100% found this document useful (1 vote)
3K views21 pages

Security Hazard

This document defines key security terms like risk, risk management, and vulnerability. It outlines various security risk management alternatives like risk avoidance, reduction, and transfer. It also describes different types of security hazards like natural hazards, human-made hazards, sabotage, espionage, subversive activities, and pilferage. For each hazard, it provides examples and discusses potential countermeasures to mitigate security risks.

Uploaded by

Arvy Arvy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
3K views21 pages

Security Hazard

This document defines key security terms like risk, risk management, and vulnerability. It outlines various security risk management alternatives like risk avoidance, reduction, and transfer. It also describes different types of security hazards like natural hazards, human-made hazards, sabotage, espionage, subversive activities, and pilferage. For each hazard, it provides examples and discusses potential countermeasures to mitigate security risks.

Uploaded by

Arvy Arvy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 21

SECURITY HAZARD

PART 5
DEFINITION OF TERMS:

▪ Risk- is the potential damage or loss of an asset. The level


of risk is a combination of two factors: the value placed on
the asset by its owner and consequence, impact adverse
effect of loss or damage to asset and; the likelihood that a
specific vulnerability will be exploited by a particular threat.
▪ Risk Management- is a process of selecting and
implementing security countermeasures to achieve an
acceptable level of risk at an acceptable cost
▪ Risk Analysis- examinations of the vulnerability, probability
and critically of potential threats and include man-made
risk.
▪ Adversary- an individual, group, organization, government
that conducts activities or has the intention and capability
to conduct activities detrimental to the individual.
▪ Asset- any information, facility, material, information, or
activity w/c has positive value.
▪ Vulnerability- any weakness that can exploit by an
adversary to gain access to an asset.
▪ Countermeasures- an action taken or a physical entity used
to reduced or eliminate one or more vulnerabilities.
▪ Probability- The chance or likelihood that will take place.
▪ Criticality- the impact of loss as measured in financial
terms.
Risk Management Alternatives and Strategies
▪ Risk Avoidance- eliminating or ▪ Risk Transfer- moving the financial impact
removing the risk totally from of the potential loss-over to an insurance
business, government, industrial company
environment. ▪ Risk-self Assumption- planned assumption
and acceptance of the potential risk by
▪ Risk Reduction- decreasing the risk making a deliberate managerial decision
by minimizing the probability of the of doing nothing about the threat.
potential loss.
▪ Risk Spreading- risk through
compartmentation or
decentralization to limit the impact
of the potential loss.
TYPES OF HAZARDS
▪ Natural Hazards- these are ▪ Human-man made Hazards-
hazards whicharise from natural these are hazards w/c are result
phenomena. of a state of mind, attitude,
Types of Natural Hazards: weaknesses or character traits
of one or more persons.
 Floods cause by typhoon
Types of Human-man made
 Earthquakes Hazards:
 Forest fire
 Carelessness
 Storms
 Disloyalty
 Lightning Storms
 Espionage, pilferage and theft
 Extreme temperature and
humidity  Vandalism
Flood when Typhoon Ondoy 1990 Earthquake at Luzon

Typhoon Manghut one of the dangerous natural phenomena 2020 Taal Volcano eruption
in PH
Add a Slide Title - 2
Sabotage as a Security Hazard

Saboteur
• He is the most dangerous for whom security will have to deal
with while planning and implementing security measures and
techniques.
• As an ordinary looking as nest guy but n his mind he has
training in deception.
• He can work alone, in groups or in several places
Possible Targets of Saboteur
1. Armed forces installation
2. Natural Resources- mines, forest, farms and farm
products
3. Industries- buildings, power sources, machinery,
fuel etc.
4. Warehouse depot, communication, public utilities,
etc
Countermeasures against Sabotage

1. Use of an efficient and trained 1. Investigation of breaches of


guard force security
2. Use of physical security aids 2. Security education and
indoctrination
3. Proper screening of personnel
3. Good housekeeping methods
4. Identification and movement
control system 4. Effective and compatible
emergency planning
5. Searching on incoming vehicles
5. Regular audit
6. Safeguarding of classified
information 6. Background Checks
7. Designation of restricted area
Espionage as a security hazard
Espionage agent
• He is very dangerous adversary and his skills in deception and
his cunning should never be under estimated
• He is extracting information of value to be relayed to his
employer or handler
• Even how well-trained an espionage agent he might be, he is
human like the saboteur and he can be defeated in his own
game if proper methods and techniques are undertaken
Some methods employed by espionage
agent

1. Stealing information from employees


2. Stealing information from records
3. Using various methods of reproducing document products,
equipment and working models
4. Using “front” as commercial concerns, travel agencies, associations,
business group
5. Threats to obtain information
6. Using blackmails
7. Picking or securing information in social
8. Other operational tactics
Countermeasures against Industrial
Espionage

1. Careful and complete pre-employment measures


2.Continuing personal check
3. Prevention of unauthorized entry
4.Restricting of movement of personnel
5.Controlled disposal of waste papers
6.Only properly cleared personnel should handle
classified document
Subversive activity as a security
hazard

• Threats of subversive activity:


1. It can be local or national in nature and their
mission is to undermine the authority weaken the
organization, and eventually take over
2.This can be in form rumor mongering, propaganda,
undermining morale, and injecting defeatist
attitudes and other emotional approaches.
3. It is activity not easy to detect
4. The spreading of rumors should be immediately reported to
government for this to discredit.
5. Labor and other company unions can be infiltrated so that strikes
and “slow down” can be called to disrupt the normal operation of plant
or installation.
6. Security force should be alerted for person trying to recruit others
in organizing movements for peace, anti-colonials, anti-trade and anti-
imperialism.
7. Employees or outside personnel seeking memberships in “paper
organization” should report this activity to security.
8. Other methods of subversion ( untied fronts, mob action, terrorism,
and sabotage will done to gain the subversive ends.
Pilferage as a business Hazard

• Become financial drain if not a menace to


smooth and orderly operation
• One of the most annoying and common
human hazards which has to deal with .
• Failure to detect shortage and inaccurate
inventories will cause inventory losses, which
may be labeled as pilferage
Types of Pilferage

1. Casual Pilferer- one who steals due to his inability to resist


the unexpected opportunity.
2. Systematic Pilferer- one who steals with preconceived
plans.
Factors considered by a pilferer to be
successful on his act
a) Location of items to be pilfered
b) Access to items
c) Removal of item
d) Disposal of items

• Countermeasures for Casual Pilferage


1. Spot
2. An aggressive security education
3. Superiors should set example of integrity and desirable moral climate
4. All employees must be enjoined to report
5. Inventory and methods should be done especially to pilferable Items
6. Control of tools equipment and sets
Countermeasures for systematic
Pilferage

• Guard and electronic surveillance


• Package and material control system
• Parking area outside perimeter fence of establishment
• Careful screening and background check on applicants
• Investigation of all losses quickly and efficiently to
determine “modus operandi” or obtain clues
• Alerts all patrols to check areas
• Install alarm devices where needed and applicable
• Establish an effective lock and key control system
• Use of appropriate perimeter fencing and lighting for
packing facilities and areas vehicles and persons.
• Store bulk quantities of pilferable items in enclosed
security areas
• Establish accurate inventory and accounting methods
• Establish liaison with governmental la enforcement and
intelligence agenciesl
THANK YOU 

You might also like