Risk Analysis and Security Survey - Module 1-4

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

Risk Analysis and Security Survey

Paul M. Geluz RC CSP SSO

CvSU Instructor
MODULE 1
What is Security?

1. Is the state of being free from danger/fear or uncertainty. Is the protection of all kinds from lost
through theft , fraud, fire ,threats or hazards.

2. It is a predictable environment where one can pursue his objectives without fear of risks.

3. It is a means to protect lives, intellectual properties, reputations and material resources needed to
pursue one’s goals from loss or damage as a result of the occurrence of risks.

4. It is a means by which a sense of security is created.

Principles of Security: Security as a science is based on the following principles:

 Security and Safety is everybody’s responsibility.

 There is no absolute security.

 No two facilities have the same security needs

 There is no impenetrable barrier.

 Harm or danger may come from outside or inside of the facility.

 The prime focus of security is prevention rather than apprehension.

What are security’s common problems?

 THREATS - an activity that could lead to a loss

 HAZARDS - a condition that could lead to a loss

 VULNERABILITY - a weakness that can be used to gain access to an asset

 RISK - a potential loss or damage to an asset

Safety - State or condition, were lives and properties are free from all fears of harm, injury or loss.

Security Aspects.
Three aspects of Security.

1. Physical Security
2. Personnel Security
3.Information/Operation
Security function cycle.
a. Preventive

b. Reactive

c.Investigative

Security – freedom from fear or danger, defense against crime.

Physical Security – A system of barriers placed between the adversary and the subject of protection.

Threats – an activity that could lead to a loss.

Hazards – a condition that could lead to a loss.

Vulnerability – a weakness that can be used to gain access to an asset.

Risk – a potential loss or damage to an asset.

Five (5) types of Physical Barriers:

1. Natural – they cause delay, e.a. fence.

2. Animal – dog, etc..

3. Human – receptionist, guards, etc…

4. Structural – perimeter barrier

5. Energy – alarm system, cctv, lighting.

Perimeter barrier – is the 1st line of defense.

Main purpose is to deny, delay or impede access or exit of unauthorized person/s.

Other purpose of Perimeter barrier.

1. Defines the boundary of the property to be secured.

2. Creates a physical and psychological deterrent to unauthorized entry.

3. Delays intrusion, thus facilitating apprehension of intruders.

4. Assists in a more efficient and economical employment of guards.

5. Facilitates and improves the control of pedestrian and vehicular traffic.

The 2nd line of defense - Structure

• building

• door windows

• grills
• vault/safe

The 3rd line of defense - human and devices

• owner

• employees

• guard/s

• cctv

• ligthing system

• x-ray machine

metal detector

MODULE 2
SCOPE OF PERSONNEL SECURITY:

1. PERSONNEL SECURITY INVESTIGATION

2. SECURITY EDUCATION

KEY FUNCTIONS OF PERSONNEL SECURITY:

1. IT SEVRES AS A SCREENING DEVICE TO ASSIST THE ORGANIZATION IN HIRING SUITABLE


EMPLOYEES.

2. it conducts background investigation on employees.

3. it handles investigation of employees suspected of wrongdoing.

4. it develops security awareness among employees.

5. it attempts to ensure the protection of employees from dissimilatory HIRING OR TERMINATING


PROCEDURES AS WELL AS UNFOUNDED ALLEGATIONS OF ILLEGAL OR Unethical activities and
conduct.

the most effective tools in employee selection are:

a. the application form

b. the interview

Proprietary information:

• information which in some special way relates to the status of activities of the possessor and
over which the possessor asserts ownership.
• in the business community, proprietary information relates to the structure, products, or
business methods of the organization.

• it is usually protected in some ways against casual or general disclosure.

what is risk?

it is a potential damage or loss of an asset.

the level of risk is a combination of two factors:

1. the value placed on that asset by its owner and the consequence, impact adverse effect of loss or
damage to that asset.

2. the likelihood that a specific vulnerability will be exploited by a particular threat.

Risk analysis

it is the process used by Security Professionals in determining his priorities in the protection of
assets.

the analysis of risk includes the examination of the vulnerability, probability, and criticality of
potential threats and include natural and man-made risk.

Asset

any person, facility, material, information, or activity which has a positive value to its owner whether
it is an individual, private or government entity.

the asset may have value to an adversary, as well as to the owner, although the nature and
magnitude of those values may differ.

RISK MANAGEMENT ALTERNATIVES AND STRATEGIES

RISK AVOIDANCE - ELIMINATING OR REMOVING THE RISK TOTALLY FROM THE BUSINESS,
GOVERNMENT, OR INDUSTRIAL ENVIRONMENT FOR WHICH THE RISK MANAGER HAS
RESPONSIBILITY.

RISK REDUCTION - DECREASING THE RISK BY MINIMIZING THE PROBABILITY OF THE POTENTIAL
LOSS. THIS REDUCTION OF CRIMINAL OPPORTUNITY IS OFTEN ACCOMPLISHED BY SITUATIONAL
CRIME PREVENTION STRATEGIES TO DISCOURAGE, DETER OR DENY CRIMINAL INCIDENTS.

RISK SPREADING - SPREADING THE RISK(S) THROUGH COMPARTMENTATION OR


DECENTRALIZATION TO LIMIT THE IMPACT (Criticality) of the potential loss.

Risk transfer - moving the financial impact of the potential loss over to an insurance company.

Risk self-assumption - planned assumption and acceptance of the potential risk(s) by making a
deliberate managerial decision of (a) doing nothing about the threat, or (b) setting aside resources
for use in case of a SPECIFIC loss incident.
Combination of the above - using a combination of two or more of the above strategies to manage
potential risk and threats.

MODULE 3
Unsafe / Unhealthy Acts and Conditions

Background :

The WORK SYSTEM

People

Environment Equipment

Materials
ACCIDENT
An occurrence or event that is:

MODULE 4
Unsafe / Unhealthy Acts and Conditions

Direct Cost of Accidents


• Medical Expenses
• Equipment Damage
• Wasted Raw Materials
• Insurance Premiums
• Litigation Expenses
Indirect Cost of Accidents
1. Injured Workers

• Lesser productivity due to interruption on day of injury


• Loss in efficiency; Loss of income
2. Other Employees
• loss productivity due to:
• work stoppage out of curiosity
• when assisting injured worker
• due to inspection
Additional cost due to completion of added work

Indirect Cost of Accidents


3. Supervisors

lost productivity:

• when assisting the injured

• due to accident inspection and investigation

• preparing reports

4. Replacement worker

• hiring or training

5. Equipment

• Downtime

Humane Aspects
Sorrow due to loss

• Hardships and inconveniences

• Physical pain/discomfort

• Psychological problems
Accident Causation
Immediate CAUSES of accidents
Unsafe Act

• Unsafe Condition

Unsafe/Unhealthy
ACT- Violation of commonly-accepted safe procedures or processes

CONDITION- Physical/mechanical/ environmental condition which could have been guarded or


prevented

Unsafe / Unhealthy ACT


-A human action that departs from a standard or written job procedure or common practice, safety rules,
regulations, or instructions.
-A violation of a commonly-accepted safe procedures and or processes.

Examples of Unsafe Acts

• Operating Equipment without authority

• Disregard of SOP or instructions

• Removing Safety Devices

• Using Defective equipment

• Improper/Non-use of PPEs
Horseplay

• Willful intent to injure

• Working while under the influence


of alcohol or drugs

Factors Contributing to Unsafe Acts

Improper Attitude

• Physical Limitations

• Lack of Knowledge or Skills

You might also like