SlideShare uma empresa Scribd logo
1 de 15
Baixar para ler offline
Copyrighted Material.
Copyrighted Material.
Copyrighted Material.

Industrial Security Management
First Edition
Philippine Copyright, 2013
By: ChapterHouse Publishing Incorporated
All Rights Reserved.
The text of this book or any part hereof, may not be reproduced or
transmitted in any form or by any means, electronic or mechanical,
including copying, recording, storage in any informational retrieval
system, or otherwise, without the prior written permission of the
publisher.
Any unauthorized copying, reproduction, or dissemination of any
portion of this book shall be prosecuted in accordance with law.
Published and Distributed by:
ChapterHouse Publishing Incorporated
Novaliches, Quezon City
Edited by:
The English Factor
www.englishfactor.com
“Providing international-quality editorial services at reasonable costs.”
ISBN: 978-971-95775-2-2
Copyrighted Material.

T
ABLE OF CONTENTS

DEDICATION								V
PREFACE								VII
PART ONE:	

FUNDAMENTALS OF SECURITY			

1

Chapter 1: The Concept of Security				
3
Definitions of Security						
4
Related Concepts							5
Categories of Security						5
7
Security Management in Organizations				
Chapter 2: History of Security					
9
Historical Roots of Security					9
Security in Philippine History					10
Security in the Present Time					
11
Chapter 3: Legal Context of Security				
Universal Declaration of Human Rights				
1987 Constitution of the Republic of the Philippines		
The Revised Penal Code (RA 3815)				
Private Security Agency Law (RA 5487 as Amended)		
Presidential Decree No. 1919
	 (Amending RA 5487 and Pd 100)				
Presidential Decrees No. 11 and No. 100
	 (Amending RA 5487)						

13
13
14
15
15
16
16
Copyrighted Material.
PART TWO: CATEGORIES OF SECURITY				

17

Chapter 4: Physical Security					
19
Principles of Physical Security					20
Factors in Selecting Security Safeguards				
20
Physical Barriers							21
Advantages of Physical Barriers				
22
Purpose of Physical Barriers					22
General Types of Physical Barriers				
22
Other Types of Physical Barriers				
22
First Line of Defense: The Perimeter Barrier			
23
Purpose of the Perimeter Barrier				
23
Types of Perimeter Barriers					
24
Second Line of Defense: Building Exteriors			
27
Roofs								27
Exterior Walls							27
Concrete Structures						28
Floors								28
Interior Walls							29
Ceilings							29
Doorways							30
Windows							31
Other Openings						32
Third Line of Defense: Interior Controls 				
32
Locks								33
Telephone Entry Systems					33
Identification Systems					
34
Protective Alarm Sensors						
34
Protective Lighting						35
Purpose of Protective Lighting				
35
General Characteristics of Protective Lighting		
36
Types of Protective Lighting					
36
Chapter 5: Personnel Security					
Purpose of Personnel Security:					
Pre-Employment Screening 					
	
Pre-employment Screening Policy Checklist (CPNI, 2011)	
	
Application Form						
	
Interviews							
	
Identity Verification						
	
Qualification and Employment Checks			
	
Media Searches						
Ongoing Personnel Security during Employment		
Purpose of Ongoing Personnel Security (CPNI, 2010)	
Importance Ongoing Personnel Security			
Security Training and Awareness 				
Addressing Behaviors of Concern 				
Controlling Employee Access 				
Screening for the Insider Threat 				

39
41
41
42
43
43
43
45
46
46
47
47
48
49
49
50
Copyrighted Material.
Exit Procedures							50
The Exit Interview						53
Chapter 6: Document and Information Security			
55
Types of Documents						
56
Factors to Consider						57
Stages of Information Cycle					57
Characteristics of Information					58
60
Sensitive Information						
Classification of Sensitive Information			
60
Proprietary Information						
61
Information Security Measures					
62
PART THREE: TECHNICAL SECURITY MANAGEMENT		

65

Chapter 7: Security Survey and Inspection			
67
The Security Survey						
67
Importance of Security Survey				
68
The Value of a Security Professional				
70
Security Inspection						70
Purpose of Security Inspection				
71
Phases of Security Inspection					71
Importance of Security Inspection				
71
Steps in a Security Inspection				
72
Safety Inspection							72
Objectives of Safety Inspection				
72
Purpose of Safety Inspection					72
Phases of Safety Inspections					73
Importance of Safety Inspection				
73
74
Steps in Safety Inspection					
Security Survey Format						75
Security Inspection Report Format				
77
Industrial Security Survey Checklist				
78
Chapter 8: Security Risk Analysis					
89
Security Analysis							90
Defining the Problem						
90
Security Hazards							93
Types of Hazards						93
Major Risks							
94
Risks Management Alternatives and Strategies			
95
Chapter 9: Security Investigation					
97
Elements of Investigation						98
The Three I’s of Investigation 					
98
Purpose of Investigation						99
Qualities of Effective Investigation				
99
Copyrighted Material.
Characteristics of a Successful Investigator			
100
Systematic Approach to an Investigation				
101
Guidelines in Investigation					102
Investigation Report						103
Purpose of the Investigation Report				
103
Qualities of an Investigation Report				
104
Parts of the Report						
104
Sample Report Format					105
Incident-Type Investigation/Complaint-Type Investigation	
106
Sequence of Investigative Leads					107
Interrogation and Interview					108
Interview of Non-Hostile Informants				
108
The Interrogator and the Science of Psychology		
108
Interrogation of Suspected Individuals			
109
Types of Suspects in Terms of Attitude and Personality	
110
Different Interrogation Schemes				110
Interrogation Proper						111
PART IV: SECURITY AGENCY MANAGEMENT			

113

Chapter 10: Management and Planning				
115
MANAGEMENT IN GENERAL AND PLANNING FUNCTION	
116
Security Management and Cost Effectiveness		
116
Security Planning						
116
Development of Security Polices				
117
Illustrations of Security Policies 				
117
Operating Level Policies					118
FINANCING							118
BUDGETING							118
The Process of Budgeting					118
119
Budget Costs and Justification				
ORGANIZING							119
Organizational Relationship					120
Organizational Principle 					120
Reporting Levels 						121
Typical Security Organization				121
The Agency Operator/Security Director			
121
STAFFING AND ADMINISTRATION 				
122
Ranks and Positions						122
Staffing Pattern						
123
Position Standards						
124
Hiring								
124
Training and Professional Development			
125
Discipline							125
Appraisal of Results						125
Promotions							125
Morale and Welfare						
126
Communication 						
126
Some Management Principles				
126
Copyrighted Material.
Chapter 11: Implementation, Problem-Solving and
	Audit/Inspection						129
Program Implementation						130
Top Management’s Responsibility 				
130
Involvement of Others						130
Setting Priorities and Meeting Schedules			
130
Drills and Rehearsals						130
130
Validation and Updating of Plans				
Program Evaluation 						131
Problem Solving and Decision-Making				
131
Problem Solving Techniques					131
Some Pitfalls in Decision Making				
132
Factors Affecting a Decision					132
Security Audit/Inspection					133
Rationale for Security Audit					133
Conduct of the Audit						
134
Formal and Informal Security Audit				
134
Structured and Unstructured Audit				
134
Ascertaining Compliance					
134
Chapter 12: Security Personnel					
137
DEFINITION							138
Types of Security Guards						138
Advantages and Disadvantages of
Company Guards versus Agency Guards			
139
GENERAL FUNCTIONS OF A SECURITY GUARD		
140
Categories of Private Security Training				
140
Qualifications, Functions and Attributes				
141
Powers and Duties of Security Guard 				
143
Functions of a Private Detective 					
144
Functions of Security Supervisor from the
	 Security Guard’s Point of View				
145
Functions of Security Supervisor from the
	 Management Point of View					
145
Duties during Strikes and Lockouts				
145
Attributes of Security Guard/Private Detective			
146
Desirable Qualities of Security Guard				
147
Desirable Qualities of Security Supervisor			
147
Basis for Disqualification 					
149
Grounds for Cancellation of Security Guard License		
149
Private Security Agency Law (RA 5487 as amended) 		
150
Organization							150
Management 							151
Operations 							
154
Limitations and Prohibitions					
156
Administrative Sanctions					158
Copyrighted Material.
Chapter 13: CODE OF ETHICS AND CONDUCT			
PRIVATE SECURITY AGENCIES					
Private Security Agency’s Creed				
Ethical Standards for Private Security Agencies		
Code of Conduct for Private Security Agencies		
SECURITY GUARDS						
Security Guard’s Creed					
The 11 General Orders for Security Guards			
Code of Ethics for Security Guards				
Code of Conduct for Security Guards			

161
161
161
161
162
164
164
165
166
167

Chapter 14: GUARD FORCE ADMINISTRATION			
171
Leadership and Command					172
Leadership: the Concept 					172
Goals of a Leader 						173
Types of Leadership						173
Leadership Traits 						173
Leadership Principles						175
Leadership Indicators						175
Operations								
176
Administration							
176
Technical Services						177
GLOSSARY OF TERMS						179
BIBLIOGRAPHY							185
IMAGE CREDITS							187
Copyrighted Material.
1

PART ONE

FUNDAMENT
ALS
OF SECURITY
Copyrighted Material.
The Concept of Security

CHAPTER 1
THE CONCEPT OF SECURITY

Learning Objectives
At the end of this chapter, the student will be able to:
•	

Define security

•	

Explain the concepts of asset, risk, threat and vulnerability

•	

Enumerate the categories of security

•	

Discuss the importance of private security in organizations

Security is important to everyone. It is important to individuals
such as a homeowner who wants to protect valuable items in his
house, a parent who does not want her child to be harmed while in
school, an employee who wants to save for a comfortable retirement,
or an online shopper who wants to purchase a gadget via the internet.
It is also important to private companies such as a jewelry store
that keeps diamonds in storage, a law firm that holds incriminating
evidence against a drug lord, or an internet company that requires
personal information and passwords from its users. Of course, it is
also very important to governments that maintain military forces, use
intelligence services, legislate civil defense policies, and implement
emergency preparedness measures to serve and protect its citizens.

2
Copyrighted Material.
3

INDUSTRIAL SECURITY MANAGEMENT

Definitions of Security
	
The word secure is derived from the Latin securus which means
“safe” or “without care,” or from se cura, wherein se means “free from”
and cura means “care.”
	
To be secure could mean many different things. It could mean
being free from danger, risk, injury, fear, trouble, doubt or anxiety.
Being secure could also refer to being dependable, strong, good,
impregnable or inviolable. Or simply, it could mean having peace of
mind.
	
Security can be defined as the degree of protection or resistance
against harm, danger, loss, and criminals. As a form of protection, it
includes structures and processes that provide or improve security as
a condition.
	
The Institute for Security and Open Methodologies (ISECOM)
is an open community and a non-profit organization that published
in 2001 the Open Source Security Testing Methodology Manual
(OSSTMM), a peer-reviewed manual of security testing and analysis.
OSSTMM 3 was released in 2010, defining security with the following
explanation:
“For a threat to be effective, it must interact either
directly or indirectly with the asset. To separate the
threat from the asset is to avoid a possible interaction.
Therefore it is possible to have total (100%) security if
the threat and the asset are completely separated from
each other. Otherwise what you have is safety of the
asset which is provided by the controls you put on the
asset or the degree to which you lessen the impact of
the threat.
For example, to be secure from lightning, one
must move to where lightning can’t reach such as deep
in a mountain. Threats which can’t be separated from
the assets must be made safer so that their interactions
and any effects from interactions do little or no harm. In
this same example, to be safe from lightning, one must
stay indoors during storms, avoid windows or other
openings, and use lightning rods on the roof. Therefore,
under the context of operational security, we call
security the separation of an asset and a threat and
safety the control of a threat or its effects” (ISECOM,
2010, emphasis supplied).
Copyrighted Material.
The Concept of Security

Related Concepts
	
Understanding the concept of security requires further
definition of other related concepts such as asset, risk, threat and
vulnerability.
	An asset is anything tangible or intangible that is capable of
being owned or controlled to produce value. If it has positive economic
value, it is considered an asset. Or more simply, if its value can be
converted into cash, it is an asset (Sullivan & Sheffrin, 2003).
	
Risk is the uncertainty of financial loss, the probability that
a loss has occurred or will occur, the variations between actual and
expected results, or the possible occurrence of an undesirable event.
The end result of risk is loss or a decrease in value (Sennewald, 2003).
	
Threat and vulnerability are sometimes interchangeably used
with risk. A threat is anything that could adversely affect assets; it can
be classified into natural hazards (such as floods), accidents (chemical
spills), or intentional acts (domestic or international terrorism).
Vulnerability means weakness, flaw, or virtually anything that may
conceivably be exploited by a threat; examples are holes in a fence,
an out-of-date key system or the introduction of a computer virus
(Sennewald, 2003).
Categories of Security
	
The concept of security is so wide that categorization is
necessary for better understanding and analysis. The three main
categories covered in this book include:

1.	 Physical Security - pertains to all physical barriers employed
or installed to secure assets
2.	 Personnel Security - refers to the procedure followed,
inquiries conducted, and criteria applied to determine the
work suitability of a particular applicant or the retention of
a particular employee
3.	 Document and Information Security - refers to policies,
regulations, doctrines, and practices enforced to safeguard
the contents and integrity of any classified information or
document from compromise or loss

4
Copyrighted Material.
5

INDUSTRIAL SECURITY MANAGEMENT

	
The three main categories enumerated will be discussed more
lengthily in Part Two of this book.

	
Political security is another category that relate to social
relationships involving governments or entities that hold authority
or power. This includes issues of security in the public, national or
international level, as enumerated below.
1.	 Public security refers to the way governments are ensuring the
protection of its citizens, organizations and institutions against
threats to their well-being, as well as maintaining the general
security and peace in public places. This includes security
against problems that have a direct impact on people’s lives,
such as gang violence, cybercrime, or trafficking of illegal drugs
and firearms.
2.	 National security is the requirement to maintain the survival
of a state through the use of economic power, diplomacy,
and political power. Security threats include military foes from
other nations, big drug cartels, or even national disasters that
cause severe environmental damage.
3.	 International security consists of the measures taken by nations
and international organizations to ensure mutual survival
and safety. Examples of measures are military actions and
diplomatic agreements.
In the private sphere, security can be even further categorized,
as shown below.
1.	 Industrial security is a form of physical security involving
industrial plants and business enterprises. This involves
the safeguarding of personnel, processes, properties and
operations.
2.	 Bank and armor security involves the protection resulting from
the application of various measures which safeguards cash
and assets in storage, in transit, or during transaction.
3.	 Hotel security involves using various measures of protection
for the guests, personnel properties and functions in hotels,
restaurants, bars and clubs.
Copyrighted Material.
The Concept of Security

4.	 V.I.P. security involves the protection of top-ranking officials
of the government, visiting persons of illustrious standing and
foreign dignitaries.
5.	 Operational security involves the protection of processes,
formula, patents and industrial and manufacturing activities
from espionage, infiltration, loss, compromise or infringement.
6.	 Communication security involves the safeguard resulting from
the application of different measures which prevent or delay the
enemy or unauthorized person from gaining information through
communication including transmission and cryptographic.
7.	 Mall/commercial security is the degree of protection against
danger, loss, and crime inside malls. As a form of protection,
it refers to systems, structures and processes that provide or
improve mall security as a condition.
Security Management in Organizations
	
Security management has become an essential feature of
corporate activity; there is almost no organization without a team
dedicated to managing issues of security. We usually see shopping
malls, entertainment venues and banks policed by private armies
which we call security guards. The presence of these uniformed staff
represents the company’s ability to respond to or deter threats. This,
however, is only part of the security measures employed by companies
against threats posed by opportunistic criminals, its rival organizations,
or even its own saboteur employees. Other security measures may
include the installation of CCTVs, sophisticated alarm systems, policies
against workplace bullying and harassment, employee screening,
emergency planning, and other measures that enable individuals and
organizations to carry on with their business free from danger.
	
Indeed, security has a policing function in organizations. In fact,
illegal practices in the workplace have become an established theme
in criminology studies. These crimes involve not only the robberies
and shootouts inside malls or kidnappings in schools that we hear in
the news. It involves high-stakes corporate crimes such as tax evasion
and money laundering, fraud, bribery, workplace harassment, or even
those similar to street crimes such as thieves sneaking inside offices.
	
With corporate crime becoming a growing area of concern, the
increasing role of private security in crime prevention is becoming more
evident. This further highlights the need for increased competence and

6

Mais conteúdo relacionado

Mais procurados

Police Report Vs. Incident Report
Police Report Vs. Incident ReportPolice Report Vs. Incident Report
Police Report Vs. Incident Report- Mark - Fullbright
 
Lecture pnp operations manual presentation
Lecture   pnp operations manual presentationLecture   pnp operations manual presentation
Lecture pnp operations manual presentationMcypp Ncmf
 
BPAT lecture for Online PCR Executives
BPAT lecture for Online PCR Executives BPAT lecture for Online PCR Executives
BPAT lecture for Online PCR Executives Susan Rabano-Jalla
 
RA 5487 IMPLEMENTING RULES AND REGULATION AND ITS.pptx
RA 5487 IMPLEMENTING RULES AND REGULATION AND ITS.pptxRA 5487 IMPLEMENTING RULES AND REGULATION AND ITS.pptx
RA 5487 IMPLEMENTING RULES AND REGULATION AND ITS.pptxZyrianSuaybaguio
 
Comparative Policing System of China and Philippines
Comparative Policing System of China and PhilippinesComparative Policing System of China and Philippines
Comparative Policing System of China and PhilippinesElissa Fox
 
Police administrative disciplinary machinery
Police administrative disciplinary machineryPolice administrative disciplinary machinery
Police administrative disciplinary machineryayyel
 
PNP-ORGANIZATION-TOPIC-2-1.pptx
PNP-ORGANIZATION-TOPIC-2-1.pptxPNP-ORGANIZATION-TOPIC-2-1.pptx
PNP-ORGANIZATION-TOPIC-2-1.pptxElaine402010
 
Pnp pre charge evaluation and summary hearing guide
Pnp pre charge evaluation and summary hearing guidePnp pre charge evaluation and summary hearing guide
Pnp pre charge evaluation and summary hearing guiderengar23
 
Comparative police system2015
Comparative police system2015Comparative police system2015
Comparative police system2015monde24836
 
Fundamentals of investigation
Fundamentals of investigationFundamentals of investigation
Fundamentals of investigationjaredplata
 
Observation Discription Identification (ODEX)
Observation Discription Identification (ODEX)Observation Discription Identification (ODEX)
Observation Discription Identification (ODEX)Ocpo Pcr
 
Comaparative Policing System -Egypt to Philippines
Comaparative Policing System -Egypt to PhilippinesComaparative Policing System -Egypt to Philippines
Comaparative Policing System -Egypt to PhilippinesElissa Fox
 

Mais procurados (20)

Police Report Vs. Incident Report
Police Report Vs. Incident ReportPolice Report Vs. Incident Report
Police Report Vs. Incident Report
 
Lecture pnp operations manual presentation
Lecture   pnp operations manual presentationLecture   pnp operations manual presentation
Lecture pnp operations manual presentation
 
Pnp operational procedure
Pnp operational procedurePnp operational procedure
Pnp operational procedure
 
BPAT lecture for Online PCR Executives
BPAT lecture for Online PCR Executives BPAT lecture for Online PCR Executives
BPAT lecture for Online PCR Executives
 
POLICE-BLOTTER_01.19.ppt
POLICE-BLOTTER_01.19.pptPOLICE-BLOTTER_01.19.ppt
POLICE-BLOTTER_01.19.ppt
 
RA 5487 IMPLEMENTING RULES AND REGULATION AND ITS.pptx
RA 5487 IMPLEMENTING RULES AND REGULATION AND ITS.pptxRA 5487 IMPLEMENTING RULES AND REGULATION AND ITS.pptx
RA 5487 IMPLEMENTING RULES AND REGULATION AND ITS.pptx
 
Comparative Policing System of China and Philippines
Comparative Policing System of China and PhilippinesComparative Policing System of China and Philippines
Comparative Policing System of China and Philippines
 
Gun safety
Gun safetyGun safety
Gun safety
 
Police administrative disciplinary machinery
Police administrative disciplinary machineryPolice administrative disciplinary machinery
Police administrative disciplinary machinery
 
PNP-ORGANIZATION-TOPIC-2-1.pptx
PNP-ORGANIZATION-TOPIC-2-1.pptxPNP-ORGANIZATION-TOPIC-2-1.pptx
PNP-ORGANIZATION-TOPIC-2-1.pptx
 
Military courtesy and discipline
Military courtesy and disciplineMilitary courtesy and discipline
Military courtesy and discipline
 
Basic intelligence
Basic intelligenceBasic intelligence
Basic intelligence
 
Cri 018 no 1
Cri 018 no 1Cri 018 no 1
Cri 018 no 1
 
Pnp pre charge evaluation and summary hearing guide
Pnp pre charge evaluation and summary hearing guidePnp pre charge evaluation and summary hearing guide
Pnp pre charge evaluation and summary hearing guide
 
Police patrol preview
Police patrol previewPolice patrol preview
Police patrol preview
 
Comparative police system2015
Comparative police system2015Comparative police system2015
Comparative police system2015
 
Fundamentals of investigation
Fundamentals of investigationFundamentals of investigation
Fundamentals of investigation
 
Slu Nstp lecture
Slu Nstp lectureSlu Nstp lecture
Slu Nstp lecture
 
Observation Discription Identification (ODEX)
Observation Discription Identification (ODEX)Observation Discription Identification (ODEX)
Observation Discription Identification (ODEX)
 
Comaparative Policing System -Egypt to Philippines
Comaparative Policing System -Egypt to PhilippinesComaparative Policing System -Egypt to Philippines
Comaparative Policing System -Egypt to Philippines
 

Semelhante a Ims preview

Cloud Security Demystified
Cloud Security DemystifiedCloud Security Demystified
Cloud Security DemystifiedMichael Torres
 
Security audits & compliance
Security audits & complianceSecurity audits & compliance
Security audits & complianceVandana Verma
 
Alwinco Security Risk Assessment
Alwinco Security Risk AssessmentAlwinco Security Risk Assessment
Alwinco Security Risk AssessmentAndre Mundell
 
04 - Annexe 20sdsdsdsadsadsdsdsad22.pptx
04 - Annexe 20sdsdsdsadsadsdsdsad22.pptx04 - Annexe 20sdsdsdsadsadsdsdsad22.pptx
04 - Annexe 20sdsdsdsadsadsdsdsad22.pptxkashifmajeedjanjua
 
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...CODE BLUE
 
Security architecture principles isys 0575general att
Security architecture principles isys 0575general attSecurity architecture principles isys 0575general att
Security architecture principles isys 0575general attSHIVA101531
 
Organizational Security Culture : A New Business Paradigm by JMSupan 2019
Organizational  Security Culture :  A New Business Paradigm by JMSupan 2019Organizational  Security Culture :  A New Business Paradigm by JMSupan 2019
Organizational Security Culture : A New Business Paradigm by JMSupan 2019JOEL JESUS SUPAN
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security FrameworkNada G.Youssef
 
Improving_safety_culture_a_practical_guide.pdf
Improving_safety_culture_a_practical_guide.pdfImproving_safety_culture_a_practical_guide.pdf
Improving_safety_culture_a_practical_guide.pdfSuhelBangi
 
Know more about exin unique information security program
Know more about exin unique information security programKnow more about exin unique information security program
Know more about exin unique information security programElke Couto Morgado
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...EC-Council
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview Ahmed Riad .
 
Top-Rated Professional Security Services for Comprehensive Protection.pdf
Top-Rated Professional Security Services for Comprehensive Protection.pdfTop-Rated Professional Security Services for Comprehensive Protection.pdf
Top-Rated Professional Security Services for Comprehensive Protection.pdfprivate security
 
Information security management best practice
Information security management best practiceInformation security management best practice
Information security management best practiceparves kamal
 
1 info sec+risk-mgmt
1 info sec+risk-mgmt1 info sec+risk-mgmt
1 info sec+risk-mgmtmadunix
 

Semelhante a Ims preview (20)

Cloud Security Demystified
Cloud Security DemystifiedCloud Security Demystified
Cloud Security Demystified
 
Security audits & compliance
Security audits & complianceSecurity audits & compliance
Security audits & compliance
 
Sem 001 sem-001
Sem 001 sem-001Sem 001 sem-001
Sem 001 sem-001
 
Alwinco Security Risk Assessment
Alwinco Security Risk AssessmentAlwinco Security Risk Assessment
Alwinco Security Risk Assessment
 
04 - Annexe 20sdsdsdsadsadsdsdsad22.pptx
04 - Annexe 20sdsdsdsadsadsdsdsad22.pptx04 - Annexe 20sdsdsdsadsadsdsdsad22.pptx
04 - Annexe 20sdsdsdsadsadsdsdsad22.pptx
 
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
 
Information Security and the SDLC
Information Security and the SDLCInformation Security and the SDLC
Information Security and the SDLC
 
The Role Of The Risk Manager
The Role Of The Risk ManagerThe Role Of The Risk Manager
The Role Of The Risk Manager
 
Security architecture principles isys 0575general att
Security architecture principles isys 0575general attSecurity architecture principles isys 0575general att
Security architecture principles isys 0575general att
 
Organizational Security Culture : A New Business Paradigm by JMSupan 2019
Organizational  Security Culture :  A New Business Paradigm by JMSupan 2019Organizational  Security Culture :  A New Business Paradigm by JMSupan 2019
Organizational Security Culture : A New Business Paradigm by JMSupan 2019
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security Framework
 
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
 
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
 
Improving_safety_culture_a_practical_guide.pdf
Improving_safety_culture_a_practical_guide.pdfImproving_safety_culture_a_practical_guide.pdf
Improving_safety_culture_a_practical_guide.pdf
 
Know more about exin unique information security program
Know more about exin unique information security programKnow more about exin unique information security program
Know more about exin unique information security program
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview
 
Top-Rated Professional Security Services for Comprehensive Protection.pdf
Top-Rated Professional Security Services for Comprehensive Protection.pdfTop-Rated Professional Security Services for Comprehensive Protection.pdf
Top-Rated Professional Security Services for Comprehensive Protection.pdf
 
Information security management best practice
Information security management best practiceInformation security management best practice
Information security management best practice
 
1 info sec+risk-mgmt
1 info sec+risk-mgmt1 info sec+risk-mgmt
1 info sec+risk-mgmt
 

Mais de chapterhouseinc

Mais de chapterhouseinc (6)

Questioned Documents First Chapter
Questioned Documents First ChapterQuestioned Documents First Chapter
Questioned Documents First Chapter
 
Parole preview
Parole previewParole preview
Parole preview
 
Logic preview
Logic previewLogic preview
Logic preview
 
Criminal justice preview
Criminal justice previewCriminal justice preview
Criminal justice preview
 
Comparative police systems_preview
Comparative police systems_previewComparative police systems_preview
Comparative police systems_preview
 
Organized crime preview
Organized crime previewOrganized crime preview
Organized crime preview
 

Último

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 

Último (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 

Ims preview

  • 3. Copyrighted Material. Industrial Security Management First Edition Philippine Copyright, 2013 By: ChapterHouse Publishing Incorporated All Rights Reserved. The text of this book or any part hereof, may not be reproduced or transmitted in any form or by any means, electronic or mechanical, including copying, recording, storage in any informational retrieval system, or otherwise, without the prior written permission of the publisher. Any unauthorized copying, reproduction, or dissemination of any portion of this book shall be prosecuted in accordance with law. Published and Distributed by: ChapterHouse Publishing Incorporated Novaliches, Quezon City Edited by: The English Factor www.englishfactor.com “Providing international-quality editorial services at reasonable costs.” ISBN: 978-971-95775-2-2
  • 4. Copyrighted Material. T ABLE OF CONTENTS DEDICATION V PREFACE VII PART ONE: FUNDAMENTALS OF SECURITY 1 Chapter 1: The Concept of Security 3 Definitions of Security 4 Related Concepts 5 Categories of Security 5 7 Security Management in Organizations Chapter 2: History of Security 9 Historical Roots of Security 9 Security in Philippine History 10 Security in the Present Time 11 Chapter 3: Legal Context of Security Universal Declaration of Human Rights 1987 Constitution of the Republic of the Philippines The Revised Penal Code (RA 3815) Private Security Agency Law (RA 5487 as Amended) Presidential Decree No. 1919 (Amending RA 5487 and Pd 100) Presidential Decrees No. 11 and No. 100 (Amending RA 5487) 13 13 14 15 15 16 16
  • 5. Copyrighted Material. PART TWO: CATEGORIES OF SECURITY 17 Chapter 4: Physical Security 19 Principles of Physical Security 20 Factors in Selecting Security Safeguards 20 Physical Barriers 21 Advantages of Physical Barriers 22 Purpose of Physical Barriers 22 General Types of Physical Barriers 22 Other Types of Physical Barriers 22 First Line of Defense: The Perimeter Barrier 23 Purpose of the Perimeter Barrier 23 Types of Perimeter Barriers 24 Second Line of Defense: Building Exteriors 27 Roofs 27 Exterior Walls 27 Concrete Structures 28 Floors 28 Interior Walls 29 Ceilings 29 Doorways 30 Windows 31 Other Openings 32 Third Line of Defense: Interior Controls 32 Locks 33 Telephone Entry Systems 33 Identification Systems 34 Protective Alarm Sensors 34 Protective Lighting 35 Purpose of Protective Lighting 35 General Characteristics of Protective Lighting 36 Types of Protective Lighting 36 Chapter 5: Personnel Security Purpose of Personnel Security: Pre-Employment Screening Pre-employment Screening Policy Checklist (CPNI, 2011) Application Form Interviews Identity Verification Qualification and Employment Checks Media Searches Ongoing Personnel Security during Employment Purpose of Ongoing Personnel Security (CPNI, 2010) Importance Ongoing Personnel Security Security Training and Awareness Addressing Behaviors of Concern Controlling Employee Access Screening for the Insider Threat 39 41 41 42 43 43 43 45 46 46 47 47 48 49 49 50
  • 6. Copyrighted Material. Exit Procedures 50 The Exit Interview 53 Chapter 6: Document and Information Security 55 Types of Documents 56 Factors to Consider 57 Stages of Information Cycle 57 Characteristics of Information 58 60 Sensitive Information Classification of Sensitive Information 60 Proprietary Information 61 Information Security Measures 62 PART THREE: TECHNICAL SECURITY MANAGEMENT 65 Chapter 7: Security Survey and Inspection 67 The Security Survey 67 Importance of Security Survey 68 The Value of a Security Professional 70 Security Inspection 70 Purpose of Security Inspection 71 Phases of Security Inspection 71 Importance of Security Inspection 71 Steps in a Security Inspection 72 Safety Inspection 72 Objectives of Safety Inspection 72 Purpose of Safety Inspection 72 Phases of Safety Inspections 73 Importance of Safety Inspection 73 74 Steps in Safety Inspection Security Survey Format 75 Security Inspection Report Format 77 Industrial Security Survey Checklist 78 Chapter 8: Security Risk Analysis 89 Security Analysis 90 Defining the Problem 90 Security Hazards 93 Types of Hazards 93 Major Risks 94 Risks Management Alternatives and Strategies 95 Chapter 9: Security Investigation 97 Elements of Investigation 98 The Three I’s of Investigation 98 Purpose of Investigation 99 Qualities of Effective Investigation 99
  • 7. Copyrighted Material. Characteristics of a Successful Investigator 100 Systematic Approach to an Investigation 101 Guidelines in Investigation 102 Investigation Report 103 Purpose of the Investigation Report 103 Qualities of an Investigation Report 104 Parts of the Report 104 Sample Report Format 105 Incident-Type Investigation/Complaint-Type Investigation 106 Sequence of Investigative Leads 107 Interrogation and Interview 108 Interview of Non-Hostile Informants 108 The Interrogator and the Science of Psychology 108 Interrogation of Suspected Individuals 109 Types of Suspects in Terms of Attitude and Personality 110 Different Interrogation Schemes 110 Interrogation Proper 111 PART IV: SECURITY AGENCY MANAGEMENT 113 Chapter 10: Management and Planning 115 MANAGEMENT IN GENERAL AND PLANNING FUNCTION 116 Security Management and Cost Effectiveness 116 Security Planning 116 Development of Security Polices 117 Illustrations of Security Policies 117 Operating Level Policies 118 FINANCING 118 BUDGETING 118 The Process of Budgeting 118 119 Budget Costs and Justification ORGANIZING 119 Organizational Relationship 120 Organizational Principle 120 Reporting Levels 121 Typical Security Organization 121 The Agency Operator/Security Director 121 STAFFING AND ADMINISTRATION 122 Ranks and Positions 122 Staffing Pattern 123 Position Standards 124 Hiring 124 Training and Professional Development 125 Discipline 125 Appraisal of Results 125 Promotions 125 Morale and Welfare 126 Communication 126 Some Management Principles 126
  • 8. Copyrighted Material. Chapter 11: Implementation, Problem-Solving and Audit/Inspection 129 Program Implementation 130 Top Management’s Responsibility 130 Involvement of Others 130 Setting Priorities and Meeting Schedules 130 Drills and Rehearsals 130 130 Validation and Updating of Plans Program Evaluation 131 Problem Solving and Decision-Making 131 Problem Solving Techniques 131 Some Pitfalls in Decision Making 132 Factors Affecting a Decision 132 Security Audit/Inspection 133 Rationale for Security Audit 133 Conduct of the Audit 134 Formal and Informal Security Audit 134 Structured and Unstructured Audit 134 Ascertaining Compliance 134 Chapter 12: Security Personnel 137 DEFINITION 138 Types of Security Guards 138 Advantages and Disadvantages of Company Guards versus Agency Guards 139 GENERAL FUNCTIONS OF A SECURITY GUARD 140 Categories of Private Security Training 140 Qualifications, Functions and Attributes 141 Powers and Duties of Security Guard 143 Functions of a Private Detective 144 Functions of Security Supervisor from the Security Guard’s Point of View 145 Functions of Security Supervisor from the Management Point of View 145 Duties during Strikes and Lockouts 145 Attributes of Security Guard/Private Detective 146 Desirable Qualities of Security Guard 147 Desirable Qualities of Security Supervisor 147 Basis for Disqualification 149 Grounds for Cancellation of Security Guard License 149 Private Security Agency Law (RA 5487 as amended) 150 Organization 150 Management 151 Operations 154 Limitations and Prohibitions 156 Administrative Sanctions 158
  • 9. Copyrighted Material. Chapter 13: CODE OF ETHICS AND CONDUCT PRIVATE SECURITY AGENCIES Private Security Agency’s Creed Ethical Standards for Private Security Agencies Code of Conduct for Private Security Agencies SECURITY GUARDS Security Guard’s Creed The 11 General Orders for Security Guards Code of Ethics for Security Guards Code of Conduct for Security Guards 161 161 161 161 162 164 164 165 166 167 Chapter 14: GUARD FORCE ADMINISTRATION 171 Leadership and Command 172 Leadership: the Concept 172 Goals of a Leader 173 Types of Leadership 173 Leadership Traits 173 Leadership Principles 175 Leadership Indicators 175 Operations 176 Administration 176 Technical Services 177 GLOSSARY OF TERMS 179 BIBLIOGRAPHY 185 IMAGE CREDITS 187
  • 11. Copyrighted Material. The Concept of Security CHAPTER 1 THE CONCEPT OF SECURITY Learning Objectives At the end of this chapter, the student will be able to: • Define security • Explain the concepts of asset, risk, threat and vulnerability • Enumerate the categories of security • Discuss the importance of private security in organizations Security is important to everyone. It is important to individuals such as a homeowner who wants to protect valuable items in his house, a parent who does not want her child to be harmed while in school, an employee who wants to save for a comfortable retirement, or an online shopper who wants to purchase a gadget via the internet. It is also important to private companies such as a jewelry store that keeps diamonds in storage, a law firm that holds incriminating evidence against a drug lord, or an internet company that requires personal information and passwords from its users. Of course, it is also very important to governments that maintain military forces, use intelligence services, legislate civil defense policies, and implement emergency preparedness measures to serve and protect its citizens. 2
  • 12. Copyrighted Material. 3 INDUSTRIAL SECURITY MANAGEMENT Definitions of Security The word secure is derived from the Latin securus which means “safe” or “without care,” or from se cura, wherein se means “free from” and cura means “care.” To be secure could mean many different things. It could mean being free from danger, risk, injury, fear, trouble, doubt or anxiety. Being secure could also refer to being dependable, strong, good, impregnable or inviolable. Or simply, it could mean having peace of mind. Security can be defined as the degree of protection or resistance against harm, danger, loss, and criminals. As a form of protection, it includes structures and processes that provide or improve security as a condition. The Institute for Security and Open Methodologies (ISECOM) is an open community and a non-profit organization that published in 2001 the Open Source Security Testing Methodology Manual (OSSTMM), a peer-reviewed manual of security testing and analysis. OSSTMM 3 was released in 2010, defining security with the following explanation: “For a threat to be effective, it must interact either directly or indirectly with the asset. To separate the threat from the asset is to avoid a possible interaction. Therefore it is possible to have total (100%) security if the threat and the asset are completely separated from each other. Otherwise what you have is safety of the asset which is provided by the controls you put on the asset or the degree to which you lessen the impact of the threat. For example, to be secure from lightning, one must move to where lightning can’t reach such as deep in a mountain. Threats which can’t be separated from the assets must be made safer so that their interactions and any effects from interactions do little or no harm. In this same example, to be safe from lightning, one must stay indoors during storms, avoid windows or other openings, and use lightning rods on the roof. Therefore, under the context of operational security, we call security the separation of an asset and a threat and safety the control of a threat or its effects” (ISECOM, 2010, emphasis supplied).
  • 13. Copyrighted Material. The Concept of Security Related Concepts Understanding the concept of security requires further definition of other related concepts such as asset, risk, threat and vulnerability. An asset is anything tangible or intangible that is capable of being owned or controlled to produce value. If it has positive economic value, it is considered an asset. Or more simply, if its value can be converted into cash, it is an asset (Sullivan & Sheffrin, 2003). Risk is the uncertainty of financial loss, the probability that a loss has occurred or will occur, the variations between actual and expected results, or the possible occurrence of an undesirable event. The end result of risk is loss or a decrease in value (Sennewald, 2003). Threat and vulnerability are sometimes interchangeably used with risk. A threat is anything that could adversely affect assets; it can be classified into natural hazards (such as floods), accidents (chemical spills), or intentional acts (domestic or international terrorism). Vulnerability means weakness, flaw, or virtually anything that may conceivably be exploited by a threat; examples are holes in a fence, an out-of-date key system or the introduction of a computer virus (Sennewald, 2003). Categories of Security The concept of security is so wide that categorization is necessary for better understanding and analysis. The three main categories covered in this book include: 1. Physical Security - pertains to all physical barriers employed or installed to secure assets 2. Personnel Security - refers to the procedure followed, inquiries conducted, and criteria applied to determine the work suitability of a particular applicant or the retention of a particular employee 3. Document and Information Security - refers to policies, regulations, doctrines, and practices enforced to safeguard the contents and integrity of any classified information or document from compromise or loss 4
  • 14. Copyrighted Material. 5 INDUSTRIAL SECURITY MANAGEMENT The three main categories enumerated will be discussed more lengthily in Part Two of this book. Political security is another category that relate to social relationships involving governments or entities that hold authority or power. This includes issues of security in the public, national or international level, as enumerated below. 1. Public security refers to the way governments are ensuring the protection of its citizens, organizations and institutions against threats to their well-being, as well as maintaining the general security and peace in public places. This includes security against problems that have a direct impact on people’s lives, such as gang violence, cybercrime, or trafficking of illegal drugs and firearms. 2. National security is the requirement to maintain the survival of a state through the use of economic power, diplomacy, and political power. Security threats include military foes from other nations, big drug cartels, or even national disasters that cause severe environmental damage. 3. International security consists of the measures taken by nations and international organizations to ensure mutual survival and safety. Examples of measures are military actions and diplomatic agreements. In the private sphere, security can be even further categorized, as shown below. 1. Industrial security is a form of physical security involving industrial plants and business enterprises. This involves the safeguarding of personnel, processes, properties and operations. 2. Bank and armor security involves the protection resulting from the application of various measures which safeguards cash and assets in storage, in transit, or during transaction. 3. Hotel security involves using various measures of protection for the guests, personnel properties and functions in hotels, restaurants, bars and clubs.
  • 15. Copyrighted Material. The Concept of Security 4. V.I.P. security involves the protection of top-ranking officials of the government, visiting persons of illustrious standing and foreign dignitaries. 5. Operational security involves the protection of processes, formula, patents and industrial and manufacturing activities from espionage, infiltration, loss, compromise or infringement. 6. Communication security involves the safeguard resulting from the application of different measures which prevent or delay the enemy or unauthorized person from gaining information through communication including transmission and cryptographic. 7. Mall/commercial security is the degree of protection against danger, loss, and crime inside malls. As a form of protection, it refers to systems, structures and processes that provide or improve mall security as a condition. Security Management in Organizations Security management has become an essential feature of corporate activity; there is almost no organization without a team dedicated to managing issues of security. We usually see shopping malls, entertainment venues and banks policed by private armies which we call security guards. The presence of these uniformed staff represents the company’s ability to respond to or deter threats. This, however, is only part of the security measures employed by companies against threats posed by opportunistic criminals, its rival organizations, or even its own saboteur employees. Other security measures may include the installation of CCTVs, sophisticated alarm systems, policies against workplace bullying and harassment, employee screening, emergency planning, and other measures that enable individuals and organizations to carry on with their business free from danger. Indeed, security has a policing function in organizations. In fact, illegal practices in the workplace have become an established theme in criminology studies. These crimes involve not only the robberies and shootouts inside malls or kidnappings in schools that we hear in the news. It involves high-stakes corporate crimes such as tax evasion and money laundering, fraud, bribery, workplace harassment, or even those similar to street crimes such as thieves sneaking inside offices. With corporate crime becoming a growing area of concern, the increasing role of private security in crime prevention is becoming more evident. This further highlights the need for increased competence and 6