Powerpoint Intro To Industrial Security Concepts
Powerpoint Intro To Industrial Security Concepts
Powerpoint Intro To Industrial Security Concepts
INDUSTRI A L S EC UR I T Y
CONCEPTS
IA NA JOY CE M. O RGADO , RCRIM
D
SECURITY
A. WIRE FENCES
B.WALLS
C.BODIES OF WATER
A. WIRE FENCE
• WIRE FENCING CAN BE BARBED WIRE, CHAIN LINK OR CONCERTINA. CHAIN LINK ARE
FOR PERMANENT STRUCTURE, BARBED WIRE IS FOR SEMI PERMANENT, AND
CONCERTINA FOR THE LEAST PERMANENT AND ALSO CAN BE USED AS A TEMPORARY
ROAD BLOCK OR IMPEDIMENT DURING STRIKES AND CROWD CONTROL. WIRE
FENCES ARE ATTRACTIVE AND LOW IN MAINTENANCE COST; THEY OFFER LESS
HAZARD TO PEOPLE BECAUSE OF THE ABSENCE OF BARBS, AND THE OPENINGS ARE
SMALL TO PREVENT PASSAGE OF PILFERED ARTICLE.
B. BUILDING WALL
• WALLS, FLOORS, ROOF OR THEIR COMBINATION SERVE ALSO AS BARRIERS AND THEY SHOULD BE OF SUCH
CONSTRUCTION TO PROVIDE UNIFORM PROTECTION JUST LIKE WIRE FENCING.
• MASONRY WALLS AS PERIMETER BARRIER SHOULD HAVE THE SAME HEIGHTS AS THE CHAIN LINK AND SURMOUNTED
BY THE BARBED WIRE TOP GUARDS; IF THE HEIGHT OF THE MASONRY IS LESS THAN THE PRESCRIBED, ADDITIONAL
CHAIN LINK AS “TOPPING”
• WALL CAN BE MADE OF STONE SLABS LIKE ADOBE OR HOLLOW BOUND BY CONCRETE WITH POST AT REGULAR
INTERVALS TO PREVENT THE WALL FROM TOPPLING DUE TO WIND, OR SCOURING FACILITIES, SECURITY MUST SIT
DOWN WITH DESIGN ENGINEERS SO THAT AREA WHERE SENSITIVE ACTIVITY WILL BE DONE SHOULD BE GIVEN
SPECIAL EMPHASIS IN PROTECTIVE WALLS.
C. BODIES OF WATER
•BODIES OF WATER LIKE RIVER, LAKE, MARSH, CATARACT, SEA POND OR
ANY OTHER BODIES OF WATER FORMING A PART OF THE WALL, BUILDING
OR FENCING SHOULD NEVER BE CONSIDERED ADEQUATE NATURAL
PERIMETER BARRIER. ADDITIONAL SECURITY MEASURES LIKE WIRE
FENCE, CONCRETE WALLING, SECURITY PATROLLING AND FLOODLIGHTING
AT NIGHT MAY BE NECESSARY FOR THE PORTIONS OF THE PERIMETER.
TYPES OF FENCE
1. SOLID FENCE – CONSTRUCTED IN SUCH AWAY THAT VISUAL ACCESS THROUGH THE FENCE IS DENIED. ITS ADVANTAGE IS
THAT IT DENIES THE OPPORTUNITY FOR THE INTRUDER TO BECOME FAMILIAR WITH THE PERSONNEL, ACTIVITIES AND THE
TIME SCHEDULED OF THE MOVEMENTS OF THE GUARDS IN THE INSTALLATION. ON THE OTHER HAND, IT PREVENTS THE
GUARDS FROM OBSERVING THE AREA AROUND THE INSTALLATION AND IT CREATES SHADOW THAT MAY BE USED BY THE
INTRUDER FOR COVER AND CONCEALMENT.
b. DENIES THE INTRUDER THE OPPORTUNITY TO BECOME FAMILIAR WITH THE PERSONNEL ACTIVITIES, AND TIME
SCHEDULED OF THE MOVEMENT OF THE GUARDS ON THE INSTALLATION.
c. IT PREVENTS THE INSTALLATION GUARDS FROM OBSERVING THE AREA AROUND THE INSTALLATION.
d. A SOLID FENCE CREATES SHADOWS WHICH MAY BE USED BY THE INTRUDER FOR COVER AND CONCEALMENT.
TYPES OF FENCE
2. FULL-VIEW FENCE – IT IS CONSTRUCTED IN SUCH AWAY THAT VISUAL ACCESS IS PERMITTED THROUGH THE FENCE. ITS
ADVANTAGES ARE THAT IT ALLOWS THE ROVING PATROLS AND STATIONARY GUARD TO KEEP THE SURROUNDING AREA OF THE
INSTALLATION UNDER OBSERVATION. ON THE OTHER HAND, IT ALLOWS THE INTRUDER TO BECOME FAMILIAR WITH THE
MOVEMENTS AND TIME SCHEDULE OF THE GUARD PATROLS THEREBY ALLOWING HIM TO PICK THE TIME THAT IS ADVANTAGEOUS
ON HIS PART.
a. ROVING PATROLS AND STATIONARY GUARDS ARE ABLE TO KEEP THE AREA SURROUNDING THE INSTALLATION UNDER
OBSERVATION
b. IT DOES NOT CREATE SHADOWS WHICH WOULD PROVIDE COVER AND CONCEALMENT FOR THE INTRUDER
c. IT’S ALLOWING VISUAL ACCESS TO THE INSTALLATION, ITS PERSONNEL, ITS GUARDS; AND ITS ACTIVITIES
d. IT ALLOWS THE INTRUDER TO BECOME FAMILIAR WITH THE MOVEMENTS AND THE TIME SCHEDULE OF THE GUARDS
PATROL; THERE AFTER ALLOWING HIM TO PICK THE TIME FOR ATTEMPTING PENETRATION WHICH WOULD BE MOST
ADVANTAGEOUS TO HIM
TYPES OF FULL VIEW FENCE
1. CHAIN LINK FENCE.
c. THE MESH OPENINGS ARE NOT TO BE LARGER THAN 2 INCHES PER SIDE.
• ON THE OTHER HAND, THE USE OF COMMUNICATION EQUIPMENT IN THE INSTALLATION HELPS
SECURITY IN UPGRADING ITS OPERATIONAL EFFICIENCY AND EFFECTIVENESS.
THREE BASIC PARTS OF ALARM SYSTEM
• FOOT RAIL DO NOT ACQUIRE ANY OBVIOUS USE OF THE TELLER’S HAND AND THEIR
HANDS MAY KEPT IN FULL VIEW OF THE ROBBERS FOR REASON OF SAFETY, BECAUSE
FOOT RAIL CAN BE ACTIVATE VERY OBTRUSIVELY AND SAFELY THEN WILL FREQUENTLY
BE FOUND IN THE BANKS WHERE TELLERS NORMALLY OPERATE WHILE STANDING UP.
DISADVANTAGE
• THE SAME PENALTY SHALL BE IMPOSED UPON ANY PERSON WHO SHALL MAKE SUCH
TOOL. IF THE OFFENDER IS A LOCKSMITH, SHALL SUFFER THE PENALTY OF PRISON
CORRECCIONAL IN ITS MEDIUM AND MAXIMUM PERIOD.
ART 305 (REVISED PENAL CODE) FALSE KEY
• VAULT SHOULD NOT BE MADE PART OF THE WALL DUE TO MOISTURE AND CONDENSATION CAUSED BY TEMPERATURE
• STANDARD VAULTS, TO REDUCE DESTROYING OF TOO MUCH RECORD, SHOULD NOT BE MORE THAN 5, 000 CUBIC FEET
• THE VAULT MUST BE RESISTIVE UP TO 6 HOURS
3. FILE ROOM
• A CUBICLE IN A BUILDING
CONSTRUCTED A LITTLE
LIGHTER THAN A VAULT BUT OF
BIGGER SIZE TO ACCOMMODATE
LIMITED PEOPLE TO WORK ON
THE RECORDS INSIDE.
3. FILE ROOM
• THE FILE ROOM SHOULD AT MOST BE 12 FEET HIGH
• THE INTERIOR CUBAGE SHOULD NOT MORE THAN 10, 000 CUBIC FEET
• THE VENTILATION SHOULD BE THROUGH THE DOOR
• IT MUST HAVE A WATERTIGHT DOOR AND AT LEAST FIRE PROOF FOR ONE HOUR
• THE SUPPORTING STRUCTURE, THE WALLS, FLOOR AND ROOF SHOULD BE MADE
FIREPROOF
PERSONNEL IDENTIFICATION AND MOVEMENT CONTROL
1. PERSONAL RECOGNITION
2.ARTIFICIAL RECOGNITION – IDENTIFICATION CARDS,
PASSES, PASSWORDS, ETC.
USE OF PASS SYSTEM
1. SINGLE PASS SYSTEM – THE BADGE OR PASS CODED FOR AUTHORIZATION TO ENTER SPECIFIC AREAS
IS ISSUED TO AN EMPLOYEE WHO KEEPS IT IN HIS POSSESSION UNTIL HIS AUTHORIZATION IS
TERMINATES.
2. PASS EXCHANGE SYSTEM – AN EXCHANGE TAKES PLACE AT THE ENTRANCE OF EACH CONTROLLED
AREA. UPON LEAVING THE PERSONNEL SURRENDERS HIS BADGE OR PASSES AND RETRIEVE BACK HIS
BASIC IDENTIFICATION.
3. MULTIPLE PASS SYSTEM – THIS PROVIDES AN EXTRA MEASURE OF SECURITY BY REQUIRING THAT AN
EXCHANGE TAKE PLACE AT THE ENTRANCE OF EACH RESTRICTED AREA.
BADGE AND PASS CONTROL
1. THE SYSTEM SHOULD HAVE A COMPLETE RECORD OF ALL BADGES AND IDENTIFICATION
CARDS ISSUED, RETURN, MUTILATED OR LOST BY SERIAL NUMBER AND CROSS-INDEXED
ALPHABETICALLY.
2. THE SUPERVISOR FROM TIME TO TIME FOR ITS ACCURACY AND AUTHENTICITY SHOULD
CHECK THE LISTS.
3. PASSES AND BADGES REPORTED LOST SHOULD BE VALIDATED AND SECURITY AT
ENTRANCE BE INFORMED THROUGH CONSPICUOUS POSTING.
TYPES OF CONTROLLED AREA
1. CONTROLLED AREA – ARE THOSE AREAS WHERE ACCESS IS RESTRICTED AS TO ENTRANCE OR
MOVEMENT BY ALL AUTHORIZED PERSONNEL AND VEHICLES. IT SHOULD ADDITIONALLY MARKED BY A
FENCE OR OTHER BARRIER, AND ACCESS TO IT SHOULD LIMITED TO AS FEW GUEST AS POSSIBLE.
2. LIMITED AREA – ARE THOSE WITHIN THE CONTROLLED ARE WHERE A GREATER DEGREE OF SECURITY IS
REQUIRED.
3. EXCLUSION AREA – ARE USED ONLY FOR HANDLING AND STORAGE OF HIGH VALUE CARGO AND
CLASSIFIED DOCUMENTS. THE NUMBER OF PEOPLE AUTHORIZED TO ENTER THIS AREA SHOULD BE
STRICTLY LIMITED, AND THE AREA SHOULD BE UNDER SURVEILLANCE AT ALL TIMES.
TRAFFIC CONTROL SYSTEM
• CONTROLLING TRAFFIC IN AND OUT WITHIN A FACILITY IS ESSENTIAL TO
ITS SECURITY PROGRAM. PERIMETER BARRIERS, LOCKED DOORS AND
SCREENED WINDOWS PREVENT OR DETER THE ENTRY OF AUTHORIZED
VISITORS, BUT SINCE SOME TRAFFIC ESSENTIAL TO EVERY OPERATION, NO
MATTER HOW HIGHLY, CLASSIFIED IT MAYBE, PROVISION MUST BE MADE
FOR THE CONTROL OF THIS MOVEMENT.
TRAFFIC CONTROL SYSTEM
• SPECIFIC SOLUTION WILL DEPEND UPON THE NATURE OF THE BUSINESS, OBVIOUSLY
RETAIL ESTABLISHMENT, WHICH ENCOURAGE HIGH VOLUME TRAFFIC AND WHICH
REGULARLY HANDLE A GREAT DEAL OF MERCHANDISE BOTH IN AND OUT, HAVE A
PROBLEM OF A DIFFERENT DIMENSION FROM THE INDUSTRIAL OPERATION WORKING
ON A HIGHLY CLASSIFIED GOVERNMENT PROJECT. BOTH, HOWEVER, MUST WORK
FROM THE SAME GENERAL PRINCIPLE TOWARDS PROVIDING THE GREATEST POSSIBLE
SECURITY WITHIN THE EFFICIENT AND EFFECTIVE OPERATION OF THE JOB AT HAND.
PERSONNEL IDENTIFICATION
• THE MOST PRACTICAL AND GENERALLY ACCEPTED SYSTEM IS THE USE OF BADGES
AND IDENTIFICATION CARDS. GENERALLY SPEAKING, THIS SYSTEM DESIGNATES
WHEN AND WHERE AND HOW PASSES SHOULD BE DISPLAYED, AND TO WHOM, WHAT
IS TO BE DONE IN CASE OF THE LOSS OF THE PASS; PROCEDURE FOR TAKING THE
PASS FROM TERMINATING EMPLOYEES; AND A SYSTEM IN CANCELLATION AND
REISSUE OF ALL PASSES; EITHER AS A SECURITY REVIEW OR WHEN A SIGNIFICANT
NUMBER OF BADGE HAVE REPORTED LOST OR STOLEN.
PERSONNEL IDENTIFICATION
TO BE EFFECTIVE:
1. BADGE MUST BE TAMPER-RESISTANT, WHICH MEAN THAT THEY SHOULD BE PRINTED OR EMBOSSED ON A
DISTINCTIVE STOCK WITH A SERIES OF DESIGN DIFFICULT TO REPRODUCE
2. THEY SHOULD CONTAIN A CLEAR AND RECENT PHOTOGRAPH OF THE BEARER, PREFERABLY IN THE COLOR
3. THE PHOTOGRAPH SHOULD BE AT LEAST ONE INCH SQUARE AND SHOULD BE UPDATED EVERY TWO OR THREE
YEARS OR WHEN THERE IS ANY SIGNIFICANT CHANGE IN FACIAL APPEARANCE
4. SHOULD ADDITIONALLY CONTAIN VITAL STATISTIC SUCH AS DATE OF BIRTH, HEIGHT, WEIGHT, COLOR OF HAIR
AND EYES, SEX AND THUMBPRINTS.
VISITORS MOVEMENT CONTROL
•SECURITY SHOULD ESTABLISH PROPER METHODS OF
ESTABLISHING THE AUTHORITY FOR ADMISSION OF VISITORS AS
WELL AS THE LIMITATION THEREAT. THIS SECURITY MEASURE
WOULD DEPEND ON THE SENSIBILITY OF THE INSTALLATION, BUT
COULD INCLUDE THE FOLLOWING:
1. VISITOR’S LOGBOOK
• OF THE THREE MAJOR ASPECTS OF SECURITY, PERSONNEL SECURITY IS CONSIDERED AS THE MOST
IMPORTANT. THIS IS FOR THE SIMPLE REASON THAT SECURITY INVOLVES PEOPLE, BOTH AN ASSETS TO
BE PROTECTED AND AS SOURCE OF SECURITY THREATS. IT IS AN ACKNOWLEDGE FACT THAT LOSSES ARE
ATTRIBUTED MAINLY TO NEGLIGENCE OR ACTIVE PARTICIPATION OF EMPLOYEES, EITHER THROUGH
THEFT AND SABOTAGE. THIS EMPHASIZES THE NEED TO SET UP A SYSTEM OF HIRING THE PEOPLE FOR THE
COMPANY.
PURPOSE OF PERSONNEL SECURITY
1. TO INSURE THAT A FIRM HIRES THOSE EMPLOYEES BEST SUITED
FOR THE FIRM; AND
2.ONCE HIRED, TO ASSIST IN PROVIDING THE NECESSARY
SECURITY TO THESE EMPLOYEES WHILE THEY ARE CARRYING
OUT THEM FUNCTIONS.
SCOPE OF PERSONNEL SECURITY
a. LOYALTY
b. INTEGRITY
c. DISCRETION
d. MORALS
e. CHARACTER
f. REPUTATION
COMPONENTS OF COMPLETE BI
j. ORGANIZATION MEMBERSHIP
a. APPLICANTS NAME
k. NEIGHBORHOOD INVESTIGATION
b. DATE OF BIRTH
l. CHARACTER REFERENCE
c. PRESENT RESIDENCE ADDRESS m. EMPLOYMENT HISTORY
d. PERSONAL HISTORY n. MILITARY HISTORY
e. MARITAL HISTORY o. FOREIGN TRAVEL HISTORY
f. RESIDENCE HISTORY p. CRIMINAL RECORD
g. CITIZENSHIP q. CREDIT RECORDS
h. PHYSICAL DATA
r. APPLICANT’S SIGNATURE
s. DATE OF APPLICATION
i. EDUCATIONAL HISTORY
TYPES OF LOCAL AGENCY CHECK (LAC)
a.BARANGAY CLEARANCE
b.CITY OF MUNICIPAL CLEARANCE
c.LOCAL POLICE CLEARANCE
d.COURT CLEARANCE
TYPES OF NATIONAL AGENCY CHECK (NAC)
• PROPRIETARY INFORMATION IS INFORMATION THAT IN SOME SPECIAL WAY RELATES TO THE STATUS OR
ACTIVITIES OF THE POSSESSOR AND OVER WHICH THE POSSESSOR ASSERTS OWNERSHIP. IN THE
BUSINESS COMMUNITY, PROPRIETARY INFORMATION RELATES TO THE STRUCTURE, PRODUCTS OR
BUSINESS METHODS OF THE ORGANIZATION. IT IS USUALLY PROTECTED IN SOME WAY AGAINST CAUSAL
OR GENERAL DISCLOSURE. ALL PROPRIETARY INFORMATION IS CONFIDENTIAL, BUT NOT ALL
CONFIDENTIAL INFORMATION IS PROPRIETARY, FOR EXAMPLE, CONFIDENTIAL PERSONNEL DATA IN
EMPLOYEE FILES IN NOT CONSIDERED AS PROPRIETARY ALTHOUGH THE COMPANY TREATS IT AS
CONFINDENTIAL.
TYPES OF DOCUMENTS
• CLASS I – VITAL DOCUMENTS: IN THIS CATEGORY THESE ARE RECORDS THAT ARE IRREPLACEABLE, RECORDS OF
WHICH REPRODUCTION DOES NOT HAVE THE SAME VALUE AS THE ORIGINAL; RECORDS NEEDED TO RECOVER CASH,
TO REPLACE BUILDING, EQUIPMENTS, RAW MATERIALS, FINISHED PRODUCTS, AND WORK IN PROCESS AND RECORDS
NEEDED TO AVOID DELAY IN RESTORATION OF PRODUCTION, SALES AND SERVICES.
• CLASS II – IMPORTANT DOCUMENTS: THIS INCLUDES RECORDS THE REPRODUCTION OF WHICH WILL CLOSE
CONSIDERABLE EXPENSE AND LABOR, OR CONSIDERABLE DELAY.
• CLASS III – USEFUL DOCUMENTS: THIS INCLUDES RECORDS WHOSE LOSS MIGHT CAUSE INCONVENIENCE BUT COULD
BEV READILY REPLACED AND WHICH WOULD NOT IN THE MEANTIME PRESENT AN INSURMOUNTABLE OBSTACLE TO
THE PROMPT RESTORATION OF THE BUSINESS.
TYPES OF DOCUMENTS
• CLASS IV – NON-ESSENTIAL DOCUMENTS: THIS RECORDS ARE DAILY FILES, ROUTINE IN NATURE EVEN IF
LOST OR DESTROYED, WILL NOT AFFECTS OPERATION OR ADMINISTRATION. THIS CLASS REPRESENT THE
BULK OF RECORDS WHICH SHOULD NOT BE EVENT OF DISASTERS, THEY SHOULD, HOWEVER, BE KEPT IN
ORDINARY FILES READY FOR REFERENCE, IF NEEDED, AND USUALLY DISCARDED AFTER SOME PERIOD OF
TIME.
BASIC CONSIDERATION IN DOCUMENT AND
INFORMATION SECURITY
1. SECURITY OF INFORMATION IS BASED ON THE PREMISE THAT THE GOVERNMENT HAS THE RIGHT AND DUTY TO PROTECT
OFFICIAL PAPERS FROM UNWARRANTED AND INDISCRIMINATE DISCLOSURE;
2. THE AUTHORITY AND RESPONSIBILITY FOR THE PREPARATION AND CLASSIFICATION OF CLASSIFIED MATTERS REST
EXCLUSIVELY WITH THE ORIGINATING OFFICE;
3. CLASSIFIED MATTERS SHALL BE CLASSIFIED ACCORDING TO THEIR CONTENTS AND NOT TO THE CLASSIFICATION OF FILES IN
WHICH THEY ARE HELD OR ANOTHER DOCUMENT TO WHICH THEY ARE REFERRED;
4. CLASSIFICATION SHALL MADE AS SOON AS POSSIBLE BY PLACING APPROPRIATE MARKS ON THE MATTER TO BE CLASSIFIED;
5. EACH INDIVIDUAL WHOSE DUTIES ALLOW ACCESS TO CLASSIFIED MATTER OR EACH INDIVIDUAL WHO POSSESS KNOWLEDGE
OF CLASSIFIED MATTER WHILE IT IS IN HIS POSITION SHALL INSURE THAT DISSEMINATION OF SUCH CLASSIFIED MATTER IS
ON “NEED TO KNOW” BASIS AND TO PROPERLY CLEARED PERSONS ONLY.
TYPES OF PROPRIETARY INFORMATION
1. TRADE SECRETS – THIS CONSIST OF ANY FORMULA, PATTERN, DEVICE OR COMPILATION OF INFORMATION
WHICH IS USED IN ONE’S BUSINESS AND WHICH GIVES HIM AN OPPORTUNITY TO GAIN AN ADVANTAGE OVER
COMPETITORS WHO DO NOT KNOW OR USE IT. IT MAY BE A FORMULA FOR A CHEMICAL COMPOUND A
PROCESS OF MANUFACTURING, TREATING OR PRESERVING MATERIALS, A PATTERN FOR MACHINE OR DEVICE,
OR A LIST OF CUSTOMERS. IT DIFFERS FROM OTHER SECRET INFORMATION AS TO SINGLE OR EPHEMERAL
EVENTS. A TRADE SECRET IS A PROCESS OR DEVICE FOR CONTINUOUS USE IN THE PROTECTION OF THE
BUSINESS.
2. PATENTS – THIS IS A GRANT MADE BY THE GOVERNMENT TO AN INVENTOR, CONVEYING OR SECURING TO HIM
THE EXCLUSIVE RIGHT TO MAKE, USE, OR SELL HIS INVENTION FOR TERM OF YEARS.
PRIMARY DISTINCTIONS BETWEEN PATENTS AND
TRADE SECRETS