• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/141

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

141 Cards in this Set

  • Front
  • Back

Security

Defined as a degree of protection to safeguard things and person againts danger, damage, loss and crime.

Physical Security

The broadest type of security concerned with physical measures designed to safeguard personnel and prevent unauthorized access to equipment, facilities materials, document

Communication security

Protection by preventing or delaying the enemy or unauthorized person in gaining information through communication system

Document Security

Protection of documents classified matters and vital records from loss access by unauthorized person damage, theft and compromise through proper storage and procedures

Personal security

Protection of person especially the ranking officials of the government or a company, visiting person of illusion standing and foreign dignities

Industrial security

Protection of industrial plants and business enterprises which involves the safeguarding of personnel, process, properties and operation.

Operational security

Protection of process, formulas and patents industrial, and manufacturing activities from espionage, infiltration loss, compromise or photocopying

Personnel security

Involves background checks of individual commensurate with the security requirements

Bank security

Protection of cash and assets while they are in storage in transit and or during transaction.

Hotel security

Protection or physical assets, guest and their personal effects and hotel property

Barrier

Any structure or physical device capable of restriction, deterring, or delaying illegal access to an installation

Perimeter barrier

A medium or structure which defines the physical limits of an installation or area to restrict or impede access thereto. Its supplement the protection of an inside or outside perimeter

Natural barrier

Geographical features, such as rivers lakes

Structural barrier

Man-made construction such as fences and walls

Human barrier

It refers to security guards and employee of the establishment

Animal barrier

Structure used in partially providing a guarding system like dogs and geese

Energy barrier

Employment of mechanical, electrical, electronic energy imposes deterrent to entry by the potential intruder.

Solid fence

Visual access through the fences is denied from the intruders

Full view fence

Provide visual access through the fences

Chain link fence (permanent)

Must be constructed in 7feet material excluding the top guard; wire must be 9guage or heavier; mesh opening must not be larger than 2inches and;must reach 2inches of hard ground.

Barbed wire fences

Twisted double stand; 12guage wire, with 4point barb spaced on equal distant part; must be firmly affixed to post not more than 6feet apart, distance between strand will not exceed 6inched and atleast one wire will be interlocked vertical in midway

Concertina wire fence (least permanent)

Commercially manufactured wire coil of high strength steel barber wire clipped together at interval to form cylinder. Opened is 50feet long and 3feet high

Clear zone

Refers to unobstructed area maintained on both sides of the perimeter barrier.

Outside (clear zone)

Distance of atleast 20feet from the perimeter barrier to the public road

Inside (clear zone)

Distance of atleast 50feet from the protected area to the perimeter barrier.

Top Guard

An additional overhead of barbed wire placed on vertical perimeter fences facing upward and outward with a 45degree angle with 3 to 4 strands of barbed wires spaced 6 apart.

Guard control stations

Normally provided at main perimeter entrances to secure area located out of doors and manned by guards on a full-time basis

Tower/guard tower

Is house like structures above the perimeter barriers. It gives a psychological effects to violators

Protection in depth

Use of warning signs, reduction of access roads, and use of animal guards and intrusion alarm devices is deployed

Sign and notice

Controls signs should be created necessary in the management of unauthorized access, and prevention of accidental entry. Sign should be plainly visible and legible from any approach and in comprehensible language

Protective lighting

Improves visibility so that intruders can be seen identifies or apprehended and makes it easier for guards to identify employees and vehicle during night time.

Continuous lighting

Most common type consisting of series of fixed luminous to light a given area continuously with overlap.

Glare-projection type

The intensity is focused on the intruder while the observer guard remained in the comparative darkness

Controlled lighting type

The lighting is focused on a pile of items rather than the background

Standby lighting

Like continuous lighting but can be turned on manually or by special device or other automatic means

Movable lighting

Consist of stationary or portable manually operated searchlight. The searchlight may be lighted continuously during the hours of darkness or only as needed

Emergency lighting

This standby lighting may be utilized in the event of electric failure

Incandescent lamps

Type of light lamps with common light bulb in which light is produced by the resistance of a filament to electric current

Gaseous-discharge lamp

Type of light lamps with very economical to use but us not acceptable for industrial security lighting due to long time of lighting

Mercury vapor lamps

Gaseous light gives blue green color

Sodium vapor lamps

Emit yellow amber light usually used as streetlights

Quarts lamp

Emit very bright white light and almost as rapid as the incandescent lamp.

Floodlight

Projects light in a concentrated beam otherwise known as reflector or spotlight

Searchlight

Highly focused incandescent lamps

Streetlights

Produces diffused light rather than direction beam

Fresnel light

Projects a narrow, horizontal beam which is a proximately 180 degrees in the horizontal and 15 to 30 degrees in the vertical panel

Sensor or triggered device

Basic part of alarm system detects or senses a condition or object

Controls / transmission line

Basic part of alarm system receives the information from sensor, evaluates the information and transmits it to the annunciation function

Annunciation

Basic part of alarm system provides alert to the monitoring personnel to initiate a response

Metallic foil or wire

Types of alarm system detects any action that moves or break the foil or wire. It is commonly used in window or glass surfaces of building or compound. All possible point of entry can be wired by using electrically charged strips of tinfoil or wire

Photoelectric or electric eye device

Types of alarm system where a light beam is transmitted at a frequency of several thousand vibrations per second. It is connected by a wire to control station and when an intruder crosses the beam he breaks the contact with the photoelectric coil which thus activates the alarm

Audio detection device

Types of alarm system has a supersensitive microphone speaker sensor that is installed in walls ceilings and floor of the protected are. Any sound caused by attempted forced entry is detected by file censor

Vibration detection device

Types of alarm system where the vibration sensitive sensor is attached to walls, ceiling or floors of the protected areas. Any vibration caused by attempted forced entry is detected by the sensor

Magnetic door contact

Types of alarm system has a protective device usually placed in the door and window that can be send notification when the opening and closure occurs.

Passive infrared detector (PIR)

Type of alarm system which is able to distinguish if an infrared emitting object is present by first learning the ambient temperature of the monitored space and then detecting a change in the temperature caused by the presence of an object

Foot rail activator

Type of bank alarm system they are placed on the floor in such a position that teller may activate the alarm by placing the front of their foot engage the activation bar

Bill traps

Type of bank alarm system also known as currency activation device which are usually place in the tellers to top cash drawer and connected to the alarm system using a wire connectors when currency is removed from the device the alarm is activated

Knee or thigh buttons

Type of bank alarm system it is installed inside the deck or teller station so they can be activated by knee or thought pressure. They are commonly found in location where personnel usually perform their duties from a seated position

Foot button

Type of bank alarm system like the foot rails it permits alarm activation in relatively safety while both hands remain clear in view of the robbers

Double squeeze button

Type of bank alarm system where it requires pressure on both side of the device and therefore the probability of accidental alarm is reduced

Central station system

A type of protective alarm where the central station located outside the installation. It can be located in agency and the installation is one of the subscribers, when alarm is sounded central station notifies police and other agency, a system in which the alarm signal is related to remote panel located at the facilities of private owned protection service company manned by its personnel

Propriety system

A type of protective alarm where it is same as the central station system except that it is owned by operated and located in the facility. It is located inside the industrial firm itself with a duty operator. Response to all alarm is by facility own security or fire personnel since this system is monitored locally into locally the response time to an alarm is reduced

Auxiliary system

A type of protective alarm where in this system installation circuits are led directly into local police or fire department by lease telephone line

Local alarm by chance system

A type of protective alarm or a local alarm in which a siren or bell is sounded with no predicable response. These system are used in residence or small establishment which cannot afford a respond system. The hope is that the neighbor or passing patrol car will reach the alarm and call for police assistance.

Dial alarm system

A type of protective alarm where this system is set to dial a predetermined number when the alarm is activated . The phone is answered a recording state that an intrusion is in progress at the location alarmed

Lock

A mechanical, electrical, hydraulic or electronic device designed to prevent entry into building, room, container or hiding place, and to prevent the removal of items without the consent of the owner

Peterman

A term used in england for lock picker, safe crackers and perpetrator of restricted areas or room

Padlock

A portable and detachable lock having or sliding hasp which passes through a staple ring or the like and is then made fast or secured.

Warded locks

Type of lock where the underlying principle is incorporation of wards or obstruction inside the lock to prohibit a key from operating the bolt unless the key has corresponding notches cut in it that it will pass the wards, it offers very little security this type of lock must therefore be use only to have privacy but not to provide degree of security

Disc tumbler lock

Type of lock also known as wafer tumbler type has flat metal tumbler with open center fitted into lock case. It is commonly designed for automobile industry and is in general use in car door today because this lock is easy and and cheap to manufacture the delay afforded is between 7 to 10 mins

Lever lock

Type of lock used for all purposes. The least of this lock are used in desk, locked and cabinets and are generally less secure than pin tumbler lock

Combination lock

Type of lock that requires manipulation of dial according to a predetermined combination code of numbers or letters. Most of these locks have three dials but some locks have four dials for greater security.

Code-operated lock

Type of lock are opened by pressing a series of numbered buttons in the proper sequence. Some of them are equipped of alarm if wrong sequence is pressed. These are high security locking device

Card-operated lock

Type of lock with coded card notched embosses or containing an embedded pattern of copper flocks. These are frequently fitted with a recording device which register time and identify the user

Key control

Is the management of keys in a plant or business organization to prevent unauthorized individual access to the keys

Maison key system

Keying system that permits a single lock to be opened with a number of unique, individual keys. Key system are often found in apartment building common areas

Key cabinet

A well constructed cabinet will have to be of sufficient size to hold the original key to every lock in the system at it should be secured at all times

Key records

Some administrative means must be set up record code numbers. Indicate to whom the keys to specific locks have been issued

Inventories

Periodic inventories will have to be made of all duplicate and original keys in the hand of the employees whom they have been issued

Audit

In addition to periodic inventory an announced audit should be made of all key control records and procedure by a member of management

Daily report

It should be made to the person responsible for the key control

Change key

A key to single lock within a master keyed system

Sub-master key

A key that will open all the locks within a particular area or grouping in a given facility

Master key

A special key capable of opening a series of locks. This key is capable of opening less number of locks than the grand master key

Grand master key

A key that will open everything involving two or more master key groups. This key is relatively rare but might but used by a multi-premises operation in which location was master keyed while the grand master key would function on any system

Protective cabinet

The final line of defense at any facility every facility will have its own particular need but certain general observation

Safe

Metallic container used for the safekeeping of documents or small items in an office or installation. It can be classified as both robbery and burglary resistance depending upon the use and need. It shall be 750lbs or below and must be anchored to buildings structure. Walls shall be 1inch thick steel and door should be 1½ thick steel

Vault

Heavily constructed fire and burglar resistance container usually a part of the building structure used to keep and protect cas, documents and negotiable instruments. It is bigger than safe but smaller than file room.

Vault

Security cabinet doors should be 6inches thick made of steel; walls ceiling and floor should be 12inches thick; floor should be elevated by 4inches and it should be more than 5,000 cubic feet in size. The door should be fire resistive up to 6hrs

File room

A cubicle in a a building constructed a little lighter than a vault but bigger size. It can be accommodate limited people to work on the records inside. It should be 12feet high not be more than 10,000 cubic feet and water light and fire proof door for 1 hr

Restricted area

It refers to an area in which personnel or vehicle are controlled for reason of security. It is establish to provide security for installation or facilities and to promote efficiency of security operation and economy in the use of security personnel

Controlled area

Access is restricted to entrance to entrance or movement by only authorized personnel and vehicles

Limited area

It is a restricted area in which lesser degree of control is required than in an exclusion area but which the security interest would be compromised by uncontrolled movement

Exclusion area

It refers to a restricted area which contains a security interest to top secret importance and which requires are highest degree of protection. The area should be under surveillance at all time

Personnel security

The sum total procedures followed inquiries conducted and criteria applied to determine the work suitable to a particular applicant or the retention or transfer of a particular employee

Personnel security investigation

Is an inquiry into the character, reputation, discretion, integrity, morals and loyalty of an individual in order to determine a person's suitability for appointment access to classified matter

Local Agency check

Refers to the investigation of the records and files of agency in the area of principal residence of the individual being investigated, mayor Police, fiscal, where the individual is a resident

National agency check

It consist of LAC supplemented by investigation of the records and files of the following aganecies; PNP, ISAFP, NBI, CSC, BUREAU OF IMMIGRATION AND DEPORTATION and other agency

Complete background investigation

It is a type of BI which is more comprehensive that consist of detailed information regarding to the subject

Partial background investigation

Investigation of the individual but limited only to some of the circumstances.

Security clearance

It is a certification by a responsible authority that a person describe is cleared to access and classify matters at appropriate levels

INTERIM

Security clearance effective for two years

FINAL

Security clearance effective for five years

Creation

Record cycle where information is discovered and develops

Use

Record cycle where some action is taken with the information

Storage/Retrieval

Record cycle for future use

Transfer

Record cycle transferring information from active to inactive use

Disposition

Record cycle where the decision may be to retain the information indefinitely at either an active or an inactive storage center or to dispose it

Class 1 - Vital document

Types of documents has a category these are records that are not irreplaceable; records of which reproduction does not have the same values as the original

Class 2 - Important documents

Types of documents includes records, the production of which will close considerable expenses and labor, or considerable delay

Class 3 - Useful documents

This include records whose loss might cause inconvenience but could be readily replaced and which would not in the meantime present an insurmountable obstacle

Class 4 - non essential documents

These records are daily files, routine in nature even if lost or destroyed, will not affect operation or administration. This class represent the bulk of the records which should be attempted to protect.

Security hazard

Is an act or condition which result in a situation like a breach of the protection system and the subsequent loss or compromise of defense information, company secret or damage to personnel property or facilities

Human hazard

Is the act or condition affecting the safe operation of the facility caused by human action, accidental or intentional, this type of hazard is the result of a state of mind, attitude weakness or character traits on the part of one or more person's like sabotage, espionage, pilferage theft etc.

Natural hazard

It is the act or situation caused by natural phenomenon like, floods, typhoon earthquake etc. But there are many measure and technique which may be employed to reduce their effect in establishment plants or installation

Relative critical of operation

Extent and degree of risk to security will be dependent is the importance of firm with reference to the national economy and security

Relative vulnerability

Extent and degree of risk to security will be dependent is the susceptibility of the plant or establishment to damage, loss or disruption of operation due to various hazards

Pilferage

It is most annoying and common human hazards it is a theft conducted by an employee

Casual pilferer

One who steals due to his inability to resist the unexpected opportunity and has little fear of detection; sudden irresistible urge.

Systematic pilferer

Steals with preconceived plans and takes away any or all types of items or supplies for economic gains; planned theft

Warded lock

Most common lock

RA. 5487 amended by PD. 11

Private Security Agency Law

Company security

Type of security guard recruited and employed by the company

Private security

Type of security guard hired by client belonging to private security agency

Government security

Type of security guard recruited and employed by the government

Art. 304 possession of pick lock or similar tools

Any person who, shall, without lawful cause, have in his possession picklocks or similar tools especially adapted to the commission of the crim of robbery. Shall be punished by arresto mayor in it's maximum period to prison correctional in it's minimum period.

Art. 305 false key

1. The tools mentioned in the next preceding article


2. Genuine keys stolen from the owner


3. Any key other than those intended by the owner for use in the lock for forcibly opened by the offender.

Threat

Activity that could lead to a loss

Hazard

Condition that could lead to loss

Vulnerability

Weakness that could be used to access an asset

Risk

Potential loss or damage to an asset

Security inspection

Conducting physical examination to determine compliance to policies

Security survey

Critical, detailer check or exhaustive examination and thorough inspection

Padpao

Philippine association of detective and protective agency operation

Sosia

Supervisory office for security and investigation agencies

Sagsd

Security agency guards supervision division, old name of SOSIA

Security guard

SG Atleast 21 but not more than 50years old; highschool graduate

Security operator/manager

SG Not less than 25 years old; Bachelors Degree

Security consultant

SG Atleast 10 years of experience; masters degree

Regular LTO

LTO given to PSA's with 200-1000 guards and is valid for two years

Temporary LTO

LTO given to new PSA's with less than 200 guards and is valid for one year