Вы находитесь на странице: 1из 7

Industrial

Security
Management
Definition of Terms
Industrial Security
Management

Definition of Terms
Industrial Security Management
1. ACTIVE MEASURES - are the physical barriers, security lighting use of vaults, locks and others.
2. ADVERSARY - an individual, group, organization, or government that conducts activities or has
the intention and capability to conduct activities detrimental to the individual, private or
government entity.
3. ALARMS - aural or visual signal given by the annunciator to security when t=intruder actuates
device in a protected area.
4. ANIMAL BARRIERS - animals are used in partially providing a guarding system.
5. ANNUNCIATOR - is a visual or audible signaling device which initiates conditions of associated
circuits.
6. ASSET - any information, facility, material, information, or activity which has a positive value to its
owner whether it is an individual, private or government entity.
7. AUDITS - in addition to periodic inventory, an unannounced audit should be made of all key
control records and procedures by a member or management.
8. BARRIER - can be defined as any physical structure whether natural or man-made capable of
restricting, deterring, delaying, or preventing illegal and unauthorized access to an installation.
9. CASUAL PILFERER - one who steals due to his inability to resist the unexpected opportunity
and has little fear of detection is no plan or premeditation and he is usually a "loner" on the job.
10. CENTRAL STATION SYSTEM - a type of alarm where the control station is located outside the
plant or installation. When the alarm is sounded or actuated by subscriber, the central station
notifies the police and other public safety agencies.
11. CHANGE KEY - a specific key, which operates the lock and has a particular combination of cuts,
or biting, which match the arrangement of the tumblers in the lock.
12. CLASSIFIED INFORMATION - this includes all information concerning document, cryptographic
devices developed projects and materials following on the categories of top secret, confidential,
or restricted.
13. CLASSIFIED MATTER - any information or material in any form or of any nature, the
safeguarding of which is necessary in the interest of security and which is classified for such
purpose bby the responsible classifying authority.
14. CLASSIFY - this refers to the assigning of information or material, one of the four security
categories after determination has been made that the information requires the security protection
as provided.
15. CODE-OPERATED LOCK - a type of lock that can be opened by pressing a series of numbered
button in the proper sequence.
16. COMBINATION LOCK - instead of using the key to align the tumblers, the combination
mechanism uses numbers, letters or other symbols as reference point which enables an operator
to align them manually.
17. COMMUNICATION - the transfer of thought from the mind of one person to the mind of another
thought a common medium or channel.
18. CONFERENCE - the exchange of thoughts or opinions by conversation, or seminar.
19. CONFIDENTIAL - blue color code; is any information or material, the unauthorized disclosure of it
would be prejudice to the interest and prestige of the national or governmental activity or would
cause administrative embarrassment or unwanted injury to and be of advantage to and be of
advantage to foreign country.
20. CONTINUOUS LIGHTING - the most familiar type of outdoor security lighting, this is designed to
provide two specific results: glare projection or controlled lighting. It consists of a series of fixed
luminaries at range to flood a given area continuously during the hours of darkness.
21. CONTROLLED AREAS - are those areas where access is restricted as to entrance or
movements by all authorized personnel and vehicles.
22. CONTROLLED LIGHTING - the lighting is focused on the pile of items, rather than the
background. The width of the lighted strip can be controlled and adjusted to suit the security
needs.
23. COUNTERMEASURES - an action taken or a physical entity used to reduce or eliminate one or
more vulnerabilities.
24. CRITICALITY - the impact of a loss as measured in financial terms.
25. DAILY REPORT - a daily report should be made to the person responsible for key control from
the personnel department indicating all persons who have left or will be leaving the company.
26. DECEPTION DETECTION TECHNIQUES - this process of using devices in detecting deception
during the interview stage.
27. DECLASSIFY - the act of removing the security classification from classified information or
matter.
28. DOCUMENT AND INFORMATION SECURITY - this involves the protection of documents and
classified papers from loss, access by unauthorized persons, damage, theft and compromise
through disclosure.
29. DOCUMENT SECURITY - this involves the protection of documents and classified papers from
loss, access by unauthorized persons, damage, theft and compromise through disclosure.
30. ELECTRICAL LOCK - a type of lock that can be opened and closed remotely by electrical
means.
31. ENERGY BARRIERS - it is the employment of mechanical, electrical, electronic energy imposes
a deterrent to entry by the potential intruder or to provide warning to guard personnel.
32. EXCLUSION AREAS - are used only for handling and storage of high value cargo and classified
documents.
33. FILE ROOM - a cubicle in a building constructed a little lighter than a vault but of bigger size to
accommodate limited people to work on the records inside.
34. FLOODLIGHTS - these can be used to accommodate most outdoor security lighting needs,
including the illumination of boundaries, fences, and buildings and for the emphasis of vital areas
or particular buildings.
35. FRESNEL LIGHTS - these are wide beam units, primary used to extend the illumination in long,
horizontal strips to protect the approaches to the perimeter barrier.
36. FULL-VIEW FENCE - it is constructed in such a way that visual access is permitted through the
fence. Its advantage are that it allows the roving patrols and stationary guard to keep the
surrounding area of the installation under observation.
37. GLARE PROJECTION - the intensity is focused to the intruder while the observer or guard
remained in the comparative darkness, the lighting is toward of the approach of an entrance to an
installation.
38. GRAND MASTER KEY - a key that will open everything in a system involving two or more master
key groups.
39. GUARD CONTROL STATIONS - this is normally provided at main perimeter entrances to secure
areas located out-of-doors, and manned by guards on full-time basis.
40. HUMAN BARRIERS - persons being used in providing a guarding system or by the nature of
their employment and location, fulfill security functions.
41. INDUSTRIAL SECURITY MANAGEMENT - the utilization of all available resources within a
security organization in order to function and attain its goal and objectives.
42. INVENTORIES - periodic will have to be made of all duplicate and original keys in the hands of
each employee whom they have been issued.
43. KEY CABINET - a well-constructed cabinet will have to be procured. The cabinet will have to be
of sufficient size to hold the original key to every lock in the system. It should be secured at all
times.
44. KEY OPERATED MECHANICAL LOCK - it uses some sort of arrangement of internal physical
barriers which prevent the lock from operating if unless they are properly aligned.
45. KEY RECORD - some administrative means must be set up to record code numbers and
indicates to whom keys to specific locks have been issued.
46. LASER BEAM ALARM - a laser emitter floods a wall or fencing with the beam so that when this
beam is disturbed by a physical object, an alarm is activated.
47. LIMITED AREAS - are those within the controlled are where a greater degree of security is
required.
48. LOCAL ALARM - this system consist of ringing up a visual or audible alarm near the object to be
protected.
49. LOCK - is defined as mechanical, electrical, hydraulic or electronic device designed to prevent
entry into a building, room, container or hiding place.
50. MANAGEMENT - in all business and organizational activities is the act of getting people together
to accomplish desired goals and objectives efficiently and effectively.
51. MASTER KEY - a special key capable of opening a series of lock.
52. MEDIUM OF COMMUNICATION - refers to the common language known for two or more
individuals who wants to exchange thought or ideas with each other.
53. MOVABLE LIGHTING - this system is manually operated and is usually made up of movable
search or floodlights that can be located in selected or special locations which will require lighting
only for short period of time.
54. NATURAL BARRIERS - it includes bodies of waters, mountains, marshes, ravines deserts or
other terrain that are difficult to traverse.
55. PADLOCK - a portable and detachable lock having a sliding hasp which passes through a staple
ring and is then made fasten or secured.
56. PASS EXCHANGE SYSTEM - an exchange takes place at the entrance of each controlled area.
Upon leaving the personnel surrenders his badge or passes and retrieve back his basic
identification.
57. PASSIVE MEASURES - are those that will dates man from committing such acts for fear of being
caught, charged in court, or get dismissed; security education programs, investigation, fire
prevention seminars; personal security checks are examples of passive security.
58. PERSONNEL SECURITY - states even before the hiring of an employee and remains to be
maintained for as long as the person is employed.
59. PHYSICAL SECURITY - this is the broadest branch of security which are concerned with the
physical measures adopted to prevent unauthorized access to equipment, facilities, material and
document and to safeguard them against espionage, sabotage, damage, loss and theft.
60. PILFERAGE - is one of the most annoying and common human hazards which security has to
deal with.
61. POSITIVE VETTING - is the process of inspecting or examining with careful thoroughness. The
essence of vetting that is personal; interview conducted under stress.
62. PROBABILITY - the chance or likelihood that a loss will take place. Indicated by a mathematical
statement concerning the possibility of an even occurring.
63. PROFILING - is the process whereby a subject's reaction in a failure critical situation is predicted
by observing his behavior, or by interviewing him, or analyzing his responses to a questionnaire,
such as an honesty test.
64. PROPRIETARY SYSTEM - centralized monitor of the proprietary alarm system is located in the
industrial firm itself with a duty operator.
65. PROTECTIVE ALARMs - is one of the important barriers in security. It assists the security in
detecting, impeding, or deterring potential security threat in the installation.
66. PROTECTIVE LIGHTING - the idea that lighting can provide improve protection for people and
facilities is as old as civilization. Protective lighting is the single most cost-effective deterrent to
crime because it creates a psychological deterrent to the intruders.
67. RECLASSIFYING - refers to the act of changing the assigned classification from classified
information or matter.
68. RECORDED TOUR - guard takes with him on his tour of duty a form which must have the time
punched on it at each station.
69. RESTRICTED - white or no color; is any information and material which requires special
protection other than those determines confidential, secret and top secret.
70. RISK ANALYSIS - the analysis of risk includes examination of the vulnerability, probability and
criticality of potential threats and includes natural and man-made risk.
71. RISK AVOIDANCE - eliminating or removing the risk totally from the business, government, or
industrial environment for which the risk manager has responsibility.
72. RISK MANAGEMENT - is a process of selecting and implementing security countermeasures to
achieve an acceptable level of risk at an acceptable cost.
73. RISK REDUCTION- decreasing the risk by minimizing the probability of the potential loss.
74. RISK SPREADING - spreading the risk through compartmentation or decentralization to limit the
impact of the potential loss.
75. RISK TRANSFER - moving the financial impact of the potential loss over to an insurance
company.
76. RISKS - is the potential damage or loss of an asset.
77. RISK-SELF ASSUMPTION - planned assumption and acceptance of the potential risk by making
a deliberate managerial decision of doing nothing about the threat or setting aside resources for
use in case of a specific loss incident.
78. SAFE - a metallic container used for the safekeeping of documents or small items in an office or
installation. It can be classified as either robbery or burglary resistance depending upon the use
and need.
79. SEARCH LIGHTS - these are highly focused incandescent lamp and are designed to pinpoint
potential trouble spots.
80. SECRET - red color code; is any information and material, the unauthorized disclosure of it would
endanger national security, causes serious injury to the interest an prestige to the nation of any
government activity, or of great advantage to a foreign country.
81. SECURITY - safety from harms, a term that has different dimensions in psychology, public safety,
defense and military matters, and information access. Is a state or quality, condition of being
secured, freedom from fear, harm, danger, loss, destruction or damages, to secure is to make
safe or be protected.
82. SECURITY EDUCATION - is conducted to develop security awareness among employees of the
company. It should cover all employees, regardless of rank or position.
83. SECURITY MANAGEMENT - the broad field of management related to asset management,
physical security and human resource safety functions.
84. SINGLE PASS SYSTEM - the badge or pass coded for authorization to enter specific areas is
issued to an employee who keeps it in his possession until his authorization is terminates.
85. SOLID FENCE - constructed in such a way that visual access through the fence is denied. Its
advantage is that it denies the opportunity for the intruder to become familiar with the personnel,
activities and the time scheduled of the movements of the guards in the installation.
86. STANDBY LIGHTING - it is designed for reserve or standby use or to supplement continuous
systems. A standby system can be most useful to selectively light a particular area in an
occasional basis.
87. STREET LIGHTS - these lightings equipment received the most widespread notoriety for its value
in reducing crime.
88. STRUCTURAL BARRIERS - these are features constructed by man regardless of their original
intent that tends to delay the intruder.
89. SUB-MASTER KEY - a key that will open all the lock within a particular area or grouping in a
given facility.
90. SUPERVISORY TOUR - this is where the guard sends signals to guard headquarters from each
station that he checks.
91. SYSTEMATIC PILFERER - one who steals with preconceived plans and takes away any of all
types of items or supplies for economic gain.
92. TOP GUARD - additional overhang of barbed wire placed on vertical perimeter fences upward
and outward with a 45 degree angle with 3 to 4 strands of barbed wire spaced 6 inches apart.
This increases the protective height and prevents easy access.
93. TOP SECRET - green color code; is any information and materials the unauthorized disclosure of
it would cause exceptionally grave damage to the nation, politically, economically, and military
operation.
94. TOWER GUARD - this is a house-like structure above the perimeter barriers. The higher the
tower, the more visibility it provides.
95. TRADE SECRETS - this consists of any formula, pattern, device or compilation of information
which is used in one's business and which gives him an opportunity to gain an advantage over
competitors who do not know or use it.
96. UPGRADING - refers to the act of assigning the information or matter only to properly cleared
person when such classified information is required in the performance of their official duties.
97. VAULT - heavily constructed fire and burglar resistance container usually a part of the building
structure used to keep and protect cash, documents and negotiable instruments.
98. VISITOR ENTRANCES - separate access for visitors and employees of the establishment should
be provided.
99. VISITOR'S LOGBOOK - all visitors to any facility should be required to identify them and should
be given a visitor's ID by the security.
100. VULNERABILITY - any weakness that can exploit by an adversary to gain access to an
asset.

Вам также может понравиться