Security Officers Exam - Notes PDF
Security Officers Exam - Notes PDF
Security Officers Exam - Notes PDF
com
JAIIB CAIIB STUDY MATERIALS / CAIIB DISCUSSION
BANK PROMOTION EXAMS / ONLY FOR BANKERS
[email protected], [email protected], 09994452442
io
ne
xa
ot
.b
an
kp
ro
This notes had been compiled by collecting information from various websites over internet.
First of all we thank all the original contributors. Though we had taken enough care to go
through the notes, they are very common in nature and may not be exactly as per your
requirement. We request everyone to update yourself basically with the latest information
related to your bank through your banks website, RBI website and other authenticated
sources. I also request you to go through the attached files on specification of Strong
Rooms/Vaults/Safes/Strong Room Doors as per BIS standards though it is not mentioned in
your syllabus. In case you find any incorrect/doubtful information, kindly update us (along with
the source link/reference for the correct information).
s.
co
m
Facebook Groups
SECURITY DEVICES
io
ne
xa
Security devices are products used for our own safety and also security and protection of our
valuables and surroundings, including our cars, houses, bank accounts, shops, businesses etc.
With advancement in technology, new gadgets are being developed which help in enhancing
security of our surroundings. The different types of electronic security devices are access
control products, alarms, buzzers, CCTV, metal detectors, motion detectors, air teasers, stun
guns, personal alarms, sirens etc. Electronic security devices must have an appropriate
sensitivity level that will allow detection but is not triggered unnecessarily. Hence, it is always
advisable to buy electronic security devices from established electronic security devices
manufacturers & suppliers. Also, before selecting any electronic security device it is important
to take into consideration the size of the area to cover and the number of devices that will be
required.
ro
ot
an
kp
.b
A CCTV (Closed Circuit Television) is a very effective security device that is used to transmit a
signal to a limited set of monitors through a video camera. CCTV is most commonly used as a
security device in various commercial and private establishments like retail shops, banks, and
casinos. It is also used in various other sensitive areas like airports, military installations and
government establishments. CCTV systems use sophisticated technologies like night vision,
motion detectors and computer-assisted operation. For operating a CCTV, a wide range of
accessories required includes: DVR, CCTV Cameras
s.
co
m
Facebook Groups
Robbery Prevention - When you think of potential high-stake targets, Banks are on the top of
the list. A well installed bank video surveillance system will deter robberies, while providing
provide important video footage and evidence to law enforcement.
ne
xa
Investigating a Crime - In the event of fraud or robbery, recorded video from bank security
cameras can be used to track down and identify suspects.
io
Check fraud prevention using the latest in HD video surveillance systems allows for detailed
facial recognition of suspects that helps fight check fraud at banks. Newer digital video
recorders allow you to record transaction data along with the video recording. This allows you
to not only see the transactions as they happen but also sync the video with the detailed
transaction. You can use this information to identify criminals and protect customer accounts.
ot
Fake ATM withdrawals - Bank customers often report suspicious ATM withdrawals leaving their
bank accounts depleted of funds without their knowledge. Having bank security cameras record
each and every ATM transaction can provide the evidence you need to find the criminals.
ro
Monitor multiple locations - Newer digital video systems allow banks to to view live and
recorded video footage from multiple branches at one time. Video can also be transmitted one
central monitoring room, or viewed over the Internet via smartphones or tablets.
an
kp
Alarm system integration - Newer digital camera systems allow bank security cameras and
alarm systems to be fully integrated into a single network.
.b
Digital video storage -Digital technology offers a more efficient way of storing and managing
surveillance footage. It is more convenient and accessible. This allows you to use advanced
search techniques to pinpoint specific incidents and identifying suspects faster with greater
ease.
24hr surveillance - Bank surveillance cameras provide continuous surveillance of banking
facilities, this protection continues outside of typical bank workday hours. Considering that
most ATMs are accessed by customers 24 hours a day it is nice to know you are being covered.
s.
co
m
Facebook Groups
Recognition of data - The use of digital technology for video surveillance produces the
capability of using advanced data-recognition when searching video footage for specific bank
transactions. This also helps when backing up images of particular individuals.
Customer confidence - A confident customer is one that feels secure. An professional bank
video surveillance system enhances the sense of security and makes your customers feel at
ease..
ne
xa
Remote access -Digital video recorders ( also known as DVRs or NVRs) allow remote monitoring
of live and recorded video from any PC, Mac or Smartphone with an Internet connection and
access to the network.
ro
ot
an
kp
io
To achieve the optimal protection with video surveillance, numerous areas must be closely
monitored. These areas include everything from exits and entrances to exterior ATMS and teller
windows. These following factors should strongly be considered when installing a video
surveillance system in a bank:
.b
It's imperative that you install surveillance cameras at all exits and entrances so you may
capture video as well as images of every bank customer entering and exiting.
Install security cameras at all ATMs to monitor and record clear images and video of
individual customer faces.
Properly place cameras to monitor all bank transactions closely especially in the teller
areas.
Proper placement of surveillance cameras in the main lobby is crucial. Monitoring traffic
and recording an overall view of the bank lobby is important.
Security cameras monitoring of all vaults and safes.
s.
co
m
Facebook Groups
Banks should constantly monitor the CCTV footage from their ATM booths. Lack of security
guards at ATM booths encourages criminals to target ATM machines. Banks should constantly
monitor the CCTV footage from their ATM booths.
Detection Systems
ne
xa
Electronic devices which automatically identify and record or register stimulus, such as an
environmental change in pressure or temperature, an electric signal or radiation from a
radioactive material are known as detection systems. These devices are generally used at the
gateways or entrances of government buildings, parks, airports, railway stations, and other high
security areas for protection.
Types of Detection Systems
io
There are a variety of electronic detection system such as metal detectors, motion detectors,
magnetic detectors, fire and gas detectors, heat detectors, temperature detectors, light
detectors, signal detectors, power detectors ultrasonic detectors etc.
ot
Detection Systems The detection systems are electronic devices that are used to protect any
area by detecting a moving object in a particular field or to differentiate between weapons and
other metallic objects.
an
kp
ro
These devices are generally used at the gateways or entrances of government buildings, parks,
airports, railway stations, and other high security areas. They use a variety of sensors for
detection like electronic sensors, passive infrared sensors, ultrasonic sensors and microwave
sensors. These detection systems are generally categorized on the basis of the sensing
technology used in them like:
Metal Detectors
.b
A metal detector is an electronic instrument which detects the presence of metal nearby. Metal
detectors are useful for finding metal inclusions hidden within objects, or metal objects buried
underground. They often consist of a handheld unit with a sensor probe which can be swept
over the ground or other objects. If the sensor comes near a piece of metal this is indicated by a
changing tone in earphones, or a needle moving on an indicator. Usually the device gives some
indication of distance; the closer the metal is, the higher the tone in the earphone or the higher
the needle goes. Another common type are stationary "walk through" metal detectors used for
security screening at access points in prisons, courthouses, and airports to detect concealed
metal weapons on a person's body.
s.
co
m
Facebook Groups
The simplest form of a metal detector consists of an oscillator producing an alternating current
that passes through a coil producing an alternating magnetic field. If a piece of electrically
conductive metal is close to the coil, eddy currents will be induced in the metal, and this
produces a magnetic field of its own. If another coil is used to measure the magnetic field
(acting as a magnetometer), the change in the magnetic field due to the metallic object can be
detected.
ne
xa
The first industrial metal detectors were developed in the 1960s and were used extensively for
mineral prospecting and other industrial applications. Uses include de-mining (the detection of
land mines), the detection of weapons such as knives and guns (especially in airport security),
geophysical prospecting, archaeology and treasure hunting. Metal detectors are also used to
detect foreign bodies in food, and in the construction industry to detect steel reinforcing bars in
concrete and pipes and wires buried in walls and floors.
io
Metal detectors will detect all metallic objects like gold, silver, iron, nickel, copper, brass,
aluminum, tin, lead, bronze. Metal detectors will not detect nonmetal items such as gemstones,
diamonds, pearls, bone, paper, or stone figures.
ot
Alarms
an
kp
ro
Alarms are devices that are used to make people alert about a problem or situation by making a
loud noise. They are generally used for warning about a burglary, fire or forced intrusion. These
alarm systems work through sensors fitted in them. The sensors detect motion through PIR
(passive infrared) or opening of a door or window. After detecting motion the sensors trigger a
signal and make loud noise. Technology wise the different types of alarms are: Wired Intruder
Alarms, Wireless Intruder Alarms, Magnetic Alarms, Motion Detection Alarms, Loop Alarm and
PIR Alarms.
Access Control Products
.b
Access control products are highly technological advanced systems that assist in securing a
place from the risks of theft, bomb and other weapons. Electronic Access Control products
market is one of the fastest growing sector of the global security industry. USA is the largest
electronic access control market in the world and it is estimated to account for US$2.2 billion by
the end of 2007. Europe is the second largest market for these products followed by AsiaPacific. According to an estimate by Global Industry Analysts Inc, the global market for
electronic access control devices will reach US$6.1 billion by 2010. Some of the devices used for
this purpose are;
s.
co
m
Facebook Groups
s.
co
m
Facebook Groups
Biometric access control refers to a specific example of access control, which is the business of
authorizing personnel to enter a closed quarters or gain access to a restricted object.
Time Locks
ne
xa
A time lock is a part of a locking mechanism commonly found in bank vaults and other highsecurity containers. The time lock is a timer designed to prevent the opening of the safe or
vault until it reaches the pre-set time, even if the correct lock combination(s) are known.
io
Time locks are mounted on the inside of a safe's or vault's door. Usually there are three time
locks on a door. The first one to reach 0 will allow access in to the vault; the other two are for
backup purposes.
ot
Time locks were originally created to prevent criminals from kidnapping and torturing the
person(s) who knows the combination, and then using the extracted information to later burgle
the safe or vault, or to stop entry by authorized staff at unauthorized times.
ro
Modern electronic time locks have some functions not available to mechanical time locks, like
resettable timers and pre-set times to activate.
an
kp
.b
Security devices : Any device employed to enhance the security measures through warning
signals or generating evidence,
Security Equipment : Any product employed to store and protect currency and other valuables
in the custody of a Branch,
ne
xa
ot
io
The 12 Bore Pump Action Gun has been specially developed for use as a security weapon. It is a
single barrel breach loading weapon superior to 12 Bore DBBL. It is provided with a tubular
magazine, which holds 4 nos. of 12 Bore Cartridges and is placed parallel to and below the
barrel. Extraction, loading and cocking of the cartridges take place in a single 'pump action' by
operating handle, sliding along the magazine. Due to rapid reloading by pump action and
spread of shots, it is an ideal weapon for counter ambush tactics.
SPECIFICATIONS :
ro
Weapon
Calibre
an
kp
Chamber
Length of Barrel
70 mm (2-3/4")
I.
II.
Magazine Capacity
4 Rounds
Weight
3.05 kgs.
.b
Ammunition
s.
co
m
Facebook Groups
APPLICATIONS :
Banks security
Anti insurgent applications
Industrial security
Personal security
Sporting Arm
Anti Riot role by use of Rubber Ball non-lethal ammunition
ne
xa
io
A short range personal weapon capable of being used upto 183 m. It is operated by spent case
projection or blow back action and is capable of firing in fully automatic or single shot modes. It
is fitted with a hinged collapsible butt and may be fired with the butt in the extended or folded
position. The casing is in one piece and carries a bayonet boss at the forward end for fitting of
bayonet.
ot
SPECIFICATION :
Calibre
9 mm
ro
an
kp
482.6 mm
3.82 Kgs
3.06 Kgs
Box
Magazine Capacity
34 Rounds
0.226 Kgs
0.680 Kgs
.b
w
s.
co
m
Facebook Groups
Back Sight
Range Setting
Effective Range
27.43 meters
182.88 meters
System of Operation
Ammunition
550 Rounds
68 Rounds
Blade Type
109
19
io
ne
xa
Maximum Range
BARREL :
199.34 mm
Bore Diameter
ot
Length of Barrel
ro
Right Hand
1 turn in 250 mm
an
kp
.b
s.
co
m
Facebook Groups
Specifications
Calibre
Overall Length
Length of barrel
Chamber
10
: 12 Bore
: 1194 mm (3'11")
: 762 mm (30")
: 70 mm (2-3/4")
s.
co
m
Facebook Groups
11
Trigger Pull
: 2.92 to 3.63 Kg
Range
: 45.72 to 50.29 metres
Pull distance from butt end to trigger : 368.3 mm
Weight
: 3.4 Kg (approx)
Muzzle Velocity
: 320.04 m/s
ot
io
ne
xa
an
kp
ro
Specification : The Standard Double Barrel Gun with Short and long Barrel option.
Calibres : 12-bore, for Shot & Ball
Action : A pronounced rectangle action design. Two triggers with a manual or automatic safety.
Barrels : 22 to 32 with 2 (70 mm) chambers. With shot the gun gives Imp. Cyl. Bore.
Regulated for 50-100 yards with stipulated ammunition.
Weights : Depends upon the specification, normally varies from 3.3 kgs to 3.6 kgs.
Case : All guns are available with a lightweight case suitable for travel.
Hint : Long barrels are required with a deliberate style and used against high birds where as
Short barrels are preferred for snap shooting.
.b
ne
xa
Specification : The Single Barrel Standard Gun available with short and long barrel options.
Calibres : 12-bore, for Shot & Ball
Action : A pronounced rectangle action design. Single triggers with a manual safety.
Barrels : 32 with 2 (70 mm) chambers. With shot the gun gives Imp. Cyl. Bore. Regulated
for 50-100 yards with stipulated ammunition.
Weights : Depends upon the specification, normally varies from 2.8 kgs to 3.3 kgs.
Case : All guns are available with a lightweight case suitable for travel.
Hint : Long barrels are requiredwith a deliberate style and used against high birds where as
Short barrels are preferred for snap shooting.
ro
ot
io
0.22" Revolver
an
kp
Calibre
0.22"
Weight
380 gms
Barrel length
66 mm
capacity
8 rounds
Ammunition
0.22" x 24.8 mm
.b
w
s.
co
m
Facebook Groups
12
Grip
Wooden
Overall size
Length
187 mm
Width
116 mm
Range
20 Metres
Action
Pin Firing
Floating
ne
xa
ROLE : Light weight, easy to handle weapon, suitable for personal safety.
io
FUNCTION : 32 (7.65 mm) Revolver is capable of firing 6 rounds, loaded in revolving chamber.
Misfiring of a round does not affect next firing.
ot
SAFETY : Positive location of main spring eliminates malfunctioning and additional safety
feature provided to prevent accidental firing
II.
III.
IV.
an
kp
VI.
ro
I.
V.
VIII.
.b
VII.
TECHNICAL DATA
s.
co
m
Facebook Groups
13
Nomenclature
Calibre
7.65 mm
0.7 kg
Length of Revolver
177.8 mm
76.2 mm
Sights
Fore Sight
Blade
Back Sight
'U'
ne
xa
Rifling
Feed
ot
io
Pistol 0.32"
0.32"
Magazine
ro
Calibre
an
kp
Barrel length
3.44" approx.
Chamber
Weight of Pistol
Sight
Fixed
Safety
.b
w
s.
co
m
Facebook Groups
14
Trigger pull
5 to 7 lbs.
Rifling
Action
Dimensions
Range
18.27 mm
ne
xa
1. An application for the grant of license shall be made to the licensing authority and shall be in
such form, contain such particulars and be accompanied by such fee, if any, as may be
prescribed.
io
If you live in Delhi, the designated licensing authority for you would be the A.D.C.P (Licensing),
Delhi. His office is at the Defence Colony Police Station, located right next to the Moolchand
flyover. The fees for the grant of a fresh license depend on the type arms for which the license
is being sought. They are highest for a handgun (pistol/ revolver) & repeating rifle (Rs. 100/-)
and the lowest for a Muzzle loading gun (Rs. 10/-). License renewal fees are 50% of the
application fee.
ot
The application fee can be deposited in cash along with your application. People living in other
metros would also need to apply at the office of the local D.C.P (Licensing). For people living in
non-metro cities, they would need to apply at the office of their local S.D.M (Sub-Divisional
Magistrate).
an
kp
ro
2. On receipt of an application, the licensing authority shall call for the report of the Officer in
charge of the nearest police station on that application, and such Officer shall send his report
within the prescribed time.
.b
NOTE:This basically means that your application shall be sent for "verification" to your local Police
Station (under whose jurisdiction your stated address is). They basically will check if you have a
criminal record or not and the veracity of all information declared in the application. Persons
with past criminal records are not eligible for arms licenses. In almost all cases a policeman will
go to each of the addresses supplied and probably even ask your neighbours about your "moral
character". Another purpose of this verification is to check whether your stated "NEED" for a
gun checks out.
s.
co
m
Facebook Groups
15
The applicant must declare all addresses that he/ she has resided at during the last 5 years
along with the time period and duration from-to for each address. A verification report will be
requested from the relevant local Police Stations at all the addresses provided by you. This is
where most license application files "get lost" in transit.
3. The Licensing Authority, after such inquiry, if any, as it may consider necessary, and after
considering the report received as mentioned above, shall subject to the provisions of the Act,
by order in writing either grant the license or refuse to grant the same.
ne
xa
4. However where the Officer in charge of the nearest police station does not send his report
on the application within the prescribed time, the licensing authority may, if it deems fit, make
such order, after the expiry of the prescribed time, without waiting for that report.
io
(i) By a citizen of India in respect of a smooth bore gun having a barrel of not less than twenty
inches in length to be used for protection or sport or in respect of a muzzle-loading gun to be
used for bona fide crop protection.
ot
(ii) In respect of a point 22 bore rifle or an air rifle to be used for target practice by a member of
a rifle club or rifle association licensed by
the Central Government.
ro
(B) A license, if the license authority is satisfied that the person by whom the license is required
has a good reason for obtaining the same.
HELPFUL TIPS FOR INCREASING THE CHANCES OF SUCCESS WITH YOUR APPLICATION
an
kp
Required Documents
Documents to be furnished along with the application form are proof of address and proof of
date of birth - plus any other documents that the
applicant wishes to submit in support of proving his/ her stated "NEED" for a gun.
.b
s.
co
m
Facebook Groups
16
In Delhi the Police have a tendency of denying licenses if your stated need is "protection of
person or property and private security", unless you can "show cause" in terms of a justifiable
and real threat to life or property. Their logic is that Delhi is a well policed city and you don't
really need a gun for self-defence. You will also be (almost certainly) asked to produce income
proof documents in such cases.
If your stated "NEED" is Target-shooting. For this, at the very MINIMUM you must sign up with
the local rifle club - in Delhi this would be the Delhi State Rifle Association. Not sure what the
current fee is. Members of Rifle Clubs applying for a .22 Rifle license (to be used for target
practice) have a very good success rate.
ne
xa
ot
io
Type of Gun
Guns permitted for use by civilians are Shotguns, Handguns and sporting rifles. Civilians can
hold a maximum of THREE arms licenses. There is no limitation as to what combination of 3 can
be held, so in theory a person may very well use his three permitted arms licenses to hold: -
an
kp
ro
.b
BASICALLY any combination of THREE you so desire - this is of course theoretical, you would still
need to convince the licensing authority of your stated NEED for each additional arms license
you apply for!
s.
co
m
Facebook Groups
17
For members of accredited/ recognised rifle associations/ shooting clubs, in addition to the
(above mentioned) max permissible limit of 3 arms licenses, they are permitted to own 1
additional .22 cal rifle for the purpose of target shooting - thereby taking their total allowance
of arms licenses to FOUR.
Competition shooters who have achieved the status of "renowned shot" are exempted from
the above provisions, details of the relevant notifications pertaining to them (i.e. "renowned
shots") can be found at http://www.nrai.in/notifications.html for further details.
s.
co
m
Facebook Groups
NPB RIFLE - If you are applying for a .315, .30-06 etc. rifle they would fall in this category, so this
is what you need to fill out in the form.
ne
xa
NPB DBBL GUN (Double Barrel Breech Loading Gun) - A double barrel smooth bore gun
(shotgun) with a barrel of not less than twenty inches in length. (12 bore/ 16 bore etc. double
barrel shotguns)
NPB SBBL GUN (Single Barrel Breech Loading Gun) - A single barrel smooth bore gun (shotgun)
with a barrel of not less than twenty inches in length, even pump-action shotguns fall under this
category. (12 bore/ 16 bore etc. single barrel shotguns)
io
ot
NPB PISTOL/ REVOLVER - If you are applying for a .32, .30 etc. pistol or revolver license, this is
what you need to fill out in the form.
ro
NPB stands for - Non Prohibited Bore. I won't talk about PB (Prohibited Bore) weapons here,
since it's next to impossible to get a license for them.
.b
an
kp
18
People at war have resorted to biochemical weapons throughout history, from tribal warriors
smearing spear-tips with poison to Scud missiles armed with nerve gas warheads. Modern
technology has made sophisticated biochemical weapons increasingly available to individuals
and small groups.
ne
xa
Here are brief descriptions of several types of chemical and biological agents:
ot
io
Nerve agents: A Japanese cult used sarin gas in 1985 to kill a dozen people and injure 5,500 in a
Tokyo subway. Iraq also used sarin gas in the 1980s during a war with Iran. The U.S. produced
stockpiles of these agents, but has been destroying them in recent years. Inhaled as a vapor or
absorbed via droplets splashed on the skin, sarin gas causes an extremely rapid cascade of
events from vomiting to convulsions to paralysis. Loss of consciousness can occur within a
minute. Death can occur minutes later. U.S. troops sometimes carry atropine injectors that can
block the effects of nerve gas, if the injectors are used quickly enough.
an
kp
ro
Blister agents: The best-known type of weapon in this category is mustard gas, which was used
extensively in World War I, in the 1960s between Egypt and Yemen, and in the 1980s by Iraq
against its Kurdish rebels. In a typical case, extremely painful blisters develop four to eight
hours after exposure, damaging the skin, eyes and lungs. At high enough doses, death can occur
from respiratory failure, especially when left untreated. But even in World War I, most mustard
gas victims who got medical treatment survived.
Other examples: phosgene oxime, Lewisite.
.b
Blood agents: The French used 4,000 tons of cyanide gas in World War I. The U.S. built a
stockpile of this agent during World War II, but later destroyed the weapons. If a victim
breathes a large enough dose, death can occur within six to eight minutes.
s.
co
m
Facebook Groups
19
treated with high doses of penicillin and other antibiotics. A vaccine also exists, and has been
given to many U.S. troops. Anthrax generally does not spread
Biological Weapons
Anthrax
ne
xa
Anthrax Spores was first tested as a biological warfare agent by Unit 731 of the Japanese
Kwantung Army in Manchuria during the 1930s; some of this testing involved intentional
infection of prisoners of war, thousands of whom died. Anthrax, designated at the time as
Agent N, was also investigated by the Allies in the 1940s.
io
Smallpox
ot
The British considered using smallpox as a biological warfare agent at the Siege of Fort Pitt
during the French and Indian Wars (175463) against France and its Native American allies.
Although it is not clear whether the actual use of smallpox had official sanction. It has also been
alleged that smallpox was used as a weapon during the American Revolutionary War (177583).
ro
Tuberculosis
an
kp
North Korea is suspected of producing TB. The worlds second biggest infectious killer.
Tuberculosis may infect any part of the body, but most commonly occurs in the lungs (known as
pulmonary tuberculosis). Extrapulmonary TB occurs when tuberculosis develops outside of the
lungs, although extrapulmonary TB may coexist with pulmonary TB as well.
Bubonic Plague
.b
Plague was used during the Second Sino-Japanese War as a bacteriological weapon by the
Imperial Japanese Army. These weapons were provided by Shir Ishiis units and used in
experiments on humans before being used on the field. For example, in 1940, the Imperial
Japanese Army Air Service bombed Ningbo with fleas carrying the bubonic plague.
s.
co
m
Facebook Groups
20
Ebola
As a biological weapons agent, the Ebola virus is feared for its high case-fatality rate. Because of
its rarity, the disease may not be diagnosed corrected at the onset of an outbreak. Reports
suggested that the Ebola virus was researched and weaponized by the former Soviet Unions
biological weapons program Biopreparat. Dr. Ken Alibek, former the First Deputy Director of
Biopreparat, speculated that the Russians had aerosolized the Ebola virus for dissemination as a
biological weapon. The Japanese terrorist group Aum Shinrikyo reportedly sent members to
Zaire during an outbreak to harvest the virus.
Cholera
ne
xa
During World War II, the Japanese biological weapons program known as Unit 731 located in
Pingfan Manchuria (24 kilometers south of Harbin) experimented with Vibrio cholera as a
weapons agent. It was reported that the Japanese dropped cholera and typhus cultures into
more than 1,000 Chinese wells and reportedly caused 10,000 cases in 1941. However, an
estimated 1,700 of the deaths were Japanese soldiers, a testimony to the difficulty of
protecting ones own troops from biological agents and controlling infections.
io
Botulinum Toxin
ot
Botulinum toxin is one of the deadliest toxins known, and is produced by the bacterium
Clostridium botulinum. Botulism causes death by respiratory failure and paralysis. Furthermore,
the toxin is readily available worldwide due to its cosmetic applications in injections.
Chimera Viruses
an
kp
ro
Being able to destroy an entire city in less than a second with the push of a button is one way to
measure destructive power, but being able to selectively and slowly decimate a population with
disease and infection is so unconventionally brutal that it has to top the list. Thats Chimera
Viruses!
Dead Bodies
.b
While advanced nuclear and bombs are scary and powerful, if youre going for painful slow,
mentally devastating destruction sometimes launching the diseased riddled bodies of prisoners
that youve executed back over the city walls is the most sadistic way to go about decimating a
population.
s.
co
m
Facebook Groups
21
io
ne
xa
Large-scale defense against biological attack is extremely difficult since most biological weapon
strikes are covert. However, extensive research is underway to protect in the event of a
biological attack. Detectors to measure the amounts of toxins in the air are being developed.
Vaccines and antibiotics are being produced, and continuing research yields increasingly
effective drugs. Programs to educate physicians and hospitals about the symptoms and
treatment of persons infected by biological toxins are being developed. Municipal governments
are being educated on the procedure for handling a localized epidemic. On a more personal
note, you can help protect yourself from an attack by purchasing a gas mask, since biological
weapon strikes are mainly aerosol. Be sure to have your gas mask leak-tested, and make sure
that the mask fits you properly, forming an airtight seal about your face.
ro
ot
Due to moral and ethical reasons, the vast majority of governments have banned biological
weapons development. In an attack, thousands of innocent civilians could be placed at risk, and
the possibility of mass panic could cause the toxin to spread far beyond the initial area of
attack, setting off a subsequent chain of infection. Tragically, ethical concerns have not
hindered the development of advanced biological weapons by some countries and terrorist
groups. Today, the world must hope that a large-scale biological attack from one a rogue group
does not occur, and prepare itself in case the worst does happen.
.b
an
kp
Biological and Chemical weapons may be the most devastating and uncontrollable weapons
ever rendered by man. Biological weapons are any man made weapon caused to disperse
viruses, bacteria, or toxins derived from living organisms to cause death or disease within
humans. Recent statistics claim that in the event of a future terrorist attack, the means in which
the attack would be achieved would be through the use of bio-chemical weapons. This is not
hard to believe, considering most bio-chemical agents can be created in ones own home with
readily available materials. Due to the nature of biological and chemical weapons, the most
widely predicted use for such weapons would be against the populace of a nation, where it may
inflict massive fatalities and economic destruction. However this does not mean that a biochemical attack is un-survivable, with proper knowledge and readiness it can very well be a
crisis that one can overcome.
s.
co
m
Facebook Groups
22
STEPS
Don't count on a vaccine being available. The flu vaccine that is currently used for seasonal flu
will not work against any Chemical or Biological Attack. New strains of the virus require new
vaccines, and these can take months or years to develop and even longer to produce and
distribute on a large scale.
ne
xa
Stay informed. Should a pandemic of any kind flare up, the World Health Organization (WHO),
the Centers for Disease Control and Prevention (CDC), and other governmental and nongovernmental organizations will provide information on the spread of the disease, as well as
updates on vaccines or other medications, tips for keeping yourself safe, and travel advisories.
The WHO and CDC, as well as various national governments, already have websites in place to
provide useful planning information to the public. Newspapers and TV and radio broadcasts will
also help disseminate critical warnings and advice.
Get your yearly flu vaccine shot. While the current vaccine won't protect you from every flu or
any other "new" strains of the virus, it can help you stay healthy (by protecting you some flu
virus strains), which may in turn help your body to fight the virus better if you do become
infected.
ot
io
Get a pneumonia vaccine shot. In past Chemical or Biological pandemics, many victims
succumbed to secondary pneumonia infection. While the pneumonia vaccine cannot protect
against all types of pneumonia, it can improve your chances of surviving the pandemic. The
vaccine is especially recommended for people over the age of 65 or those who have chronic
illnesses such as diabetes or asthma.
an
kp
ro
.b
Wash your hands frequently. Hand washing may be the single most powerful defense against
avian influenza and many other infectious diseases. If pandemic strikes, you should wash your
hands several times a day. Make sure that you use proper hand washing technique.
Use an alcohol-based disinfectant. Since it's probably not feasible to wash your hands every
time you touch something that may carry the virus, you should carry an alcohol-based hand
cleaner with you at all times. These cleaners come in a variety of forms, and can be used any
time you need a quick touch-up. Keep in mind, however, that the use of these cleaners is not a
substitute for thoroughly washing your hands, and they should only be used to supplement
hand washing.
s.
co
m
Facebook Groups
23
Avoid exposure to infected. Right now, the only documented way to become infected with
avian influenza is by coming into contact with infected birds or poultry products, and these
routes of infection will continue even if the virus mutates so that human-to-human
transmission becomes the greatest threat. Avoid handling any thing the infected has already
touched, and try to prevent domestic animals (such as house cats/dogs) from coming into
contact with Infected. If you work in proximity the dead or living infected, for example--take
precautions such as wearing gloves, respirators, and safety aprons. Cook all foods thoroughly,
to 165 F (74 C) throughout, and exercise proper food-handling techniques, as you would to
protect yourself from other threats such as salmonella. Proper cooking kills the most virus.
ne
xa
Exercise social distancing. The most effective way to prevent becoming infected is to avoid
exposure to infected people. Unfortunately, it's not possible to determine who is infected and
who is not--by the time symptoms appear, a person is already contagious. Social distancing,
deliberately limiting contact with people (especially large groups of people), is a reasonable
precaution to take in the event of a pandemic.
ot
io
Stay home from work. If you're sick or if others at your workplace have become sick, you
should stay away from your workplace even in the absence of a pandemic. Given that people
will generally be infected and contagious before they exhibit symptoms, however, during a
pandemic it's essential to stay away from places, such as work, where you have a high
probability of being exposed to an infected person.
an
kp
ro
Try to work from home. A pandemic can last for months or even years, and waves of intense
local outbreaks can last for weeks, so it's not like you can just take a few sick days to protect
yourself from workplace infection. If possible, try to arrange a work-from-home situation. A
surprising variety of jobs can now be accomplished remotely, and employers will likely be
willing--or even required--to try this out if a pandemic strikes.
.b
Keep children home from school. Any parent knows that kids pick up all kinds of bugs at
school. Avoid public transportation. Buses, planes, boats, and trains place large numbers of
people in close quarters. Public transportation is the ideal vehicle for widespread spread of
infectious disease.
Stay away from public events. During a pandemic, governments may cancel public events, but
even if they don't, you should probably stay away from them. Any large gathering of people in
close proximity creates a high-risk situation.
s.
co
m
Facebook Groups
24
Wear a respirator. The most virus can be spread through the air, so in the event of a pandemic
it's a good idea to protect yourself from inhalation of the virus if you're out in public. While
surgical masks only prevent the wearer from spreading germs, respirators (which often look like
surgical masks) protect the wearer from inhaling germs. You can buy respirators that are
designed for one-time use, or you can buy reusable ones with replaceable filters. Use only
respirators labeled as "NIOSH certified," "N95," "N99," or "N100," as these help protect against
inhalation of very small particles. Respirators only provide protection when worn properly, so
be sure to follow the instructions exactly--they should cover the nose, and there should be no
gaps between the mask and the side of the face.
ne
xa
Wear medical gloves. Gloves can prevent germs from getting on your hands, where they can be
absorbed directly through open cuts or spread to other parts of your body. Latex or nitrile
medical gloves or heavy-duty rubber gloves can be used to protect the hands. The gloves
should be removed if torn or damaged, and hands should be thoroughly washed after removal
of gloves.
io
Protect your eyes. Some Illnesses can be spread if contaminated droplets (from a sneeze, or
spit, for example) and then enter the eyes or mouth. Wear glasses or goggles to prevent this
from occurring, and avoid touching your eyes or mouth with your hands or with potentially
contaminated materials.
ot
Dispose of potentially contaminated materials properly. Gloves, masks, tissues, and other
potential bio-hazards should be handled carefully and disposed of properly. Place these
materials in approved bio-hazard containers or seal them in clearly marked plastic bags.
an
kp
ro
Prepare for disruption of services. If a pandemic strikes, many of the basic services we take for
granted, such as electricity, phone, and mass transit, may be disrupted temporarily.
Widespread employee absenteeism and massive death tolls can shut down everything from the
corner store to hospitals.
Stock up on necessities. Store a two-week supply of water for everyone in your household.
Keep at least 1 gallon (3.8 L) per person per day in clear plastic containers.
.b
Store a two-week supply of food. Opt for non-perishable foods that don't need to be cooked
and that don't require a lot of water to prepare.
Keep a small amount of cash at all times as banks may close and ATMs may be out of service.
Discuss emergency preparation with your family. Make a plan so that children will know what
to do & where to go if you are incapacitated or killed, or if family members cant communicate
with each other. Make sure you have an adequate supply of essential medications. Seek
medical attention at the onset of symptoms. The effectiveness of antiviral medications
decreases as the illness progresses, so prompt medical treatment is imperative. If someone
with whom you have had close contact becomes infected, be sure to seek medical care even if
you do not display symptoms.
s.
co
m
Facebook Groups
25
Types of Cybercrime
An attack to commit a Cyber Crime can be called as a Cyber Attack! When it comes to the
Internet, you are sure to acquire some malware, if you visit malicious websites without proper
protection. At the minimum, you need an antivirus and a firewall. You also need to stay and
steer clear of different types of cybercriminals trying to make money at your cost.
ne
xa
Let us have a look at the common types of cybercrime and how to deal with them.
io
ot
ro
There are many methods of Cyber Attacks from malware injection to phishing to social
engineering to internal stealing of data. Other advanced but common forms are DDoS Attacks,
Brute Force attacks, hacking, holding a computer system (or a website) for ransom using direct
hack or ransomware.
Some of them have been listed below:
an
kp
.b
w
s.
co
m
Facebook Groups
26
Types of cybercrime
Identity theft
Identity theft and fraud is one of the most common types of cybercrime. The term Identity
Theft is used, when a person purports to be some other person, with a view to creating a fraud
for financial gains. When this is done online on the Internet, its is called Online Identity Theft.
The most common source to steal identity information of others, are data breaches affecting
government or federal websites. It can be data breaches of private websites too, that contain
important information such as credit card information, address, email IDs, etc.
ne
xa
ot
io
2] There are no widows or dying people who need your help to transfer their money to NGOs in
your country. If you receive such emails, delete them immediately.
3] There are no loan companies that are willing to lend money to people across the globe
without any security. Stay away from such mails/claims.
ro
4] Greed and the desire to make quick money has usually been why people fall victim to such
scams. So control your excitement and actions if you get a chance to lay your hands on
millions of Dollars, for no reason.
an
kp
5] Shop online only on trusted websites. You know a site is trusted when it uses a lock icon.
These sites show the name of the company in green color in the address bar of all browsers
except Internet Explorer. Plus the reputation of online shopping centers has to be considered.
Of course, there can be new stores that you may want to try out. Exercise caution in buying
from such sites by doing a background check on the sites.
.b
6] Do not directly reply with your resume to online job offers via emails even if the job
website is reputed. It is easy for anyone to register with job sites and post job vacancies. Do a
little background check on the company to see if it is indeed a company. If a job vacancy asks
you for bank details as well, ignore it. Better be safe than sorry.
s.
co
m
Facebook Groups
27
7] If a friend is interested in your social security number and bank details, he or she may not be
a friend. Keep the details to yourself.
8] Balance your credit card statements every month to see if any item exists that you cannot
relate to.
9] Check out your credit reports once a year to see if there are any loans that you did not take.
10] Think before clicking links in e-mail, instant messages or chat sessions and be suspicious of
any e-mail with urgent requests for personal financial information.
Ransomware
ne
xa
This is one of the detestable malware-based attacks. Ransomware enters your computer
network and encrypts your files using public-key encryption, and unlike other malware this
encryption key remains on the hackers server. Attacked users are then asked to pay huge
ransoms to receive this private key.
io
Prevent Ransomware
DDoS attacks
ro
ot
an
kp
DDoS attacks are used to make an online service unavailable and bring it down, by bombarding
or overwhelming it with traffic from multiple locations and sources. Large networks of infected
computers, called Botnets are developed by planting malware on the victim computers. The
idea is normally to draw attention to the DDOS attack, and allow the hacker to hack into a
system. Extortion and blackmail could be the other motivations.
.b
s.
co
m
Facebook Groups
28
It is also good to use a distributed data movement method. That is, instead of just one server,
you have different datacenters that respond to requests in parts. It would have been very costly
in older days when you had to buy more servers. These days, datacenters can be applied on
cloud thus reducing your load and distributing it from across servers instead of just one
server.
ne
xa
You may even use mirroring in case of an attack. A mirror server contains most recent (static)
copy of the items on the main server. Instead of using the original servers, you might want to
use mirrors so that the traffic coming in can be diverted and thus, a DDoS can be
failed/prevented.
io
In order to close original server and start using mirrors, you need to have information about
incoming and outgoing traffic on the network. Use some monitor that keeps displays you the
true state of traffic and if it alarms, close the main server and divert traffic to mirrors.
Alternatively, if you are keeping a tab on traffic, you may use other methods to deal with the
traffic, without having to shut it down.
ot
Botnets
ro
an
kp
.b
Spamming and phishing are two very common forms of cybercrimes. There is not much you can
do to control them. Spam is basically unwanted emails and messages. They use Spambots.
Phishing is a method where cyber criminals offer a bait so that you take it and give out the
information they want. The bait can be in form of a business proposal, announcement of a
lottery to which you never subscribed, and anything that promises you money for nothing or a
small favor. There are online loans companies too, making claims that you can get insecure
loans irrespective of your location. Doing business with such claims, you are sure to suffer both
financially and mentally. Phishing has its variants too notably among them are Tabnabbing,
Tabjacking. and Vishing and Smishing.
s.
co
m
Facebook Groups
29
Such spamming and phishing attempts are mostly emails sent by random people whom you did
not ever hear of. You should stay away from any such offers especially when you feel that the
offer is too good. The US Cybercrime Center says do not get into any kind of agreements that
promise something too good to be true. In most cases, they are fake offers aiming to get your
information and to get your money directly or indirectly.
ne
xa
io
Phishing is carried out via various means. The most common ones are through emails, websites
and over telephone.
ot
Phishing emails Emails masqueraded as from a legitimate source is sent to the victim most
probably asking for the details mentioned earlier.
ro
Phishing websites Websites that look similar to genuine companies or banks are setup that
could mislead the victim into entering important details such as the username and password.
an
kp
Phishing phone calls Calls are made to the victims in the name of a bank or similar institution.
The victim is made to enter or tell confidential data such as PIN number.
Characteristics of Phishing attacks
Following are some of the characteristics generally associated with a phishing email or website.
Request for submitting personal information most companies do not ask their
customers to submit confidential data via emails. So if you find an email asking for your
credit card number there ishigh probability that it is a phishing attempt.
Sense of urgency most phishing emails demand immediate action. Emails saying your
account will be deactivated in a day if you dont enter your credit card number is an
example.
Generic salutation phishing emails generally star with Dear customer instead of the
users name.
Attachments Phishing emails might also have attachments with them which will
mostly contain malware.
Phony links the links might show something else but will actually direct to a different
location. Phishing mails use various methods to hide the actual URLs.
.b
w
s.
co
m
Facebook Groups
30
ro
ot
io
ne
xa
The link that is displayed will be an image while the actual link could be different.
Actual links can be masked using HTML. Thus the text displayed will be
http://websitename.com/ while the hyperlink set will be http://www.othersite.com.
Another method is by using @ in the link. If a link contains the @ sign, the URL youre
taken to will be the one after the @ sign. For example, if the link is
www.microsoft.com/[email protected]/?=true, the actual URL you will be taken to is
web.com?=true.
Links with numbers instead of website name. Example: www.182.11.22.2.com
NB: To see the URL, just hover your mouse over the link (but dont click) and the link will
be displayed.
Bad grammar and/or spelling Theres a good chance that phishing mails might contain
bad grammar and spelling mistakes.
Phishing websites might look exactly like the original onesbut their URL might be slightly
or completely different. Hence make sure that the URL is the correct one when you visit
a website.
Also legitimate websites use SSL for protecting your information when entering your
data. Make sure that the URL starts with https:// instead of http:// for pages where you
have to submit username/password or other private information.
.b
an
kp
If you find a mail suspicious, do not click its URLs or download attachments.
Do not reply to suspicious emails with your personal information.
Use a browser that comes with phishing protection such as the latest versions of IE,
Firefox, Opera, Chrome etc. They come with blacklists of known phishing sites that are
updated regularly and if you happen to visit any of these sites, they will alert you.
Use a good up to date anti-virus.
And of course take use of your Email providers spam filters
Follow Safe computing tips.
Social Engineering
s.
co
m
Facebook Groups
31
Social engineering is a method where the cyber criminals make a direct contact with you using
emails or phones mostly the latter. They try to gain your confidence and once they succeed at
it, they get the information they need. This information can be about you, your money, your
company where you work or anything that can be of interest to the cyber criminals.
It is easy to find out basic information about people from the Internet. Using this information as
the base, the cyber criminals try to befriend you and once they succeed, they will disappear,
leaving you prone to different financial injuries directly and indirectly. They can sell the
information obtained by you or use it to secure things like loans in your name. The latter case is
of Identity theft. You should be very careful when dealing with strangers both on phone and
on the Internet.
Malvertising
ne
xa
Malvertising is a method whereby users download malicious code by simply clicking at some
advertisement on any website that is infected. In most cases, the websites are innocent. It is
the cyber criminals who insert malicious advertisements on the websites without the
knowledge of the latter. It is the work of advert companies to check out if an advertisement is
malicious but given the number of advertisements they have to deal with, the malverts easily
pass off as genuine ads.
ot
io
In other cases, the cyber criminals show clean ads for a period of time and then replace it with
malverts so that the websites and advertisements do not suspect. They display the malverts for
a while and remove it from the site after meeting their targets. All this is so fast that the
website does not even know they were used as a tool for cybercrime. Malvertising is one of the
fastest, increasing types of cybercrime.
ro
an
kp
PUPs, commonly known as Potentially Unwanted Programs are less harmful but more annoying
malware. It installs unwanted software in your system including search agents and toolbars.
They include spyware, adware, as well as dialers. Bitcoin miner was one of the most commonly
noticed PUPs in 2013.
Drive-By-Downloads
.b
Drive By Downloads too, come close to malvertising. You visit a website and it triggers a
download of malicious code to your computer. These computers are then used to aggregate
data and to manipulate other computers as well. The websites may or may not know that they
have been compromised. Mostly, the cyber criminals use vulnerable software such as Java and
Adobe Flash and Microsoft Silverlight to inject malicious codes as soon as a browser visits the
infected website. The user does not even know that there is a download in progress.
s.
co
m
Facebook Groups
32
ot
io
ne
xa
Be careful while opening emails from unknown senders and especially while clicking on
attachments
Use a strong user log-in password, as RATs can be physically installed and hidden when
you are away from your computer.
Most of the times, it is installed using a Trojan. Naturally, you will need a good antimalware software to detect and isolate the Trojan before it can install any kind of script
on to your computer.
If some RAT software is being installed on your corporate device, check out the type of
tasks the remote administration tools can do. That will help you stay on guard.
If you dont use RATS, disallow Remote Assistance connections to your computer as
mentioned above.
Always use an up-to-date and patched operating system to reduce chances of drive by
RAT downloads.
Exploit Kits
an
kp
ro
A vulnerability means some problem in the coding of a software that enables cyber criminals to
gain control of your computer. There are ready to use tools (exploit kits) in the Internet market
which people can buy and use it against you. These exploit kits are upgraded just like normal
software. Only difference is these are illegal. They are available mostly in hacking forums as well
as on the Darknet.
Scams
.b
Notable among Internet scams are, scams which misuse the Microsoft name and other general
tech support scams. Scamsters phone computer users randomly and offer to fix their computer
for a fee. Every single day, scores of innocent people are trapped by scam artists into Online
Tech Support Scams and forced to shell out hundreds of dollars for non-existent computer
problems.
s.
co
m
Facebook Groups
33
Prevention is always better than the cure. You must have heard this a number of times. The
same applies to the field of IT, when it comes to protection against Cyber Attacks. However,
assuming that your computer(s) or website(s) were attacked, even after taking all the
precautions, there are certain common general response steps laid down:
ot
io
ne
xa
ro
You might already know that there is no 100% foolproof method to counter cybercrime and
cyber attacks, but still, you have to take as many precautions to protect your computers.
an
kp
The primary things to be done are to use a good security software, that not only scans for virus,
but also looks for different types of malware, including but not limited to ransomware, and
stops it from entering the computer. Mostly these malicious codes are injected into your
computers by visiting or downloading things from non-reputed websites, drive by downloads,
compromised websites that display malicious advertisings also known as Malvertising.
.b
Along with the antivirus, you should use a good firewall. While the built in firewall in Windows 8
and Windows 7 is good, you can use third party firewalls that you feel are stronger than the
default Windows Firewall.
s.
co
m
Facebook Groups
34
If it is a corporate computer network, make sure there is no Plug and Play support in any of the
user computers. That is, employees should not be able to plug in Flash drives or their own
Internet dongles into the USB. The IT department of the company should also keep a watch on
all the network traffic. Using a good network traffic analyzer helps in prompt attendance to
strange behaviors arising out of any terminal (employee computer).
Disaster Management
Fire
ne
xa
Fire is a very good servant, but, a very bad master. As long as fire is under our control, it serves
a lot of useful purposes for us, but, once it goes out of our control, it can create a lot of
destruction. However, despite the presence of fire safety measures, the occurrence of
accidents is oftentimes inevitable.
It is this combination (of good servant and bad master), which is dangerous.
io
Because of the useful purposes that it serves, people keep sources of fire in/around their
houses/workplace. And, these sources could sometimes result in "undesired" fire.
ot
For a fire to take shape (as well as continue), the following three conditions should be met:
A combustible material
A specific temperature at which the above material would burn
Some fuel (mostly oxygen) to aid the burning
an
kp
ro
When petrol/gasoline is burning, the petrol/gasoline is the combustible material, and, the
atmosphere provides the fuel (oxygen). The presence of the above 3 elements together is called
the fire triangle. Each of these 3 elements have to be present to start a fire, and for the fire to
continue.
Using An Extinguisher
.b
So, now that you have decided how to fight a fire, and, what kind of extinguishers to use, lets
see, how to use an extinguisher. Most extinguishers are based on PASS System.
P -> Pull the Pin on the extinguisher. This pin is kept to prevent accidental discharge while
carrying/transporting the extinguishers.
A -> Aim the nozzle of the extinguisher at the base of the fire. Its very important that the
discharge from the extinguisher is directed towards the base of the fire. Most people make the
mistake of directing the extinguishing agent on the fire itself. Thats ineffective. The
extinguishing agent should be directed at the base of the fire where the burning material is
located. That is the point, where the fire-triangle is established, which needs to be broken.
S -> Squeeze the trigger, so that the extinguishing agent starts flowing out of the cylinder,
and, onto the burning material at the base of the fire.
s.
co
m
Facebook Groups
35
S -> Swipe the nozzle sideways to coat the entire burning material, with the extinguishing
agent.
PASS is an acronym to remember the steps involved Pull (the pin), Aim (the nozzle),
Squeeze (the trigger), Swipe (sideways).
Precautions While Fighting A Fire
ne
xa
ot
io
Always stay upwind: It protects you from heat, smoke etc. It allows you to go closer to fire
thus, being able to better direct your extinguishing agent. It protects you from inhalation of
poisonous gases, which might be given out during the fire.
Keep under observation, even when the fire is extinguished. Smoldering particles can easily
rekindle, thus, catching you off-guard.
Pour extinguishing agent in adequate quantity, rather than small quantities. Doing it in
installments does not help. One discharge of 60 liters of water is not the same as two
discharges of 30 liters each. E.g. If you have to pour 4 buckets of water, have the 4 buckets
ready, and, pour all 4 buckets in one go. Instead, if you pour two buckets of water, refill them,
and, pour again its not the same.
ro
an
kp
So, now that you are well equipped in fighting a fire you just need to decide, whether you
want to fight a fire, or, flee away from it. Remember, in general, timely action helps a lot in
containing the damage. Besides, more often than not, general fires (specially Class A fires) dont
spread suddenly unless, chemical reactions are involved. This means that if you can nip a fire
in the bud, you should try to fight and extinguish it.
.b
Still, no material is worth more than human life. So, dont fight, if any of the following
conditions are involved:
s.
co
m
Facebook Groups
36
You dont have sufficient/right material to fight the fire. The time spent in fighting could
impact your ability to evacuate
You dont have backup. You should be able to get help, in case, there is a need
Fire seems to be blocking your exit path
You have no idea what is burning For example - Class D fire would need specialized
knowledge of the metal under fire, and, how will that metal react with different
extinguishing agents at high temperature
Fire seems to be spreading too fast
There are explosives around
ne
xa
So, there could be a possibility that many people are not going to take part in fighting against a
fire. These people need to evacuate. Hence, there needs to be an evacuation plan in place. This
evacuation plan should be in place - before the incident of fire.
The evacuation plan should have the following items identified, and, well communicated to
everybody: - A command and control structure, which should be effective and operational as
soon as a fire is reported - Assembly area Mechanism and responsibility for headcount etc.
ot
io
In case of a fire, one should never use escalators (irrespective of the height of building which is
being evacuated). Escalators could be unreliable due to failure of electrical circuits which
operate it, or, it could have mechanical failure due to snapping of wires/ropes causing it to
go into a free-fall. At the minimum, there is a high risk of smoke inhalation, as, smoke has a
tendency to go up, and, hence, will always try to enter escalator pits from where, it can go all
the way up to the top, without any hindrance.
an
kp
ro
If there is lot of smoke, crawl on the floor. Because of smokes tendency to go up, even during
very dense smoke conditions, the lower few inches of the ground are expected to be relatively
free of smoke.
To reduce smoke inhalation, put a wet handkerchief to cover your nose. If there is no water
available, use your own saliva to wet a small portion of the handkerchief, and, use that portion
to cover your nostrils.
.b
If you can go to an open-area (for example uncovered terrace, open ground etc.), there will be
no risk of smoke-inhalation. However, use your own judgment if you decide to go to the terrace
of a high-rise building. While there will be no risk of smoke-inhalation, rescue efforts could
become difficult and is dependent on the level of sophistication that the local fire department
has (e.g. access to snorkel, very long ladders-capable of reaching high-rise buildings, rescuehelicopters etc.).
s.
co
m
Facebook Groups
37
Always evacuate in an orderly manner. A building housing 200 or so people (normal, healthy
adults) across 3-4 floors with a single exit can easily be evacuated in less than 2-3 minutes if
done in an orderly manner. If people push and shove, stampede can occur, causing much more
injury, and, it might take much longer to evacuate. Worse: Backing up might be impossible. Say,
while, people are evacuating towards an exit, and, its found that the specific exit is blocked,
there might be a need to backup. If the evacuation is not proceeding in an orderly manner, it
might not be possible to back-up; as people towards the end of the evacuation queue (who are
not aware of the blockage at the exit) will try to push forward, while, those at the front of the
queue (who are aware of the blockage) want to back-up.
ne
xa
Since, panic might set in, during a fire thereby clouding peoples thought process and ability
to think reasonably, its highly likely that during a fire, people forget these simple tenets, and, in
their attempt to rush out, actually create chaos and disorderliness. Thus, its important that
regular mock evacuation-drills are carried out. That will cause people to behave in a much more
orderly manner during an actual fire.
ot
io
While evacuating, do a quick survey to see, if there is somebody around you, who might need
some assistance, e.g. somebody who is old, too weak, injured, child, any disability etc. If
possible, provide assistance to such a person. Even if you yourself are not in a position to
provide assistance, at least request for help on this persons behalf.
If an area is already clear, while, evacuating, close the door behind you. It will serve several
purposes:
.b
an
kp
ro
Will isolate the area, thereby, causing an impediment to the spread of the fire.
Will save time for others, who might want to recede the area.
While, you should close the door, lock it only if you are absolutely sure that there is nobody
inside. Because, if there was even a single person inside it, and, you have locked it, the chances
of that person being rescued is diminished by a huge factor.
If you are inside a closed door with fire outside:
Feel the inside of the door with your hand. If the door feels hot, many a times, it might be safer
to stay inside. At this time, whether your should stay inside, or, still venture out could be a
judgment call, depending on: how long do you expect a rescue team to arrive and/or
alternative avenues (e.g. possibility of jumping from the window). If you are on the high floor of
room, with windows having strong grills and the local fire-department is not wellequipped/staffed, then, the time that you spend inside the room is actually going against you
as the fire outside becomes more vigorous. If you do decide to stay inside the room, wet
towels, bed sheets etc. and put below the doors to prevent smoke etc. from coming inside your
room.
s.
co
m
Facebook Groups
38
If you want to help in case of a fire-incident, you could help in one of the following ways:
direct help in fighting the fire (if you are able, and, are knowledgeable in fire-fighting)
provide background logistics support
inform the local fire station
io
DO NOT PANIC
Decide your strategy.
If you want to fight:
With What
How
Which arm (of the fire triangle) to fight
Or, you might want to flee (evacuate)
ot
ne
xa
ro
Remember, all the conditions might not be met, e.g. to stay upwind, you might have to get
away from the exit. Depending on the circumstances, you would have to choose which
conditions to meet, and, which one to compromise.
an
kp
You should know the local Fire-Station Number. Do not ever make test/prank calls. Besides,
being illegal, you might have to live with guilt for the rest of your life if your prank call
caused delayed response to a real fire-emergency somewhere else.
Disaster Management
.b
Floods
Floods refer to huge amount of water reaching land in a short span of time, causing land
surface to be submerged under water at places, where, land surface is usually not covered
with water.
s.
co
m
Facebook Groups
39
Floods could be caused due to natural causes, or, human activities, or, a combination of both.
Floods are caused by discharge of huge volume of water in a short span of time, at a rate, such
that the water can not be carried away from the scene of discharge.
Some of the possible reasons for such huge discharge of water could be:
ne
xa
very heavy rainfall (say: due to cyclones, typhoons etc.) in a short span of time. It should
be noted that the amount of rainfall itself is not a sufficient cause, the duration within
which the rainfall is receive is equally important contributor
breach in levy, dams etc
very high tidal waves (sometimes in the aftermath of a seismic activity, e.g.
earthquakes) etc. also called tsunamis
io
Usually, flooding impacts a large area, wherein entire district or states might be flooded.
However, sometimes, flooding is very local, i.e. limited to just one city, or, parts of it. Most
often, the localized flooding is caused due to human activities, rather than natural
phenomenon. A natural phenomenon might seem like the immediate trigger, but, in reality, this
is caused by human activity.
ot
There are some places, which get flooded almost every year. One such example is Bangladesh.
Some of the other places which had incidents of bad flooding in the recent past include:
ro
Among various kinds of disasters, flooding is unique in the sense that it has a very high degree
of predictability, both in the short term, as well as long term. In most situations, flood prone
areas are quite known in the sense that they have a history of flooding. Only in very rare
situations, a place might be flooded without having any past history of flooding. Even in such
cases, a careful study of the area could give an indication of possible flooding.
.b
an
kp
s.
co
m
Facebook Groups
40
Lack of food: Most of the food items get damaged, causing a severe shortage of food. This
shortage could be for the food to be consumed in the near future, or, even standing crops could
be damaged, causing long-term food shortage.
Lack of utilities: Utility services might have to be turned off, for the fear of electrocution, as,
there is water everywhere.
ne
xa
ot
io
ro
Usually, any of the following situations should indicate the possibility of flooding:
.b
an
kp
heavy rainfall in/around the vicinity, especially, if the specific location falls in the pathway of
the water-discharge system from the area receiving heavy rainfall
if there is heavy rainfall/flow of water/accumulation of water, on the other side of a boundary,
e.g. across a dam, across a levy, side of a river-embankment etc., because, these boundaries
might get breached
As can be seen, both the above situations can be predicted to a reasonable degree. These days,
the meteorological predictions are accurate enough for upto 4-5 days. Hence, its usually
possible to know about the possibility of heavy rainfall about 4-5 days in advance.
Also, areas which are prone to heavy rainfall, cyclones, typhoons etc. are also well-known.
Hence, the predictability is very high even in long-term, in the sense, that certain areas are
known to be flood-prone. The advantage of long-term predictability is that people might be
able to take long-term precautionary measures also requiring heavy investments.
s.
co
m
Facebook Groups
41
Also, for situations, where, there is a boundary between huge mass of water, and, your living
place, again, keeping an eye on the following two situations should be a good indication of the
possibility of flooding:
increase in the volume/mass of water being built up on the other side of the boundary
general maintenance and upkeep of the boundary
General level of civic maintenance is a good indication of the possibility of flooding,
during rainfall. If the drains and streets are generally clean, the possibility of flooding
gets reduced; on the other hand, if the drains and streets are generally choked or dirty,
the chances of flooding (atleast at the local level) gets increased.
ne
xa
Prevention of Flood
Sometimes, it might not be possible to prevent a flood, even if we know that its about to get
flooded. However, there are certain actions that can be taken to reduce the impact
significantly, or, to reduce the possibility of flooding:
ot
io
The first step is to keep the drainage system clean. This allows water to be carried down very
fast. Choked drains cause a significant reduction in the ability and speed of the water to be
drained away. In most situations of urban flooding this is a major cause. The drains might get
choked due to throwing of solid-wastes inside storm drains. These solid-wastes might include
construction material, plastics, paper etc. This is a clear example, how human activity can
amplify the process of flooding. Drains might also get choked due to falling tree-leaves etc.
an
kp
ro
General clean-up of streets is also important. As rain-water falls down the street, it rushes into
the storm drains. if the streets are not clean, the rain water trying to go into the drain carries
solid wastes into the drain with itself, which then obstructs the flow of water by the drainage
system.
.b
Rain water harvesting system: As more rain-water tries to flow down the drains, it puts that
much more stress on the drainage system. Instead, if there are several rain-water harvesting
systems, the rainfall falling in that much area would try to go to the sub-soil of the region
locally, rather than straining the drainage system. Lower is the amount of water trying to go
through the drainage system, the easier it is for the drainage system to drain off the water.
Desilting: The drains should be desilted before the onset of the rainy season. This prevents the
drains from getting choked. And, it also inceases the holding capacity of the drain, as,
accumulated silt prevents that much more water from being accumulated in the drains.
s.
co
m
Facebook Groups
42
Inspection and repair of dams, levees, embankments etc: Before the onset of seasons causing
accumulation and/or carrying of heavy volume of water (such as rainy season), these structures
should be thoroughly inspected for possible weak-spots, and, these should be repaired.
ne
xa
Afforestation: Forestation helps in binding the loose soil. The most major impact of this is, as
flood-water races through, it might take loose soil with it. This loose soil will now choke the
drains, as well as water-harvesting systems, thus, rendering both of these as ineffective. On the
other hand, trees will prevent soil to flow with the water, as, the roots of the trees will act as
binding force. Another major impact that afforestation provides is by reducing the impact of
flowing water. This has impact on large-scale flooding, such as overflowing river. As water
charges forward, its speed is reduced to some extent due to resistance offered by trees. This
can reduce the force of the charging water thereby, reducing structural damage due to
weakening in the force with which water hits various structures.
io
Local lowlands (say: foot of an overbridge) should have storm drains, so that water does not get
accumulated there. These drains should have some kind of mesh covering, so that only water
can flow in. Leaves and other solid debris should not go in these drains.
ro
ot
Local embankments around low-lying houses etc: Lets say, for some reason, your house is at a
level lower than its vicinity (e.g. road-level). This can happen, because, say: you have
constructed a basement which is obviously lower than the road-level, or, over a period of
years, the road-level has risen due to repeated tarring etc. In such cases, you should create a
local embankment between the street/road and your property, so that water can not flow
down from the street/road inside your house. These embankment might be permanent in
the form of concrete structure.
.b
an
kp
Besides impacting the process of flooding itself, most (not all) of these factors also have an
immense impact on the rate at which water levels might recede after the source of the
flooding has been removed. e.g. Lets say a city got flooded, after heavy rainfall. Now, once the
rainfall is stopped, the water levels in the streets etc. might tend to recede. At this stage, once
again, the rate at which water levels can recede is dependent on the ability of the storm drains
to carry the accumulated water, as well as the total amount of water that has been
accumulated which needs to be drained out.
Being Prepared
s.
co
m
Facebook Groups
43
People who stay in flood-prone areas should construct their houses using material which does
not get damaged severely due to flood-water. Also, since, there is a strong risk of structural
damage (for large-scale flooding), the material used to construct the house should be such that
it can withstand high impact due to the charge of flowing water. One should prefer areas,
which are slightly elevated. These could be local elevations, i.e. higher parts of the city etc.
There should be strong embankments along all entrances of the houses so that flood water
does not enter the house easily.
s.
co
m
Facebook Groups
44
Cement bags, covered with plastic sheets might be used to keep the flood water from entering
the houses.
Besides, long boots should always be kept, so that one does not run the risk of being bitten by
snakes and/or other insects that might also be trying to save themselves from the twirling
flood-waters.
ne
xa
One should keep arrangements for raising the height of items, which might get damaged in
water, e.g. put a few pieces of bricks below the legs of the furniture, such as bed etc. to raise its
height.
Important document should always be kept on higher shelves.
ot
io
As water, food and utilities would not be available and that too for possibly several days,
one should also take measures towards General Preparedness
Macro Level Efforts
ro
While some of the steps mentioned above need to be taken at municipal/city level, and, some
at individual level, there are some other techniques which have been tried/used at some
places. However, these require efforts at a much larger level. Some of these steps include:
As can be seen, such efforts require a very high degree of financial commitment, not just for
constructing the system, but, also for maintaining it.
.b
an
kp
Identified flood diversion areas: Flood waters are diverted to these unpopulated areas,
so that populated urban areas may be protected.
Construction of dams etc. at strategic locations
Levees, embankments around cities lying along river/sea coasts. The flooding of New
Orleans in the aftermath of Katrina hurricane was due to a breach in such a levee.
Sea walls
Beach nourishment: The sea-beaches are widened, so that they can absorb the impact
of flood-waters due to rise in sea-levels.
Conversion of flood-prone areas into wetlands, where, urbanization is not allowed, i.e.
one can not construct residential houses, or, any other permanent structures etc.
Disaster Management
Earthquake
ne
xa
Earthquakes refer to shaking of earth. There is continuous activity going on below the surface
of the earth. There are several large plates (size of continents) below the surface of the earth,
which move (at a very slow speed). As a part of this movement, sometimes, they collide against
each other. And, after the collision, they might still continue to push each other. As they
continually keep pushing each other, there is a pressure building up across these plates below
the surface. And, then, at a certain time, one of the plates might slide over another. This causes
an earthquake.
ot
io
Some earthquakes might be caused by activity above the surface. For example in a
mountainous region, there might be a heavy landslide. Due to a huge mass of land falling, at the
point of the fall, there could be a minor shaking of earth, due the impact of fall. However,
usually, such earthquakes are not very major.
Classifying An Earthquake
Intensity
ro
The impact of an earthquake (at any location) is characterized by two primary characteristics:
an
kp
This measures the magnitude of the event. Higher is the value, the bigger is the magnitude. The
most common scale used for measuring an earthquake is Richter Scale. It should be understood
that Richter scale is a logarithmic scale. What this means is an earthquake measuring 6.0 is 10
times more powerful than an earthquake measuring 5.0
.b
Epicenter
This denotes the exact location, where the earthquake originated. The deeper it is inside the
earth, the lower will be the impact on the surface where human beings reside.
There are 100s of earthquakes taking place on a daily basis all around the world. However,
most of these earthquakes are really low-intensity, too-low to be noticed. However, sometimes
there are some earthquakes which are significantly intense.
s.
co
m
Facebook Groups
45
Aftershocks
Earthquakes are also characterized by aftershocks. After any major seismic activity below the
earth, the new order might take a while to finally settle down. During this time, there might be
some more activity below the earth (sort of adjusting of the new positions for the various
plates, layers etc.) These activities result in several more earthquakes. These are called,
aftershocks. Typically, aftershocks are much smaller in magnitude, however, some times,
one of the aftershocks could be more severe than the main earthquake. Also, aftershocks
could strike up to several days after the main event.
ne
xa
For example the earthquake in Northern Chile (Nov. 2007) has had aftershocks till 3 days after
the main earthquake.
io
Similarly, in China (May, 2008) an aftershock of the magnitude of 6.4 on the Ritcher scale hit 13
days after the main earthquake on May 12. This aftershock destroyed 70,000 houses and
damaged many more. Each of these aftershocks were increasing the anxiety about the capacity
of the quake-created lakes to hold their water.
ot
Implications of Aftershocks
.b
an
kp
ro
Structures which are not severely damaged during the main earthquake could now get
damaged during one of the aftershocks as they are getting continuously weakened
by the earthquake and the aftershocks.
While rescue teams are trying to search through the debris of fallen buildings/bridges
etc for trapped people, an aftershock could destabilize the debris further, causing these
rescue teams themselves to become a victim. Besides, increasing the list of victims, it
has two other major impacts:
Loss of trained people and specialized equipments; which in turn means significant
impediment to the speed of further rescue
Fear among rescue teams for their own lives due to the possibility of an aftershock
causes them to proceed with extreme caution; thus, they are not able to work to their
fullest capability
In the May 2008 earthquake of Sichuan, about 200 relief workers died in mudslides
triggered by aftershocks.
s.
co
m
Facebook Groups
46
People who have suffered during an earthquake are in psychological trauma. Each aftershock
causes immense panic amongst them.
Predicting An Earthquake
Earthquakes have very low predictability in short term, i.e. in most cases, there is no warning
even a few minutes before an earthquake. However, in most cases, a much higher degree of
predictability exists in long term in the sense that if a certain area is sitting on a fault line, it
can be said that over a long period of time, there is a high risk of earthquake. However,
whether the earthquake occurs within the next few minutes, few years, few decades or,
maybe a few centuries might not be predicted.
io
ne
xa
There are certain schools of thoughts that believe that there are certain animal instincts which
provide certain degree of indication of an impending earthquake. While the beliefs in this
matter are varied, the closest scientific successful attempt to predict an earthquake is known to
be the incident of earthquake at Haicheng, Liaoning Province of China in Feb. 1975. An alert
local community and the earthquake administration noticed a change in water level in groundwells as well as behaviour patterns of certain animals. Taking this to be an indication of an
impending earthquake, many people were evacuated out of their houses. Even though, many
people had to stay outdoors in the cold, it is believed that timely evacuation helped in saving
thousands of lives.
ot
Still, the scientific community is divided about the possibility of accurately predicting
earthquakes. Even if the above example is considered as an example of ability to predict
earthquakes, its a matter of fact that since 1975 many more earthquakes have jolted our
earth, without anybody being forewarned. Some of these have been in China itself.
an
kp
ro
Many countries monitor the seismic activity below the earth. Since there are a lot of seismic
activities below the earth on a continuous basis, these countries are not necessarily interested
in these low-intensity activities. However, their interest is to see if there is a sudden increase in
seismic activities. An increase in seismic activity could imply an impending earthquake in the
near-future. However, how close (in time) might still not be predictable.
Recognizing an Earthquake
.b
The most common ways to identify the onset of an earthquake would be:
s.
co
m
Facebook Groups
47
A feeling of shaking of the ground below you, if you are sitting/standing. The most
common feeling is as if the person is feeling giddy.
Swinging of overhead hanging stuff, e.g. fans, chandeliers etc. However, in this situation,
you should distinguish between swaying of overhead hanging stuff due to wind
A feeling as if both the rear tires of your car are flat (if you are driving)
Immediate Injuries
During an earthquake, there are many ways by which one can get hurt (many times,
fatally)
s.
co
m
Facebook Groups
48
ne
xa
People inside buildings could get hurt (even critically) by fall of objects/walls/ceilings
People outside the buildings could get hurt by falling debris from damaged buildings,
glasses etc.
People traveling could get hurt by their vehicles falling off the tracks, bridges, material
falling from overhead bridges etc.
People could get electrocuted by snapped electrical wires
People could get washed away by floods caused due to tsunamis, breaches in dams
etc.
Immediate Safety
io
Hence, in case of an earthquake, the safest place to be would be in an open ground away
from all kinds of buildings and tall structures.
ot
If you can not rush out of your building, you can duck under some sturdy desk etc. which might
provide protection against heavy objects falling on your body.
ro
If even that is not possible, sit against a wall, with your back pushing the wall firmly, and, lean
forward to take your head in between both your knees, and, put your hands at the back of
your head to provide protection to your head and spine.
.b
an
kp
Or, you could stand directly below one of the door-frame in your house. This one appears a bit
strange to many people. In fact, there are jokes that after an earthquake you dont see all
those door-frames standing. So, whats the reasoning behind advising people to stand below
door-frames? In most styles of construction, doorframes are made very strong, or, would have
a RCC beam running right above these frames. Either way, this strong structure would take
the impact of objects falling from above, and, would break the impact of the heavy objects
falling on the person. If you use this posture, remember to save your arms and fingers from
swaying doors etc. If not careful, they could cause damage by chopping off fingers etc. due to
the banging of the doors against the frame.
Disaster Management
Dacoity
ne
xa
The following strategies will provide a foundation for addressing bank dacoity/robbery
problem.
.b
an
kp
ro
ot
io
s.
co
m
Facebook Groups
49
ne
xa
When it comes to IT security, physical security is the foundation for our overall strategy. But
some organizations, distracted by the more sophisticated features of software-based security
products, may overlook the importance of ensuring that the network and its components have
been protected at the physical level.
ot
io
Even before you lock down the servers, in fact, before you even turn them on for the first time,
you should ensure that there are good locks on the server room door. Of course, the best lock
in the world does no good if it isn't used, so you also need policies requiring that those doors be
locked any time the room is unoccupied, and the policies should set out who has the key or
keycode to get in.
ro
2: Set up surveillance
The server room is the heart of your physical network, and someone with physical access to the
servers, switches, routers, cables and other devices in that room can do enormous damage.
an
kp
Locking the door to the server room is a good first step, but someone could break in, or
someone who has authorized access could misuse that authority. You need a way to know who
goes in and out and when. A log book for signing in and out is the most elemental way to
accomplish this, but it has a lot of drawbacks. A person with malicious intent is likely to just
bypass it.
.b
A better solution than the log book is an authentication system incorporated into the locking
devices, so that a smart card, token, or biometric scan is required to unlock the doors, and a
record is made of the identity of each person who enters.
s.
co
m
Facebook Groups
50
A video surveillance camera, placed in a location that makes it difficult to tamper with or
disable (or even to find) but gives a good view of persons entering and leaving should
supplement the log book or electronic access system. Surveillance cams can monitor
continuously, or they can use motion detection technology to record only when someone is
moving about. They can even be set up to send e-mail or cell phone notification if motion is
detected when it shouldn't be (such as after hours).
3: Make sure the most vulnerable devices are in that locked room
Remember, it's not just the servers you have to worry about. A hacker can plug a laptop into a
hub and use sniffer software to capture data traveling across the network. Make sure that as
many of your network devices as possible are in that locked room, or if they need to be in a
different area, in a locked closet elsewhere in the building.
ne
xa
io
Rack mount servers not only take up less server room real estate; they are also easier to secure.
Although smaller and arguably lighter than (some) tower systems, they can easily be locked into
closed racks that, once loaded with several servers, can then be bolted to the floor, making the
entire package almost impossible to move, much less to steal.
ot
ro
Hackers can use any unsecured computer that's connected to the network to access or delete
information that's important to your business. Workstations at unoccupied desks or in empty
offices (such as those used by employees who are on vacation or have left the company and not
yet been replaced) or at locations easily accessible to outsiders, such as the front receptionist's
desk, are particularly vulnerable.
an
kp
Disconnect and/or remove computers that aren't being used and/or lock the doors of empty
offices, including those that are temporarily empty while an employee is at lunch or out sick.
Equip computers that must remain in open areas, sometimes out of view of employees, with
smart card or biometric readers so that it's more difficult for unauthorized persons to log on.
6: Keep intruders from opening the case
.b
Both servers and workstations should be protected from thieves who can open the case and
grab the hard drive. It's much easier to make off with a hard disk in your pocket than to carry a
full tower off the premises. Many computers come with case locks to prevent opening the case
without a key. You can get locking kits from a variety of sources for very low cost, such as the
one at Innovative Security Products.
s.
co
m
Facebook Groups
51
they leave or secure them to a permanent fixture with a cable lock, such as the one at PC
Guardian.
Handhelds can be locked in a drawer or safe or just slipped into a pocket and carried on your
person when you leave the area. Motion sensing alarms such as the one at SecurityKit.com are
also available to alert you if your portable is moved.
ne
xa
For portables that contain sensitive information, full disk encryption, biometric readers, and
software that "phones home" if the stolen laptop connects to the Internet can supplement
physical precautions.
8: Pack up the backups
ot
io
Backing up important data is an essential element in disaster recovery, but don't forget that the
information on those backup tapes, disks, or discs can be stolen and used by someone outside
the company. Many IT administrators keep the backups next to the server in the server room.
They should be locked in a drawer or safe at the very least. Ideally, a set of backups should be
kept off site, and you must take care to ensure that they are secured in that offsite location.
an
kp
ro
Don't overlook the fact that some workers may back up their work on floppy disks, USB keys, or
external hard disks. If this practice is allowed or encouraged, be sure to have policies requiring
that the backups be locked up at all times.
.b
If you don't want employees copying company information to removable media, you can
disable or remove floppy drives, USB ports, and other means of connecting external drives.
Simply disconnecting the cables may not deter technically savvy workers. Some organizations
go so far as to fill ports with glue or other substances to permanently prevent their use,
although there are software mechanisms that disallow it. Disk locks, such as the one at
SecurityKit.com, can be inserted into floppy drives on those computers that still have them to
lock out other diskettes.
s.
co
m
Facebook Groups
52
ne
xa
Also think about the physical security of documents that workers print out, especially extra
copies or copies that don't print perfectly and may be just abandoned at the printer or thrown
intact into the trash can where they can be retrieved. It's best to implement a policy of
immediately shredding any unwanted printed documents, even those that don't contain
confidential information. This establishes a habit and frees the end user of the responsibility for
determining whether a document should be shredded.
Summary
io
Remember that network security starts at the physical level. All the firewalls in the world won't
stop an intruder who is able to gain physical access to your network and computers, so lock up
as well as lock down.
ot
ro
INDIVIDUAL PLANS
an
kp
.b
s.
co
m
Facebook Groups
53
Protection Plans
Protection Plans are low cost insurance plans which are specially designed to provide full
protection & financial stability to your family in case of any unforeseen events.
ne
xa
As a caring parent you would always want your child to get the very best. To ensure that you
fulfill dreams that you may have for your loved ones, financial planning for their secured future
is very important.
Savings Plans
ot
io
At SBI Life, we understand that. Thats why we present you host of child plans so that you can
choose the one that suits your and your childs needs best. Our plans are as accommodating as
you are for your child. Celebrate Life!
an
kp
ro
You may have plans for your loved ones or for yourself. It makes perfect sense to prepare well
in advance with saving plan combined with life insurance cover. SBI Lifes plans will help you
plan for your savings, be it your childs wedding or education, buying a house or that dream
vacation. So that you can Celebrate Life!
.b
s.
co
m
Facebook Groups
54
Pension Plans
Increasing life expectancy rate, rising health care costs, absence of social security system in
India and disintegration of joint family system are some of the key reasons that makes
retirement planning very critical.
s.
co
m
Facebook Groups
ne
xa
Retirement Solutions
ro
ot
io
What better way to reward your loyal employees than with a secure future? SBI Lifes Group
Retirement Insurance Plans are designed to provide security and financial stability to an
employees family ensuring a loyal and motivated workforce. These plans safeguard and ensure
availability of funds to meet your companys obligations on gratuity, superannuation, pension /
annuity and leave encashment. Depending on your needs, you can choose between traditional
and unit linked plans.
an
kp
Never compromise on the dreams of your family and children. If you believe in this, you must
make your employees believe in the same too. SBI Life offers pure protection cover for your
employees to ensure that their families are financially well secured in the event of unforeseen
and unfortunate circumstances.
.b
55
IPC Section 96 to 106 of the penal code states the law relating to the right of private defence of
person and property.
io
ne
xa
The provisions contained in these sections give authority to a man to use necessary force
against an assailant or wrong-doer for the purpose of protecting ones own body and property
as also anothers body and property when immediate aid from the state machinery is not
readily available and in so doing he is not answerable in law for his deeds. Section 97 says that
the right of private defence is of 2 types:
ro
ot
Body may be ones own body or the body of another person and likewise property may be
movable or immovable and may be of oneself or of any other person. Self-help is the first rule
of criminal law. The right of private defence is absolutely necessary for the protection of ones
life, liberty and property. It is a right inherent in a man. But the kind and amount of force is
minutely regulated by law. The use of force to protect ones property and person is called the
right of private defence.
.b
an
kp
It is the first duty of man to help himself. The right of self-defence must be fostered in the
Citizens of every free country. The right is recognised in every system of law and its extent
varies in the inverse ratio to the capacity of the state to protect life and property of the subject(
citizens). It is the primary duty of the state to protect the life and property of the individuals,
but no state, no matter how large its resources, can afford to depute a policeman to dog the
steps of every rouge in the country. Consequently this right has been given by the state to every
citizen of the country to take law into his own hand for their safety. One thing should be clear
that, there is no right of private defence when there is time to have recourse to the protection
of police authorities. The right is not dependent on the actual criminality of the person resisted.
It depends solely on the wrongful or apparently wrongful character of the act attempted, if the
apprehension is real and reasonable, it makes no difference that it is mistaken. An act done in
exercise of this right is not an offence and does not, therefore, give rise to any right of private
defence in return.
s.
co
m
Facebook Groups
56
ne
xa
Right of private defence cannot be said to be an offence in return. The right of self-defence
under Section 96 is not absolute but is clearly qualified by Section 99 which says that the right
in no case extends to the inflicting of more harm than it is necessary for the purpose of
defence. It is well settled that in a free fight, no right of private defence is available to either
party and each individual is responsible for his own acts. While it is true that law does not
expect from the person, whose life is placed in danger, to weigh, with nice precision, the extent
and the degrees of the force which he employs in his defence, it also does not countenance
that the person claiming such a right should resort to force which is out of all proportion to the
injuries received or threatened and far in excess of the requirement of the case. The onus of
proving the right of private defence is upon the person who wants to plead it. But an accused
may be acquitted on the plea of the right of private defence even though he has not specifically
pleaded it.
ro
ot
io
Courts are empowered to exempt in such cases. It must be borne in mind that the burden of
proving an exception is on the accused. It is not the law that failure to setup such a defence
would foreclose this right to rely on the exception once and for all. It is axiomatic that burden
on the accused to prove any fact can be discharged either through defence evidence or even
through prosecution evidence by showing a preponderance of probability. It is true that no case
of right of private defence of person has been pleaded by the accused not put forth in the
cross-examination to the eye-witnesses but it is well settled that if there is a reasonable
probability of the accused having acted in exercise of right of private defence, the benefit of
such a plea can still be given to them.
.b
an
kp
The right of private defence, as the name suggests, is an act of defence and not of an offence.
Consequently, it cannot be allowed to be used as a shield to justify an aggression. This requires
a very careful weighing of the facts and circumstances of each case to decide as to whether the
accused had in fact acted under this right. Assumptions without any reasonable basis on the
part of the accused about the possibility of an attack do not entitle him to exercise this right. It
was held in a case that the distance between the aggressor and the target may have a bearing
on the question whether the gesture amounted to assault. No precise yardstick can be provided
to fix such a distance, since it depends upon the situation, the weapon used, the background
and the degree of the thirst to attack etc.
s.
co
m
Facebook Groups
57
The right of private defence will completely absolve a persons from all guilt even when he
causes the death of another person in the following situations, i.e
If the deceased was the actual assailant, and
If the offence committed by the deceased which occasioned the cause of the exercise of the
right of private defence of body and property falls within anyone of the six or four categories
enumerated in Sections 100 and 103 of the penal code.
Thangavel case:
The general proverb or adage that necessity knows no law does not find a place in modern
jurisprudence. The right of self-preservation is inherent in every person but to achieve that end
nothing could be done which militates against the right of another person. In the other words,
society places a check on the struggle for existence where the motive of self-preservation
would dictate a definite aggression on an innocent person.
ne
xa
Kamparsare vs Putappa:
Where a boy in a street was raising a cloud of dust and a passer-by therefore chased the boy
and beat him, it was held that the passer-by committed no offence. His act was one in exercise
of the right of private defence.
io
Section 97.Right of private defence of the body and of Property:Every person has a right, subject to the restrictions contained in Section 99, to defend-
ot
First-His own body, and the body of any other person, against any offence affecting the human
body;
ro
.b
an
kp
This Section limits exercise of the right of private defence to the extent of absolute necessity. It
must not be more than necessary for defending aggression. There must be reasonable
apprehension of danger that comes from the aggressor in the form of aggression. This Section
divides the right of private defence into two parts, i.e. the first part deals with the right of
private defence of person, and the second part with the right of private defence of property. To
invoke the plea of right of private defence there must be an offence committed or attempted
to be committed against the person himself exercising such a right, or any other person. The
question of the accrual of the right of the private defence, however, does not depend upon an
injury being caused to the man in question. The right could be exercised if a reasonable
apprehension of causing grievous injury can be established. If the threat to person or property
of the person is real and immediate, he is not required to weigh in a golden scale the kind of
instrument and the force which he exerts on the spur of the moment. The right of private
defence extends not only to the defence of ones own body and property, as under the English
law, but also extends to defending the body and property of any other person.
s.
co
m
Facebook Groups
58
Thus under section 97 even a stranger can defend the person or property of another person
and vice versa, whereas under the English law there must be some kind of relationship existing
io
ne
xa
such as father and son, husband and wife, etc., before this right may be successfully exercised.
A true owner has every right to dispossess or throw out a trespasser, while the trespasser is in
the act or process of trespassing but has not accomplished his mission; but this right is not
available to the true owner if the trespasser has been successful in accomplishing possession
and his success is known by the true owner. In such circumstances the law requires that the
true owner should dispossess the trespasser by taking recourse to the remedies available under
the law. The onus of establishing plea of right of private defence is on the accused though he is
entitled to show that this right is established or can be sustained on the prosecution evidence
itself. The right of private defence is purely preventive and not punitive or retributive. Once it is
held that the party of the accused were the aggressors, then merely because a gun was used
after some of the party persons had received several injuries at the hands of those who were
protecting their paddy crop and resisting the aggression of the party of the accused, there can
be no ground for taking the case out of Section 302, I.P.C., if otherwise the injuries caused bring
the case within the definition of murder.
ot
Chotelal vs State:
B was constructing a structure on a land subject to dispute between A and B. A was trying to
demolish the same. B therefore assaulted A with a lathi. It was held that A was responsible for
the crime of waste and B had therefore a right to defend his property.
an
kp
ro
.b
IPC Section 98. Right of private defence against the act of a person of unsound mind, etc:
When an act, which would otherwise be a certain offence, is not that offence, by reason of the
youth, the want of maturity of understanding, the unsoundness of mind or the intoxication of
the person doing that act, or by reason of any misconception on the part of that person, every
person has the same right of private defence against that act which he would have if the act
were that offence.
s.
co
m
Facebook Groups
59
Illustrations: Z, under the influence of madness, attempts to kill A; Z is guilty of no offence. But A has the
same right of private defence which he would have if Z were sane.
A enters by night a house which he is legally entitled to enter Z, in good faith, taking A for a
house breaker, attacks A. Here Z, by attacking A under this misconception, commits no offence.
But A has the same right of private defence against Z, which he would have if Z were not acting
under that misconception.
ne
xa
This Section lay down that for the purpose of exercising the right of private defence, physical or
mental capacity of the person against whom it is exercised is no bar. In other words, the right of
private defence of body exists against all attackers, whether with or without mens rea. The
above mentioned illustration are pointing a fact that even if an attacker is protected by some
exception of law, that does not diminish the danger and risk created from his acts. That is why
the right of private defence in such cases also can be exercised, or else it would have been futile
and meaningless.
io
IPC Section 99. Act against which there is no right of private defence:
There is no right of private defence against an act which does not reasonable cause the
apprehension of death or of grievous hurt, if done, or attempted to be done, by a public servant
acting in good faith under colour of his office, though that act, may not be strictly justifiable by
law.
ot
There is no right of private defence against an act which does not reasonable cause the
apprehension of death or of grievous hurt, if done, or attempted to be done, by the direction of
a public servant acting in good faith under colour of his office, though that direction may not be
strictly justifiable by law. There is no right of private defence in cases in which there is time to
have recourse to the protection of the public authorities.
ro
Extent to which the right may be exercised:--The right to Private defence in no case extends to
the inflicting of more harm that it is necessary to inflict for the purpose of defence.
an
kp
Explanation 1: - A person is not deprived of the right of private defence against an act done, or
attempted to be done, by a public servant, as such, unless he knows or has reason to believe,
that the person doing the act is such public servant.
.b
Explanation 2: - A person is not deprived of the right of private defence against an act done, or
attempted to be done, by the direction of a public servant, unless he knows, or has reason to
believe, that the person doing the act is acting by such direction, or unless such person states
the authority under which he acts, or if he has authority in writing, unless he produces such,
demanded.
s.
co
m
Facebook Groups
60
Section 99 lays down that the conditions and limits within which the right of private defence
can be exercised. The section gives a defensive right to a man and not an offensive right. That is
to say, it does not arm a man with fire and ammunition, but encourage him to help himself and
others, if there is a reasonable apprehension of danger to life and property. The first two
clauses provide that the right of private defence cannot be invoked against a public servant or a
person acting in good faith in the exercise of his legal duty provided that the act is not illegal.
Similarly , clause three restricts the right of private defence, if there is time to seek help of
public authorities. And the right must be exercised in proportion to harm to be inflicted. In
other words , there is no right of private defence :
ne
xa
The protection to public servants is not absolute. It is subject to restrictions. The acts in either
of these clauses must not be of serious consequences resulting in apprehension of causing
death or of grievous hurt which would deprive one of his right of private defence.
ot
io
To avail the benefit of those clauses (i) the act done or attempted to be done by a public
servant must be done in good faith; (ii) the act must be done under the colour of his office; and
(iii) there must be reasonable grounds for believing that the acts were done by a public servant
as such or under his authority in the exercise of his legal duty and that the act is not illegal.
Good faith plays a vital role under this section. Good faith does not require logical infallibility
but due care and caution as defined under Section 52 of the code.
an
kp
ro
Emperor vs Mammun:
The accused, five in number, went out on a moonlit night armed with clubs, and assaulted a
man who was cutting rice in their field. The man received six distinct fractures of the skullbones besides other wounds and died on the spot. The accused on being charged with murder
pleaded right of private defence of their property. Held under Section 99 there is no right of
private defence in cases where there is time to have recourse to the protection of the public
authorities.
.b
s.
co
m
Facebook Groups
61
IPC Section100. When the right of private defence of the body extends to causing death:
The right of private defence of the body extends, under the restrictions mentioned in the last
preceding section, to the voluntary causing of death or of any other harm to the assailant, if the
offence which occasions the exercise of the right be of any of the descriptions hereinafter
enumerated, namely:-
ne
xa
First-Such an assault as may reasonably cause the apprehension that death will otherwise be
the consequence of such assault;
Secondly-Such an assault as may reasonably cause the apprehension that grievous hurt will
otherwise be the consequence of such assault;
Thirdly-An assault with the intention of committing rape;
Fourthly-An assault with the intention of gratifying unnatural lust;
Fifthly-An assault with the intention of kidnapping or abducting;
Sixthly-An assault with the intention of wrongfully confining a person, under circumstances
which may reasonably cause him to apprehend that he will be unable to have recourse to the
public authorities for his release.
ot
io
To invoke the provisions of sec 100, I.P.C., four conditions must exist:
That the person exercising the right of private defense must be free from fault in bringing
about the encounter.
There must be present an impending peril to life or of great bodily harm
There must be no safe or reasonable mode of escape by retreat;
There must have been a necessity for taking the life.
an
kp
ro
Moreover before taking the life of a person four cardinal conditions must be present:
(a) the accused must be free from fault in bringing the encounter;
(b) presence of impending peril to life or of great bodily harm, either real or apparent as to
create an honest belief of existing necessity;
(c) no safe or reasonable mode of escape by retreat; and
(d) a necessity for taking assailants life.
.b
s.
co
m
Facebook Groups
62
ne
xa
her return from the accused. The latter refused to comply and the woman herself expressly
stated her unwillingness to rejoin her Muslim husband. Thereupon the husbands relatives
attempted to take her away by force. The accused resisted the attempt and in so doing one of
them inflicted a blow on the head of the womans assailants, which resulted in the latters
death. It was held that the right of the accused to defend the woman against her assailants
extended under this section to the causing of death and they had, therefore, committed no
offence.
io
IPC Section101. When such right extends to causing any harm other than death:
If the offence be not of any of the descriptions enumerated in the last preceding section, the
right of private defence of the body does not extend to the voluntary causing of death to the
assailant, but does extend, under the restrictions mentioned in Section 99, to the voluntary
causing to the assailant of any harm other than death.
ot
Mohinder Pal Jolly v. State of Punjab:Workers of a factory threw brickbats and the factory owner by a shot from his revolver caused
the death of a worker, it was held that this section did not protect him as there was no
apprehension of death or grievous hurt.
an
kp
ro
IPC Section102. Commencement and continuance of the right of private defence of the body:
The right of private defence of the body commences as soon as a reasonable apprehension of
danger to the body arises from an attempt or threat to commit the offence though the offence
may not have been committed; and it continues as long as such apprehension of danger to the
body continues. The apprehension of danger must be reasonable, not fanciful. For example,
one cannot shoot ones enemy from a long distance, even if he is armed with a dangerous
weapon and means to kill. This is because he has not attacked you and therefore there is no
reasonable apprehension of attack. In other words, there is no attack and hence no right of
private defence arises. Moreover the danger must be present and imminent.
.b
Kala Singh case:The deceased who was a strong man of dangerous character and who had killed one person
previously picked up a quarrel with the accused, a weakling. He threw the accused on the
ground, pressed his neck and bit him. The accused when he was free from the clutches of this
brute took up a light hatchet and gave three blows of the same on the brutes head. The
deceased died three days later. It was held that the conduct of the deceased was aggressive
and the circumstances raised a strong apprehension in the mind of the accused that he would
be killed otherwise. The apprehension, however, must be reasonable and the violence inflicted
must be proportionate and commensurate with the quality and character of the act done. Idle
threat and every apprehension of a rash and timid mind will not justify the exercise of the right
of private defence.
s.
co
m
Facebook Groups
63
IPC Section103. When the right of private defence of property extends to causing death:
The right of private defence of property extends, under the restrictions mentioned in Section
99, to the voluntary causing of death or of any other harm to the wrong-doer, if the offence,
the committing of which, or the attempting to commit which, occasions the exercise of the
right, be an offence of any of the descriptions hereinafter enumerated, namely;
io
ne
xa
First-Robbery;
Secondly-House-breaking by night;
Thirdly-Mischief by fire committed on any building, tent or vessel, which building, tent of vessel
is used as a human dwelling, or as a place for the custody of property;
Fourthly-Theft, mischief, or house-trespass, under such circumstances as may reasonably cause
apprehension that death or grievous hurt will be the consequence, if such right of private
defence is not exercised.
ro
ot
IPC Section 103 provides the right of private defence to the property whereas IPC Section 100 is
meant for exercising the right of private defence to the body of a person. It justifies homicide in
case of robbery, house breaking by night, arson and the theft, mischief or house trespass which
cause apprehension or grievous harm. If a person does not have possession over the property,
he cannot claim any right of private defence regarding such property. Right to dispossess or
throw out a trespasser is not available to the true owner if the trespasser has been successful in
accomplishing his possession to his knowledge. This right can be only exercised against certain
criminal acts which are mentioned under this section.
.b
an
kp
s.
co
m
Facebook Groups
64
Section104 IPC. When such right extends to causing any harm other than death:
If the offence, the committing of which, or the attempting to commit which, occasions the
exercise of the right of private defence, be theft, mischief, or criminal trespass, not of any of
the descriptions enumerated in the last preceding section, that right does not extend to the
voluntary causing of death, but does extend, subject to the restrictions mentioned in section
99, to the voluntary causing to the wrong -doer of any harm other than death.
ne
xa
This Section cannot be said to be giving a concession to the accused to exceed their right of
private defence in any way. If anyone exceeds the right of private defence and causes death of
the trespasser, he would be guilty under Section 304, Part II. This Section is corollary to Section
103 as Section 101 is a corollary to Section 100.
ot
io
V.C.Cheriyan v. State:
The three deceased person along with some other person had illegally laid a road through the
private property of a Church. A criminal case was pending in court against them. The three
accused persons belonging to the Church put up barricades across this road with a view to close
it down. The three deceased who started removing these barricades were stabbed to death by
the accused. The Kerela High Court agreed that the Church people had the right of private
defence but not to the extent of causing death of unarmed deceased person whose conduct did
not fall under Section 103 of the Code.
an
kp
ro
.b
The right of private defence of property against criminal trespass or mischief continues as
long as the offender continues in the commission of criminal trespass or mischief.
The right of private defence of property against house-breaking by night continues as long as
the house-trespass which has been begun by such house-breaking continues.
s.
co
m
Facebook Groups
65
This right can be exercised if only there is no time to have recourse of public authorities. As
soon as the trespass is accomplished successfully the true owner of the property loses right of
private defence to protect property. No right of private defence to protect property is available
to a trespasser when disputed land is not at all in possession of him.
Section106. Right of private defence against deadly assault when there is risk of harm to
innocent person:
s.
co
m
Facebook Groups
66
If in the exercise of the right of private defence against an assault which reasonably causes the
apprehension of death, the defender be so situated that he cannot effectually exercise that
right without risk of harm to an innocent person his right or private defence extends to the
running of that risk.
ne
xa
Illustration
A is attacked by a mob who attempt to murder him. He cannot effectually exercise his right of
private defence without firing on the mob, and he cannot fire without risk of harming young
children who are mingled with the mob. A commits no offence if by so firing he harms any of
the children.
ot
io
This section removes an impediment in the right of private defence. The impediment is the
doubt in the mind of the defender as to whether he is entitled to exercise his right even when
there is a possibility of some innocent persons being harmed by his act. The Sections says that
in the case of an assault reasonably causing an apprehension of death, if the defender is faced
with such a situation where there exists risk of harm to an innocent person, there is no
restriction on him to exercise his right of defence and he is entitled to run that risk.
an
kp
ro
Conclusion
To justify the exercise of this right the following are to be examined: The entire accident
Injuries received by the accused
Imminence of threat to his safety
Injuries caused by the accused
Circumstances whether the accused had time to recourse to public authorities.
.b
Right of private defence is a good weapon in the hand of every citizen to defend himself. This
right is not of revenge but toward the threat and imminent danger of an attack. But people can
also like misuse this right. Its very difficult for court to find out whether this right had been
exercised in good faith or not.
s.
co
m
Facebook Groups
Air Force
Navy
Officers
Army
General
Lt. General
Air Marshal
Major General
Brigadier
Air Commodore
Colonel
Group Captain
Lt. Colonel
Wing Commander
Major
Squadron Leader
Captain
Flight Lieutenant
Lieutenant
Lieutenant
Flying Officer
Sub Lieutenant
ne
xa
*Field Marshal
Admiral
Vice Admiral
Rear Admiral
Commodore
ot
io
Captain
Commander
Lt. Commander
ro
Air Force
an
kp
Army
Navy
Subedar/Risaldar Major
Subedar/Risaldar
Warrant Officer
Naib Subedar/Risaldar
Naik
Corporal
Leading Seaman
Lance Naik
Leading Aircraftsman
Seaman I
Sepoy
Airman
Seaman II
.b
Note : Personnel below Officer ranks too are Promoted to Officer ranks , known as Honorary
ranks for their exceptional Service.
67
ot
io
ne
xa
ro
.
FIRST AID PROCEDURES
an
kp
Following are some basic first aid procedures for treating shock, bleeding and wounds, burns,
choking, electric shock, eye injury, fainting, heat stroke, hypothermia, and unconsciousness.
These techniques can be used in the workplace or at home and being prepared will help make
the most of a serious situation.
.b
Shock
s.
co
m
Facebook Groups
68
Shock can be life threatening. Symptoms include cold sweat, weakness, irregular
breathing, chills, pale or bluish lips and fingernails, rapid weak pulse and nausea.
Seek medical help immediately.
Do not give the victim anything to eat or drink.
Lay the victim on his/her back, but do not move him/her if there's a back or neck injury.
If the victim is unconscious, vomiting or has severe injury to the lower face or jaw, lay
him/her on his/her side and be sure the victim is getting adequate air.
Keep the victim warm (not hot) by use of blankets or clothes.
Raise the victim's feet and legs with a pillow. (Only do this if it does not cause the victim
any pain.)
ne
xa
ro
ot
io
Burns
1. Chemical or Compressed Gas Burns
Use a drench hose, emergency shower or eyewash for at least 15 minutes to rinse away
all traces of chemicals while removing any contaminated clothing from the victim.
Cover the burn loosely with a clean, dry cloth or special burn dressing.
Check the victim for shock.
Call or seek medical attention as soon as possible.
.b
an
kp
s.
co
m
Facebook Groups
69
Choking
Note: These instructions are for choking victims over one year of age. There are specific
guidelines for treatment of infant choking that are not outlined in this document.
If the victim can speak or cough forcibly and is getting sufficient air, do not interfere with
his/her attempts to cough the obstruction from the throat. If the victim cannot speak or is not
getting sufficient air, have someone call for help while you perform abdominal thrusts.
1. Stand directly behind the victim and wrap your arms around the stomach.
2. Make a fist with one hand and place that fist just above the navel and well below the ribs,
with the thumb and forefinger side toward you.
3. Grasp this fist with the other hand and pull it quickly toward you with an inward and slightly
upward thrust. Repeat if necessary.
io
ne
xa
ot
Electric Shock
Do not touch the victim until electrical contact is broken.
If possible, unplug or switch off the source of electricity.
If victim is not breathing and has no pulse, call or seek medical attention immediately.
ro
Eye Injury
an
kp
1. Chemical
Hold the eyelids apart and flush the eyeball with lukewarm water for at least 15-30
minutes. Be careful not to let runoff water flow into the other eye.
Place a gauze pad or cloth over both eyes and secure it with a bandage.
Get to an eye specialist or emergency room immediately.
.b
s.
co
m
Facebook Groups
70
Fainting
Note: Fainting victims regain consciousness almost immediately. If this does not happen, the
victim could be in serious danger and you should call for help as soon as possible.
Lay the victim down on their back and make sure they have plenty of fresh air.
Reassure the victim and apply a cold compress to the forehead.
If the victim vomits, roll the victim on his/her side and keep the windpipe clear.
Report the fainting incident to the victim's doctor.
s.
co
m
Facebook Groups
71
ne
xa
Heat Stroke
Heat stroke can be life threatening. Symptoms can include a body temperature of 105F
or higher; dry, hot, flushed skin; rapid pulse; unconsciousness; and lack of perspiration.
Get the victim out of the heat and into a cooler place.
Place the victim in the shock position, lying on the back with feet up.
Remove or loosen the victim's clothing.
Cool the victim by fanning and applying cloth-wrapped cold packs or wet towels.
Treat for shock.
ot
io
an
kp
ro
Unconsciousness
Determine responsiveness by gently tapping the victim's shoulder and asking, "Are you
okay?"
If there is no response, shout "Help!" and look for a medical alert tag on the victim's
neck or wrist.
If victim is not breathing and has no pulse, begin CPR.
Call or seek medical help as soon as possible.
.b
io
ne
xa
ot
.b
an
kp
ro
This notes had been compiled by collecting information from various websites over internet.
First of all we thank all the original contributors. Though we had taken enough care to go
through the notes, they are very common in nature and may not be exactly as per your
requirement. We request everyone to update yourself basically with the latest information
related to your bank through your banks website, RBI website and other authenticated
sources. I also request you to go through the attached files on specification of Strong
Rooms/Vaults/Safes/Strong Room Doors as per BIS standards though it is not mentioned in
your syllabus. In case you find any incorrect/doubtful information, kindly update us (along with
the source link/reference for the correct information).
s.
co
m
Facebook Groups
72