Vapor Lamp-it is considered more efficient that the incandescent and used widespread in
exterior lighting. This emits a purplish-white color, caused by an electric current passing through a tube
of conducting and luminous gas.

3. Metal Halide-it has similar physical appearance to mercury vapor but provides a light source of
higher luminous efficiency and better color rendition.

4. Fluorescent-this provides good color rendition, high lamp efficiency as well as long life. However,
it cannot project light over long distance and thus are not desirable as flood type light.

5. High Pressure sodium vapor-this has gained acceptance for exterior lighting of parking areas,
roadways, buildings and commercial interior installations. Constructed on the same principle as
mercury vapor lamps, they emit a golden white to light pink color and this provide high lumen
efficiency and relatively good color rendition.

TYPES OF LIGHTING EQUIPMENT


1. Floodlights-these can be used to accommodate most outdoor security lighting needs including the
illumination of boundaries, fences and buildings and for the emphasis of vital areas or building.

2. Streetlights- these are lighting equipment received the most widespread notoriety for its value in
reducing crime.

3. Search Lights- these are highly focused incandescent lamp and are designed to pinpoint potential
trouble spots.

4. Fresnel Lights-these are wide beam units, primary used to extend the illumination in long,
horizontal strips to protect the approaches to the perimeter barrier. Fresnel projects a narrow, horizontal
and from 15 to 30 degrees in the vertical plane.

PROTECTIVE ALARM
Protective alarm is one of the important barriers in security. It assists the security in detecting,
impeding or deterring potential security threat in the installation. Its function is to alert the security
personnel for any attempt of intrusion into a protected area, building or compound.

BASIC PARTS OF ALARM SYSTEM

1. Sensor or Trigger Device-it emits the aural or visual signals or both.


2. Transmission Line- a circuit, which transmit the message to the signaling apparatus.
3. Annunciator-the signaling system activates the alarm.

PROTECTIVE ALARM SYSTEM

1. Central Station System – a type of alarm where the control station is located outside the plant
or installation.
2. Proprietary system – centralized monitor of the proprietary alarm system is located in the
industrial firm itself with a duty operator.
3. Local Alarm – This system consists of ringing up a visual or audible alarm near the object be
protected
4. Auxiliary alarm – company-owned alarm system with a unit in the nearest police station so that
in case of need, direct call is possible.

KINDS OF ALARMS

1. Audio Detection Device-it will detect any sound caused by attempted force entry. A supersonic
microphone speaker sensor is installed in walls, ceilings and floors of the protected area.
2. Vibration Detection Device-it will detect any vibration caused by attempted force entry. A
vibration sensitive sensor is attached to walls, ceilings and floors of the protected area.
3. Metallic Foil Wire- it will detect any action that moves the foil or wire. An electrically charge
strips of tinfoil or wire. An electrically charge strips of tinfoil or wire is used in the doors,
windows or glass surfaces of the protected area.
4. Laser Beam Alarm-a laser emitter floods a wall or fencing with a beam so that when a physical
object disturbs this beam, an alarm is activated 
5. Photoelectric or electric Eye Device-an invisible/visible beam is emitted and when this is
disturbed or when intruder breaks contact with the beam; it will activate the alarm.

LOCKS AND KEY CONTROL


A lock is defined as mechanical, electrical; hydraulic or electronic device design to prevent entry into
building, room, container or hiding place. Lock is one of the most widely used physically security
devices in the asset protection program of an installation.

KEYING SYSTEMS
A key is a device used to open door. A key consists of two parts: the blade which is inserted into the
lock, and the bow, left protruding so that torque can be applied.

IDENTIFICATION AND MOVEMENT CONTROL


In every installation, the use of protective barriers, security lighting, communication and electronic
hardware provides physical safeguard, but these are insufficient to maximize the effort of the guard
force.

The most practical and generally accepted in personnel identification is the use of identification cards
badges or passage.

Personnel Identification
The use of practical personal recognition, artificial recognition such as the use of identification cards,
passes, passwords, etc.

Badge and pass Control 


The system should have a complete record of all badges and identification cards issued, returned
mutilated or lost by serial number and cross-indexed alphabetically.

Visitors Movement Control


Security should establish proper methods of establishing the authority for admission of visitors as well
as the limitation thereat. This security measure would depend on the sensibility of the installation, but
could include the following:

Visitor’s logbook-all visitors to any facility should be required to identify themselves and should be
given a visitor’s ID by the security. Visitor’s logbook should be filled up with the named visitors,
nature and duration of visit.

Photograph-taking of photographs should also be considered. Extreme caution must be exercised in


areas where classified information is displayed to preclude unauthorized taking of pictures of the
installation. If a visitor has camera and it is prohibited to take picture, said camera should be left in the
care of security with corresponding receipt.

Escort- if possible, visitors should be escorted by the security to monitor their activity within the
establishment and guide them where to go.

Visitor entrances- separate access for visitors and employees of the establishment should be provided.

Time traveled- if there is a long delay or time lapse between the departure and arrival, the visitors may
be required to show cause for the delay.

Package Control
Every facility must establish a system for the control of package entering or leaving the premises. Since
the transporting of packages through the portals is a fact of life, people entering or leaving the
installation premises should be dealt with the following in order to prevent theft and misappropriation
of company properties.
Vehicle Control
Vehicular traffic within the boundaries of any facility must be carefully controlled for safety as well as
to control the transporting of pilfered goods from the premises. Privately owned vehicle of
personnel/visitor should be registered and are subject to the identification and admittance procedure.

Building access control


At any physical barrier, a security system must possess the ability to distinguished among authorized
persons, unauthorized visitors, and other unauthorized persons. This is to assist the security personnel
protects sensitive area and information within the installation.

DOCUMENT AND INFORMATION SECURITY


In every installation, document and information are dispensable for their daily operation and activities,
be it in the form of a paper, film, and magnetic media or in the computer system. Once there is a
leakage in the contents of company’s document and information, the business operational stability is at
stake. It may lead to disclosure due to bankruptcy. The leakage of document and information cost
government, business industry alike, billions of pesos. Protection of document and information entails a
massive task on the part of the executives and the staff of the installation.

Document Security is the protection of records from its entire document life cycle.

Standard Rules – the authority responsibility for the preparation and classification of classified matter
rest exclusively with the originating office.

DOCUMENT SECURITY SYSTEMS


Documents Security is that aspect of security that involves the application of security measures for the
protection and safeguarding classified information.

Security Clearance is the certification by a responsible authority that the person described is cleared
for access to classified matter the appropriate level.

Information Security 
Information security means protecting information and information systems from unauthorized access,
use, disclosure, disruption, modification, or destruction.

The terms information security, computer security and information assurance are frequently used
interchangeable. These fields are interrelated and share the common goals of protecting the
confidentiality, integrity and availability of information.

PERSONNEL SECURITY
Among the major aspects of security, personnel security is considered as the most important. The
reason is that security involves people, both an asset to be protected and at the same time a source of
security threats.

Personnel Security refers to those practices, technologies and/or services used to ensure that personnel
security safeguards are applied.

Sensitive Data/Information refers to critical information for which the unauthorized access, loss,
misuse, modification, or improper disclosure could negatively impact the ability of the entity or agency
to provide services and benefits to its customers.

Confidential Data/Information refers to the information that involves the privacy to which


individuals are entitled by law. This information may only be disclosed to those individuals that are
authorized and have a need to review the data or information.

Personnel Security Investigation (PSI) is a process of inquiry into the character, reputation,
discretion, integrity, morals and loyalty of an individual to determine the suitability for appointment or
access to classified matter.

Background Investigation serves to verify information on the application form and to obtain other
information pertinent to the decision to employ. It could be in the form of partial background
investigation or complete background investigation. Background Checks, Vetting and Profiling
Local Agency Check (LAC) is background investigation activity where the sources information
involves only the local agencies in the community such as the local government units such as
clearances from the barangay, city or municipality, local police, and the courts.

National Agency Check (NAC) is also an investigation activity, but the sources information involves
clearance from national government units.

Positive Vetting – is the process of inspecting or examining with careful thoroughness. The essence of
vetting is that it is personal interview conducted under stress.

Security Profiling – is a process whereby a subject reaction in a future critical situation is predicted by
observing his behavior, or by interviewing him, or analyzing his responses to a questionnaire, such as
an honesty test.

Deception Detection Techniques – this is a process of using devices in detecting deception during the
interview stage. This includes the use of a Polygraph, Psychological stress Evaluator and Voice
Analyzer.

Financial and Lifestyle Inquiry – this type of investigation seeks to gather information on income and
mode of living, sometimes referred to as earning-to-debt ratio.

Undercover Investigation – this is the placement of an agent in a role in which the agent’s true
identity and role remains unknown in order to obtain information for criminal prosecution or for
recovery or limitation of assets losses.

Exit Interview – this is a valuable tool because it gives departing employees an opportunity to list
grievances. It offers security managers an opportunity to learn of problems not previously known.

You might also like