INDUSTRIAL SECURITY.pptx

Embed Size (px)

Citation preview

INDUSTRIAL SECURITY

INDUSTRIAL SECURITYSecurity and safety are the second level of the hierarchy of human needs according to Abraham Maslow. Both are on top of the physiological needs, which include air, food shelter, excretion among others. The need for security and safety encompasses the body, health, family, resources and property.

IntroductionIs a state or condition of being secured; there is freedom from fear, harm, danger, loss, destruction, or damages.

What is Security?Security guard is a person who offers or renders personal service to watch or secure either a residence or business establishment or both for hire or compensation

Security guard force is a group of force selected men trained or grouped into functional unit for the purpose of protecting operational processes from those disruptions which would impede efficiency or halt operation at a particular plant, facility, installation or special activityDifference between security guard and security guard forceTHE BASIC RESOURCES OF AN ORGANIZATIONRefers to the natural, physical, social, political and industry that surround the organization.This is classified as a base resource as it provides the opportunity and inspiration for the creation of an organization.

EnvironmentRefers to information or data about employees, policies, plans, projects, designs, patterns, business application software, production, sales and other business transaction data.It is the product of an idea created or perceived by human intelligence and imagination that is expressed in writing or orally. It is transmitted from the creator to another person who has the skill to concretize these ideas into products or services.InformationMAJOR AREA in SECURITYThis focus with the physical measures adopted to prevent unauthorized access to equipment, facilities, material and documents and to safeguard them against espionage, sabotage, damage, loss and theft.These measures consist of barriers and devices that would detect, impede and prevent unauthorized access to equipment.

WHAT IS PHYSICAL SECURITY?The type of access necessary will depend upon a number of a variable factors and therefore may be achieved in a number of ways.There is no impenetrable barrier.Defense-in depth is barriers after barriersDelay is provided against surreptitious (secret) and non-surreptitious entry.Each installation is different

PRINCIPLES OF PHYSICAL SECURITYCan be defined as those measures taken by an installation or unit to protect itself against sabotage, espionage, or subversion and at the same time provide freedom of action in order to provide the installation of the unit with the necessary flexibility to accomplish its mission.

WHAT IS PROTECTIVE SECURITY SYSTEMS?Industry security - a type of security to business groups engaged in industries like manufacturing, assembling, research and development, processing, warehousing and even agriculture. It may also mean the business of providing security.Hotel security a type of security applied to hotels where its properties are protected from pilferage, loss, damage and function in the hotel restaurant are not disturbed and troubled by outsiders or the guest themselves. This type of security employs hose detectives, uniforms, guard supervisor and insures that the hotel guest and their personal effects are safeguard.

The aspects of the protective security can be seen with application of the following:Bank security this type of security is concern with the bank operations. Its main objectives are the protection of bank cash assets, its personnel and clientele. Security personnel are trained to safeguard bank and assets while in the storage.VIP security a type of security applied for the protection of top-ranking officials of the government or private entity, visiting persons of illustrious standing and foreign dignitaries.

The aspects of the protective security can be seen with application of the following:School security a type of security that is concern with the protection of students, faculty member and school properties. Security personnel are trained to protect the school property from theft, vandals handling campus riot and detecting the use of intoxicated drugs and alcohol by the students.Supermarket or mails security a type of security which is concern with the protection of the stores, warehouses, storage, its immediate premises and properties as well as the supermarket personnel and customers.

The aspects of the protective security can be seen with application of the following:A barrier can be defined as any structures or physical device capable of restricting, deterring, delaying illegal access to an installation.

WHAT IS BARRIER?Defined the physical limits of an areaCreate physical and psychological deterrent to unauthorized entryPrevent penetrations there in or delay intrusion, thus, facilitating apprehension of intrudersAssist in more efficient and economical employment of guardsFacilitate and improve the control and vehicular traffic.

Generally, barriers are use for the following purposes:Natural barriers includes bodies of water, mountains, marshes, ravines, deserts or other terrain that are difficult to traverseStructural barriers these are the futures constructed by man regardless of their original intent that tends to delay the intruder.Human barriers persons being used in providing a guarding system or by the nature of their employment and location, fulfill security functions.Animal barriers animals are used in partially providing a guard system. Dogs are usually trained and utilized to serve as guard dogs.Energy barriers it is the employment of mechanical, electrical, electronic energy imposes deterrent to entry by the potential intruder or to provide warning to guard personnel.

Different types of barriersAny area in which personnel or vehicles are controlled for reasons of security.

What is Restricted Area?Restricted area is established to provide security for any installation or facilities and to promote efficiency of security operations and economy in the use of security personnel.Restricted area was established to permit different degrees of security within the same installation or facilities.

Importance of Restricted AreaExclusion area restricted area contains security interest to TOP SECRET matters, and which requires the highest degree of protectionLimited area control restricted area in which a lesser degree of security is required than in an exclusion area but security interest would be comprised by uncontrolled movement

Types of Restricted AreaIt is the protection of the installations inner and the immediate vicinity.

What is Perimeter Security?The main purpose of perimeter barriers is to deny or impede access or exit of unauthorized person.

Purpose of the Perimeter SecuritySolid Fence constructed such away the visual access through the fences is denied

Full-view Fence constructed in such away that visual access is permitted through the fence

Type of FencesChain link fenceBarbed wire fenceConcentrating wire fence

Types of Full-view FencesGates and DoorsSide-walks-elevatorsUtilities and openings

Different types of Perimeter Barrier Openings The idea that lighting can provide protection for people and facilities especially during darkness.

What is Protective Lighting?Continuous lightingStandby lightingMovable or portable lightingEmergency lighting

Types of protective lightingIncandescent lampMercury vapor lampMetal halideFluorescentHigh-pressure sodium vaporFloodlightStreetlight

General Types of Lighting SourcesProtective alarms are one of the important barriers in security.

What is Protective Alarm?Its function is to alert the security personnel for any attempt intrusion into a protected area, building or compound.

Functions of Protective AlarmSensor or trigger device it emits the aural or visual or bothTransmission line a circuit which transmit the message to the signaling apparatusEnunciator it is the signaling system that activates the alarm

Three basic parts of Alarm SystemCentral stationProprietary systemLocal alarmAuxiliary alarm

Types of Protective Alarm SystemAudio detection deviceVibration detection deviceMetallic foil or wireLaser beam alarm

Kinds of AlarmsIt is one of the most widely used physical security devices in the asset protection program of installationWhat is Protective Lock and Key Control?A lock is defined as mechanical, electrical, hydraulic or electronic devices. Designated to prevent entry to a building, room, container or hiding places

What is Lock?Key-operatedMechanical lockIt uses some sort of arrangement of internal physical barriers(wards tumblers) which prevent the lock from operating unless they are properly aligned . The key is the device used to align these internal barriers so that the lock may be operated.PadlockA portable and detachable lock having a sliding hasp which passes through a staple ring and is then made fasten or secureTypes of LocksCombination lock Instead of using the key align the tumblers the combination mechanism uses numbers, letters or the other symbols as reference point which enables an operator to align them manually.Code-operator lockA type of lock that can open by pressing a series of number in proper sequence.Electrical LockA type of lock that can be opened and closed remotely by electrical means.Card Operated LockA type of lock operated by a coded card.

Types of LocksChange keyA specific key which operate the lock and has particularly combination of cuts which match the arrangement of the tumbler in the lock.Sub-master keyA key that will open all the lock within a particularly area or grouping in a given facility.Grand master key A key that will open everything in a system two or more master key groups.Key controlOnce an effective key control has been installed, positively control of all keys must be gained and maintained. This can be accomplished only if it is establish in conjunction with the installation of new locking devices.

Types of Keys Key cabinet A well-contracted cabinet will have to e produced. The cabinet will have to of sufficient size to hold the original key to every lock in the system. It should be secured at all times.Key record Some administrative means must be set up to record code numbers and indicates to whom keys to specific locks have been issued.

The following methods can be used to maintained effective key control:Periodic inventories will have to e made of all duplicates and originals keys in the hands of employee whom they have been issued.

Inventories Audits In addition to periodic inventory, an unannounced audit should be made af all keys control records and procedures be a member of management.Daily ReportA daily report should be made to the person responsible for a key control from the personnel department indicating all persons who have left or will be leaving the company in the event that the key has been issued, steps The following methods can be used to maintain effective key control:Key and lock should be change at least once a year or every 12 months.Master key should not be mark identifying them as master key. Key should not be marked or should not identify doors of locks they open. Master key should be in minimum . When the key is lost , the circumstances should be investigated and lock should be immediately change. A key depositor for securing keys during non-working should be centrally located, locked and kept under supervision of the security personnel. Key issued in daily basis, or this issued for a specific on time purpose , should be accounted daily . Key should be counted and signed for by security supervisor at the beginning of each working day . When the key is lost, the circumstances should be investigated and set in writing . In some instance .if the lost key provides access to sensitive area , lock should be change. All keys should be inspected periodically.

Principles of key controlsArt. 304 (revised penal code) possession of picklocks or similar tools .Any person who shall without lawful cause have in possession of picklocks or similar tools especially to the commission of the crime robbery , shall be punishable by arrest to mayor in its minimum period. The same penalty shall be imposed upon any person who shall make such tool. If the offender is a locksmith, shall suffer the penalty of prison correctional in its medium and maximum period.Art.305 (RPC).false keyThe tool mentioned in the next proceeding articles genuine keys stolen to the owner Any key other than those intended by the owner for use in the lock forcibly opened by the offender .

RELATED LAWS REGULATING THE POSSESSION OR USE OF PROBIHITED KEYS OR SIMILAR TOOLS The final line defense at any facility is in the high security storage where papers , records, plans , or cashable instrument , precious metals or other especially valuable assets are protected . This security will be of a size and quantity, which the nature of the business dictates.In protecting property, it is essential to recognize that protective container are designed to secure against burglary or fire. Each type of equipment has a specialize function and it will depend on the owner of the facility which type has is going to use.

What is security cabinet ?1. SafeA metallic container used for the safekeeping of documents or small items in an office or installation. Safe can be classified as either robbery or burglary resistance depending upon the use and need.Its weight must be at least 750lbs. and should be anchored to a building structure.Its body should at least one inch thick steel.

Three Types of Security Cabinets 2. VaultHeavily constricted fire and burglar resistance container usually a part of the building structure used to keep and protect the cash, documents and negotiable instruments. Vaults are bigger than safe but smaller than a file room.The vault door should be made of steel at least 6 inches in thickness.The vault walls, ceiling, floor reinforce concrete at least 12 inches in thickness.The vault must be resistive up to 6 hours.

Three Types of Security Cabinets 3. File roomA cubicle in a building constructed a little lighter than a vault but of the bigger size to accommodate limited people to work on the record inside.The file room should at most 12 feet high.It must have a watertight door and at least fire proof for one hour.

Three Types of Security Cabinets Badge must be tamper-resistantThey should contain a clear and recent photograph of the bearerThe photograph should be at least 1 inch square and should be updated every two or three years or when there is a significant change in appearanceShould additionally contain vital statistics such as date of birth, height, weight, color of hair and eyes, gender and thumbprintsPersonnel Identification and Movement ControlPersonal recognitionArtificial recognition

Types of Personnel IdentificationSingle pass systemThe badge or pass coded authorization to enter specific areas is issued to an employee who keeps it in his possession until the authorization is terminatesPass exchange systemAn exchange takes place at the entrance of each controlled area. Upon leaving the personnel surrenders his badge or passes and retrieve back his basic identificationMultiple pass systemThis provides an extra measure of security by requiring that an exchange take place at the entrance of each restricted area.

Use of Pass SystemThe system should have complete record of all badges and identification card issuedThe supervisor required to check the badges from time to time to maintain accuracy and efficiency of the operationPasses and badges lost should immediately validated

Things to ponder under Badge and pass controlVisitors logbookPhotographEscortVisitor entranceTime travelled

Visitors Movement ControlNo packages shall be authorized to be brought inside the industrial installation, offices and work area without proper authority.Outgoing packages carried by personnel should be closely inspected Any personnel/visitor entering the installation with a package should deposit the same to the security and in return receives the number tag.

Package Movement ControlPrivately owned vehicle of personnel/visitor should be registered and are subject to the identification and admittance procedureVehicles should be subjected for search at the entrance and exit.All visitors with vehicles should provide the security as to the complete details of their duration of stay, person to be visited and other informationAll vehicles of visitors should be given a sign/sticker to be place on the windshieldTraffic warning sign should be installed in all entrances in order to guide the visitors in their destination and provide them necessary safety precautionsSecurity personnel must constantly supervise parking areas and make frequent spot searches of vehicles found there

Vehicle Movement control and identificationAt any physical barrier, a security system must possess the ability to distinguish among authorized persons, unauthorized persons. This is to assist the security personnel protects sensitive are and information within the installation.Appropriate warning signs should be posted at the building perimeter. Special restricted entry facilities to public access should be provided. This will be dependent on the degree of security needed for the protection of property, activity and other processes within the building.The access to the restricted area shall be limited to authorize personnel who have the direct involvement with the installation, construction and operation and maintenance of the equipment and systems and/or use of the materials contained within the restricted area. A clear-cut policy on the access control should be disseminated to all personnel of the installation.

Building Access ControlIncludes all the security measures designed to prevent unsuitable individuals or persons of doubtful loyalty to the government from gaining access to classified matter or to any security facilities, and to prevent appointment, or retention as employees of such individuals.

Personnel SecurityPersonnel security generally embraces such security measures as personnel security investigation, security orientation and indoctrination and security education as will ensure the prevention of unsuitable individuals or persons of doubtful loyalty to the government, from gaining access to classified matter or being appointed, employed or retained as employees.

Scope and PurposeJust any other technique, security must start from a given foundation or basic shall be referred to as the principles of security. Are normally disseminated by regulation or directive to ensure uniformity of purpose ,logical and similar methods of operation can appropriate and continuous placement of responsibility .

PrinciplesTo provide the standards and procedures necessary to insure the appointment , employment of retention of suitable and loyal individuals in government service.To develop the necessary and proper disciplined among the applicants and employee in the government service as well as protect and preserve the security interest of the Philippine government.Inculcate the desirable security attitudes and habits among the applicants and employee of the government as well as promote the efficiency of the service.Objective of personnel securityNo person is entitled solely by virtue of his grade or positions to knowledge or possession of classified matter. Classified matter shall be entrusted only to those individual whose official duties require such knowledge possession , and who have been granted the proper clearance .All personnel whose duties require access to classified matter shall be subject to a security investigation to determine the eligibility for the required security clearance All personnel shall undergo security orientation, indoctrination and security educationBasic politics in personnel securityDocument SecurityMaterial that a government body claims is sensitive information that requires protection of confidentiality, integrity, or availability that required security clearance.Information Sensitivity-is a control of access to information or knowledge that might result in loss of an advantage or level of security if disclosed to others.Security Clearance-a status granted to individuals allowing them to access to classified information or to restricted areas after completion of thorough background check.Classified InformationRestricted Area-a zone established by a sanctioning body to prohibit specific activities in a specific area.Background Check-the process of looking up and compiling criminal records, commercial records and financial records of an individual organization.E.g. Employment screening, Loyalty check

Classified InformationNationalLocalBarangayForms of Background ChecksThe term Need to Know, when used by government and other organizations, describes the restriction of data which is considered very sensitive. Under need-to-know restrictions, even if one has all the necessary official approvals to access certain information, one would not be given access to such information, or read into a clandestine operation, unless one has a specific need to know, that is, access to the information must be nessesary for the conduct of ones official duties. No one is supposed to be given an access to the need to know even when it comes to the rank and position of an individual.Classified InformationCompartmentalization (Information Security) In matters concerning information security, whether public or private sector, compartmentalization is the limiting of access to information to persons or other entities who need to know it in order to perform certain tasks. The concept originated in the handling of classified information in military and intelligence applications, though it dates back to antiquity, and was used to successfully keep the secret of Greek fire. The basis for compartmentalization is the idea that, if fewer people know the details of a mission or task, the risk or likelihood that such information will be compromised or fall into the hands of opposition is decreased. Hence, varying levels of clearance within organizations exists.Classified InformationTop Secret (YELLOW) is the highest form of classified information. Information is further compartmented so that specific access using a code word after top secret is a legal way to hide collective and important information. Such material would cause exceptionally grave damage to national security if made publicly available.Secret (RED)-it is desired that no document be released which refers to experiments with humans and might have adverse effect on public opinion or result in legal suits. Documents covering such work field should be classified secret.Classified InformationSecret material would cause serious damage to national security if it were publicly available.Confidential (BLUE)material would cause damage or prejudicial to national security if publicly available.Restricted material would cause undesirable effects if publicly available. Official material forms the generality of government business, public service delivery and commercial activity.Classified InformationClearance is a general classification, that comprises a variety of rules controlling the level of permission required to view so classified information, and how it must be stored, transmitted, and destroyed.Classified InformationIt serves as a screening device in hiring suitable employees .It provides background investigation services of both potential and present employees , for possible assignment to sensitive position .It handles investigation of employees suspected of wrong doingIt develops security awareness among employees .It attempts to ensure the protection from discriminatory hiring or terminating procedures as well as unfounded allegations of illegal or unethical activities and conduct.Key functions of personnel security THANK YOU!