67% found this document useful (3 votes)
3K views21 pages

Definition of Terms

This document defines various security-related terms including: 1. Active measures which are physical barriers like security lighting, vaults and locks. 2. Alarms which are aural or visual signals given when an intruder activates a device in a protected area. 3. Ambush attacks where a kidnapper attempts to stop a victim's car by blocking the road or shooting the driver.

Uploaded by

Junelle Sajonia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODT, PDF, TXT or read online on Scribd
67% found this document useful (3 votes)
3K views21 pages

Definition of Terms

This document defines various security-related terms including: 1. Active measures which are physical barriers like security lighting, vaults and locks. 2. Alarms which are aural or visual signals given when an intruder activates a device in a protected area. 3. Ambush attacks where a kidnapper attempts to stop a victim's car by blocking the road or shooting the driver.

Uploaded by

Junelle Sajonia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODT, PDF, TXT or read online on Scribd
You are on page 1/ 21

DEFINTION

OF TERMS
LEA 2
INDUSTRIAL
SECURITY
1. ACCESS LIST – an authenticated list personnel given to security guard allowing
entry to compound or installation or part thereof.

2. Access to the items – techniques can be from fake documents, bribing of


guards, outsmarting security, creating disturbance and other methods to divert
attention while pilferage goes on.

3. Active measures - are the physical barriers, security lighting use of vaults,
locks and others.

4. Advance Security – this are the advanced security at the place of engagement
before the arrival of the VIP. - Sanitize the engagement area.

5. Adversary – an individual, group organization, or government that conducts


activities or has the intention and capability to conduct activities detrimental to
the individual, private or government entity.

6. agriculture.

7. Alarms – Aural or visual signal given by the annunciator to security when


intruder actuates device in a protected area. An annunciator is a visual or audible
signaling device which initiates conditions of associated circuits.

8. Ambush Attack – the kidnapper will attempt to stop the victim’s car with in a
zone he established by blocking the roadway or by shooting the driver.

9. Animal Barriers – animals are used in partially providing a guarding system.


Dogs are usually trained and utilized to serve as guard dogs. German shepherds
are best suited for security functions. Goose and turkeys could also be included.

10. Animal Barriers – Usually German Shepherd, dog trained for and used as
guards.

11. ANNUNCIATOR – is a visual or audible signing device which initiates conditions


of associated circuits. The primarily purpose of alarms is to alert security guard.

12. Area Security – Covers the surrounding areas of engagement.

13. Asset – any information, facility, material information, or activity which has a
positive value to its owner whether it is an individual, private r government
entity.
14. Audio Detection Device – it will detect any sound caused by attempted force
entry. A supersonic microphone speaker sensor is installed in walls, ceilings and
floors of the protected area.

15. AUDIT - an official verification and examination of accounts and records.

16. Audits – in addition to periodic inventory, an unannounced audit should be


made of all key control records and procedures by a member of management.

17. Auxiliary alarm – company-owned alarm systems with a unit in the nearest
police station so that in case of need, direct call is possible. The company
maintains the equipment and lines both for the company and those in the police,
fire and other emergency agencies by special arrangement. The auxiliary system
can be availed of by radio, landlines, or cellphones.

18. Background Investigation (BI) – This technique is very expensive but


necessary in personnel security. It serves to verify information on the application
form and to obtain other information pertinent to the decision to employ.

19. BADGE SYSTEM – a system for personnel movement and control whereby
badges or identification are issued to personnel upon entering and an
installation. Visitors are also issued temporary badges when entering the
installation.

20. Bank Security – this type of security is concern with bank operations. Its main
objective is the protection of bank cash and assets, its personnel and clientele.
Security personnel are trained to safeguard bank and assets while in storage, in
transit and during transactions.

21. Barrier Maintenance –Fencing barriers and protective walls should always be
regularly inspected by security. Any sign or attempts to break in should be
reported for investigation. Destruction of fence or sections thereof should be
repaired immediately and guard vigilance should be increased.

22. BODYGUARD – A person or a grouped of persons usually armed and


responsible for the physical safety of one or more specific person.

23. CARD-OPERATED LOCK – a type of lock operated by code card.

24. Casual Pilferer – one who steals due to his inability to resist the unexpected
opportunity and has little fear of detection is no plan or premeditation and he is
usually a “loner” on the job. The temptation to pick up the article is basically due
to poor security measure. The implication of causal pilfering is the big cumulative
cost if it remains unchecked.

25. Central Station System – a type of alarm where the control station is located
outside the plant or installation. When the alarm is sounded or actuated by
subscriber, the central station notifies the police and other public safety
agencies.

26. Change key – a specific key, which operates the lock and has a particular
combination of cuts, or biting, which match the arrangement of the tumblers in
the lock.

27. Classified Information – this includes all information concerning document,


cryptographic devices developed projects and materials following on the
categories of Top Secret, Confidential or Restricted.

28. Classified Matter – any information or material in any form or of any nature,
the safeguarding of which is necessary in the interest of security and which is
classified for such purpose by the responsible classifying authority.

29. Classify – this refers to the assigning of information or material, one of the four
security categories after determination has been made that the information
requires the security protection as provided.

30. Close-in Security – Accompanies the VIP where ever he goes, maximum of 4
members.

31. CODE-OPERATED LOCK – a type of lock that can be opened by pressing a


series of numbered button in the proper sequence.

32. COMBINATION LOCK – instead of using the key to align the tumblers, the
combination mechanism uses numbers, letters or other symbols as reference
point which enables an operator to align them manually.

33. Communication- The transfer of thought from the mind of one person the
mind of another thought a common be from oral, written and other forms.

34. Compartmentation – refers to the grant of access to the classified matter only
to properly cleared person when such classified information is required in the
performance of their official duties.
35. Compromise – this takes place through the loss of security, which results from
unauthorized persons obtaining knowledge of classified matters.

a. Conducts prophylactic (neutralize the area), operations in the area of


engagement.

36. Conference – The exchange of thoughts or opinions by conversations, or


seminar. The exchange could be from oral, written and other forms.

37. CONFIDENTIAL (blue color code) – Information and material (matter) the
unauthorized disclosure of which, while not endangering the national security,
would be prejudicial to the interest or prestige of the nation or any governmental
activity, or would cause administrative embarrassment or unwarranted injury to
un individual or would be of advantage to a foreign nation.

38. Continuous Inspection - To keep pace with the constant changes in the
organization, changes in our security terms of attitudes, life-style and moral
values, and the rapid advancement of technological modifications are all around
us, the inspection must be ad on-going and never-ending activity.

39. Continuous Lighting –the most familiar type of outdoor security lighting, this
is designed to provide two specific results: glare projection or controlled lighting.
It consists of a series of fixed luminaries at range to flood a given area
continuously during the hours of darkness.

40. CONTROLLED AREA – an area near the adjacent to limited or exclusive areas
where entry is restricted.

41. Controlled Areas – Are those areas where access is restricted as to entrance or
movement by all authorized personnel and vehicles. It should additionally be
marked by a fence or other barrier, and access to it should limited to as few
guests as possible;

42. Controlled lighting – The lighting is focused on the pile of items, rather than
the background. The width of the lighted strip can be controlled and adjusted to
suit the security needs.

43. CONTROLLING - the regulation of many different aspects of business activity,


controls are needed to standardized equality and performance, protect
assets, measures performance, balance plans and programs and motivate
individuals.
44. Countermeasures – an action taken or a physical entity used to reduce or
eliminate one or more vulnerabilities. The cost of possible countermeasures may
be monetary, but may also include non-monetary cost such as reduced
operational efficiency, adverse publicity unfavorable working conditions, and
political consequences.

45. COVERAGE FACTOR – The minimum number of directions from which each
point in the area should be lighted depending upon the use of the area.

46. Critically – the impact of a loss as measured in financial terms. How important
it is in terms of the survival or existence of the organization.

47. Daily report – a daily report should be made to the person responsible for key
control from the personnel department indicating all persons who have left or will
be leaving the company. In the event that a key has been issued, steps should
be initiated to ensure that the key is recovered.

48. Damage to Nation Security – refers to the prejudice, embarrassment or injury


to the country resulting from act or omission.

49. Deception Detection Techniques – this process of using devices in detection


deception during the interview stage. This includes the use of a Polygraph,
Psychological Stress Evaluator and Voice Analyzer.

50. Declassify – the act of removing the security classification from classified
information or matter.

51. Disc tumbler lock – Designed for the use of the automobile industry and are in
general use in car doors today, because this lock is easy and cheap to be
manufactured, its use has expanded to other areas such as desk, files and
padlocks. The delay afforded is approximately ten minutes.

52. Disposal of Items – there is a need for “fences” “brokers” or “clearing houses”
for these “hot” items.

53. Document and Information Security – this involves the protection of


documents and classified paper from loss, access by unauthorized persons,
damage, theft and compromise through disclosure.

54. Document Security – this involves the protection of documents and classified
papers from loss, access by unauthorized persons, damage, theft and
compromise through disclosure.
55. DOPPLER EFFECT – a physical phenomenon that causes frequency shift if an
objects move in the area permeated by radio frequency signals. This change in
a certain type of alarms activates a signaling unit.

56. DRY RUN – practical test or exercise of a plan of any activity to test its validity,
an operational readiness exercise.

57. DURESS CODE – a type of code system so that security personnel when forced
by armed men enter an installation can give alarm by the use of certain words
in casual conversational with other personnel in the installation.

58. ELECTRICAL LOCK – a type of lock that can be opened and closed remotely by
electrical means.

59. Emergency lighting – this system is used in times of power failure or other
emergencies when other systems are inoperative.

60. Energy Barriers – it is the employment of mechanical, electrical, electronic


energy imposes a deterrent to entry by the potential intruder or to provide
warning to guard personnel. These are protective lighting, alarm system and any
electronic devices used as barriers.

61. ENTRANCE CONFERENCE – a conference or dialogue between the survey


team and management officials of a plant before security survey is
conducted.

62. ESCORT – one or more persons accompanying another to give guidance or


protection or to pay honor.

63. EXCLUSION AREA – a restricted area containing materials or operation of


security interest.

64. EXIT CONFERENCE – a conference similar to entrance conference done after


the completion of the security survey.

65. Exit Interview – this is a valuable tool because it gives departing employees an
opportunity to list grievances. It offers security managers an opportunity to learn
of problems not previously known. Incorporating a checklist of company-issued
property and confronting a departing employee of this has resulted in reducing
losses of company property. Debriefing an employee is also incorporated in to
the exit Interview to remind employees of their continuing legal obligation to
safeguard confidential company information.
66. FALL SAFE – a term applied to a device or system that in the event of failure of
a components the incapacity will be signaled.

67. File room – a cubicle in a building constructed a little lighter than a vault but of
bigger size to accommodate limited people to work on the records inside.

68. Financial and Lifestyle inquiry – this type of investigation seeks to gather
information on income and mode of living, sometimes referred to as the earning-
to-debt ratio.

69. FIREARMS- possession of firearms by agency are entitled to possess firearms


after satisfactory complying the requirements as provided by law.

70. Floodlights - These can be used to accommodate most outdoor security lighting
needs, including the illumination of boundaries, fences and buildings and for the
emphasis of vital areas or particular buildings.

71. Fluorescent – this provides good color rendition, high lamp efficiency as well as
long life. However, it cannot project light overlong distance and thus are not
desirable as flood type lights.

72. Formal Inspection is one which some fanfare is attached. It is usually


preceded by an announcement, and the unit under inspection “prepares” for
events, including some extra housekeeping activities that would not otherwise
happen at that point in time.

73. Fresnel lights – These are wide beam units, primary used to extend the
illumination in long, horizontal strips to protect the approaches to the perimeter
barrier. Fresnel projects a narrow, horizontal beam that is approximately 180
degrees in the horizontal and from 15 to 30 degrees in the vertical plane.

74. Full-View fence – It is constructed in such away that visual access is permitted
through the fence. Its advantages are that it allows the roving patrols and
stationary guard to keep the surrounding area of the installation under
observation. On the other hand, it allows the intruder to become familiar with
the movements and time schedule of the guard patrols thereby allowing him to
pick the time that is advantageous on his part.

75. Glare projection type – The intensity is focused to the intruder while the
observer or guard remained in the comparative darkness, the lighting is toward
of the approach of an entrance to an installation.
76. Government Security Personnel – shall be natural persons which include
government security guards, detective, security consultant, security officers and
others that may be classified later except those of the AFP, PNP, BJMP, Municipal
or City Jail guards rendering / performing security and/or detective services as
employed by government entities.

77. Grand Master Key – a key that will open everything in a system involving two
or more master key groups.

78. Guard Control stations – This is normally provided at main perimeter


entrances to secure areas located out-of-doors, and manned by guards on full-
time basis. Entry station should be near a perimeter for surveillance at the
entrance.

79. High pressure sodium vapor – this has gained acceptance for exterior lighting
of parking areas, roadways, buildings and commercial interior installations.
Constructed on the same principle as mercury vapor lamps, they emit a golden
white to light pink color and this provide high lumen efficiency and relatively
good.

80. Hotel Security – a type of security applied to hotels where its properties are
protected from pilferage, loss, damage and the function in the hotel restaurants
are not disturbed and troubled by outsiders or the guest themselves. This type of
security employs house detectives, uniforms guard and supervisor and insures
that hotel guests and their personal effects safeguarded.

81. Human Barriers – guards, charges of quarters, office and shop workers, etc.
who stand between the intruder and the matter to be protected.

82. Incandescent Lamp – it is the least expensive in terms of energy consumed


and has the advantage of providing instant illumination when the switch is on.

83. Industrial Security – a type of security applied to business groups engaged i


industries like

84. Informal Inspection is usually the result of a long and firmly entrenched
inspection program, understood by all and accepted as part of the organizational
life. The inspection has been stripped of all external trappings of importance, but
their functional importance has not been lessen in any manner. They are
seriously and quietly executed in a spirit of understanding and cooperation.
85. Initial Interview – it is the first contact of eh prospective employee wherein
the interviewer determines the suitability of the applicant for employment
through his give answers on the different type of questions being conducted. It
is in this stage where; the interviewer may start providing the necessary
information as to the overview of company security policies and at the same time
on the employee accountability and corresponding penalties that could result
from violation there from.

86. INSPECTION – term use for succeeding surveys.

87. Inventories – periodic inventories will have to be made of all duplicate and
original keys in the hands of eh employees whom they have been issued.

88. Its purpose is to insure that a firm hires those best suited to assist the
firm in achieving its goals and objectives and once hired assist in providing
necessary security to the work force while carrying out their functions.

89. Key Cabinet – a well-constructed cabinet will have to be procured. The cabinet
will have to be of sufficient size to hold the original key to every lock in the
system. It should be secured at all times.

90. KEY CONTROL – the management of key is a plant of business organization to


prevent unauthorized individuals access to the keys.

91. KEY OPERATED MECHANICAL LOCK – it uses some sort of arrangement of


internal physical barriers (wards tumblers) which prevent the lock from operating
unless they are properly aligned. The key is the device used to align these
internal barriers so that the lock may be operated.

92. Key record – some administrative means must be set up to record code
numbers and indicates to whom keys to specific locks have been issued.

93. Laser Beam Alarm – a laser emitter floods a wall or fencing with a beam so
that when this beam is disturbed by a physical object, an alarm is activated.

94. Lever tumbler lock – Are difficult to define in terms of security, since they vary
greatly in their effectiveness. These locks are used in safe deposit boxes and are
for all practical purposes, pick proof. The least of these locks are used in desk,
lockers and cabinets and are generally less secure than pin tumbler lock.
95. Limited Areas – Are used only for handling and storage of high value cargo
and classified documents. The number of people authorized to enter this area
should be strictly limited, and the area should be under surveillance at all times.

96. Local Alarm – this system consists of ringing up a visual or audible alarm near
the object to be protected. When an intruder tries to pry a window, the alarm
thereat goes off.

97. Location of items to be pilfered – the systematic pilferer surveys shopping


and store areas, or through contracts from the firms.

98. LOCK – is defined as a mechanical, electrical, hydraulic, or electronic device to


prevent entry to a building, room, container or hiding place.

99. MAISON KEYING – the issue of key to open main entrance gate and office.

100. Man-made Barriers – are structural construction like fences walls,


floors, roofs, grills, bars, road, blocks, or other physical means to deter or
impede penetration.

101. Master Key – a special key capable of opening a series of lock.

102. MASTER KEY – a special key capable of opening a series of locks.

103. MASTER KEYING SYSTEM – the system used in big installation


whereby keys can open a group or group of locks.

104. Mercury Vapor lamp – it is considered more efficient that he


incandescent and used widespread in exterior lighting. This emits a purplish-
white color, caused by an electric current passing through a tube of conducting
and luminous gas. It used for large area overhead lighting, such as in factories,
warehouses, and sports arenas as well as for streetlights.

105. Metal halide – it has similar physical appearance to mercury vapor but
provides a light source of higher luminous efficiency and better color rendition.
are used for general lighting purposes both indoors and outdoors, such as
commercial, industrial, and public spaces, parking lots, sports arenas, factories,
and retail stores, as well as residential security lighting; automotive and specialty
applications are further fields of usage.
106. Metallic foil or wire – it will detect any action that moves that foil or
wire. An electrically charge strips of tinfoil or wire is used in the doors, windows
or glass surfaces of the protected area.

107. MISSION ORDER- is a written instructions issued by the agency to its


guards to perform lawful activity at specific time, place and date. It shall include
the make, model and serial no. of the firearm issued to the guard and the name
of the operation officer or manager of the agency.

108. Movable or Portable lighting – this system is manually and is usually


made up of movable search or floodlights that can be located in selected or
special locations which will require lighting only for short period of time.

109. Moving Attacks – the approach will usually be made from the left or
passing side, and the attacker will attempt to move over into the path of the
victim’s vehicle, forcing it to stop. Approach, would be from the right in the left
side drive countries. The ideal location for abduction is where cross street or turn
off is available to allow the attacker an easy quick way to escape. If two vehicles
are used to attack, one wills cut-off the victim’s vehicles, forcing it to stop. The
second may be then, move up on the left side. The abductor will make the
attack, take the victims from his vehicles and escape as quickly as possible.

110. Multiple pass system – this provides and extra measure of security by
requiring that an exchange take place at the entrance of each restricted area.

111. Natural Barriers – GOD created barrier such as, river, mountains and
others.

112. Natural Barriers – it includes bodies of waters, mountains, marshes,


ravines, deserts or other terrain that are difficult to traverse.

113. Natural Hazards – these are hazards which are the result of a state of
mind, attitude, weaknesses or character traits of one or more persons. They can
be acts of commission or omission, both overt and covert, which can disrupt
operation of a plant or installation.

114. Need to know – is the dissemination of classified information or matter


to limit strictly to those persons whose duties requires knowledge or possession
thereof.

115. Official – orders, manuals, letters, overlays, maps and magazines. You
may be careful and follow the chain of command.
116. Orientation and Training – it is in this stage where new employees
receive detailed presentation of personnel security policy. Usually, handouts or
employee’s manual are being distributed for reference. New employees also
requested to sign acknowledgement that they have been aware of the exiting
company policies and will abide the same.

117. PADLOCK – a portable and detachable lock having a sliding hasp which
passes through ha staple ring and is then made fasten or secured.

118. Pass exchange system – an exchange takes place at the entrance of


each controlled area. Upon leaving the personnel surrenders his badge or passes
and retrieve back his basic identification.

119. PASS SYSTEM – a method used by security to screen visitors of person


admitted into building premises.

120. Passive measures - are those that will dates man from committing such
acts for fear of being caught, charged in court, or get dismissed; Security
education programs, investigation, fire prevention seminars; personal security
checks are examples of passive security.

121. Patents – this is a grant made by the government to an inventor,


conveying or securing to him the exclusive right to make, use, or sell his
invention for term of years.

122. Perimeter Security – secures the immediate areas surrounding the


place of engagement. - Usually these are the uniformed men.

123. PERMIT- a document issued by CPNP of his duly authorized


representatives authorizing a person to engage in the occupation calling or
employment of watchman, security guard or private after payment of dues of
fees.

124. Personal supervision: Personal inspection of all guards prior to their


starting tour of duty. Periodic checks of guards during their tour by the senior
member of each relief or his representative.

125. Personnel – letters, diary and notebooks. These should be treated


usually the same with official document.
126. Personnel Security – this is as important as physical security. Personnel
security state even before the hiring of an employee and remains to be
maintained for as long as the person is employed.

127. PETERMAN – a term used in England for lock pickers, safecracker and
penetrators of restricted rooms or areas.

128. Photoelectric or Electric Eye Device – an invisible/ visible beam is


emitted and when this is disturbed or when an intruder bread contact with the
beam, it will activate the alarm.

129. Photograph – Taking of photographs should also be considered. Extreme


caution must be exercised in areas where classified information is displayed to
preclude unauthorized taking of pictures of the installation. If a visitor has
camera and it is prohibited to take picture, said camera establishment and guide
them where to go.

130. Physical Security – this is the broadest branch of security which


concerned with the physical measures adopted to prevent unauthorized access to
equipment, facilities, material and document and to safeguard them against
espionage, sabotage, damage, loss and theft.

131. Pin tumbler lock- The pin tumbler lock is a lock mechanism that uses
pins of varying lengths to prevent the lock from opening without the correct key.
The outer casing of the pin tumbler has a cylindrical hole in which the plug or
metal pin is housed. The lock mechanism uses pins of varying lengths to prevent
the lock from opening. To open the lock, the plug must rotate, this is done by
using the correct key.

132. Positive Vetting – is the process of inspecting or examining with careful


thoroughness. The essence of vetting that is a personal interview conducted
under stress. It is based on information previously given by his applicant. Other
information issued during the interview, such as those discovered in the BI,
which confirms or denies this given by the applicant.

133. Private Detective – shall mean any person who does detective work for
hire, reward or commission, other than members of the AFP, Guard of the
Bureau of Jail Management Penology, Municipal or city jail guards, and members
of the PNP or of any other Law Enforcement agency of the government.
134. Private Detective Agency (PDA) – shall mean any person association,
partnership, firm or private corporation, who contracts, recruits, trains, furnishes
or post any private detective, to perform its functions or solicits individuals,
firms, or private, public or government-owned.
135. Private Security Agency (PSA) – shall mean any person association,
partnership, film or private corporation, who contracts, recruits, trains, furnishes
or post any security guard, to perform its functions or solicits individuals,
business, firms, or private, public or government-owned or controlled corporation
to engage his/its security guards, for hire, commission or compensation thru
subscription or as consultant/trainer to any private or public corporation whose
business or transaction involve national security or interest like the operation
and/or management of domestic or ocean vessels, airplanes, helicopters,
seaports, airports, landing strips etc., or as consultant on any security related
matter. Or to provide highly specialized security, detective and investigation
services like gangway security, catering security, passenger profiling, baggage
examination, providing security on board vessels or aircraft, or other security
needs that PNPSAGSD – CSG may approve.
136. Private Security Industry – shall cover those in the legitimate business
of providing private security and detective services.
137. Private Security Personnel – shall be natural persons which include
private security guards, private detectives, security consultant, security officers
and others that may be classified later, rendering performing security and/or
detective services as employed by private security agencies and/or private firms.

138. Probability – the chance of likelihood that a loss will take place.
Indicated by a mathematical statement concerning the possibility of an even
occurring.

139. Proprietary system – centralized monitor of the proprietary alarm


system is located in the industrial firm itself with a duty operator. In case of
alarm, the duty operator calls whatever is the primary need; firefighters, police,
an ambulance or a bomb disposal unit.

140. Protection in Depth –In large open areas or ground where fencing or
walling is impractical and expensive, warning signs should be conspicuously
placed. The depth itself is protection reduction of access roads, and sufficient
notices to warn intruders should be done. Use of animals as guards and intrusion
device can also be good as barriers.

141. Protective alarm - A security alarm is a system designed to detect


intrusion – unauthorized entry – into a building or other area such as a home or
school. Security alarms are used in residential, commercial, industrial, and
military properties for protection against burglary (theft) or property damage, as
well as personal protection against intruders. Security alarms in residential areas
show a correlation with decreased theft. Car alarms likewise help protect vehicles
and their contents. Prisons also use security systems for control of inmates.

142. Protective alarm – is one of the important barriers in security. It assists


the security in detecting, impeding or deterring potential security threat in the
installation. Basically, its function is to alert the security personnel for any
attempt of intrusion into a protected area, building or compound. Once and
intruder tampers the circuitry, the beam or radiated waves of the alarm system,
it will activate an alarm signal.

143. PROTECTIVE ALARMS – is an aural signal given by the annunciator to


security guard when intruder actuates device in a protected area.

144. Protective lighting - Protective lighting, or security lighting systems,


generally go by the same name. Certain types, like emergency lighting and
moveable lighting, may be used in very specific cases. However, they all have a
common goal of keeping your facility secure.

145. Prowling – is the process whereby a subject’s reaction in a future critical


situation is predicted by such as an honesty test. The Reid Report is an example
of honesty test.

146. Reclassifying or Regarding – refer to the act of changing the assigned


classification from classified information or matter.

147. Recorded tour – guard takes with him on his tour of duty a form which
must have the time punched on it at each station.

148. Refresher conference – it is design to remind employees of the


company about their responsibilities, review the guidelines and policies,
introduction of new policies and regulations and a moment of getting employees
feedback about the company policies that is being implemented.

149. Removal of item – this can be done as wearing the stolen shoes or
shorts, concealment in body or vehicles, use of false documents, etc. driver may
conceal pilfered items in his vehicle.

150. Reserve Security – on standby for possible back-up/re-enforcement

151. RESTRICTED (white or no color) – is any information and material


which requires special protection other than those determines confidential, secret
and top secret.
152. RESTRICTED AREA – any area access to which is subject to special
restriction control.

153. Risk Analysis – the analysis of risk includes examinations of the


vulnerability, probability and critically of potential threats and include natural and
man-made risk.

154. Risk Avoidance – eliminating or removing the risk totally from the
business, government, or industrial environment for which the risk manager has
responsibility.

155. Risk Management – is a process of selecting and implementing security


countermeasures to achieve and acceptable level of risk at an acceptable cost.

156. Risk Reduction – decreasing the risk by minimizing the probability of the
potential loss. The reduction of criminal opportunity is often accomplished by
situational crime prevention strategies to discourage, deter, or deny criminal
incidents.

157. Risk Spreading – spreading the risk through compartmentation or


decentralization to limit the impact (critically) of the potential loss.

158. Risk Transfer – moving the financial impact of the potential loss-over to
an insurance company.

159. Risks – is the potential damage of loss of an asset. The level of risk is a
combination of two factors: the value placed on that asset by its owner and the
consequence, impact adverse effect of the loss or damage to that asset and; the
likelihood that a specific vulnerability will be exploited by a particular threat.

160. Risk-Self Assumption – planned assumption and acceptance of the


potential risk by making a deliberate managerial decision of doing nothing about
the threat, or setting aside resources for use in case of a specific loss incident.

161. Routine Security – Neutralize the possible route of the VIP party.

162. Safe – a metallic container used for the safekeeping of documents or small
items in an office or installation. Safe can be classified as either robbery or
burglary resistance depending upon the use and need.

163. School Security – a type of security that is concern with the protection
of students, faculty, members, and school properties. Security personnel are
trained to protect the school property from theft, vandals, handling campus riots
and detecting the use of intoxicated drugs and alcohol by the students.
164. Search lights – These are highly focused incandescent lamp and are
designed to pinpoint potential trouble spots.

165. SECRET (red color) – is any information and material, the unauthorized
disclosure of it would be prejudicial to the interest and prestige of the national or
governmental activity or would cause administrative embarrassment or unwanted
injury to and be of advantage to and be of advantage to a foreign country.

166. Security - is a state or quality, condition of being secured, freedom from


fear, harm, danger, loss, destruction or damages, to secure is to make safe or be
protected.

167. Security Guard – sometimes called private security guard or watchman


shall include any person who offers or renders personal service to watch or
secure either a residence or business establishment or both for hire or
compensation, and with a license to exercise profession.

168. Security promotion – it is the act of emphasizing the importance and


role of security achieving the company goals and objectives. It involves security
employee cooperation and support.

169. Security Reminders – a phase which employs an indirect approach of


education the employees such as posting security posters and distributing fliers.

170. SECURITY SURVEY – a fact finding probe and determine plans


adequacy and deficiency in all aspects of security, with the corresponding
recommendations.

171. SEP – the exposure and teaching of employees on security and its
relevance to their work.

172. Signs and notices – “Control signs” should be erected where necessary
in the management of unauthorized ingress to preclude accidental entry. Signs
should be plainly visible and legible from any approach an in an understood
language or dialect.

173. Single pass system – the badge or pass coded for authorization to
enter specific areas is issued to an employee who keeps it in his possession until
his authorization is terminated.

174. Solid Fence – Constructed in such away that visual access through the
fence is denied. Its advantage is that it denies the opportunity for the intruder to
become familiar with the personnel, activities and the time scheduled of the
movements of the guards in the installation. On the other hand, it prevents the
guards from observing the area around the installation and it created shadow
that may be used by the intruder for cover and concealment.

175. Standby lighting – it is designated for reserve or standby use or to


supplement continuous systems. A standby system can be most useful to
selectively light a particular area in an occasional basis.

176. Street lights – This lighting equipment received the most widespread
notoriety for its value in reducing crime.

177. Structural Barriers – These barriers are features constructed by man,


regardless of their original intent, which tend to delay the intruder. Examples are
walls, ceilings, doors, window, locks, fences, safe cabinets or containers.

178. Structured or - Structured Inspection is one that moves systematically


from one area to the next and so on. There is a format or logical sequence to the
process. For instance, the audit may start with the first line of defense, then the
second line, then the third line, etc.

179. Sub-master Key – a key that will open all the lock within a particular
area or grouping in a given facility.

180. Supermarket or Mall Security - a type of security which is concern


with the protection of the stores, warehouses, storage, its immediate premises
and properties as well as the supermarket personnel and customers. Security
personnel are trained to detect “shoplifter”, robbery, and bomb detection and
customer relation.

181. Supervisory Tour – This is where the guard sends signals to guard
headquarters from each station that he checks.

182. SURVEY – term to the first detailed “look see” conducted by a term.

183. Systematic Pilferer – one who steals with preconceived plans and takes
away any or all types of items or supplies for economic gain. Pilferers of this kind
can be employees or outsiders of the establishment.

184. The security of any business establishment today is a complex process.


Security work involves active and passive measures so that effective defense can
be established against crimes.
185. The warded lock – offer very little security, this type of lock must
therefore be use only to have privacy, but not to provide a degree of security.

186. Time traveled – If there is a long delay or time lapse between the
departure and arrival, the visitors may be required to show cause for the delay.

187. Top Guard – additional overhang of barbed wire place on vertical


perimeter fences upward and outward wit a 45 degree angle with 3 to 4 strands
of barbed wires spaced 6 inches apart. This increases the protective height and
prevents easy access.

188. TOP SECRET (green color code) – is any information and materials the
unauthorized disclosure of it would cause exceptionally grave damage to the
nation, politically, economically and military operation.

189. Tower Guard – This is a house-like structure above the perimeter


barriers. The higher the tower, the more visibility it provides. It gives a
psychological unswerving effect to violators. By and large guard towers, whether
permanent or temporary, must have a corresponding support force in the event
of need. Towers as well as guard control stations should have telephones,
intercoms and if possible two-way radios connected to security headquarters or
office to call for reserves in the event of need.

190. Trade Secrets – this consist of any formula, pattern, device or


compilation of information which is used in one’s business and which gives him
an opportunity to gain an advantage over competitors who do not know or use
it. It may be a formula for a chemical compound a process of manufacturing,
treating or preserving materials, a pattern for machine or device, or a list of
customers. It differs from other secret information as to single or ephemeral
events. A trade secret is a process or device for continuous use in the protection
of the business.

191. Unauthorized – refers to person not authorized to have access on


classified matters.

192. Undercover Investigation – this is the placement of an agent in a role


in which the agent’s true identity and role remains unknown, in order to obtain
information for criminal prosecution or for recovery or limitation of asset losses.

193. Unstructured Inspection - Unstructured Inspection is conducted in a


random manner, there is no format or logical sequencing. For example, the
inspection may start with countermeasures for proprietary information, then
emergency plan, followed by investigation and so forth.

194. Upgrading – refers to the act of assigning the information or matter to


the higher classification than that previously assigned to it.

195. Vault – heavily constructed fire and burglar resistance container usually a
part of the building structure used to keep and protect cash, documents and
negotiable instruments. Vaults are bigger than safe but smaller than a file room.

196. Vibration Detection Device – It will detect any vibration caused by


attempted force entry. A vibration sensitive sensor is attached to walls, ceiling or
floors of the protected area.

197. VIP Security – a type of security applied for the protection of top-
ranking officials of the government or private entity, visiting persons of illustrious
standing and foreign dignitaries.

198. Visitor’s entrances – separate access for visitors and employees of the
establishment should be provided.

199. Visitor’s logbook – All visitors to any facility should be required to


identify them and should be given a visitor’s ID by the security. Visitor’s logbook
should be filled up with the named of visitors, nature and duration of visit.

200. Vulnerability – any weakness that can exploit by an adversary to gain


access to and asset.

You might also like