Your SlideShare is downloading. ×
0
Securing Airport Terminals Passengers And Cargo By Geoff warren
Securing Airport Terminals Passengers And Cargo By Geoff warren
Securing Airport Terminals Passengers And Cargo By Geoff warren
Securing Airport Terminals Passengers And Cargo By Geoff warren
Securing Airport Terminals Passengers And Cargo By Geoff warren
Securing Airport Terminals Passengers And Cargo By Geoff warren
Securing Airport Terminals Passengers And Cargo By Geoff warren
Securing Airport Terminals Passengers And Cargo By Geoff warren
Securing Airport Terminals Passengers And Cargo By Geoff warren
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Securing Airport Terminals Passengers And Cargo By Geoff warren

1,656

Published on

Aviation Watch …

Aviation Watch
Securing Airport Terminals Passengers And Cargo

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,656
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Welcome to the Armatus Risks company presentation.
  • Welcome to the Armatus Risks company presentation.
  • Welcome to the Armatus Risks company presentation.
  • Welcome to the Armatus Risks company presentation.
  • Transcript

    • 1. E C U R IN G A IR P O R T T E R M IN A L S PAS S ENGER AND C ARGO by G E O F F WA R R E N A R M A T U S R IS K S
    • 2. ID E N T IF Y T H E T H R E A TM U L T I L A YE R E D S E C U R IT YU S E O F TE C H N O L O G YM U L T I A G E N C Y C O M M U N IC A T IO N A N D L IA S IO A
    • 3. TH E TH R E A T Analysis of Threats Know your Enemy Understand the Phases of AttackM Understand Attack Indicators Be Unpredictable and NEVER set patterns
    • 4. M U L T I L A YE R E D S E C U R IT Y A multiple layer of security deterrents using both overt and covert methods Use layers that compliment each other Allow each layer to have the ability to report and react if needed Conduct regular Security Reviews and Penetration Tests
    • 5. T H E S E C U R IT Y A U D IT S e c u r it y A u d it s h o u ld c o v e r :ng security policies. management policies and procedures.ngency planning/procedures/incident control.ity trainingity management rable pointsunding area eter security systems and surveillance Cnces and exits s controlngmunicationsows and their protection and their efficiency keep/sanctuary e parking and securityity of work assets (equipment)
    • 6. P E N E T R A T IO N T E S T IN GPenetration Testing is a key part of the security review process.The smallest weakness in any organisations security measurescould have an immediate impact and long-term consequences.Any successful physical attack can cause irreversible damage to acompany’s reputation, not to mention financial damage.Penetration testing is essential when delivering a full securityreview of any organisation.
    • 7. TH E C O R R E C T U S E O F TE C H N O L O G Y 1. Use technology as part of your layered deterrent 3. Keep up to date with what is available. The terrorists will!!! 5. Technology is only as useful as the operators. Train them well 7. Use dogs correctly trained and handledr
    • 8. A G E N C Y IN T E R A C T IO N Agencies M U S T share information All agencies must be tested and reviewed together Each Agency must come up with a plan that will dovetail U
    • 9. IN S U M M A R YRECRUIT AND SELECT THE RIGHT PEOPLETRAIN THOSE PEOPLE WELLCONTINUALLY RE- TRAIN dEQUIP THEM WELLUSE TECHNOLOGY BOTH OVERTLY AND COVERTLYCONSTANTLY REVIEW AND TEST YOUR SECURITY MEASURECHANGE IS GOOD AND BE UNPREDICTIBLE

    ×