Preview

Port Security

Powerful Essays
Open Document
Open Document
2330 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Port Security
Heightening port security with technological advancements in Africa

6/22/2011

Totem International Ltd

1

Heightening port security with technological advancements in Africa By

Firoze Zia Hussain CEO & Director Totem International Ltd, India An electronics and communication engineer who is a forward thinking and energetic professional recognized for high-profile turnaround achievements. Was highly decorated law enforcement professional with more than 10 years experience in security function. Successful and consistent record of investigations, and crime prevention. Participant of the US State Department Young Leaders Exchange Program. Successfully executed project work and technology transfer/ collaboration at India 's largest Printed Circuit Board manufacturing plant of INDAL electronics. Pursued consultancy in Quality Circle, ISO9000, JIT, Kaizen, TQM, Taguchi’s techniques of experimentation .A widely traversed person with diverse contacts in global distribution of chemicals and security products.

6/22/2011

Totem International Ltd

2

6/22/2011

Totem International Ltd

3

Introduction To Port Security
 IMO
 ISPS

code(2002)

 SOLAS

6/22/2011

Totem International Ltd

4

Importance of port security


Bulk of African exports is through ports.


 

2% of the world trade.
Trades & profits. Extensively used conveyance for transportation. Increases Africa‟s Natural Resources.



6/22/2011

Totem International Ltd

5

Port Security can prevent
 Pirates/Terrorist Attacks.  Smuggling of

weapons.  Illegal S/W issues & Immigration.

6/22/2011

Totem International Ltd

6

Technological models to enhance efficiency at ports

6/22/2011

Totem International Ltd

7

Technologies ' in ports

6/22/2011

Totem International Ltd

8

RFID Technology
 ADC

technology.  An Rfid System Compromises of


One or more RF tags


  

Two or more antennas
One or more

You May Also Find These Documents Helpful

  • Powerful Essays

    Castco Finance Analysis

    • 1446 Words
    • 6 Pages

    Linde AG ,Catalyst Paper Corp ,Cello Group PLC , iSECUREtrac Corp, MediaG3 Inc , Flawless Diamond India Ltd, Shinseido Co Ltd, Conforce International Inc, BRF SA, Favored Inc, Altimo Group Corp, China Dairy Group Ltd , New Dragon Asia Corp, Post Holdings Inc, Exactech Inc, Unilens Vision Inc, Victoria Enterprises Ltd, BlueStar SecuTech Inc, Global Green Matrix Corp, Asian Logistics Ltd , Echo Global Logistics Inc , Genesis-IT AB, Geometric Ltd , Global Digital Solutions Inc, SecureLogic Corp.…

    • 1446 Words
    • 6 Pages
    Powerful Essays
  • Best Essays

    The Sarbanes-Oxley Act

    • 2729 Words
    • 11 Pages

    Firion is a “corporation which develops, produces, and markets specialized jackets used in waste disposal and other safety-related applications” (UMUC, 4). Like most modern companies, Firion utilizes technology for increased efficiency in production, networking among employees, and to store and maintain important data. For example, databases contain employee and customer information as well as sensitive information about the research concerning Firion’s new glove designs and coatings. It is of extreme importance…

    • 2729 Words
    • 11 Pages
    Best Essays
  • Better Essays

    Michael David Mitchell

    • 1136 Words
    • 5 Pages

    Office, U. S. (n.d.). United States Department of Justice Press Release. Retrieved from U.S. Bureau of Industry and Security: http://www.bis.doc.gov/news/2010/doj03182010.htm…

    • 1136 Words
    • 5 Pages
    Better Essays
  • Better Essays

    There are seven domains in a typical IT infrastructure and in each domain; there are multiple network security applications and countermeasures that are present.…

    • 1049 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Nowadays, security software is becoming a major part of enterprise business. Software development is activity connected with advanced technology and high level of knowledge. After viewing the growing number of malicious activity, it is now imperative that we develop a plan and stick to it. There are so many threats to vulnerabilities and threats that leave systems open to malicious attacks. Whenever you sit at a computer and log onto the internet, your system, becomes vulnerable. There is now potential for malicious attacks. Knowing what to look for can prevent a lot of these attacks.…

    • 534 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Bp Case Study

    • 1496 Words
    • 6 Pages

    May be one of the most widespread usage at wal-mart, Tesco, Metro, etc... Companies like Wal-Mart even influencing/imposing the adoption of this technology to their partners for better supply chain tracking!…

    • 1496 Words
    • 6 Pages
    Better Essays
  • Best Essays

    The report is being generated for the town council. The council has its main center and even operates sub smaller five neighborhood centers in various parts of town. The council solely relies on its network and data storage systems to interact with staff members and offices so that real time based data can be accessed regarding cases, clients etc. The data send over the network are very sensitive and vital for legal proceedings.…

    • 1608 Words
    • 7 Pages
    Best Essays
  • Good Essays

    remote access policy

    • 464 Words
    • 2 Pages

    All employees will be responsible for understanding and following all security related policies and procedures.…

    • 464 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Worldwide Network Security

    • 7779 Words
    • 32 Pages

    The worldwide network security market grew by 6.1% in 2011. The total market, which includes firewall, unified threat management (UTM), intrusion detection and prevention (IDP), and virtual private network (VPN) solutions, reached $7.4 billion in 2011. UTM revenue saw the strongest growth at 17.4% and reached $2.2 billion. The IDP market saw more moderate growth at 4.5%, reaching $1.9 billion. The firewall segment remained the largest component of the market at $2.4 billion but grew only a modest 2.9% over 2010. Revenue from standalone VPN solutions fell 5.3% to $0.9 billion. IDC expects the firewall and VPN segments to remain fairly flat over the forecast period. UTM and IDP solutions will drive the overall market to $10.1 billion in 2016, representing a compound annual growth rate (CAGR) of 6.4%. Other highlights include:  Application awareness and control will continue to be a key feature demanded by organizations to address the ever-blurring line between personal and corporate use of the Web and better enable business processes and productivity.  Further, the "bring your own device" (BYOD) trend will necessarily continue to drive more granularity and context into policy management.  Integrating more advanced malware detection will be one of the key drivers in the UTM/next-generation firewall and IDP spaces.…

    • 7779 Words
    • 32 Pages
    Powerful Essays
  • Satisfactory Essays

    port expander essay

    • 303 Words
    • 2 Pages

    What is a Port Expander? What does a Port Expander do? After extensive research, I have learned quite allot about Port Expanders in general and what they are used for. A Port Expander is a device that allows a single port on a computer to operate multiple devices but there are two basic types of port expansions (Internal and External). The Internal expansion slot is a single expansion plate inside the computer with multiple ports often including several USB ports and are all part of a single card that will plug into a pre-designated slot on the motherboard. The External expansion would usually be a cable that will run from the computer to a secondary box, which will have several spots that are identical to the one on the main system.…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Investment Port

    • 701 Words
    • 3 Pages

    Chapter 13 Question 1) Briefly describe the results of studies that examined the performance of alternative industries during specific time periods and discuss their implications for industry analysis.…

    • 701 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Border and Coastal Security

    • 2941 Words
    • 12 Pages

    Border Patrol focus has been detection, apprehension and/or deterrence of terrorists and terrorist weapons (Securing America’s Borders). 2011). The duties and responsibilities of the Border Patrol is one of the most important jobs and it is to detect and prevent the entry of illegal immigrants, terrorists, and smugglers into the United States. The amount of travellers that come through the United States, the trade that the United States engage in, and the number of immigrants entering the United States makes us a target for terrorist attacks from different angles. The Department of Homeland Security was created to deal with and address the threat of international terrorism (Securing America’s Borders). The priority mission of this department is homeland security.…

    • 2941 Words
    • 12 Pages
    Better Essays
  • Good Essays

    Computer Security

    • 414 Words
    • 2 Pages

    Many commercial software packages are designed with computer security features that control who can access the computer. These types of access controls use a process called identification and authentication. Identification verifies that the user is a valid user, and authentication verifies that the user is who he or she claims to be. Three common methods of authentication are remembered information, possessed objects, and biometric devices.…

    • 414 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Rodon, J., Ramis-Pujol, J.(2006), “Exploring the Intricacies of Integrating with a Port Community System”, 19th Bled Econference.…

    • 11592 Words
    • 47 Pages
    Powerful Essays
  • Best Essays

    Transnet

    • 3954 Words
    • 14 Pages

    Transnet port terminals (formerly SAPO - managing port and cargo terminal operations in the nation’s leading ports), and…

    • 3954 Words
    • 14 Pages
    Best Essays

Related Topics