SlideShare une entreprise Scribd logo
1  sur  55
BASIC SECURITY CONCEPTS
Joel Jesus M. Supan
Philippines 2019
This Presentation and Organizational Security Culture
Development Program was created and developed by
Joel Jesus M. Supan.
All rights reserved, this is protected by the Philippine
Law on Intellectual Property. No part of this presentation
shall be reproduced in any form or by any means,
electronic, mechanical, photocopying, recording or
otherwise, without the written permission of the author
and creator.
Philippine Copyright©2019
WARNING
DESIRED OUTCOME
For the audience to be familiar with
the Basic Concepts of Security
what it is, its rationale
and how to achieve it.
1. Security Defined
2. Client Objectives
3. Client Resources
4. Hazards that Threaten a Company
5. Security Requirements of a Company
6. Principles of Security
7. Aspect of Security and their Elements
8. Threat Differentiation
9. Security Systems Integration
10.Other Security Learning Needs and Concepts
BASIC SECURITY TOPIC
OUTLINE
SECURITY is a relatively predictable environment where one
can pursue his/her objectives without fear from the occurrence
of mishaps and risks that threaten him/her.
Security Defined
MORE SECURITY AS DEFINITIONS
… can be applied to the conditions of the internal affairs
of a home or as country.
… proof of ones investment to a Organizational such as
bond, stocks and debentures.
…connotes stability, freedom from danger or harm,
anxiety, assurance, pledge, etc.
… means by which a sense of security is obtained
Basic Organizational Objective
The basic objective of any business is to have money.
The basic mission of any business is make money.
Organizations, regardless of their sizes, have the same objectives and the
resources to achieve such. Thus, the principles and measures by which we
protect their resources are the same.
Organizational Comparative Matrix
of Objectives, Leadership and Resources
Hierarchy of Operational Objectives
All Organizations follow the same hierarchy of operational Objectives. one
objective cannot be achieved with achieving the first. There are no shortcuts
Organizational Resources
and their Functional Relationships
Every company resource is essential to achieve business
objectives. Resources are the “Objects of Security”
Organizational
Resources
Organizational
Resources are like
a deck of cards.
It can not operate
with one resource
missing.
Various Definitions of Risk
To an Insurer... the value in terms of cost of the resource
exposed to danger.
To a Risk Manager… it is a condition in which the
outcome of the activities involve therein is uncertain.
To a Safety Practitioner… the amount of time a particular
resource is exposed to a specific hazard.
To Authorities… the person being the cause of risk.
To a Security Practitioner… risk is the hazard itself. It is
the enemy for security.
Hazard To Loss Progression
Hazards, Threats, Risks, Mishaps, Emergency, Crises, Disaster and Loss
are the enemies of security. They destroy or cause the loss of company
resources. Hazards follow a line of progression for loss to occur.
NATURAL HAZARDS
Typhoon Storm
Tornado Flood
Lightning Landslide
Tsunami Lahar
Pestilence Epidemic
Monsoon Rains Drought
Earthquake
Common Hazards that
Threaten the Organization
MAN-MADE HAZARDS
AGAINST ONESELF
Drug Addiction
Absenteeism
Regulation Violation
Ignorance
Negligence
Sickness
Accidents
Common Hazards that
Threaten the Organization
MAN-MADE MISHAPS
AGAINST PERSONS
Altercation
Harassment
Grave Threat
Fist fight
Assault
Robbery
Kidnapping
Homicide
Murder
Common Hazards that
Threaten the Organization
WHITE-COLLAR
CRIMES
Tardiness
Fraud
Theft of Info
Piracy
Discrimination
Disclosure of
Information
Common Hazards that
Threaten the Organization
Social Unrest
Strikes
Riots
Activism
Rebellion
War
Common Hazards that
Threaten the Organization
Security Needs of a Company
Company resources and the hazards define the security
need on a company
How to Achieve
Organizational Security
Security Principles
All security systems must satisfy all the basic principles. Not
considering these principles will become the weakest link in
security that will render all other system useless
Security Principles
1. There is no absolute security.
Any kind of threat, hazard, risk or mishap
can happen anywhere any time.
Security Principles
2. Security is good only as its weakest link.
All it takes is one gap in security at any instance
to cause a mishap. The effectiveness of security
is only as good as the last mishap.
Security Principles
3. High Relative Security can be achieved in depth.
Each Security Aspect, Elements in a a System should be
able to compliment and supplement each other
4. No two facilities are alike.
Security Principles
All facilities have their peculiar resources, people,
environment, circumstances and conditions. Their security
measures should be attuned to these conditions.
5. Threat may come from within and without.
Security Principles
80% of losses in companies are cause by the doing or undoing
of their own employees.
Security Principles
6. Security is everybody’s concern.
It is the duty of every employee to protect the resources of their
company from loss or damage by their thoughts words and deeds
Aspects of Security
The Aspect of Security are the methods by which security actions are
carried out. There are six aspects that comprise a complete security.
Each one should compliment and supplement each other. Each aspect
is comprised of elements to operationalized the Aspects.
These Aspects are integrated into an Integrated Security Model
called Stonewall Security Model
1. PERSONNEL SECURITY
The aspect of Security that
ensures that all Employees are
capable, reliable, trustworthy
and loyal, healthy and happy.
It ensures that the lives and
limbs of the Employees are free
from danger or harm.
Protects the Organizational
from the undoing of its
employees
Integrated Security
Model
Aspects of Security
Elements of Personnel Security
 Personal History Statement
 Background Investigation (Due Diligence)
 Education and Training
 Supervision
 Effectiveness and Efficiency Evaluation
 Debriefing
Aspects of Security
The elements 1 to 3 of Personnel Security is the
mandate of the Human Resource Team. The element 3
to 6 are the responsibilities of the supervisor
2. INFORMATION
SECURITY
Ensures that all
critical and sensitive
information about
the Organization are
not destroyed, lost,
distorted and
disclosed to those
not concerned.Integrated Security
Model
Aspects of Security
Information is the lifeblood of the company. It conveys between the
members ideas which are the nutrients that keeps the company alive.
The Company dies if such information were lost, destroyed, diluted or
disclosed to unauthorized person.
Elements Information Security :
Classification of information
Marking of classification
Handling and transmittal
Need-to-know basis
 Destruction of classified
information
Aspects of Security
The elements of Information are the measure by which information is
protected from loss, destruction, distortion and disclosure to
unauthorized persons.
3. OPERATIONS
SECURITY
Ensures that all
Organizational Policies,
Procedures, Systems
Rules and Regulation
and Standards for
Administrative and
Operating Procedures
are established, written
and disseminated for
uniformity of
dissemination and
continuity and are
followed and enforced
Integrated Security
Model
Aspects of Security
Elements of Operations Security :
Organizational Policies
Organizational Regulations
Systems and Processes
Publication and Dissemination
Instruments and forms for enforcement
Appropriate documentation
Timely Disposition of issues
Aspects of Security
OPERATIONS SECURITY
Aspects of Security
The company is like a vehicle with a definite destination. It can arrive at
its destination without Policies (road), Systems and Procedure (well
aligned wheels), Rules and Regulations (Steering wheel) to keep it on
the road and the Supervisor to handle the steering wheel.
$
Requisites for Effective Enforcement
Be:
Education – disseminate what, why and how
Engineering – provide physical support
Enforcement – engage every member in enforcement
- Be fast
- Be firm
- Be Friendly
Aspects of Security
4. ENVIRONMENT
SECURITY
Ensures that the
Organization’s
surroundings are
conserved, orderly and
clean; has the
Goodwill for and of the
Community, the
Industry and the
Government and
Complies with the
Laws.
Integrated Security
Model
Aspects of Security
Elements of Environment Security
Physical Environment - Cleanliness and orderliness
Natural Environment - Conservation and Protection
Social Environment - Community Relation & CSR
Political - Legal and Regulatory
- Liaison with local government
agencies, compliance to
law, rules and regulations
 Industry Environment - Rapport with and support of
the Industry
Aspects of Security
The company cannot sustain its existence with ensure the its
environment is protected
5. REPUTATION
SECURITY
Ensures that the
ORGANIZATION
delivers its
commitments and that
it is free from
embarrassment and
indignation.
Integrated Security
Model
Aspects of Security
Company Reputation is the lynchpin to success.
Elements Reputation Security:
•Straight forward commitment
•Quality Control
•Contracts
•Service Level Agreement
•After Sales Service
•Customer Relations
Aspects of Security
6. PHYSICAL SECURITY
These are physical barrier
placed between the
resource and the hazards
Integrated Security
Model
Aspects of Security
Elements:
 Natural Barrier
 Structural Barrier
 Mechanical Barrier
 Animal Barrier
 Energy Barrier
 Human Barrier
SECURITY INTEGRATION AND CONVERGENCE MODEL
42
Mishaps and disruptions are caused by the confluence of a hazard, its
object and the opportunity for both to meet at a specific time, place,
and conditions. Hazard, the target and the Opportunity each their
respective sub-elements to be such. By removing one sub-element
the element will be eliminated. Thus the mishap cannot occur.
Mishap Prevention through
Threat Differentiation Model
Stages of Mishaps
vs. Security Functions Cycle
Security Operations is a never ending cycle of Prevention,
Response and Investigation where the objective of investigation
is to find ways to prevent the recurrence of the mishap.
The Objectives and
Functional Cycle of Security
Physical Security Systems to be adequate must attain its 7
objectives any shortcoming will render the system useless.
Integrated Security System
for Anti- Intrusion
Defend
No single security device can perform and achieve all the
objectives of security. It must be integrated in to other systems.
Integrated Physical Security System
for Anti- Terrorism
No single security device can perform and achieve all the
objectives of security. It must be integrated in to other systems.
Other Relevant Concepts of Security
to Consider
• The concept of security cost effectiveness. If security
eats into the profit it is not security.
• Concept of convenience and comfort. Security that will
inconvenience and make uncomfortable people is not
sustainable.
• The concept of constancy and consistency.
Dependency syndrome is the reason for inconsistency
which is a weak link in a security system.
• Paradoxes of Security. Security concepts may seen to
be self contradictory but are in fact true.
1. For every advantage there is a disadvantage.
2. No single security means can prevent all types of threats.
3. The more effective security is, the harder it is to justify.
4. The value of security only realized when it is lost.
5. Security is as good only as the last breach.
6. The more you spend on security the farther you stray
from your goal because the goal is to make money.
Paradoxes of Security
The paradoxes if security are not to be ignored for
efficiency and effectiveness.
OTHER SECURITY LEARNING NEEDS
1. Security Policies Development
2. Enterprise-wide Risk Management
3. Security Program Development
4. Crisis Contingency and Business
Continuity Planning
5. Personal Security
The cognitive knowledge of security is not sufficient
security for a company
The adoption of a holistic integrated security program will
make the company be impervious to all types of hazards
and threats.
BASIC SECURITY CONCEPTS
Joel Jesus M. Supan
Philippines 2019
JOEL JESUS M. SUPAN
Author
FIELD OF EXPERTISE
Organizational Security Education
&Training
Security Services Management
Security Business Intelligence
Corporate Security Management
Corporate Intelligence and Investigation
Risk Management
Crisis Management
Business Continuity
34 Years of Security Practice
Past Chairman- CHED TC BSISM
BSP Certified Security Subject Matter Expert
Member - PNP SOSIA Advisory Council
Graduate - PMA CLASS 1981
Officer - American Society for Ind’l Security
Author - The Art and Science of Security
Inventor - Pepperella
STONEWALL SECURITY
CONCEPTS AND CONSULTING
SERVICES
63 Magnolia Street
Roxas Dist., Quezon City
Telephone Number 371-4864
Cell Phone No: 09178892154
Email Address: stonewall.sec81@yahoo.com
Website: www.stone-security.com
Thank you!

Contenu connexe

Tendances

CISSP-Certified.pptx
CISSP-Certified.pptxCISSP-Certified.pptx
CISSP-Certified.pptxssuser645549
 
Security Training Incident Investigation And Report Writing.Ppt
Security Training Incident Investigation And Report Writing.PptSecurity Training Incident Investigation And Report Writing.Ppt
Security Training Incident Investigation And Report Writing.PptFaheem Ul Hasan
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security AssessmentsTom Eston
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentGary Bahadur
 
Security Presentation
Security PresentationSecurity Presentation
Security PresentationGerhard Peens
 
Gsk training general 2017
Gsk training general   2017Gsk training general   2017
Gsk training general 2017brijesh singh
 
Security training module
Security training moduleSecurity training module
Security training modulepagare_c
 
Top 10 Qualities Every Excellent Security Guard Should Have
Top 10 Qualities Every Excellent Security Guard Should HaveTop 10 Qualities Every Excellent Security Guard Should Have
Top 10 Qualities Every Excellent Security Guard Should HaveGrant Heanes
 
Guía de seguridad proteccion perimetral…clave de la seguridad fisica
Guía de seguridad proteccion perimetral…clave de la seguridad fisica Guía de seguridad proteccion perimetral…clave de la seguridad fisica
Guía de seguridad proteccion perimetral…clave de la seguridad fisica miguel911
 
The Role of a Static Security Guard
The Role of a Static Security GuardThe Role of a Static Security Guard
The Role of a Static Security GuardAmelia White
 

Tendances (20)

CISSP-Certified.pptx
CISSP-Certified.pptxCISSP-Certified.pptx
CISSP-Certified.pptx
 
Unit3
Unit3Unit3
Unit3
 
Security Training Incident Investigation And Report Writing.Ppt
Security Training Incident Investigation And Report Writing.PptSecurity Training Incident Investigation And Report Writing.Ppt
Security Training Incident Investigation And Report Writing.Ppt
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security Assessments
 
Security Site Surveys and Risk Assessments
Security Site Surveys and Risk AssessmentsSecurity Site Surveys and Risk Assessments
Security Site Surveys and Risk Assessments
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Security Presentation
Security PresentationSecurity Presentation
Security Presentation
 
Gsk training general 2017
Gsk training general   2017Gsk training general   2017
Gsk training general 2017
 
Security training module
Security training moduleSecurity training module
Security training module
 
SECURITY AWARENESS
SECURITY AWARENESSSECURITY AWARENESS
SECURITY AWARENESS
 
Physical Security Management System
Physical Security Management SystemPhysical Security Management System
Physical Security Management System
 
Top 10 Qualities Every Excellent Security Guard Should Have
Top 10 Qualities Every Excellent Security Guard Should HaveTop 10 Qualities Every Excellent Security Guard Should Have
Top 10 Qualities Every Excellent Security Guard Should Have
 
Guía de seguridad proteccion perimetral…clave de la seguridad fisica
Guía de seguridad proteccion perimetral…clave de la seguridad fisica Guía de seguridad proteccion perimetral…clave de la seguridad fisica
Guía de seguridad proteccion perimetral…clave de la seguridad fisica
 
2.5 security officers
2.5 security officers2.5 security officers
2.5 security officers
 
Supervisior responsibility
Supervisior responsibilitySupervisior responsibility
Supervisior responsibility
 
Physical security
Physical securityPhysical security
Physical security
 
2.3 security officers
2.3 security officers2.3 security officers
2.3 security officers
 
Escolts 1
Escolts 1Escolts 1
Escolts 1
 
The Role of a Static Security Guard
The Role of a Static Security GuardThe Role of a Static Security Guard
The Role of a Static Security Guard
 
Physical security
Physical securityPhysical security
Physical security
 

Similaire à Basic Security Concepts JMSupan 2019 Edition

BUILDING A SAFETY CULTURE.pdf
BUILDING A SAFETY CULTURE.pdfBUILDING A SAFETY CULTURE.pdf
BUILDING A SAFETY CULTURE.pdfAmb Steve Mbugua
 
Cybertopic_1security
Cybertopic_1securityCybertopic_1security
Cybertopic_1securityAnne Starr
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security ManagementMark Conway
 
gkkSecurity essentials domain 1
gkkSecurity essentials   domain 1gkkSecurity essentials   domain 1
gkkSecurity essentials domain 1Anne Starr
 
EMPLOYEE PARTICIPATION IN SAFETY.pdf
EMPLOYEE PARTICIPATION IN SAFETY.pdfEMPLOYEE PARTICIPATION IN SAFETY.pdf
EMPLOYEE PARTICIPATION IN SAFETY.pdfBimal Chandra Das
 
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENTTHE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENTIJNSA Journal
 
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENTTHE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENTIJNSA Journal
 
Why Worker Safety Trainings are unique?
Why Worker Safety Trainings are unique?Why Worker Safety Trainings are unique?
Why Worker Safety Trainings are unique?Consultivo
 
Behavioural Safety_Pavan.pptx
Behavioural Safety_Pavan.pptxBehavioural Safety_Pavan.pptx
Behavioural Safety_Pavan.pptxPavan Patil
 
Nssga alliance coresafetyprinciples
Nssga alliance coresafetyprinciplesNssga alliance coresafetyprinciples
Nssga alliance coresafetyprinciplesnssga
 
Dancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehDancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehAnne Starr
 
Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016Samuel Loomis
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-levelDonald Tabone
 
Safety Culture Refresher
Safety Culture Refresher Safety Culture Refresher
Safety Culture Refresher Larry Mixon
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingSwati Gupta
 
presentation_imp_presentn_wcm_1488348649_236072.pptx
presentation_imp_presentn_wcm_1488348649_236072.pptxpresentation_imp_presentn_wcm_1488348649_236072.pptx
presentation_imp_presentn_wcm_1488348649_236072.pptxbhaskarbhalerao
 

Similaire à Basic Security Concepts JMSupan 2019 Edition (20)

BUILDING A SAFETY CULTURE.pdf
BUILDING A SAFETY CULTURE.pdfBUILDING A SAFETY CULTURE.pdf
BUILDING A SAFETY CULTURE.pdf
 
CHAP 8..ppt
CHAP 8..pptCHAP 8..ppt
CHAP 8..ppt
 
Cybertopic_1security
Cybertopic_1securityCybertopic_1security
Cybertopic_1security
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
 
CISSPills #3.06
CISSPills #3.06CISSPills #3.06
CISSPills #3.06
 
)k
)k)k
)k
 
gkkSecurity essentials domain 1
gkkSecurity essentials   domain 1gkkSecurity essentials   domain 1
gkkSecurity essentials domain 1
 
EMPLOYEE PARTICIPATION IN SAFETY.pdf
EMPLOYEE PARTICIPATION IN SAFETY.pdfEMPLOYEE PARTICIPATION IN SAFETY.pdf
EMPLOYEE PARTICIPATION IN SAFETY.pdf
 
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENTTHE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
 
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENTTHE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
 
Why Worker Safety Trainings are unique?
Why Worker Safety Trainings are unique?Why Worker Safety Trainings are unique?
Why Worker Safety Trainings are unique?
 
Testing
TestingTesting
Testing
 
Behavioural Safety_Pavan.pptx
Behavioural Safety_Pavan.pptxBehavioural Safety_Pavan.pptx
Behavioural Safety_Pavan.pptx
 
Nssga alliance coresafetyprinciples
Nssga alliance coresafetyprinciplesNssga alliance coresafetyprinciples
Nssga alliance coresafetyprinciples
 
Dancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehDancyrityshy 1foundatioieh
Dancyrityshy 1foundatioieh
 
Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level
 
Safety Culture Refresher
Safety Culture Refresher Safety Culture Refresher
Safety Culture Refresher
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
 
presentation_imp_presentn_wcm_1488348649_236072.pptx
presentation_imp_presentn_wcm_1488348649_236072.pptxpresentation_imp_presentn_wcm_1488348649_236072.pptx
presentation_imp_presentn_wcm_1488348649_236072.pptx
 

Dernier

Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfAmzadHosen3
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 

Dernier (20)

Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 

Basic Security Concepts JMSupan 2019 Edition

  • 1. BASIC SECURITY CONCEPTS Joel Jesus M. Supan Philippines 2019
  • 2. This Presentation and Organizational Security Culture Development Program was created and developed by Joel Jesus M. Supan. All rights reserved, this is protected by the Philippine Law on Intellectual Property. No part of this presentation shall be reproduced in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the written permission of the author and creator. Philippine Copyright©2019 WARNING
  • 3. DESIRED OUTCOME For the audience to be familiar with the Basic Concepts of Security what it is, its rationale and how to achieve it.
  • 4. 1. Security Defined 2. Client Objectives 3. Client Resources 4. Hazards that Threaten a Company 5. Security Requirements of a Company 6. Principles of Security 7. Aspect of Security and their Elements 8. Threat Differentiation 9. Security Systems Integration 10.Other Security Learning Needs and Concepts BASIC SECURITY TOPIC OUTLINE
  • 5. SECURITY is a relatively predictable environment where one can pursue his/her objectives without fear from the occurrence of mishaps and risks that threaten him/her. Security Defined
  • 6. MORE SECURITY AS DEFINITIONS … can be applied to the conditions of the internal affairs of a home or as country. … proof of ones investment to a Organizational such as bond, stocks and debentures. …connotes stability, freedom from danger or harm, anxiety, assurance, pledge, etc. … means by which a sense of security is obtained
  • 7. Basic Organizational Objective The basic objective of any business is to have money. The basic mission of any business is make money.
  • 8. Organizations, regardless of their sizes, have the same objectives and the resources to achieve such. Thus, the principles and measures by which we protect their resources are the same. Organizational Comparative Matrix of Objectives, Leadership and Resources
  • 9. Hierarchy of Operational Objectives All Organizations follow the same hierarchy of operational Objectives. one objective cannot be achieved with achieving the first. There are no shortcuts
  • 10. Organizational Resources and their Functional Relationships Every company resource is essential to achieve business objectives. Resources are the “Objects of Security”
  • 11. Organizational Resources Organizational Resources are like a deck of cards. It can not operate with one resource missing.
  • 12. Various Definitions of Risk To an Insurer... the value in terms of cost of the resource exposed to danger. To a Risk Manager… it is a condition in which the outcome of the activities involve therein is uncertain. To a Safety Practitioner… the amount of time a particular resource is exposed to a specific hazard. To Authorities… the person being the cause of risk. To a Security Practitioner… risk is the hazard itself. It is the enemy for security.
  • 13. Hazard To Loss Progression Hazards, Threats, Risks, Mishaps, Emergency, Crises, Disaster and Loss are the enemies of security. They destroy or cause the loss of company resources. Hazards follow a line of progression for loss to occur.
  • 14. NATURAL HAZARDS Typhoon Storm Tornado Flood Lightning Landslide Tsunami Lahar Pestilence Epidemic Monsoon Rains Drought Earthquake Common Hazards that Threaten the Organization
  • 15. MAN-MADE HAZARDS AGAINST ONESELF Drug Addiction Absenteeism Regulation Violation Ignorance Negligence Sickness Accidents Common Hazards that Threaten the Organization
  • 16. MAN-MADE MISHAPS AGAINST PERSONS Altercation Harassment Grave Threat Fist fight Assault Robbery Kidnapping Homicide Murder Common Hazards that Threaten the Organization
  • 17. WHITE-COLLAR CRIMES Tardiness Fraud Theft of Info Piracy Discrimination Disclosure of Information Common Hazards that Threaten the Organization
  • 19. Security Needs of a Company Company resources and the hazards define the security need on a company
  • 21. Security Principles All security systems must satisfy all the basic principles. Not considering these principles will become the weakest link in security that will render all other system useless
  • 22. Security Principles 1. There is no absolute security. Any kind of threat, hazard, risk or mishap can happen anywhere any time.
  • 23. Security Principles 2. Security is good only as its weakest link. All it takes is one gap in security at any instance to cause a mishap. The effectiveness of security is only as good as the last mishap.
  • 24. Security Principles 3. High Relative Security can be achieved in depth. Each Security Aspect, Elements in a a System should be able to compliment and supplement each other
  • 25. 4. No two facilities are alike. Security Principles All facilities have their peculiar resources, people, environment, circumstances and conditions. Their security measures should be attuned to these conditions.
  • 26. 5. Threat may come from within and without. Security Principles 80% of losses in companies are cause by the doing or undoing of their own employees.
  • 27. Security Principles 6. Security is everybody’s concern. It is the duty of every employee to protect the resources of their company from loss or damage by their thoughts words and deeds
  • 28. Aspects of Security The Aspect of Security are the methods by which security actions are carried out. There are six aspects that comprise a complete security. Each one should compliment and supplement each other. Each aspect is comprised of elements to operationalized the Aspects. These Aspects are integrated into an Integrated Security Model called Stonewall Security Model
  • 29. 1. PERSONNEL SECURITY The aspect of Security that ensures that all Employees are capable, reliable, trustworthy and loyal, healthy and happy. It ensures that the lives and limbs of the Employees are free from danger or harm. Protects the Organizational from the undoing of its employees Integrated Security Model Aspects of Security
  • 30. Elements of Personnel Security  Personal History Statement  Background Investigation (Due Diligence)  Education and Training  Supervision  Effectiveness and Efficiency Evaluation  Debriefing Aspects of Security The elements 1 to 3 of Personnel Security is the mandate of the Human Resource Team. The element 3 to 6 are the responsibilities of the supervisor
  • 31. 2. INFORMATION SECURITY Ensures that all critical and sensitive information about the Organization are not destroyed, lost, distorted and disclosed to those not concerned.Integrated Security Model Aspects of Security Information is the lifeblood of the company. It conveys between the members ideas which are the nutrients that keeps the company alive. The Company dies if such information were lost, destroyed, diluted or disclosed to unauthorized person.
  • 32. Elements Information Security : Classification of information Marking of classification Handling and transmittal Need-to-know basis  Destruction of classified information Aspects of Security The elements of Information are the measure by which information is protected from loss, destruction, distortion and disclosure to unauthorized persons.
  • 33. 3. OPERATIONS SECURITY Ensures that all Organizational Policies, Procedures, Systems Rules and Regulation and Standards for Administrative and Operating Procedures are established, written and disseminated for uniformity of dissemination and continuity and are followed and enforced Integrated Security Model Aspects of Security
  • 34. Elements of Operations Security : Organizational Policies Organizational Regulations Systems and Processes Publication and Dissemination Instruments and forms for enforcement Appropriate documentation Timely Disposition of issues Aspects of Security
  • 35. OPERATIONS SECURITY Aspects of Security The company is like a vehicle with a definite destination. It can arrive at its destination without Policies (road), Systems and Procedure (well aligned wheels), Rules and Regulations (Steering wheel) to keep it on the road and the Supervisor to handle the steering wheel. $
  • 36. Requisites for Effective Enforcement Be: Education – disseminate what, why and how Engineering – provide physical support Enforcement – engage every member in enforcement - Be fast - Be firm - Be Friendly Aspects of Security
  • 37. 4. ENVIRONMENT SECURITY Ensures that the Organization’s surroundings are conserved, orderly and clean; has the Goodwill for and of the Community, the Industry and the Government and Complies with the Laws. Integrated Security Model Aspects of Security
  • 38. Elements of Environment Security Physical Environment - Cleanliness and orderliness Natural Environment - Conservation and Protection Social Environment - Community Relation & CSR Political - Legal and Regulatory - Liaison with local government agencies, compliance to law, rules and regulations  Industry Environment - Rapport with and support of the Industry Aspects of Security The company cannot sustain its existence with ensure the its environment is protected
  • 39. 5. REPUTATION SECURITY Ensures that the ORGANIZATION delivers its commitments and that it is free from embarrassment and indignation. Integrated Security Model Aspects of Security Company Reputation is the lynchpin to success.
  • 40. Elements Reputation Security: •Straight forward commitment •Quality Control •Contracts •Service Level Agreement •After Sales Service •Customer Relations Aspects of Security
  • 41. 6. PHYSICAL SECURITY These are physical barrier placed between the resource and the hazards Integrated Security Model Aspects of Security Elements:  Natural Barrier  Structural Barrier  Mechanical Barrier  Animal Barrier  Energy Barrier  Human Barrier
  • 42. SECURITY INTEGRATION AND CONVERGENCE MODEL 42
  • 43. Mishaps and disruptions are caused by the confluence of a hazard, its object and the opportunity for both to meet at a specific time, place, and conditions. Hazard, the target and the Opportunity each their respective sub-elements to be such. By removing one sub-element the element will be eliminated. Thus the mishap cannot occur. Mishap Prevention through Threat Differentiation Model
  • 44. Stages of Mishaps vs. Security Functions Cycle Security Operations is a never ending cycle of Prevention, Response and Investigation where the objective of investigation is to find ways to prevent the recurrence of the mishap.
  • 45. The Objectives and Functional Cycle of Security Physical Security Systems to be adequate must attain its 7 objectives any shortcoming will render the system useless.
  • 46. Integrated Security System for Anti- Intrusion Defend No single security device can perform and achieve all the objectives of security. It must be integrated in to other systems.
  • 47. Integrated Physical Security System for Anti- Terrorism No single security device can perform and achieve all the objectives of security. It must be integrated in to other systems.
  • 48. Other Relevant Concepts of Security to Consider • The concept of security cost effectiveness. If security eats into the profit it is not security. • Concept of convenience and comfort. Security that will inconvenience and make uncomfortable people is not sustainable. • The concept of constancy and consistency. Dependency syndrome is the reason for inconsistency which is a weak link in a security system. • Paradoxes of Security. Security concepts may seen to be self contradictory but are in fact true.
  • 49. 1. For every advantage there is a disadvantage. 2. No single security means can prevent all types of threats. 3. The more effective security is, the harder it is to justify. 4. The value of security only realized when it is lost. 5. Security is as good only as the last breach. 6. The more you spend on security the farther you stray from your goal because the goal is to make money. Paradoxes of Security The paradoxes if security are not to be ignored for efficiency and effectiveness.
  • 50. OTHER SECURITY LEARNING NEEDS 1. Security Policies Development 2. Enterprise-wide Risk Management 3. Security Program Development 4. Crisis Contingency and Business Continuity Planning 5. Personal Security The cognitive knowledge of security is not sufficient security for a company
  • 51. The adoption of a holistic integrated security program will make the company be impervious to all types of hazards and threats.
  • 52. BASIC SECURITY CONCEPTS Joel Jesus M. Supan Philippines 2019
  • 53. JOEL JESUS M. SUPAN Author FIELD OF EXPERTISE Organizational Security Education &Training Security Services Management Security Business Intelligence Corporate Security Management Corporate Intelligence and Investigation Risk Management Crisis Management Business Continuity 34 Years of Security Practice Past Chairman- CHED TC BSISM BSP Certified Security Subject Matter Expert Member - PNP SOSIA Advisory Council Graduate - PMA CLASS 1981 Officer - American Society for Ind’l Security Author - The Art and Science of Security Inventor - Pepperella
  • 54. STONEWALL SECURITY CONCEPTS AND CONSULTING SERVICES 63 Magnolia Street Roxas Dist., Quezon City Telephone Number 371-4864 Cell Phone No: 09178892154 Email Address: stonewall.sec81@yahoo.com Website: www.stone-security.com

Notes de l'éditeur

  1. Much of the effectiveness of any security /prevention or reaction is timeliness.
  2. Much of the effectiveness of any security /prevention or reaction is timeliness.