Epc  Design Implementation Safety Security  Totem International Ltd Ceo  Firoze Zia Hussain
Upcoming SlideShare
Loading in...5

Like this? Share it with your network


Epc Design Implementation Safety Security Totem International Ltd Ceo Firoze Zia Hussain



EPC design and implementation considering safety security

EPC design and implementation considering safety security



Total Views
Views on SlideShare
Embed Views



1 Embed 7

http://www.linkedin.com 7



Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment
  • Weapons of Mass Destruction What are the weapons of mass destruction available to our enemies including terrorists, fanatics, and extremists? They have 3 main options: Chemical warfare... Chemicals which can maim, incapacitate or kill the target… they are usually in either liquid or gaseous form Biological warfare… consists of viruses and bacteria which can maim, incapacitate or kill the target Dirty Bombs… release radioactive contamination In addition there is also a 4 th category… the white powder incident or hoax! It still has the potential to cause wide scale panic and it is also very difficult to determine whether it is a hazard or a hoax! This last comment means that it will have to be treated just as seriously as a genuine toxic substance in the initial stages So lets look at these threats in more detail…

Epc Design Implementation Safety Security Totem International Ltd Ceo Firoze Zia Hussain Presentation Transcript

  • 1. Presentation on EPC design and implementation for safety and security at Cerebral conference at hyderabad Firoze Zia Hussain CEO TOTEM INTERNATIONAL LTD [email_address] +919618621234
  • 2. Heightening security with technological advancements
  • 4. Safety And Security in EPC Design and Implementation
  • 5. Introduction To Security-standards
    • IMO
    • ISPS code(2002)
    • SOLAS
    • Different codes
    • For airports ,….
    12/03/11 Totem International Ltd
  • 6. Security can prevent
    • Terrorist Attacks.
    • Theft from premises.
    12/03/11 Totem International Ltd
  • 7. Technological models to enhance efficiency 12/03/11 Totem International Ltd
  • 8. Technologies' in ports Technologies 12/03/11 Totem International Ltd
  • 9. RFID Technology
    • ADC technology.
    • An Rfid System
    • Compromises of
    • One or more RF tags
    • Two or more antennas
    • One or more interrogators
    • One or more host computers
    • Appropriate software
    12/03/11 Totem International Ltd
  • 10. GPS Technology
    • Used to track the position
    • To avoid theft
    • Highly effective & reliable
    • Not only track the position
    • of asset but also see what
    • is happening.
    • Can be used from any where
    • by making use of gps device.
    • Device may be very small like a
    • Watch or button on collar
    12/03/11 Totem International Ltd
  • 11. Cloud Technology 12/03/11 Totem International Ltd
  • 12. Biometrics Technology 12/03/11 Totem International Ltd
  • 13. Uses of Biometrics
    • Increases Security
    • Reduces fraud by employing hard to forget technologies & materials
    • Can be of assistance in providing viable solution to security
    • Makes it possible to know who did what when and where
    • Increases ROI in areas like Loss prevention and time of attendence of emplyees
    12/03/11 Totem International Ltd
  • 14. Wireless Technologies Flow of information Employees Clients Dock Side Head office Sea
  • 15. Installing Perimeter Security 12/03/11 Totem International Ltd
  • 16. Intrusion Detection
    • Designed to alert the authority to a
    • specific danger.
    • Indoor
    • Passive infrared detectors
    • Ultrasonic detectors
    • Microwave detectors
    • Photo-electric beams
    • Glass break detectors
    • Smoke, heat &carbonmonoxide
    • detectors
  • 17. Out Door Sensors
    •   Vibration (shaker) or
    • inertia sensors
    •   Passive magnetic field
    • detection
    •   E-field
    •   Microwave barriers
    •   Microphonic systems
    • Taut wire fence systems
    • Fibre optic cable
    • H-field
    12/03/11 Totem International Ltd
  • 18. Monitored Security Solutions
    • linked via the telephone line or cellular network or both to an Alarm Receiving Centre (ARC).
    • contacting the right Authority - i.e. the police usually, or the Fire & Rescue Service (FRS) in the case of a fire - if there is an activation. 
    • highest standards of operation.
    12/03/11 Totem International Ltd
  • 19. Passive systems
    • Detects a potential security breach
    • logs the information
    • signals an alert on the console and or owner.
    12/03/11 Totem International Ltd
  • 20. Reactive Systems
    • known as an intrusion prevention system (IPS).
    • auto-responds to the suspicious activity by resetting the connection.
    •   reprogramming the firewall to block network traffic from the suspected malicious source.
    •   IDPS is commonly used automatically
    • at the command of an operator; systems that both "detect" (alert) and/or "prevent ."
    12/03/11 Totem International Ltd
  • 21.
    • Detection/alarm system.
    • Deter theft as well as vandalism.
    • 24-hour protection of your assets and resources.
    • Lower their risks associated with theft.
    • Decreasing costs associated with .
    • * insurance premiums.
    • repair or replacement of property or equipment that has been damaged .
  • 22. Access Control 12/03/11 Totem International Ltd
  • 23. Installing Rfid at factories 12/03/11 Totem International Ltd
  • 24.
    • RFID tags
    • 1. Active Tags
    • contain sensors,
    • global positioning (GPS),
    • satellite links,
    • other enhancements
    • 2. Semi-active tags
    • battery is used to power sensors
    • volatile memory.
    • contactless smart cards
    12/03/11 Totem International Ltd
  • 25. Access Control
    • Employee ID :
    • Smart and SecureTradelanes (SST).
    • Container Security Initiatives (CSI).
    • prevent loss and possible mischief.
    • Also contain biometric information such as a photograph.
    • closed circuit TV (CCTV)
    12/03/11 Totem International Ltd
  • 26. Vehicle Control
    • Equipping tractors and other equipment with RFID tags.
    • record the exact time at which a particular truck and
    • container entered or left the terminal.
    • can be used to unlock fuel pumps and record fuel usage.
  • 27. Asset Security
    • sensors to monitor environmental conditions within the container.
    • GPS, sensors, and satellite phone capabilities to constantly report the location of the container.
    • satellite phone portals for commercial shippers.
    12/03/11 Totem International Ltd
  • 28. Containers with RFID enable shippers and carriers to :
    • Consistently monitor container security and integrity.
    • Speed shipments through the supply chain.
    • Verify that a container was loaded at a secure loading point.
    • Significantly reduce the likelihood a tamper event happened in
    • Transit with container accountability from point of origin to
    • destination.
    • Gather enough data to conduct a ‘virtual inspection’ in advance
    • of arrival.
    • Guarantee that shipping containers meet governmental security
    • regulations.
    • Receive fast track or ‘green lane’ handling through customs at
    • the point of dispatch and / or the point of receipt.
    • Avoid extensive delays in the shipment and receipt.
    • Minimise the cost of handling .
    12/03/11 Totem International Ltd
  • 29. Biometrics a possible solution to improve efficiency 12/03/11 Totem International Ltd
  • 30. Personal identity 12/03/11 Totem International Ltd
  • 31. Verification 12/03/11 Totem International Ltd
  • 32. Working principle 12/03/11 Totem International Ltd
  • 33. Hand geometry technology to improve efficiency 12/03/11 Totem International Ltd
  • 34.
    • Identifies users by the shape of their hands.
    • The preferred technology for high-security applications.
    • Very reliable when combined with other forms of identification.
    • Hand scanners have a twenty-six bit Wiegand output format as one of the menu choices .
    12/03/11 Totem International Ltd
  • 35. Implementation Issues
    • Card Reader Emulation.
    • Stand Alone Access Control
    • Privacy Issues
    • Operation by Disabled People
    • Outdoor Conditions
  • 36. Dealing with Terrorist Threats at Hotels 12/03/11 Totem International Ltd
  • 37. Chemical Warfare Agents Biological Warfare Agents Dirty Bombs Examples of Hazards White Powder Incidents 12/03/11 Totem International Ltd
  • 38. Protection Level A Protection Level B Protection Level C Crowd Control Line Decontamination Line Hot Line Typically SCBA/Gas suits Typically Full-face/ appropriate filter/suit or P&SA/ suit Typically Half-mask/disposable/skin protection – if nec. 12/03/11 Totem International Ltd Exclusion (Hot) Zone Contamination Reduction (Warm) Zone Support (Cold) Zone Access Control Points Wind Drainage
  • 39. Zone Description 12/03/11 Totem International Ltd
  • 40. Benefits of Electronic surveillance
    • Installing Night vision equipment
    • They are good when you want to get a better look at a
    • specific object and then return to normal viewing
    • Conditions.
    • Have a single lens or stereo lens, depending on the model , excellent for constant viewing, such as moving around in a dark building.
    • Cameras  with night-vision technology can send the image to a  monitor  for display or to a VCR  for recording. When night-vision capability is desired in a permanent location, such as on a building or as part of the equipment in a  helicopter , cameras are used..
    12/03/11 Totem International Ltd
  • 41. Purpose of Night vision Camera’s
    • To locate enemy targets at night
    • For navigation, surveillance and targeting
    • It reveals whether an area has been disturbed.
    • To discover items that have been hidden by criminals, including money, drugs and bodies. 
    • Changes to areas such as walls can be seen using thermal imaging .
    12/03/11 Totem International Ltd
  • 42. Benefits of Low lux camera’s 12/03/11 Totem International Ltd
  • 43. High mega pixel cameras
    •   IP security cameras provide optimum picture quality and better frame.
    •   These cameras use inexpensive sensors and mechanical shutters to control exposure and time
    • Offers a way to increase the detailed capture within an image without sacrificing the area of the camera.
    12/03/11 Totem International Ltd
  • 44.
    • Loss and theft prevention
    12/03/11 Totem International Ltd
  • 45. ROI for security equipment and technology
    • Are my employees being honest about their hours worked
    •   A security director can view and download incident online without having to pull the incident from the DVR.
    • Remote access can save a business in fleet expenses, travel expenditures, and time and resource management.
    • Be in multiple places at one time.
    • A win-win for all parties anytime, anywhere access.
    • Convergence opens new ROI opportunities for security providers, who are investing R&D dollars to position themselves at the forefront of the convergence revolution.
    12/03/11 Totem International Ltd
  • 46. Using surveillance to prevent theft
    • Generates hypotheses
    • Monitor trends
    • Detect clusters and outbreaks
    • objectives can be met very rapidly and often more accurately than with other reporting systems.
    12/03/11 Totem International Ltd