Physical Security

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 14
At a glance
Powered by AI
The key takeaways are the importance of physical security measures to prevent unauthorized access and safeguard assets. Physical security covers protection of equipment, facilities, materials, documents and personnel. The principles of physical security are to deny unauthorized access through integrated barriers in depth and to detect surreptitious entries.

The principles of physical security are that enemy agents must not access protected areas, there is no impenetrable barrier so defense in depth with multiple barriers is needed, and surreptitious entry is difficult to detect making security barriers important.

The different types of physical security barriers include natural barriers, structural barriers, human barriers, animal barriers, and energy barriers. Specific barriers are fences, walls, floors, roofs, grills, and bars.

INDUSTRIAL SECURITY MANAGEMENT

CHAPTER 3
PHYSICAL SECURITY
This chapter describes the basic concepts of physical security as used in any installation
or physical system. Physical security is a major division in industrial security, hence it is hereby
described.

A. Definition

PHYSICAL SECURITY – it is the broadest branch of security which is concerned with


the physical measures adopted to prevent unauthorized access to equipment,
facilities, materials and documents, and to safeguard them against espionage,
sabotage, damage and theft.

Physical security covers other types of security to protect equipment, document,


facilities, and materials against theft, damage, sabotage, or espionage. It also
encompasses protection of personnel from any criminal act.

B. PRINCIPLES OF PHYSICAL SECURITY

In every establishment, physical measures are needed to deny unauthorized access or


intrusion because of the following:

1. Enemy Agents Must Not Access - Acquisition of information is the ultimate results,
and the means and form in which the information is obtained.

2. There is No Impenetrable Barrier - for the unfriendly government or organization,


they are willing to devote enough time, money, personnel, material, and imagination
in passing barriers. So physical security attempts to build defense by using a certain
barrier.

3. Defense in Depth Means Barrier after Barrier – In order that barrier could prevent
unauthorized access and serve its purpose very well, there should be an integration of
all barriers adopted in the installation.

4. Surreptitious versus Non-Surreptitious Entry – The possibility of surreptitious


entry is the greatest hazard from the standpoint of counterintelligence security
because it is usually difficult to determine, that the information has been
compromised. No action is taken to neutralize the act of espionage because
surreptitious entry is not usually detected. Surreptitious entry means not observable
while non-surreptitious entry is observable. Observable or not, intruders usually find
the right place and right opportunity to gain access. Physical security then is needed
to detect or deny unauthorized entries.

Page 1
INDUSTRIAL SECURITY MANAGEMENT

5. Each Installation is Different - Since each installation is different, each will have
different problems to overcome. The security procedures will not be adequate for all
installations.

C. Barrier System

1. Definition

BARRIERS - refers to any physical structure whether natural or man-made


capable of restricting, deterring, delaying or preventing illegal and
unauthorized access to an installation.

2. Types of Barriers

a. General Types of Physical Security Barriers:

 Natural Barrier – These are offered by nature which could obstruct or delay
the passage way of potential intruders. These also refer to natural structures
that serve as deterrents or obstructions to intruders such as high cliff, canyon,
desert, or bodies of water.

 Man-made Barrier – these are structural constructions like fences, walls,


floors, roofs, grills, bars, roadblocks or other physical means to deter or
impede penetration.

b. Specific Types of Physical Security Barriers:

 Natural Barrier – are those natural features that delay or make more difficult
the entry of intruders.

 Structural Barrier – these barriers are features constructed by men that tend
to delay entry of intruder.

 Human Barrier – these are guards, office and shop workers, who stand
between the intruders and the matters to be protected.

 Animal Barrier – these are usually trained dogs, used as guards.

 Energy Barrier – usually electrical or electronic devices used to provide


assistance to guard personnel.

Page 2
INDUSTRIAL SECURITY MANAGEMENT

D. Perimeter Barriers

1. Concept of Perimeter Barriers

Perimeter barrier is a medium of structure which defines the physical limits of an


installations or area to restrict or impede access thereto. It is any physical barrier used to
supplement the protection of an inside or outside perimeter. Perimeter barrier also
includes the utilization of security personnel.

2. Purpose of Perimeter Security

The main purpose of perimeter barrier is to deny or impede access or exit of


unauthorized person. Basically, it is the first line of defense of an installation. This is
maybe in the form of fences, building walls or even bodies of water. The function and
location of the facility itself usually determine the perimeter of the installation. If the
facility is located in a city whereby the building or enterprise occupies all the area where
it is located, the perimeter may be the walls of the building itself.

Most of the Industrial companies, however, are required to have a wide space for
warehousing, manufacturing etc.

3. Line of Physical Defense

Security managers and security personnel also consider the various lines of
defense that could help delay or stop intruders. These are:
 First Line includes all perimeter barriers;
 Second Line includes the building exterior; and
 Third Line includes those internal control measures.

4. Perimeter Barrier Opening

In determining the appropriate perimeter barriers, security managers


should not overlook the necessity of monitoring perimeter openings that could be
used by intruders. These openings are:

a. Gates and Doors – when not in use and controlled by guards, gates and doors
in the perimeter should be locked and frequently inspected by guards. Locks
should be changed from time to time and should be covered under protective
locks and key control.

b. Side-walk Elevators – these provide access to areas within the perimeter


barrier and should be locked and guarded.

c. Utilities Opening - Sewers, air intakes, exhaust tunnels and other utility
openings which penetrate the barrier and which have cross sectional areas of
96 square inches or more should be protected by bars, grills, water filled traps

Page 3
INDUSTRIAL SECURITY MANAGEMENT

or other structural means providing equivalent protection to that portion of the


perimeter barriers.

d. Clear Zone –an obstructed area or a “clear zone” should be maintained on


both sides of the perimeter barrier. A clear of 20 feet or more is desirable
between the barriers and exterior structures and natural covers that may
provide concealment for assistance to a person seeking unauthorized entry.

5. Types of Perimeter Barriers

Perimeter barriers include any of the following:

a. FENCES – are independent structures designed to control physical and visual


access between outside areas. Types of fences include Solid Fence and Full-
View Fence.

1. Solid Fence –is made of opaque material in such a way that visual access
through the fence structure is denied. Solid fences are constructed with
heavy materials such as bricks, stone and concrete, and usually extended
down into the ground to a point view below the frost line.

Advantages of Solid Fence:


 Denies visual access of the installation to the intruder;
 Denies the intruder the opportunity to become familiar with the
personnel, activities, and the schedule of the movement of the
guards.

Disadvantages of Solid Fence:


 Prevents the guards from observing the area around the
installation;
 Creates shadow which may be used by the intruder for cover and
concealment.

2. Full-View Fence – is constructed in such a manner that visual access is


permitted such as wire fence through the fence structure. It is designed
purely to control physical access between two areas.

Advantages of Full-View Fence:


 Guards are able to keep the area surrounding the installation
under observation;
 Does not create any shadow

Disadvantages of Full-View Fence:


 Allows visual access to the installation;
 Allows the intruder to get familiar with the movements and the
time schedule of the guard patrols.

Page 4
INDUSTRIAL SECURITY MANAGEMENT

b. BUILDING WALLS – include walls, roofs or their combinations serve also


as barriers and they should be of such constructions to provide uniform
protection just like wire-fencing.

c. BODIES of WATER – like river, lake, cataract, sea, pond, or any bodies of
water forming part of the wall, building or fencing should not be considered
an adequate perimeter barrier. Additional security measures like wire fence,
concrete walling, security patrolling and flood lighting at night may be
necessary for the portions of the perimeter.

6. Additional Protective Measures

a. Top Guard –it is an additional overhang of barbed wire placed on a vertical


perimeter fences upward and outward with a 45 degree angle with 3 and 4
strands of barbed wires spaced 6 inches apart.

b. Guard Control Stations – this is normally provided at main perimeter entrances


to secure areas located out-of-doors, and manned by guards on full-time basis.

c. Tower Guard – this is a housed-like structure above the perimeter barriers. The
higher the tower, the more visibility it provides. It gives a psychological
unswerving effect to violators. By and large guard towers, whether permanent or
temporary, must have a corresponding support force in the event of need.

d. Barrier Maintenance – Fencing barriers and protective walls should always be


regularly inspected by security. Any sign or attempts to break in should be
reported for investigation.

e. Protection in Depth – in large open areas or ground where fencing or walling is


impractical and expensive, warning signs should be conspicuously placed. The
depth itself is protection reduction of access roads, and sufficient notices to warn
intruders should be done. Use of animals, as guards and intrusion device, can
also be good as barriers.

f. Signs and Notices – “Control Signs” should be erected where necessary in the
maintenance of preclude accidental entry.

E. Protective Lighting

Protective Lighting provides a means of continuing illumination during hours of


darkness, a degree of protection that is maintained during daylight hours.

This safeguard also has considerable value as a deterrent to thieves and vandals
and may make the job of the saboteur more difficult. It is an essential element of an
integrated physical security program.

Page 5
INDUSTRIAL SECURITY MANAGEMENT

The system must be reliable and designed with overlapping illumination to avoid
creating unprotected area in the event of individual light failure. It must be easy to
maintain and it must secure itself against attack. Poles should be within the barrier power
lines and the switch box must be protected.

1. Purpose of Protective Lighting

a. It provides sufficient illumination to the areas during hours of darkness;


b. Lighting can help improve visibility so that intruder can be seen and identified
and, if possible apprehended.
c. It serves as deterrent to would-be thieves.

2. Types of Protective Lighting

a. Continuous Lighting – the most familiar type of outdoor security lighting,


this is designed to provide two specific results: glare projection and controlled
lighting.
1. Glare Projection Type – it is being used in prisons and correctional
institutions to illuminate walls and outside barriers.
2. Controlled Lighting – it is generally employed where, due to
surrounding property owners, nearby highways or other limitations, it
is necessary for the light to be more precisely focused.

b. Standby Lighting – it is designed for reserve or standby use or to supplement


continuous systems.

c. Movable or Portable Lighting – this system is manually operated and is


usually made up of movable search or floodlights that can be located in
selected or special locations which will require lighting only for short period
of time.

d. Emergency Lighting – this system is used in times of power failure or other


emergencies when other system are inoperative.

3. General Types of Lighting Sources

Listed below are the general lighting sources that are mostly used in providing
indoor or outdoor lighting:

a. Incandescent Lamp – it is the least expensive in terms of energy consumed


and has the advantage of providing instant illumination when the switch is on.

b. Mercury Vapor Lamp – it is considered more efficient that the incandescent


and used widespread in exterior lighting.

Page 6
INDUSTRIAL SECURITY MANAGEMENT

c. Metal Halide – it has similar physical appearance to mercury vapor but


provides a light source of higher luminous efficiency and better color
rendition.

d. Fluorescent – this provides good color rendition, high lamp efficiency as well
as long life.

e. High-Pressure Sodium Vapor – this has gained acceptance for exterior


lighting of parking areas, roadways, buildings and commercial interior
installations.

4. Types of Lighting Equipment

a. Floodlights – these can be used to accommodate most outdoor security


lighting needs, including the illumination of boundaries, fences and buildings
and for the emphasis of vital areas or particular buildings.

b. Street Lights – these are lighting equipment received the most widespread
notoriety for its value in reducing crime.

c. Search Lights – these are highly focused incandescent lamp and are designed
to pinpoint potential trouble spots.

d. Fresnel Lights – these are wide beam units, primary used to extend the
illumination in long, horizontal strips to protect the approached to the
perimeter barrier.

5. Lighting Application/Lighting System

a. Fenced Perimeter Lighting – is used to illuminate the fence itself and the
area beyond it (“the detection zone”). Its objective is to reveal an intruder’s
approach and produce glare towards him, it can be difficult to apply because it
may create nuisance or hazards.

b. Area Lighting – is used in a building face perimeters consists of faces of


buildings on or within 20 ft. of the property or area line to be protected and
where the public may approach the building. Doorways or other insets in the
building’s face should receive special attention for lighting to eliminate
shadows.

c. Flood Lighting – is used to case a strong light on the walls of buildings so


that intruders are visible either in silhouette (outline) or by the shadows which
they cast.

Page 7
INDUSTRIAL SECURITY MANAGEMENT

d. Gate House Lighting – is installed on active entrances for pedestrians and


vehicles to facilitate complete inspection of passengers, cars, trucks and
freight cars as well as their contents and passengers.

e. Toppings-up Lighting – is used to illuminate dark areas not adequately lit by


area or flood lighting. Areas and structures within the installation property
lines consist of yards, storage spaces, large open working areas, piers docks,
and other sensitive areas and structures.

6. Areas to be Lighted
 Perimeter fence
 Building face perimeter
 Pedestrian and vehicle entrance
 Parking area
 Storage, large opened working areas, piers, docks, and other sensitive
areas.

F. PROTECTIVE ALARM AND COMMUNICATION SYSTEM

PROTECTIVE ALARM – is one of the important barriers in security. It assists the


security in detecting, impeding or deterring potential security threat in the
installation.

Basically, its function is to alert the security personnel for any attempt of intrusion
into a protected area, building or compound. Once an intruder tampers the circuitry, the
beam or radiated waves of the alarm system, it will activate an alarm signal.

On the other hand, the use of communication equipment in the installation helps
security in upgrading its operational efficiency and effectiveness.

1. Three Basic Parts of Alarm System

Generally all alarming devices have these three (3) basic parts:
a. Sensor or Trigger Device – it emits the aural or visual signal or both.
b. Transmission Line – Circuits which carries messages to the signaling
apparatus.
c. Enunciator – it is a signaling system that activates the alarm.

2. Types of Protective Alarm System

a. Central Station System – a type of alarm system where the control station is
located outside the plant or installation.

b. Proprietary System – it is a centralized monitor of the proprietary alarm


system is located in the industrial firm itself with a duty operator.

Page 8
INDUSTRIAL SECURITY MANAGEMENT

c. Local Alarm – this system consist of ringing up a visual or audible alarm near
the object to be protected.

d. Auxiliary Alarm – it is a company-owned alarm system with a unit in the


nearest police station so that in case of need, direct call is possible.

3. Kinds of Alarms

a. Metallic Foil or Wire – it will detect any vibration caused by attempted force
entry.

b. Photoelectric or Electric Eye Device – it is an invisible/visible beam is


emitted and when this is disturbed or when an intruder breaks contact with the
beam, it will activate the alarm.

c. Audio Detection Device – it will detect any sound caused by attempted force
entry.

d. Vibration Detection Device – it will detect any vibration caused by


attempted force entry.

e. Space and Motion Detectors –these systems derive their operating principle
usually from a physical phenomenon known as “Doppler Effect”. A constant
sound waves in a cubicle disturbed by an object will cause change of
frequently and wave motion thereby causing an alarm to trigger.

f. Electron or Electromagnetic Fence – it is an electronic fence consisting of 4


to 5 strands of wire spaced from 9 to 24 inches above one another which
serves as antenna, a monitor panel, and an electric circuitry.

g. Foot Rail Activator – placing the front of their foot to engage the activation
bar placed on the floor in such a position that tellers may activate the alarm.

h. Bill Traps - bill trap or currency activation devices are usually placed in the
teller’s cash drawer and connected to the alarm system using a wire connector.

i. Knee or Thigh Button – these are installed inside the desk or teller station so
they can be activated by knee or thigh pressure. They are commonly found in
location where personnel usually perform their duties from a seated position.

j. Foot Button – like the foot rail permit alarm activation safety while both
hands remain clear in view of the robber.

k. Double Squeeze Buttons – pressure is requires on both side of the device and
therefore the probability of accidental alarm is reduced.

Page 9
INDUSTRIAL SECURITY MANAGEMENT

G. Fire Alarm System

1. Definition

Fire Alarms – are those devices installed to help detect fires or detect anything that
causes fire such as smoke or unusual rising of temperature.

In large cities, alarms are received at central dispatch office and then transmitted to fire
stations, frequently with the use of mobile teleprinters and computers. Apparatus is dispatched
according to the nature of the alarm and location of the fire. Many modern departments are now
equipped with computer-aided dispatch systems that can track the status of all units and provide
vital information about the buildings where fires occur.

2. Private Fire Protection System

Private companies and business establishments install fire alarms and automatic fire
extinguishers to avert possible occurrence of fire.

 Automatic Sprinkling System – it is an integrated network of hydraulically


designed piping installed in a building, structure or area with outlets arranged in a
systematic pattern which automatically discharge water when activated by heat or
combustion products from a fire.

Automatic Sprinkler – is a type of built-in sprinklers which works by the


increase of room temperature and which automatically operates the system to put
out the fire.

Types of Sprinkling System:


a. Wet Pipe System – the piping has water with pressure, and the water
sprinkler will operate when head is opened and water will continue to flow
until shot-off.

b. Dry Pipe System – the pipes are filled with air under pressure which holds
the water at a value located in a room. When sprinklers head goes, into
operation, air is released, trapping the dry pipe value and allowing water to
flow through the system.

 Fire Pumps – are mechanical device of supplying water which can be manual or
motor-driven. These pumps are ideal when natural supplies of water are readily
available like a river, lake or stream.

 Standpipes are galvanized Iron (GI) steel or plastic pipes located inside a
building from the lowest to the top floor with water under pressure for use in case
of fire. Located near the standpipe is a fire hose usually enclosed in a glass box
handy for use. In case of fire, the hose is screwed into the standpipe outlet and

Page 10
INDUSTRIAL SECURITY MANAGEMENT

valve is opened to release the water. The water for the standpipe can come from a
storage tank at the roof or from a series of water pumps.

 Fire Hydrant is a mechanical device strategically located in an installation or


street where fire hose is connected so that water with pressure will be available to
extinguish a fire.

 Portable Hand Extinguishers - it is a firefighting equipment which can be


portable or in a cart that is used to put out fire depending on the contents to
extinguish certain types of fire as Class A to D.

 Alarm System in buildings may be also be equipped with detection system that
will transmit an alarm. Some detectors are designed to respond to smoke and
others to heat.

H. Protective Locks and Key Control

1. Definition of Terminologies

a. Lock – a mechanical, electrical, hydraulic or electronic device to prevent entry


into a building, room, container or hiding place and to prevent the removal of
items without the consent of the owner.

b. Key –maybe defined as:


- It is an instrument for locking and unlocking: a metal bar with notches
or grooves that, when inserted into a lock and turned, operates the
lock’s mechanism; or

- It is a door or lock opener: a device such as a plastic card with an


encoded magnetic strip that operates a door or lock.

c. Peterman – an English term used to describe a lock picker.

2. Types of Locks

The type of lock to be used is usually influences by the design of the


establishment as well as the criticality of the establishment’s nature and operation.
Security or protective locks could be classified into the following:

a. Key-Operated Mechanical Lock – it uses some sort of arrangement of internal


physical barriers (wards tumblers) which prevent the lock from operating unless
they are properly aligned. The key is the device used to align these internal
barriers so that the lock may be operated:

Three (3) Types of Key-Operated Lock


1. Disc or Wafer tumbler mechanism

Page 11
INDUSTRIAL SECURITY MANAGEMENT

2. Pin tumbler mechanism


3. Lever tumbler mechanism

b. Padlock - it is a portable and detachable lock having a sliding hasp which passes
through a staple ring or the like and is then made fast or secured.

c. Combination Lock – instead of using the key to align the tumblers, the
combination mechanism uses numbers, letters or other symbols as reference point
which enables an operator to align them manually.

d. Code-Operated Lock – it is a type of lock that can be opened by pressing a series


of numbered button in the proper sequence.

e. Electrical Lock - a type of lock that can be opened and closed remotely by
electrical means.

f. Card-Operated Lock – it is a type of lock operated by a coded card.

3. What is a Key?

A key is a device which is used to open a door. A key consist of two parts: the
blade, which is inserted into the lock, and the bow, left protruding so that torque can be
applied. The blade of a key is normally designed to open one specific lock, although
master keys are designed to open sets of similar locks.

4. Types of Key

a. Change Key – it is a specific key, which operated the lock and has a particular
combination of cuts which match the arrangement of the tumblers in the lock.

b. Sub-master Key – it is a key that will open all the lock within a particular area or
grouping in a given facility.

c. Master Key – it is a special key capable of opening a series of lock.

d. Grand Master Key - it is a key that will open everything in a system involving
two or more master key group.

5. Key Control

Once an effective key control has been installed, positive control of all keys must
be gained and maintained. This can be accomplished only if it is established in
conjunction with the installation of new locking devices.

The following methods can be used to maintain effective key control.

Page 12
INDUSTRIAL SECURITY MANAGEMENT

a. Key Cabinet – a well-constructed cabinet will have to be procured. The cabinet


will have to be of sufficient size to hold the original key to every lock in the
system. It should be secured at all times.

b. Key Record – some administrative means must be set up to record code numbers
and indicates to whom keys to specific locks have been issued.

c. Inventories – periodic inventories will have to be made of all duplicate and


original keys in the hands of the employees whom they have been issued.

d. Audits – in addition to periodic inventory, an unannounced audit should be made


of all key control records and procedures by a member of management.

e. Daily Report – a daily report should be made to the person responsible for key
control from the personnel department indicating all persons who have left or will
be leaving the company. In the event that a key has been issued, steps should be
initiated to insure that the key is recovered.

I. Security Cabinet

The final line of defense at any facility is in the high security storage where
papers, records, plans or cashable instrument, precious metals or other especially valuable
assets are protected. These security containers will be of a size and quantity, which the
nature of the business dictates.

1. Types of Security Cabinet

a. Safe - it is a metallic container used for the safekeeping of documents or small


items in an office or installation. Safe can be classified as either robbery or
burglary resistance depending upon the use and need.
 Its weight must be at least 750 lbs, and should be anchored to a building
structure.
 Its body should at least one inch thick steel.

b. Vault – it is heavily constructed fire and burglar resistance container usually a


part of the building structure used to keep and protect cash, documents and
negotiable instruments. Vaults are bigger than safe but smaller than a file room.
 The vault door should be made of steel at least 6 inches in thickness.
 The vault walls, ceiling, floor reinforce concrete at least 12 inches in
thickness.
 The vault must be resistive up to 6 hours.

c. File Room – it is a cubicle in a building constructed a little lighter than a vault but
of bigger size to accommodate limited people to work on the records inside.
 The file room should at most be 12 feet high.
 It must have a watertight door and at least fire proof for one hour.

Page 13
INDUSTRIAL SECURITY MANAGEMENT

Page 14

You might also like