Académique Documents
Professionnel Documents
Culture Documents
1. He is the most dangerous foe whom security will have to deal with
while planning and implementing security measures and
techniques.
2. He is an ordinary looking as the next guy but in his mind, he has
the training in deception, knowledgeable in incendiaries,
explosives, chemistry, bacteriology, mechanics and psychology.
3. He can work alone, in-groups, or simultaneously in several places.
POSSIBLE TARGETS OF SABOTEUR
1. The spreading of rumors, written materials, slogans or any other devices to confuse
the work population and discredit the government should be immediately reported.
2. Labor and other company unions can be infiltrated so that strikes and “slow downs”
can be called to disrupts the normal operation of a plant or installation.
3. Security force should be alerted for person trying to recruit others in organizing
movements for peace, anti-colonials, anti trade and anti-imperialism.
4. Employees or outside personnel seeking memberships in “paper organizations”
should report this activity to security.
5. Other methods of subversion like united fronts, mob action, terrorism and sabotage
will be done to gain the subversive ends.
PILFERAGE AS A BUSINESS HAZARD
• Casual Pilferer – one who steals due to his inability to resist the
unexpected opportunity and has little fear of detection is no plan or
premeditation and he usually a “loner” on the job. The temptation to
pick up the article is basically due to poor security measure. The
implication of casual pilfering is the big cumulative cost if it remains
unchecked.
• Systematic Pilferer – one who steals with preconceived plans and
takes away any or all types of items or supplies for economic gain.
Pilferers of this kind can be employees or outsiders of the
establishment.
FACTORS CONSIDERED IN PILFERAGE
1. Package inspection
2. Assets inventories
3. Body search
4. Uses of alarms
5. Personnel ID &management control
6. Security education
7. Lock and key management
8. regular reporting
9. Property audits
10. Garbage & trash check before disposal
11. Inspections
What is a Risk?
• Risk is the likelihood that something bad will happen that causes
harm to an informational asset (or the loss of the asset).
• The likelihood that a threat will use a vulnerability to cause harm
creates a risk. When a threat does use a vulnerability to inflict harm, it
has an impact.
Vulnerability define
THREAT DEFINE
• Anything (man-made or act of nature) that has the potential to
cause harm.
IMPACT DEFINE
• a loss lost income, loss of life, loss of real property, loss of
availability, integrity, and confidentiality, and possibly other
losses.
The level of risk is a combination of two factors:
• The value placed on that asset by its owner and the consequence,
impact adverse effect of the loss or damage to that asset and;
• The likelihood that a specific vulnerability will be exploited by a
particular threat.
TYPES OF RISK:
1) Pure Risk
2) Dynamic Risk
What is Risk Management?
1. Nuclear Attack
2. Natural Catastrophe
3. Civil Disturbances and Malicious Destruction
4. Other Crimes
5. Conflict of Interest
6. Other Risk
What is Asset?
0<P<1
Probability known or unknown
K= (Cp+ Ct+Cr+CD) - (I - a)
where:
K= Criticality Cost of the Loss
Cp= Cost of Permanent Replacement
Ct = Cost of Temporary Replacement
Cr = Related Cost
Cd= Discounted Cash
I= Insurance
a= Allocable Insurance Premium
Percentage of Impact:
100% Fatal
75% Very Serious
50% Average
25% Less Serious
0% Unimportant
PROBABILITY AND CRITICALITY MATRIX
0.999
0.75
0.050
0.25
0.001
0% 25% 50% 75% 100%
An effective method of designing and
implementing an assets protection program is the
systems approach. The systems approach has
been defined as “a comprehensive solution to a
total problem.” It is an orderly and rational method
of problem solving and, if properly carried out,
should insure an effective assets protection
program.
THREE GENERAL STEPS IN THE
IMPLEMENTATION OF THE SYSTEMS
APPROACH :
1. a vulnerability analysis
2. installation of countermeasures :
• software
• hardware
• people
3. a test of the operating program to
insure its effectiveness.
Risk Management Alternatives
and Strategies
• Risk Avoidance
Eliminating or removing the risk totally from the
business, government, or industrial environment for
which the risk manager has responsibility.
• Risk Reduction
Decreasing the risk by minimizing
the probability of the potential
loss. This reduction of criminal
opportunity is often accomplished
by situational crime prevention
strategies to discourage, deter, or
deny criminal incidents.
• Risk Spreading
Spreading the risk(s) through compartmentation or
decentralization to limit the impact (criticality) of the
potential loss.
• Risk Transfer
Moving the financial impact of the potential loss
over to an insurance company.
• Risk Self-assumption
Planned assumption and
acceptance of the potential
risk(s) by making a deliberate
managerial decision of (a) doing
nothing about the threat, or (b)
setting aside resources for use in
case of a specific loss incident.
• Combination of the Above