Preview

Port Security

Powerful Essays
Open Document
Open Document
2330 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Port Security
Heightening port security with technological advancements in Africa

6/22/2011

Totem International Ltd

1

Heightening port security with technological advancements in Africa By

Firoze Zia Hussain CEO & Director Totem International Ltd, India An electronics and communication engineer who is a forward thinking and energetic professional recognized for high-profile turnaround achievements. Was highly decorated law enforcement professional with more than 10 years experience in security function. Successful and consistent record of investigations, and crime prevention. Participant of the US State Department Young Leaders Exchange Program. Successfully executed project work and technology transfer/ collaboration at India 's largest Printed Circuit Board manufacturing plant of INDAL electronics. Pursued consultancy in Quality Circle, ISO9000, JIT, Kaizen, TQM, Taguchi’s techniques of experimentation .A widely traversed person with diverse contacts in global distribution of chemicals and security products.

6/22/2011

Totem International Ltd

2

6/22/2011

Totem International Ltd

3

Introduction To Port Security
 IMO
 ISPS

code(2002)

 SOLAS

6/22/2011

Totem International Ltd

4

Importance of port security


Bulk of African exports is through ports.


 

2% of the world trade.
Trades & profits. Extensively used conveyance for transportation. Increases Africa‟s Natural Resources.



6/22/2011

Totem International Ltd

5

Port Security can prevent
 Pirates/Terrorist Attacks.  Smuggling of

weapons.  Illegal S/W issues & Immigration.

6/22/2011

Totem International Ltd

6

Technological models to enhance efficiency at ports

6/22/2011

Totem International Ltd

7

Technologies ' in ports

6/22/2011

Totem International Ltd

8

RFID Technology
 ADC

technology.  An Rfid System Compromises of


One or more RF tags


  

Two or more antennas
One or more

You May Also Find These Documents Helpful

  • Good Essays

    Network Hardening

    • 287 Words
    • 2 Pages

    It is very important to go through the process of hardening. Hardening is where you change the hardware and software configurations to make computers and devices as secure as possible. I picked the network layout 1-the workgroup . First with the workstations and laptops you need to shut down the unneeded services or programs or even uninstall them. I would also have some good anti-virus software on the workstations. You also need a hardened image for all of your workstations. To do this you need to install a new copy of the operating system and then harden it. After you have one good hardened workstation you can use it as a model for all other workstations and also laptops. For the router you definitely need to protect it from unauthorized access. The router needs to be password protected and you should periodically change that password. For the cable modem you should keep all unwanted ports closed. I would also schedule a regular scan of all the systems. Now for some of these next things I am talking about they will apply to all devices . Disable remote administration. Administration of your router / access point should be "local only", namely, there is no reason to let people from another country access to your network hardware. If you need to make changes, you should be local to the device. Update the firmware. Believe it or not, consumer network hardware needs to be patched also. Check the support site of the vendor of the device when you get it and check for an update. Sign up for e-mail alerts for updates, if available, or check back on a regular basis for…

    • 287 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Michael David Mitchell

    • 1136 Words
    • 5 Pages

    Office, U. S. (n.d.). United States Department of Justice Press Release. Retrieved from U.S. Bureau of Industry and Security: http://www.bis.doc.gov/news/2010/doj03182010.htm…

    • 1136 Words
    • 5 Pages
    Better Essays
  • Good Essays

    SkillPort Security

    • 647 Words
    • 3 Pages

    Having the proper security measures is very critical when running a business. It can be very expensive for an organization to keep an updated security system but in the end, it is well worth the money. No manager should want to even take the risk of letting hackers or viruses into the organizations information system. To fully understand why it is critical to have security measures, you first need to understand the different threats a network can face. Having a good secure network can prevent things such as malware, social engineering attacks, spam, and phishing. All of these can be very dangerous and damaging to your network. As a manager it is also very important to have a thorough security policy that states the precautions and also the steps to take in case of a security breach. When choosing security controls for your business you must consider three things; what security controls does your business need to safeguard the information systems, the safety and protection that security controls should provide, and existing security controls and how they have been implemented.…

    • 647 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Castco Finance Analysis

    • 1446 Words
    • 6 Pages

    Linde AG ,Catalyst Paper Corp ,Cello Group PLC , iSECUREtrac Corp, MediaG3 Inc , Flawless Diamond India Ltd, Shinseido Co Ltd, Conforce International Inc, BRF SA, Favored Inc, Altimo Group Corp, China Dairy Group Ltd , New Dragon Asia Corp, Post Holdings Inc, Exactech Inc, Unilens Vision Inc, Victoria Enterprises Ltd, BlueStar SecuTech Inc, Global Green Matrix Corp, Asian Logistics Ltd , Echo Global Logistics Inc , Genesis-IT AB, Geometric Ltd , Global Digital Solutions Inc, SecureLogic Corp.…

    • 1446 Words
    • 6 Pages
    Powerful Essays
  • Best Essays

    The Sarbanes-Oxley Act

    • 2729 Words
    • 11 Pages

    Firion is a “corporation which develops, produces, and markets specialized jackets used in waste disposal and other safety-related applications” (UMUC, 4). Like most modern companies, Firion utilizes technology for increased efficiency in production, networking among employees, and to store and maintain important data. For example, databases contain employee and customer information as well as sensitive information about the research concerning Firion’s new glove designs and coatings. It is of extreme importance…

    • 2729 Words
    • 11 Pages
    Best Essays
  • Good Essays

    Kafka Trial Analysis

    • 479 Words
    • 2 Pages

    The passage in which K. discusses his arrest with the guards is very important to understanding what the Law means in the context of Kafka’s The Trial. When analyzing the passage in question, one must understand from K’s point of view that he is very distressed at this moment about the lack of knowledge that the guards possess regarding the Law. The fact that they work for the courts yet know so little about it is an intriguing point to be considered.…

    • 479 Words
    • 2 Pages
    Good Essays
  • Better Essays

    There are seven domains in a typical IT infrastructure and in each domain; there are multiple network security applications and countermeasures that are present.…

    • 1049 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Nowadays, security software is becoming a major part of enterprise business. Software development is activity connected with advanced technology and high level of knowledge. After viewing the growing number of malicious activity, it is now imperative that we develop a plan and stick to it. There are so many threats to vulnerabilities and threats that leave systems open to malicious attacks. Whenever you sit at a computer and log onto the internet, your system, becomes vulnerable. There is now potential for malicious attacks. Knowing what to look for can prevent a lot of these attacks.…

    • 534 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Bp Case Study

    • 1496 Words
    • 6 Pages

    May be one of the most widespread usage at wal-mart, Tesco, Metro, etc... Companies like Wal-Mart even influencing/imposing the adoption of this technology to their partners for better supply chain tracking!…

    • 1496 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Investment Port

    • 701 Words
    • 3 Pages

    Chapter 13 Question 1) Briefly describe the results of studies that examined the performance of alternative industries during specific time periods and discuss their implications for industry analysis.…

    • 701 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Border and Coastal Security

    • 2941 Words
    • 12 Pages

    Border Patrol focus has been detection, apprehension and/or deterrence of terrorists and terrorist weapons (Securing America’s Borders). 2011). The duties and responsibilities of the Border Patrol is one of the most important jobs and it is to detect and prevent the entry of illegal immigrants, terrorists, and smugglers into the United States. The amount of travellers that come through the United States, the trade that the United States engage in, and the number of immigrants entering the United States makes us a target for terrorist attacks from different angles. The Department of Homeland Security was created to deal with and address the threat of international terrorism (Securing America’s Borders). The priority mission of this department is homeland security.…

    • 2941 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    port expander essay

    • 303 Words
    • 2 Pages

    What is a Port Expander? What does a Port Expander do? After extensive research, I have learned quite allot about Port Expanders in general and what they are used for. A Port Expander is a device that allows a single port on a computer to operate multiple devices but there are two basic types of port expansions (Internal and External). The Internal expansion slot is a single expansion plate inside the computer with multiple ports often including several USB ports and are all part of a single card that will plug into a pre-designated slot on the motherboard. The External expansion would usually be a cable that will run from the computer to a secondary box, which will have several spots that are identical to the one on the main system.…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Computer Security

    • 414 Words
    • 2 Pages

    Many commercial software packages are designed with computer security features that control who can access the computer. These types of access controls use a process called identification and authentication. Identification verifies that the user is a valid user, and authentication verifies that the user is who he or she claims to be. Three common methods of authentication are remembered information, possessed objects, and biometric devices.…

    • 414 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Rodon, J., Ramis-Pujol, J.(2006), “Exploring the Intricacies of Integrating with a Port Community System”, 19th Bled Econference.…

    • 11592 Words
    • 47 Pages
    Powerful Essays
  • Best Essays

    Transnet

    • 3954 Words
    • 14 Pages

    Transnet port terminals (formerly SAPO - managing port and cargo terminal operations in the nation’s leading ports), and…

    • 3954 Words
    • 14 Pages
    Best Essays

Related Topics