Preview

Port Security

Powerful Essays
Open Document
Open Document
2330 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Port Security
Heightening port security with technological advancements in Africa

6/22/2011

Totem International Ltd

1

Heightening port security with technological advancements in Africa By

Firoze Zia Hussain CEO & Director Totem International Ltd, India An electronics and communication engineer who is a forward thinking and energetic professional recognized for high-profile turnaround achievements. Was highly decorated law enforcement professional with more than 10 years experience in security function. Successful and consistent record of investigations, and crime prevention. Participant of the US State Department Young Leaders Exchange Program. Successfully executed project work and technology transfer/ collaboration at India 's largest Printed Circuit Board manufacturing plant of INDAL electronics. Pursued consultancy in Quality Circle, ISO9000, JIT, Kaizen, TQM, Taguchi’s techniques of experimentation .A widely traversed person with diverse contacts in global distribution of chemicals and security products.

6/22/2011

Totem International Ltd

2

6/22/2011

Totem International Ltd

3

Introduction To Port Security
 IMO
 ISPS

code(2002)

 SOLAS

6/22/2011

Totem International Ltd

4

Importance of port security


Bulk of African exports is through ports.


 

2% of the world trade.
Trades & profits. Extensively used conveyance for transportation. Increases Africa‟s Natural Resources.



6/22/2011

Totem International Ltd

5

Port Security can prevent
 Pirates/Terrorist Attacks.  Smuggling of

weapons.  Illegal S/W issues & Immigration.

6/22/2011

Totem International Ltd

6

Technological models to enhance efficiency at ports

6/22/2011

Totem International Ltd

7

Technologies ' in ports

6/22/2011

Totem International Ltd

8

RFID Technology
 ADC

technology.  An Rfid System Compromises of


One or more RF tags


  

Two or more antennas
One or more

You May Also Find These Documents Helpful

  • Good Essays

    SkillPort Security

    • 647 Words
    • 3 Pages

    Having the proper security measures is very critical when running a business. It can be very expensive for an organization to keep an updated security system but in the end, it is well worth the money. No manager should want to even take the risk of letting hackers or viruses into the organizations information system. To fully understand why it is critical to have security measures, you first need to understand the different threats a network can face. Having a good secure network can prevent things such as malware, social engineering attacks, spam, and phishing. All of these can be very dangerous and damaging to your network. As a manager it is also very important to have a thorough security policy that states the precautions and also the steps to take in case of a security breach. When choosing security controls for your business you must consider three things; what security controls does your business need to safeguard the information systems, the safety and protection that security controls should provide, and existing security controls and how they have been implemented.…

    • 647 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Transnet

    • 3954 Words
    • 14 Pages

    Transnet port terminals (formerly SAPO - managing port and cargo terminal operations in the nation’s leading ports), and…

    • 3954 Words
    • 14 Pages
    Best Essays
  • Good Essays

    Network Hardening

    • 287 Words
    • 2 Pages

    It is very important to go through the process of hardening. Hardening is where you change the hardware and software configurations to make computers and devices as secure as possible. I picked the network layout 1-the workgroup . First with the workstations and laptops you need to shut down the unneeded services or programs or even uninstall them. I would also have some good anti-virus software on the workstations. You also need a hardened image for all of your workstations. To do this you need to install a new copy of the operating system and then harden it. After you have one good hardened workstation you can use it as a model for all other workstations and also laptops. For the router you definitely need to protect it from unauthorized access. The router needs to be password protected and you should periodically change that password. For the cable modem you should keep all unwanted ports closed. I would also schedule a regular scan of all the systems. Now for some of these next things I am talking about they will apply to all devices . Disable remote administration. Administration of your router / access point should be "local only", namely, there is no reason to let people from another country access to your network hardware. If you need to make changes, you should be local to the device. Update the firmware. Believe it or not, consumer network hardware needs to be patched also. Check the support site of the vendor of the device when you get it and check for an update. Sign up for e-mail alerts for updates, if available, or check back on a regular basis for…

    • 287 Words
    • 2 Pages
    Good Essays
  • Better Essays

    CLI commands that are used in a switch and in a router are the same. Most CLI commands are configured in the global configuration mode. It’s always good practice to start with the command erase…

    • 1491 Words
    • 12 Pages
    Better Essays
  • Powerful Essays

    Network Security

    • 581 Words
    • 3 Pages

    1. A(n) hub____ is a standard network device for connecting multiple Ethernet devices together by using twisted-pair copper or fiber-optic cables in order to make them function as a single network segment.…

    • 581 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    How to reduce the attack surface with what hardening steps and network security management best practices, (100) 2) ensure secure authentication, authorization, and accounting, (100) and 3) prevent or respond to intrusions. (100)…

    • 310 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Port Security

    • 1593 Words
    • 7 Pages

    the surface there is a disregard of the protection of seaports and container ships to…

    • 1593 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    1. What is the typical relationship among the untrusted network, the firewall, and the trusted network?…

    • 2028 Words
    • 9 Pages
    Powerful Essays
  • Best Essays

    The Sarbanes-Oxley Act

    • 2729 Words
    • 11 Pages

    Firion is a “corporation which develops, produces, and markets specialized jackets used in waste disposal and other safety-related applications” (UMUC, 4). Like most modern companies, Firion utilizes technology for increased efficiency in production, networking among employees, and to store and maintain important data. For example, databases contain employee and customer information as well as sensitive information about the research concerning Firion’s new glove designs and coatings. It is of extreme importance…

    • 2729 Words
    • 11 Pages
    Best Essays
  • Good Essays

    Network Security

    • 678 Words
    • 3 Pages

    This assignment consists of two (2) sections: an infrastructure document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for.…

    • 678 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Bp Case Study

    • 1496 Words
    • 6 Pages

    May be one of the most widespread usage at wal-mart, Tesco, Metro, etc... Companies like Wal-Mart even influencing/imposing the adoption of this technology to their partners for better supply chain tracking!…

    • 1496 Words
    • 6 Pages
    Better Essays
  • Good Essays

    This conference has taught me to stand among the people of industries in society. I came to know real situations of the industrial world by attending keynote lectures. I have also been a part of several technical societies and also been involved in extracurricular activities of GCET. Being a Finance Coordinator of Imaze ’14 – A National Level Technical Festival of GCET and GCET Garba Sandhya ’14, I managed financial tasks giving my full efforts. Moreover I was a Chief Student Coordinator for Imaze ’15. Such events has improved my leadership and managerial skills to uttermost. I have been serving as a Chairperson of GCET ASME Student Section since September 2013. I have attended conferences organized by ASME India like Student Professional Development Conference at national level in April 2013 and at Asia-Pacific level in March 2014, Leadership Training Conference in June…

    • 862 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Computer Security

    • 414 Words
    • 2 Pages

    Many commercial software packages are designed with computer security features that control who can access the computer. These types of access controls use a process called identification and authentication. Identification verifies that the user is a valid user, and authentication verifies that the user is who he or she claims to be. Three common methods of authentication are remembered information, possessed objects, and biometric devices.…

    • 414 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Investment Port

    • 701 Words
    • 3 Pages

    Chapter 13 Question 1) Briefly describe the results of studies that examined the performance of alternative industries during specific time periods and discuss their implications for industry analysis.…

    • 701 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Rodon, J., Ramis-Pujol, J.(2006), “Exploring the Intricacies of Integrating with a Port Community System”, 19th Bled Econference.…

    • 11592 Words
    • 47 Pages
    Powerful Essays

Related Topics