Security
Security
Security
Security
including the king is the subject of law. It was the time that a central court system was
established where in such institutions and courts like Coraners, Justice of Peace,
Chancery courts , the Privy Councils were established.
In 1784, author and magistrate Henry Fielding proposed a permanent profession
and adequately paid security force. His most valuable contribution was the “Foot Patrol “
to make the streets safe and mounted patrol for the highways.
The Industrial Revolution during the latter half of 18th Century began to gather
momentum. The people flocked to the cities lured by promises of work and wages. The
crowding of the cities with the influx of wealth seeker brought by theory, crimes of
violence and juvenile delinquencies. The came of “ Laisses Faire” which contented that
labor was the source of wealth; and it was by freedom of labor that the public wealth
would best be promoted. Crime rate spiraled the response to high crimes brought
citizens to escort carrying of firearms for protection and they continued to band together
to hire special police to protect homes and properties. This is the beginning of private
security.
In America, security practices in early days of the colonization followed those of
England. Mutual protection and accountability characterized the various groups. The
American Revolution sprang and the declaration of Independence was born. Police
power is bestowed upon the state to permit interference with the normal personal and
property rights in the interest of conducting government in the general public interest. In
1783, a police department was established in New York City followed by Detroit in 1801,
Cincinnati in 1803, Chicago in 1846, Los Angeles in 1850 Philadelphia in 1855 and
Dallas in 1856.
the advent of the World War II causes an even more dramatic development of
private security agencies. Security personnel constituted a large work force looking for
jobs involving security services and thus usher in the era of modern security.
In 1859, Allan Pinkerton, a cooper from Scotland and the Chicago’s Police
Department detective , established one of the oldest private security forces in the United
States. This company aside from providing investigation of crimes and security for
industrial concerns also serve as the intelligence gathering arm of the Union Army
during the civil war. In 1889, Brinks Incorporated started the business as a private
service to protect property payrolls. In 1990, the William J.Burns Inc. was formed to
become the sole investigating agency for the American Banking Association. Pinkerton
and Burns were the only national investigative bodies concerned with non-specialized
crime until the advent of the Federal Bureau of Investigation.
In the Philippines, it would be wise to trace the steps leading to the final signing
by President Ferdinand E. Marcos on June 13, 1969 of Republic Act 5487, the Private
Security Agency law. In this law was assigned the most important role of security Guard
Force assisting the police in its mission to safeguard lives and properties. Then the
Philippine Constabulary (PC) played a great role in supervising all Private constabulary
issued staff memo dated August 4, 1969 creating the Philippine Constabulary Security
and Investigation Agency Supervisory Office (PCSIASO). After barely two months
another General Staff Memo was issued renaming PCSIASO to PCSOSIA( Philippine
Constabulary Supervisory Office for Security and Investigation Agencies. On June 29,
1970, it was renamed as PCSUSIA ( Philippine Constabulary Supervisory Unit for
Security and Investigation Agencies) However, the supervision later on transferred to
the National Intelligence Coordinating Agency (NICA). With the intention of continuously
professionalizing the security industry , several Presidential Decrees were issued such
as PD no. 11 issued on October 1972, amending certain sections of RA 5487
particularly Section 4 as to who may organize security and watchman agency; PD 100
on January 17,1973 further amended section 3,4,5,8,and 9 which permits the watchman
or security guard to assist in case of emergency disaster or calamity.
With the creation of Philippine National Police on January 1,1991 pursuant to
RA6975, PCSUSIA became Supervisory Office for Security and Investigation Agencies
(SOSIA) and on January 1, 1995 it was renamed as PNP SAGSD (Security Agencies
and Guard Supervision Division) This unit of the PNP was given the same function to
that of the PCSOSIA but a more challenging and expanding tasks . To date there are
more or less two thousand (2,000) registered security agencies operating in the
Philippines., Five Hundred Sixty Thousand (560,000) licensed security personnel and
one Hundred twenty four (124) Private Security Training Institutions.
B. Security in General
1. Definition of Security
Security, in a collective sense, is the same as protection and safety; the state of
being safe and the condition of being protected against physical, social, spiritual,
financial, political, emotional,occupational , psychological or other types of
consequences of failure, damage, error, accidents, harm or any other event which could
be considered not desirable.
Security is also a freedom from fear, harm, danger,loss, destruction or damages.
Basically, it is the action of man against man that led to many unsecured and unsafe
condition . Reasons could be economic, revenge, or unjust plain greed and avarice.
LESSON 2
At the end of this topic, the student should be able to :
a) Understand the different fields of Security
b) Know and understand the Types of security
2. Fields of Security
The following are the fields of security classified according to its sphere or
subjects;
a) IT FIELDS
● Computing Security- is a branch of information security applied to both
theoretical and actual computer systems. Computer Security is a branch of computer
science that addresses enforcement to secure behavior on the operations of computers.
The definition of secure varies by application , and is typically define implicitly or
explicitly by a security policy that addresses confidentiality, integrity, and availability of
electronic information that is processed by or stored on computer systems.
● Data Security- is the means of ensuring that data is kept safe from corruption
and that access to it is suitably controlled. Thus data security helps to ensure privacy. It
also helps in protecting personal data.
● Application Security- encompasses measures taken to prevent exceptions in
the security policy of an application or the underlying system through flaws in the
design, development, or deployment of the application.
● Information Security- means protecting information and information system
from unauthorized access, use, disclosure, disruption , modification or destruction.
The terms information security, computer security and information assurance are
frequently used interchangeably. These field are interrelated and share the common
goals of protecting the confidentiality, integrity, and availability of information; however,
there are some subtle differences between them. These differences lie primarily in the
approach to the subject, methodologies used, and areas of concentration.Information
Security is concerned to the confidentiality, integrity and availability of data regardless of
the form of data may take: electronic, print or other forms.
● Network Security – consist of provisions made in the underlying computer
network infrastructure, policies adopted by the network administrator to protect the
network and the network accessible resources from unauthorized access and the
effectiveness (or lack ) of these measures combined together.
b) PHYSICAL SECURITY
● Physical Security – describes measures that prevent or deter attackers from
accessing a facility, resources, , or information stored on physical media. It can be
simple as a locked door or as elaborated as multiple layers of armed guard post.
● Shopping Center Security (Mall or Supermarket) – a type of security which
is concerned with the protection of the stores, warehouses, storage, its immediate
premises and properties as well as the supermarket personnel and costumers. Security
personnel are trained to detect “shoplifter”, robbery, and bomb detection and costumer
relation.
● Airport Security- refers to the techniques and methods used in protecting
airports and by extension aircraft from crime and terrorism.
● Home Security- are methods used of protecting residential homes or town
sites which include the interior protection of houses against property losses or
damages.
c) POLITICAL FIELD
● International Security- consists of measures taken by nations and
international organizations such as United Nations, to ensure mutual survival and
safety. These measures include military action and diplomatic agreements such as
treaties and conventions. International and national security is invariably linked.
● National Security –refers to the requirement to maintain the survival of the
nation-state through use of economic, military and political power and the exercise of
diplomacy.
● Human Security – refers to an emerging paradigm for understanding global
vulnerabilities whose proponents challenge the traditional notion of national notion of
national security by arguing that the proper referent for security should be the individual
rather than the state. Human security holds that a people centered view of security is
necessary for national, regional and global stability.
d) MONETARY FIELD
● Financial Security- refers to the methods applied for the protection of fungible,
negotiable instrument representing financial value. It broadly categorized into debt
securities, such as banknotes, bonds and debentures, and equity securities, etc.
3. TYPES OF SECURITIY
a. Industrial Security- a type of security applied to business groups in industries
like manufacturing, assembling, research and development, processing, warehousing
and even agriculture.
b. Hotel Security –a type of security applied to hotels where its properties are
protected from pilferage, loss, damage and the function in the hotel restaurants are not
disturbed and troubled by the outsiders or the quest themselves. This type of security
employs house detectives, uniforms guard and supervisor and insures that hotels
guests and their personal effects are safeguarded.
c. Bank security- this type of security is concern with bank operations. Its main
objective is the protection of bank cash and assets, its personnel and client. Security
personnel are trained to safeguard bank and assets while in storage,in transit and
during transactions.
d. VIP Security – a type of security applied for the protection of top-ranking
officials of the government or private entity, visiting persons of illustrious standing and
foreign dignitaries.
e. School Security- a type of security that is concern with the protection of
students, faculty members and school properties. Security personnel are trained to
protect the school property from theft, vandals, handling campus riots and detecting the
use of intoxicated drugs and alcohol by the students.
LESSON 3
At the end of this topic, the student should be able to :
a) Identify the different Division of security
b) Know what is Security management
5. SECURITY MANAGEMENT
In one sense, Security Management is the proper utilization of resources in a
security organization in order to meet organizational goals and objectives and to ensure
their achievements. In other sense, it is a broad field of management related to asset
management , physical security and human resource safety functions. It entails the
identification of an organization’s information assets and the development,
documentation and implementation of policies, standards, procedures and guidelines.
Management tools such as information classification, risk management and risk
analysis are used to identify threats, classify assets and to rate system vulnerabilities so
that effective control can be implemented.
Objectives: At the end of the topic the students will be able to:
In the ancient world, humans learned to unite into clans, then into tribes and later
into bigger communities with their primary reason of securing their lives and livelihood.
a. Weapons out woo, stone and then later those made of metal.
b. Traps or devices designed to catch animals.
c. Barriers like wooden fences, natural barriers like river and cliff.
In the 18th century, the Agricultural Revolution or the improved agricultural methods
paved way for the massive growth in crop production. Microsoft Encarta states that the
increased of population cases the increased demand for food. It has been noted that the
lack of food leads people to steal, hence, security is needed for those who have plenty
of stocks.
In Great Britain, economic progress started, “The Industrial Revolution” – the influx
of the rural people resulted to crime increase to the point that thief catchers were
recruited to aid the law enforcement officers in locating criminals.
This could be the onset of hiring private individual to do security works. As a result,
some business firm emerged, such as the Pinkerton’s Detective and Protective Agency,
which offered to protect property and pursue offenders for a fee.
Here in the Philippines, “hacenderos” or owners of large tracts of lands often hire
farm workers on often double as protectors of the property against cattle rustlers and
robbers.
The security guard force is the key element in the overall security system of a
plant or installation. Its basic mission is to protect all the property within the limits of the
facility boundaries and protect employees and other persons on the installation.
The security guard who will become a part of the guard force must be required to
meet minimum criteria to assure that they will effectively perform their assigned security
director of the installation to insure that its guard force is of a high caliber to make a
judgment that could save multi-million pesos facility from total destruction.
The security guard force must be ready to meet the new challenges with new
concepts, hold innovations, and unrelenting insistence on high standards.
Security Guard
A Security Guard is called a private security guard or watchman that include any
person who offers or renders personal service to watch or secure client either a
residence or business establishment or both for hire or compensation, with a license to
exercise profession.
It is a group of selected men, trained or grouped into functional unit for the
purpose of protecting operational processes from those disruptions which would impede
efficiency or halt operation at a particular plant, facility, installation or special activity.
1. Alertness – a good guard must be alert in spotting violators. This can be attained
by being watchful, dedicated and diligence.
2. Judgment – sound and good judgment is more than the use of common sense. It
is the arriving at wise and timely decision.
3. Confidence – it is the state of being sure; a state of the mind free from doubt or
misgivings. This attribute attained by job knowledge. Thorough and proper
training plus good supervision instills confidence.
4. Tactfulness – ability of the guard to deal with others successfully without
offending. In short, he can be firm but pleasant.
5. Self-control – ability to take hold of oneself regardless of a provoking situation.
With self-control, the guard will do his work without being angry and the situation
will be on hand.
6. Interest, loyalty, responsible and trustworthy, is also important attributes of a
reliable guard.
Objectives: At the end of the topic the students will be able to:
Physical Security
The physical security measures are being used to define, protect and monitor
property rights and assets. These measures consist of barriers and devices that would
detect, impede and prevent unauthorized access to equipment, facilities, material and
document and to safeguard them against espionage, sabotage, damage and theft.
1. Environmental Design – the initial layer of security for a campus, building, office
or physical space uses environmental design to deter threats. Some of the most
common examples are also the most basic barbed wire, warning signs and
fencing, concrete bollards, metal barriers, vehicle heights restrictions site lighting
and trenches.
2. Mechanical and Electronic Access Control – includes gates, doors, and locks.
Key control of the locks becomes a problem with large user populations and any
user turnover. Keys quickly become unmanageable forcing the adaptation of
electronic access control. Electronic access control easily lifecycle times, dates
and individual access points.
3. Intrusion Detection – monitors for attacks. It is less a preventative measure and
more of a response measure. Although some would argue that it is a deterrent.
Intrusion detection has a high incidence of false alarms.
Barriers
Types of Barriers
Perimeter Security
1. Fences
2. Walls
3. Bodies of Water
Types of Fences
a. Solid Fences – constructed in such away that visual access through the fence is
denied. Its advantage is that it denies the opportunity for the intruder to become
familiar with the personnel, activities and the time scheduled of the movements of
the guards in the installation.
b. Full-view Fence – it is constructed in such a way that visual access is permitted
through the fence. Its advantages are that it allows the roving patrols and
stationary guard to jeep the surrounding area of the installation under
observation.
● The mesh openings are not to be larger than 2 inches per side.
● On soft ground, it must reach below surface deep enough to compensate for
shifting soil or sand.
● Barbed wire fencing must be affixed to post not more than 6 feet apart.
1. Gates and Doors – when not in use and controlled by guards, gates and doors
in the perimeter should be locked and frequently inspected by guards. Locks
should be changed from time to time and should be covered under protective
locks and key control.
2. Side-walk-elevators – these provide access to areas within the perimeter barrier
and should be locked and guarded.
3. Utilities Opening – sewers, air intakes, exhaust tunnels and other utility
openings which penetrate the barrier and which have cross sectional areas of 96
square inches or more should be protected by bars, grills, water filled traps or
other structural means providing equivalent protection to that portion of the
perimeter.
4. Fluorescent – this provides good color rendition, high lamp efficiency as well as
long life. However, it cannot project light over long distance and thus are not
desirable as flood type lights.
5. High-pressure Sodium Vapor – this has gained acceptance for exterior
lightning of parking areas, roadways, buildings, and commercial interior
installations. Constructed on the same principle as mercury vapor lamps, they
emit a golden white to light pink color and this provide high lumen efficiency and
relatively good color rendition.
LESSON 6
Objectives: At the end of the topic the students will be able to:
Protective alarms are one of the important barriers in security. It assists the
security in detecting, impeding or deterring potential security threat in the installation.
Basically, its function is to alert the security personnel for any attempt of intrusion into a
protected are, building or compound.
1. Central Station System – a type of alarm where the control station is located
outside the plant or installation. When the alarm is sounded or actuated by
subscriber, the central notifies the police and other public safety agencies.
2. Proprietary System – centralized monitor of the proprietary alarm system is
located in the industrial firm itself with a duty operator. In case of alarm, the duty
operator calls whatever is the primary need; firefighter, police, an ambulance or a
bomb disposal unit.
3. Local Alarm – this system consist of ringing up a visual or audible alarm near
the object to be protected. When an intruder tires to pry a window, the alarm
thereat goes off.
4. Auxiliary Alarm – company-owned alarm systems with a unit in the nearest
police station so that in case of need, direct call is possible. The company
maintains the equipment and lines both for the company and those in the police,
fire and other emergency agencies by special arrangement.
Kinds of Alarms
1. Audio Detectives Device –it will detect any sound caused by attempted force
entry. A supersonic microphone speaker sensor is attached to walls, ceilings or
floors of the protected area.
2. Vibration Detection Device – it will detect any vibration caused by attempted
force entry. A vibration sensitive sensor is attached to walls, ceilings or floors of
the protected area.
3. Metallic Foil or Wire – it will detect any action that moves the foil or wire. An
electrically charge strips of tinfoil or wire is used in the doors, windows or glass
surfaces of the protected area.
4. Laser Beam Alarm – a laser emitter floods a wall or fencing with a beam so that
when this beam is disturbed by a physical object, an alarm is activated,
5. Photoelectric or Electric Eye Device – an invincible/visible beam is emitted
and when this is disturbed or when an intruder breaks contact with the beam, it
will activate the alarm.
LESSON 7
Objectives: At the end of the topic the students will be able to:
Lock
Types of Locks
2. Padlock – a portable and detachable lock having a sliding hasp which passes
through a staple ring and is then made fasten or secured.
3. Combination Lock – instead of using the key align the tumblers, the
combination mechanism uses numbers, letters or other symbols as reference
point which enables an operator to align them naturally.
4. Code-operated Lock – a type of lock that can be opened by pressing a series of
numbered buttons in the proper sequence.
5. Electronic Lock – a type of lock that can be opened and closed remotely by
electrical means.
6. Card-operated Lock – a type of lock operated by a coded card.
Types of Keys
1. Change Key – a specific key which operates the lock and has a particular
combination of cuts which match the arrangement of the tumblers in the lock.
2. Sub-master Key – a key that will open all the lock within a particular area or
grouping in a given facility.
3. Master Key – a specific key capable of opening a series of lock.
4. Grand Master Key – a key that will open everything in a system involving two or
more master key groups.
Key Control
Once an effective key control has been installed positive control of all keys must
be gained and maintained positive control of all keys must be gained and maintained.
This can be accomplished only if it is established in conjunction with the installation of
new locking devices.
Security Cabinet
The final line of defense at any facility is in the high security storage where
papers, records, plans or cashable instrument, precious metals or others especially
valuable assets are protected.
1. Safe – a metallic container used for the keeping of documents or small items in
an office or installation. Safe can be classified as either robbery or burglary
resistance depending upon the use and need.
● It weight must be at least 750 lbs. and should be anchored to a building
structure.
● Its body should at least one inch thick steel.
2. Vault – heavily constructed fire and burglar resistance container usually a part of
the building structure used to keep and protect cash, documents and negotiable
instruments. Vaults are bigger that safe but smaller than a file room.
● The vault door should be made of steel at least 6 inches in thickness.
3. File Room – a cubicle in a building constructed a little lighter than a vault but of
bigger size to accommodate limited people to work in the records inside.
● The file room should at most 12 feet high.
● It must have a watertight door and at least fire proof for one hour.
1. Personal recognition
2. Artificial recognition – identification cards, passes, passwords, etc.
1. Single Pass System – the badge or pass coded for authorization to enter
specific areas is issued to an employee who keeps it in his possession until his
authorization is terminates.
2. Pass Exchanged System – an exchange takes place at the entrance of each
controlled area. Upon leaving the personnel surrenders his badge or passes and
retrieve back his basic identification.
3. Multiple Pass System – this provides an extra measure of security by requiring
that an exchanged take place at the entrance of each restricted area.
1. Visitor’s Logbook – all visitors to any facility should be required to identify them
and should be given visitor’s ID by the security. Visitor’s logbook should be filled
up with named of visitors, nature and duration of visits.
2. Photograph – taking of photograph should also be considered. Extreme caution
must be exercised un areas where classified information is displayed to preclude
unauthorized taking of pictures of the installation.
3. Escort – if possible visitor should be escorted by the security to monitor their
activity within the establishment and guide them where to go.
4. Time-traveled – if there is a long delay or time lapse between the departure and
arrival, the visitors may be required to show cause of the delay.
Semi Final
LESSON 8
PERSONNEL SECURITY
either through theft, and/ or sabotage this emphasizes the need to set up a system of
hiring the people for the company.
1. To insure that a firm hires those employees best suited for firm; and
2. Once hired, to assist in providing the necessary security to these employees
while they are carrying out their function.
Key Function of Personnel Security
● Applicants Name
● Organization Membership
● Date of Birth
● Neighbourhood Investigation
● Character References
● Personal History
● Employment History
● Marital History
● Military History
● Residence History
● Citizenship
● Criminal Record
● Physical Data
● Credit Records
● Educational History
● Applicant’s Signature
● Date of Application
a. Barangay Clearance
b. City or Municipal Clearance
c. Local Police Clearance
d. Court Clearance
NATIONAL AGENCY CHECK
Like Local Agency Check, NAC is also a BI activity but the sources of information
involve national government units.
information is sued during the interview, such as those discovered in the BI,
which confirms or denies this given by the applicant.
AS TO TRUSTWORTHINESS
1. Physical Qualifications
Operators should pass a physical examination administered by a licensed
physician. The examination should be designed to measures the individual’s
physical ability to perform assigned job duties, as identified in the
organization’s job qualification program.
2. Mental Qualifications
3. Psychological Qualifications
The entity should be required to evaluate the possible impact of any
noted psychological characteristics that may have bearing on
trustworthiness. Control system operates should have no emotional
instability or affiliations with organizations that pose a threat to security
that would interfere with the effective performance of assigned job duties.
This determination should be made by a licensed psychologist,
psychiatrist, physician or any other person professionally trained to identify
emotional instability.
4. Behavioural Observational
The entity should be required to observe individual behavioural
changes which, if left unattended, could lead to acts detrimental to the
public health and safety. Individual should have no established medical
history or medical diagnosis of habitual alcoholism or drug addiction or,
when such a condition has existed, the individual should provide certified
documentation of having completed a rehabilitation program that would
give a reasonable degree of confidence that the individual is capable of
performing assigned job duties.
5. Voluntary Assessment
The entity should give an individual an opportunity to report any
information concerning authorization and security to perform assigned job
duties.
6. Continuing Assessment
The entity should arrange for continued observation of individuals and
for appropriate corrective measures by responsible supervisors for
indications of emotional instability of individuals in the course of
performing assigned security job duties. Identification of emotional
instability reported by responsible supervisors should be subject to
verification by a licensed, trained person.
As to Capability
1. Educational Experience
Individual should be required to poses a high school diploma or pass an
equivalent performance examination designed to measure basic job-related
mathematical, language and reasoning skills ,as well as ability and knowledge
required by assigned job duties. Individuals should be required to have the
defined minimum amount on-the-job experience for each appropriate level of
operator certification required by their experience assigned job duties as define
by the employer.
2. Training
Each individual who requires training to performed assigned job tasks or
job duties as identified by the organization’s operating or contingency plans
should prior to assignment be trained to perform those tasks and duties in
accordance with the organization’s documented training and qualification plan.
Individuals should be required to have the defined amount of training for each
appropriate level of operator’s certification.
3. Security Awareness
Each individual should receive ingoing employee awareness sessions and
training.
5. Certification of Exam
Individuals should be certified before being allowed to operate control
systems.
As to Securing Environment
2. Internal Audits
The entity should collect information and periodically evaluate success of
their security assessment techniques and other mitigation risk control activities.
The organization should also evaluate the effectiveness of its management
systems and processes in supporting sounds security management decisions.
3. External Audits
The entity should require personnel security programs that will include
ongoing outside involvement in the revision and operations of the personnel
security program. A stakeholder board or advisory committee is strongly
recommended.
4. Enforcement
The entity should have the ability to suspend operator certifications or take
other appropriate enforcement action for operator misconduct.
5. Emergency Plan
Organization’s emergency plan should training of key participants to
ensure they have skills and knowledge to effectively carry those plans. A training
and orientation program for the key responders should be develop and
periodically reviewed.
It is the protection of records from its entire document cycle life. It also connotes
in this context the safeguarding classified matters.
CLASSIFICATION CATEGORIES
TOP SECRET
SECRET
CONFIDENTIAL
RESTRICTED
These are information and material , the un authorize disclosure of which would cause
exceptionally grave damage to the nation, politically, economically, or from a security
aspect. This category is reserve for the nation’s closest secrets and to be used with
great reserve.
CLASSIFICATION AUTHORITY
The original classification authority for assignment of TOP SECRET classification rests
exclusively with the head of the department. This power may however, be delegated to
authorized offices in instances when necessity for such arises. Derivative classification
authority for TOP SECRET may be granted those officers who are required to give
comments or responses to a communication that necessities top secret response.
These information and material, the un authorized disclosure of which would endanger
national security , cause serious injury to the interest or prestige of the nation or of any
governmental activity or would be great advantage to a foreign nation.
These are information and material the un authorized disclosure of which, while not
endangering the national security , would be prejudicial to the interest or prestige of the
These are information and matter which requires special protection other than that
determined to be top secret, secret or confidential.
1. Category A
⮚ Information which contains reportable time sensitive, order of battle and
significant information.
⮚ It should be given priority because it is critical information.
INFORMATION SECURITY
1. Confidentiality
Is a requisite for maintaining the privacy of the people whose personal
information the organization holds. Information that is considered to be
confidential in nature must only be accessed, used, copied, or disclosed by
person who have been authorized to access, use, copy or disclose the
information and then only when there is a genuine need to access ,use ,copy or
disclose the information.
2. Integrity
In information security, integrity means that data cannot be created,
change, or deleted without authorization. It also means that the data stored in
one part of database system is in agreement with other related data stored in
another part of the data base system.
3. Availability
The concept of availability means that the information, the computing
systems used to process the information, and the security controls used to
protect the information are all available and functioning correctly when the
information is needed. The opposite of availability denial services.
Cryptography is the practice and the study of hiding information. Information security
uses cryptography to transform usable information into form that renders it unusable by
anyone other than an authorized user; this process called encryption.
WHAT IS HAZARD?
1. Natural Hazards- are hazards which arise from natural phenomena. The
following are types of natural hazards or disasters:
⮚ Floods caused by typhoons
⮚ Earthquakes
⮚ Lighting storms
2. Man-made Hazards- these are hazards which are the result of a state of mind,
attitude, weaknesses, or character traits of one or more persons. They can be
acts of commission or omission, both overt and covert which can disrupt
operation of a plant or installation. The following are types of human or man
made hazards:
⮚ Carelessness-accidents and dissatisfaction
⮚ Vandalism, etc.
In this context, industrial hazards are workplace hazards and are often grouped into
physical hazards, physical agents, chemical agents, biological agents and psychological
issues.
● Workplace transport
● Dangerous machinery
● Electricity
● Heavy metals
● Noise
● Vibration
● Ionizing radiation
● Solvents
● Biological agents
● Work related stress, whose casual factors include excessive working time and
overwork
● Violence from outside the organization
● Bullying (sometimes called mobbing) which may include emotional, verbal, and
sexual harassment
● Reproductive hazards
1. Pilferage is one of the most annoying and common human hazards which
security has to deal with. This activity if uncontrolled can become financial drain if
not a menace to smooth and orderly operation.
2. Failure to detect shortage and inaccurate inventories will cause inventory losses,
which may be labelled as pilferage.
Types of Pilferers
1. Casual Pilferer – one who steals due to his inability to resist the unexpected
opportunity and has little fear of detection is no plan or premeditation and he is
usually a “loner” on the job. The temptation and he up the article is due to poor
security measure. The implication of causal pilfering is the big cumulative cost if it
remains unchecked.
2. Systematic Pilferer – one who steals with preconceived plans and takes away
any or all types pf items or supplies for economic gain. Pilferers of this kind can
be employees or outsiders of the establishment.
What is a Risk?
Risk is like likelihood that something bad will happen that causes harm to an
informational asset (or the loss of the asset). Vulnerability is a weakness that could be
used to endanger or cause harm to an informational asset. A threat is anything (man-
made or act of nature) that has the potential to cause harm.
What is an Adversary?
What is Asset?
What is Vulnerability?
What is Probability?
What is Critically?
1. Risk Avoidance – eliminating or removing the risk totally from the business,
government or industrial environment for which the risk manager has
responsibility.
2. Risk Reduction – decreasing the risk by minimizing the probability of the
potential loss. The reduction of criminal opportunity is often accomplished by
situational crime prevention strategies to discourage, deter or deny criminal
incidents.
3. Risk Spreading – spreading the risk through compartmentation or
decentralization to limit the impact of the potential loss.
4. Risk Transfer – moving the financial impact of the potential loss-over to an
insurance company.
5. Risk Self-assumption – planned assumption and acceptance of the potential
risk by making a deliberate managerial decision of doing nothing about the threat
or setting aside resources for use in case of specific loss incident.