0% found this document useful (0 votes)
16 views2 pages

LEA3 Terminologies Guidelines

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 2

LEA 3

Introduction to Industrial Security Concepts


GPE: LEA 3 Terminologies
OBJECTIVES:
1. Train students’ writing skills and critical thinking, and
2. Prepare students for board exam.
Format:
Student Name: _________Pegarit, Reisti Francis F.
Class No.: _____________ CRIM 2F MW 07:00PM – 08:30PM
Date:__________________February 26, 2024

Terminologies

Example:

1.Industrial security describes the protection of production and industrial plants


from faults,whether intentional or unintentional. Security used to be the task of
information technology (IT) in the form of IT security.
2.Physical Security -This term encompasses measures designed to protect physical assets,
facilities, and resources from unauthorized access, damage, theft, or sabotage. Physical
security measures may include access control systems, perimeter fencing, security guards,
surveillance cameras, alarms, and other technologies or protocols aimed at securing the
physical environment.

3.Cybersecurity -In the modern industrial landscape, cybersecurity is critical for


protecting computer systems, networks, and data from unauthorized access,
breaches, or disruptions. Industrial facilities often rely on interconnected digital
systems for operations and management, making them vulnerable to cyber threats
such as hacking, malware, ransomware, and phishing attacks.
4.Personnel Security-This term refers to procedures and protocols aimed at
ensuring the trustworthiness, reliability, and integrity of individuals who have access
to sensitive information, assets, or areas within an industrial facility.

5.Risk Assessment-This involves evaluating potential threats and vulnerabilities


that could affect an industrial facility's operations, assets, or personnel. Risk
assessments help identify and prioritize security risks, allowing organizations to
develop effective mitigation strategies and allocate resources appropriately.

6.Security Culture -Security culture refers to the collective attitudes, beliefs, and
behaviors within an organization regarding security practices and protocols.
Cultivating a strong security culture involves promoting awareness, accountability,
and a shared commitment to security among employees at all levels of the
organization.

7.Supply Chain Security -Supply chain security involves protecting the flow of
goods, materials, and information throughout the supply chain from potential threats
such as theft, tampering, counterfeiting, and disruption.

8.Perimeter Security -Perimeter security involves protecting the outer boundaries of


an industrial facility or site from unauthorized access or intrusion. This can include
physical barriers such as fences, walls, gates, and bollards, as well as technological
measures like sensors, cameras, and motion detectors. Perimeter security aims to
create a secure boundary around the facility to deter potential intruders and provide
early detection of unauthorized entry attempts.

9.Security Audit - A security audit is a systematic evaluation of an organization's


security policies, procedures, and controls to assess their effectiveness and identify
areas for improvement. Security audits may be conducted internally by the
organization's own security team or externally by third-party auditors.

10.Access Control - Access control refers to the measures put in place to regulate
and monitor entry to physical spaces, digital systems, and sensitive information
within an industrial facility. This can include technologies such as keycards, biometric
scanners, PIN codes, and security checkpoints, as well as policies and procedures
governing who has access to what resources and under what conditions.

Other Instructions:
1. Use A4 size bond paper, 1.5 spaces, Arial font 12
2. Margin: 1” all sides
3. Submit every week starting February 26, 2024 until suspended by the
instructor.
4. CRIM 2H (to be submitted Monday)
CRIM 2F (to be submitted Wednesday)
CRIM 2I (to be submitted Tuesday)
CRIM 2M (to be submitted Thursday)
CRIM 2K (to be submitted Friday)
CRIM 2O (to be submitted Saturday)
CRIM 2C (to be submitted Saturday)
CRIM 2P (to be submitted Sunday)
CRIM 2N (to be submitted Sunday)
CRIM 2R(to be submitted Sunday)

You might also like