Sunteți pe pagina 1din 10

GROUP 1

INTRODUCTION TO INDUSTRIAL SECURITY MANAGEMENT


The Concept of Security:
A. Fundamentals of Industrial Security Management
Industrial security is all procedure or system which have goal to ensure the safety and health of workers
in a business enterprise, managers establish a focus on safety that can include elements such as:
 Management leadership and commitment
 Employee engagement
 Accountability
 Safety programs, policies, and plans
 Safety processes, procedures, and practices
 Safety goals and objectives
 Safety inspections for workplace hazards
 Safety program audits
 Safety tracking & metrics
 Hazard identification and control
 Safety committees to promote employee involvement
 Safety education and training
 Safety communications to maintain a high level of awareness on safety

Industrial Security Management


 is a continuous process to maintain the safety and security of industrial control systems
(ICS). Industrial Security Management is a continuous process to maintain the safety
and security of industrial control systems (ICS).
 1) Human Resource Security safety
 2) Safety measurements and regular report
 3) Personal safety equipment practice
 4) Safety over hazardous Energy during Lock Out
 5) Protective usage of handy instruments
 6) Gas, Welding and Cutting Tools protection
 7) Woodworking Equipment and Tools safety
 8) Grounds Maintenance and Gasoline Safety
 9) Heavy Equipment safety
 10) Production Security Policy Development
 11) Industrial Security Training
 12) Keep protecting the Interior using AAA Service
 13) Industrial security practice including cyber security.
 14) Management, Analysis, and Response System for Security safety
 15) A flexible partnership safety Practice, and so on.
 You might learn the components more details here, and uncover the range of industrial security
management that includes the things for total security work.
 Industrial security management (ISM) or ICS maintenance has a profound economy that
determines the productivity of an industry. That is why now the days ISM is turning towards ICS
automation in terms of efficient security management.

9 TYPES OF AGENCIES UNDER REPUBLIC ACT 5487


 SAGSD
 PADPAO
 PNP
 COMPANYY GUARD FORCE
 DUTY DETAIL ORDER
 GOVERNMENT GUARD UNIT
 GOVERNMENT SECURITY PERSONNEL
 PRIVATE DETECTIVE
 PRIVATE SECURITY GUARD

B. Definition of Security
 Security, in a collective sense, is the same as protection and safety; the state of being safe and the
condition of being protected against physical, social, spiritual, financial, political, emotional,
occupational, psychological or other types or consequences of failure, damage, error, accidents,
harm or any other event which could be considered not desirable.
 Security is also freedom from fear, harm, danger, loss, destruction or damages.
 Basically, it is the action of man against man that led to many unsecured and unsafe conditions,
Reasons could be economic, revenge, or unjust plain greed and avarice. Whatever the motives,
the civilized man needs adequate protection.
Three Major Areas of Security
1. Physical Security- this concern with the physical measure adopted to prevent
unauthorized access to equipment, facilities, material and document and to safeguard them
against espionage, damage, loss and theft.

2 Personnel Security- this is as important as physical security. Personnel security starts even
before the hiring of an employee and remains to be maintained for as long as the person is
employed. Its purpose is to ensure that a firm hires those best suited to assist the firm in
achieving its goals and objectives and once hired assist in providing necessary security to the
work force while carrying out their functions.
3. Document and Information Security – this involves the protection of document as
classified papers from loss, access by unauthorized persons, damage, theft and comprise through
disclosure.

C. Research to other security concepts


 Information security is information assurance, the act of maintaining the confidentiality, integrity
and availability (CIA) of information, ensuring that information is not compromised in any way
when critical issues arise.
 The purpose of an information security concept is to implement the security strategy. The
concept describes the planned approach for achieving an institution's stipulated security
objectives. The security concept is the central document in a company's or public authority's
security process.
 Three basic information security concepts important to information are Confidentiality, Integrity,
and Availability. If we relate these concepts with the people who use that information, then it will
be authentication, authorization, and non-repudiation.
 Confidentiality- Making sure our information is protected from unauthorized disclosure.
 Integrity- Making sure that the information we process, transmit and store has not been
corrupted or adversely manipulated.
 Availability- making sure that the information is there when we need it and gets to those who
needs it.
GROUP 2
The concept of security: Importance and necessity of security management in organization

THE CONCEPT OF SECURITY

D. CATEGORIES OF SECURITY

Two Categories of Security Controls

There are three primary areas that security controls fall under. These areas are management
security, operational security and physical security controls.

1. Management Security
 Management security is the overall design of your controls. Providing the guidance, rules, and
procedures for implementing a security environment.
 The identification of an organization's assets (including people, buildings, machines, systems and
information assets), followed by the development, documentation, and implementation of policies
and procedures for protecting these assets.

 An organisation uses such security management procedures as asset and information classification,
threat assessment, risk assessment, and risk analysis to identify threats, categorise assets, and rate
system vulnerabilities so that they can implement effective controls.

2. Operational Security
 Operational Security is the effectiveness of your controls. Includes access control, authentication,
and security topologies after network installation is complete.
 Also known as procedural security is a risk management process that encourages managers to view
operations from the perspective of an adversary in order to protect sensitive information from falling
into the wrong hands.
 Part of physical security that deals primarily with the protection of processes, formulas, patents, and
other industrial and manufacturing activities from espionage, infiltration, loss, compromise or
photocopying.

3. Physical Security
 Physical security is the protection of personnel, data, hardware, etc., from physical threats that could
harm, damage, or disrupt business operations or impact the confidentiality, integrity, or availability
of systems and/or data.
 Is the protection of personnel, hardware, software, networks and data from physical actions and
events that could cause serious loss or damage to an enterprise, agency or institution.
 Uses to prevent of more technical threats such as hacking, malware, and cyber espionage.
 Obstacles should be placed in the way of potential attackers and physical sites should be hardened
against accidents, attacks or environmental disasters. Such hardening measures include fencing,
locks, access control cards, biometric access control systems and fire suppression systems.
 Others are surveillance cameras and notification systems, such as intrusion detection sensors, heat
sensors and smoke detectors.

Other security types:


- Personnel security
- Document security
- Bank security

KINDS OF SENSITIVE INFORMATION


 Proprietary Information
– Information which some special way is related to the status, operations or activities of the
possessor over which the possessor asserts ownership.
 Trade Secrets
- It may consist of any formula, pattern, device or compilation of information which is used in one’s
business and which gives one opportunity to gain an advantage over competitors who do not know
or use it.
 Patent
– A grant given by the government to an inventor, conveying and securing to him the exclusive
rights to make, use and sell his invention for term of twenty (20) years.

LAW ON INTELLECTUAL PROPERTY


 INTELLECTUAL PROPERTY CODE OF THE PHILIPPINES [Republic Act No. 8293] Approved on June 6,
1997
 Civil Security Force Command (CSFC) Tasked to exercise administrative and operational control in the
regulation of the firearms, explosive, and security agency industries. Under of it is Security Agencies
and Guards Supervision Division (SAGSD)
 SAGSD was renamed to Supervisory Office for Security and Investigation Agencies (SOSIA)

IMPORTANCE AND NECESSITY OF SECURITY MANAGEMENT IN ORGANIZATION

 Security management is the identification of an organization's assets (including people, buildings,


machines, systems and information assets), followed by the development, documentation, and
implementation of policies and procedures for protecting these assets.

 An organization uses such security management procedures as asset and information classification,
threat assessment, risk assessment, and risk analysis to identify threats, categorise assets, and rate
system vulnerabilities so that they can implement effective controls.

 Management of security risks applies the principles of risk management to the management of
security threats. It consists of identifying threats (or risk causes), assessing the effectiveness of
existing controls to face those threats, determining the risks' consequence(s), prioritizing the risks by
rating the likelihood and impact, classifying the type of risk and selecting an appropriate risk option
or risk response. In 2016 a universal standard for managing risks has been developed in The
Netherlands. In 2017 it was updated and named: Universal Security Management Systems Standard
2017.

 Security management is the identification of an organization's assets, followed by the development,


documentation, and implementation of policies and procedures for protecting these assets. An
organization uses such security management procedures as information classification, risk
assessment, and risk analysis to identify threats, categorize assets, and rate system vulnerabilities so
that they can implement effective controls.
TYPES OF SECURITY

 Physical Security
Physical security is the protection of personnel, hardware, software, networks and data from
physical actions and events that could cause serious loss or damage to an enterprise, agency or
institution. This includes protection from fire, flood, natural disasters, burglary, theft, vandalism
and terrorism.
 Cyber Security
Computer security, cyber security or information technology security is the protection of computer
systems and networks from the theft of or damage to their hardware, software, or electronic data,
as well as from the disruption or misdirection of the services they provide.

HAZARDS; RISK, ACCIDENT WITH EXAMPLES

The role of a security guard is important for protecting private property and the people who reside
or work on the premises they guard. However, there are several risks that security guards often face
that security managers should consider to avoid liability or injury. Here's a look at three of the most
common.

Interference Risks

When different companies work together, there are inherent risks to security guards that may lead
to accidents due to a lack of awareness of safety protocols that the client or security company may
have. That's because if activities are not properly coordinated, or if there is a level of disorganization,
it can create confusion for the security guards regarding everyone's responsibilities and duties.
Security companies that operate within the confines of their client's company have to deal with
these interference risks. Thus, it's important to take preventative measures, such as exchanging risk
insight, coordinating preventative measures and implementing health provisions.

SPECIFIC RISKS REGARDING SECURITY ACTIVITIES

Sometimes risks are specifically related to security activities. Here are some of the most common
that security guard companies must face:

Work violence

This can include physical violence, such as being attacked. It can also include sexual harassment,
bullying and intimidation with aid of a weapon. It's important to address these matters,
as research indicates that exposure to bullying and workplace violence is linked to diabetes.

Dog-related risks

Poorly trained guard dogs can lead to behavior that's unpredictable and aggressive. To prevent
this, dogs should be properly trained.
Handling weapons

If your team handles weapons, it's important they are provided with quality weapons and proper
training to avoid serious injuries or death.

Radiation Exposure

Hospitals, labs and other places that may have high exposure to radiation can seriously impact your
security guard's health if they lack proper training.

Work organization risk factors

From working alone to inflexible work schedules, work organization risk factors can put security
guards' health and safety at risk. Put safety measures into place, including using a guard patrol
control such as the Deggy guard tour solution, so that your security guards can check in and be
accounted for.

The physical workload

Poor posture, inadequate work areas and other physical workload risks can cause muscular pain,
poor blood circulation and other health risks that your security guards should be aware of.

Risks from psychosocial workload

Stress from work, a lack of motivation or strained emotional or mental workloads can lead to
tiredness and poor mental health.

Specific risks facing female security personnel

Female security guards who may be pregnant or breast-feeding require special measures to
safeguard them from health hazards that can impact their child.

RISK ASSESSMENT AND RISK MANAGEMENT IN THE WORKPLACE

According to Section 10 of the Occupational Safety and Health Act every employer must analyze,
identify and estimate the inconvenience and risks that concern the safety and health of the
employees.

Risk assessment means identifying of hazards at work, defining the hazard and stipulating the risk
associated with the hazard. Risk assessment is at its best preventative occupational safety. It is a
systematic process designated to create a safe work environment. The work environment must be
monitored and dangerous situations must be carefully investigated. Risk assessment and risk
management is part of the security operation at the workplace.

Safety at Work and Risk Assessment

Identification of hazards and risk assessment should be the base for the safety at work work at the
workplace.

The steps of a risk assessment are:

1) Identify hazards and risks

2) Identify who may be at risk

3) Qualitative or quantitative risk assessment of hazards

4) Implementing of risk management methods (by removing a hazard or reducing the level of its risk)

RISK MANAGEMENT

Risk management is an overall view to approach hazards and measures to reduce and eliminate
injuries. Before an effective risk assessment is possible the hazards needs to be identified and
estimated. The estimation of the likelihood and severity of harm as well as choosing and
accomplishing sufficient safety measures are also part of the risk management process.

IDENTIFICATION OF HAZARDS AND RISK ASSESSMENT

The inconveniences and hazards related to work at the workplace, the facilities, work environment
and working conditions should be analyzed and identified systematically. If the problems cannot be
eliminated, it is necessary to assess their impact on the health and safety of the employees.
When assessing the hazards one should pay attention especially to

 the risk of accidents and health risks


 ergonomically and physical, psychological and social severity disadvantage
 the structure and construction of the work place and working environment
 the safety of machines, work tools and other equipment
 the prevention of accidents, rescue operations and first aid
 the facilities used by the employees
 occurred accidents, occupational diseases and work-related diseases and also dangerous
situations so called near misses
 The age, sex, competence and other personal qualifications of the employee.

S-ar putea să vă placă și