Epc Design Implementation Safety Security Totem International Ltd Ceo Firoze Zia Hussain


Published on

EPC design and implementation considering safety security

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Weapons of Mass Destruction What are the weapons of mass destruction available to our enemies including terrorists, fanatics, and extremists? They have 3 main options: Chemical warfare... Chemicals which can maim, incapacitate or kill the target… they are usually in either liquid or gaseous form Biological warfare… consists of viruses and bacteria which can maim, incapacitate or kill the target Dirty Bombs… release radioactive contamination In addition there is also a 4 th category… the white powder incident or hoax! It still has the potential to cause wide scale panic and it is also very difficult to determine whether it is a hazard or a hoax! This last comment means that it will have to be treated just as seriously as a genuine toxic substance in the initial stages So lets look at these threats in more detail…
  • Epc Design Implementation Safety Security Totem International Ltd Ceo Firoze Zia Hussain

    1. 1. Presentation on EPC design and implementation for safety and security at Cerebral conference at hyderabad Firoze Zia Hussain CEO TOTEM INTERNATIONAL LTD [email_address] +919618621234
    2. 2. Heightening security with technological advancements
    4. 4. Safety And Security in EPC Design and Implementation
    5. 5. Introduction To Security-standards <ul><li>IMO </li></ul><ul><li>ISPS code(2002) </li></ul><ul><li>SOLAS </li></ul><ul><li>Different codes </li></ul><ul><li>For airports ,…. </li></ul>12/03/11 Totem International Ltd
    6. 6. Security can prevent <ul><li>Terrorist Attacks. </li></ul><ul><li>Theft from premises. </li></ul>12/03/11 Totem International Ltd
    7. 7. Technological models to enhance efficiency 12/03/11 Totem International Ltd
    8. 8. Technologies' in ports Technologies 12/03/11 Totem International Ltd
    9. 9. RFID Technology <ul><li>ADC technology. </li></ul><ul><li>An Rfid System </li></ul><ul><li>Compromises of </li></ul><ul><li>One or more RF tags </li></ul><ul><li>Two or more antennas </li></ul><ul><li>One or more interrogators </li></ul><ul><li>One or more host computers </li></ul><ul><li>Appropriate software </li></ul>12/03/11 Totem International Ltd
    10. 10. GPS Technology <ul><li>Used to track the position </li></ul><ul><li>To avoid theft </li></ul><ul><li>Highly effective & reliable </li></ul><ul><li>Not only track the position </li></ul><ul><li>of asset but also see what </li></ul><ul><li>is happening. </li></ul><ul><li>Can be used from any where </li></ul><ul><li>by making use of gps device. </li></ul><ul><li>Device may be very small like a </li></ul><ul><li>Watch or button on collar </li></ul>12/03/11 Totem International Ltd
    11. 11. Cloud Technology 12/03/11 Totem International Ltd
    12. 12. Biometrics Technology 12/03/11 Totem International Ltd
    13. 13. Uses of Biometrics <ul><li>Increases Security </li></ul><ul><li>Reduces fraud by employing hard to forget technologies & materials </li></ul><ul><li>Can be of assistance in providing viable solution to security </li></ul><ul><li>Makes it possible to know who did what when and where </li></ul><ul><li>Increases ROI in areas like Loss prevention and time of attendence of emplyees </li></ul>12/03/11 Totem International Ltd
    14. 14. Wireless Technologies Flow of information Employees Clients Dock Side Head office Sea
    15. 15. Installing Perimeter Security 12/03/11 Totem International Ltd
    16. 16. Intrusion Detection <ul><li>Designed to alert the authority to a </li></ul><ul><li>specific danger. </li></ul><ul><li>Indoor </li></ul><ul><li>Passive infrared detectors </li></ul><ul><li>Ultrasonic detectors </li></ul><ul><li>Microwave detectors </li></ul><ul><li>Photo-electric beams </li></ul><ul><li>Glass break detectors </li></ul><ul><li>Smoke, heat &carbonmonoxide </li></ul><ul><li>detectors </li></ul>
    17. 17. Out Door Sensors <ul><li>  Vibration (shaker) or </li></ul><ul><li>inertia sensors </li></ul><ul><li>  Passive magnetic field </li></ul><ul><li>detection </li></ul><ul><li>  E-field </li></ul><ul><li>  Microwave barriers </li></ul><ul><li>  Microphonic systems </li></ul><ul><li>Taut wire fence systems </li></ul><ul><li>Fibre optic cable </li></ul><ul><li>H-field </li></ul>12/03/11 Totem International Ltd
    18. 18. Monitored Security Solutions <ul><li>linked via the telephone line or cellular network or both to an Alarm Receiving Centre (ARC). </li></ul><ul><li>contacting the right Authority - i.e. the police usually, or the Fire & Rescue Service (FRS) in the case of a fire - if there is an activation.  </li></ul><ul><li>highest standards of operation. </li></ul>12/03/11 Totem International Ltd
    19. 19. Passive systems <ul><li>Detects a potential security breach </li></ul><ul><li>logs the information </li></ul><ul><li>signals an alert on the console and or owner. </li></ul>12/03/11 Totem International Ltd
    20. 20. Reactive Systems <ul><li>known as an intrusion prevention system (IPS). </li></ul><ul><li>auto-responds to the suspicious activity by resetting the connection. </li></ul><ul><li>  reprogramming the firewall to block network traffic from the suspected malicious source. </li></ul><ul><li>  IDPS is commonly used automatically </li></ul><ul><li>at the command of an operator; systems that both &quot;detect&quot; (alert) and/or &quot;prevent .&quot; </li></ul>12/03/11 Totem International Ltd
    21. 21. <ul><li>Detection/alarm system. </li></ul><ul><li>Deter theft as well as vandalism. </li></ul><ul><li>24-hour protection of your assets and resources. </li></ul><ul><li>Lower their risks associated with theft. </li></ul><ul><li>Decreasing costs associated with . </li></ul><ul><li>* insurance premiums. </li></ul><ul><li>repair or replacement of property or equipment that has been damaged . </li></ul>
    22. 22. Access Control 12/03/11 Totem International Ltd
    23. 23. Installing Rfid at factories 12/03/11 Totem International Ltd
    24. 24. <ul><li>RFID tags </li></ul><ul><li>1. Active Tags </li></ul><ul><li>contain sensors, </li></ul><ul><li>global positioning (GPS), </li></ul><ul><li>satellite links, </li></ul><ul><li>other enhancements </li></ul><ul><li>2. Semi-active tags </li></ul><ul><li>battery is used to power sensors </li></ul><ul><li>volatile memory. </li></ul><ul><li>contactless smart cards </li></ul>12/03/11 Totem International Ltd
    25. 25. Access Control <ul><li>Employee ID : </li></ul><ul><li>Smart and SecureTradelanes (SST). </li></ul><ul><li>Container Security Initiatives (CSI). </li></ul><ul><li>prevent loss and possible mischief. </li></ul><ul><li>Also contain biometric information such as a photograph. </li></ul><ul><li>closed circuit TV (CCTV) </li></ul>12/03/11 Totem International Ltd
    26. 26. Vehicle Control <ul><li>Equipping tractors and other equipment with RFID tags. </li></ul><ul><li>record the exact time at which a particular truck and </li></ul><ul><li>container entered or left the terminal. </li></ul><ul><li>can be used to unlock fuel pumps and record fuel usage. </li></ul>
    27. 27. Asset Security <ul><li>sensors to monitor environmental conditions within the container. </li></ul><ul><li>GPS, sensors, and satellite phone capabilities to constantly report the location of the container. </li></ul><ul><li>satellite phone portals for commercial shippers. </li></ul>12/03/11 Totem International Ltd
    28. 28. Containers with RFID enable shippers and carriers to : <ul><li>Consistently monitor container security and integrity. </li></ul><ul><li>Speed shipments through the supply chain. </li></ul><ul><li>Verify that a container was loaded at a secure loading point. </li></ul><ul><li>Significantly reduce the likelihood a tamper event happened in </li></ul><ul><li>Transit with container accountability from point of origin to </li></ul><ul><li>destination. </li></ul><ul><li>Gather enough data to conduct a ‘virtual inspection’ in advance </li></ul><ul><li>of arrival. </li></ul><ul><li>Guarantee that shipping containers meet governmental security </li></ul><ul><li>regulations. </li></ul><ul><li>Receive fast track or ‘green lane’ handling through customs at </li></ul><ul><li>the point of dispatch and / or the point of receipt. </li></ul><ul><li>Avoid extensive delays in the shipment and receipt. </li></ul><ul><li>Minimise the cost of handling . </li></ul>12/03/11 Totem International Ltd
    29. 29. Biometrics a possible solution to improve efficiency 12/03/11 Totem International Ltd
    30. 30. Personal identity 12/03/11 Totem International Ltd
    31. 31. Verification 12/03/11 Totem International Ltd
    32. 32. Working principle 12/03/11 Totem International Ltd
    33. 33. Hand geometry technology to improve efficiency 12/03/11 Totem International Ltd
    34. 34. <ul><li>Identifies users by the shape of their hands. </li></ul><ul><li>The preferred technology for high-security applications. </li></ul><ul><li>Very reliable when combined with other forms of identification. </li></ul><ul><li>Hand scanners have a twenty-six bit Wiegand output format as one of the menu choices . </li></ul>12/03/11 Totem International Ltd
    35. 35. Implementation Issues <ul><li>Card Reader Emulation. </li></ul><ul><li>Stand Alone Access Control </li></ul><ul><li>Privacy Issues </li></ul><ul><li>Operation by Disabled People </li></ul><ul><li>Outdoor Conditions </li></ul>
    36. 36. Dealing with Terrorist Threats at Hotels 12/03/11 Totem International Ltd
    37. 37. Chemical Warfare Agents Biological Warfare Agents Dirty Bombs Examples of Hazards White Powder Incidents 12/03/11 Totem International Ltd
    38. 38. Protection Level A Protection Level B Protection Level C Crowd Control Line Decontamination Line Hot Line Typically SCBA/Gas suits Typically Full-face/ appropriate filter/suit or P&SA/ suit Typically Half-mask/disposable/skin protection – if nec. 12/03/11 Totem International Ltd Exclusion (Hot) Zone Contamination Reduction (Warm) Zone Support (Cold) Zone Access Control Points Wind Drainage
    39. 39. Zone Description 12/03/11 Totem International Ltd
    40. 40. Benefits of Electronic surveillance <ul><li>Installing Night vision equipment </li></ul><ul><li>They are good when you want to get a better look at a </li></ul><ul><li>specific object and then return to normal viewing </li></ul><ul><li>Conditions. </li></ul><ul><li>Have a single lens or stereo lens, depending on the model , excellent for constant viewing, such as moving around in a dark building. </li></ul><ul><li>Cameras  with night-vision technology can send the image to a  monitor  for display or to a VCR  for recording. When night-vision capability is desired in a permanent location, such as on a building or as part of the equipment in a  helicopter , cameras are used.. </li></ul>12/03/11 Totem International Ltd
    41. 41. Purpose of Night vision Camera’s <ul><li>To locate enemy targets at night </li></ul><ul><li>For navigation, surveillance and targeting </li></ul><ul><li>It reveals whether an area has been disturbed. </li></ul><ul><li>To discover items that have been hidden by criminals, including money, drugs and bodies.  </li></ul><ul><li>Changes to areas such as walls can be seen using thermal imaging . </li></ul>12/03/11 Totem International Ltd
    42. 42. Benefits of Low lux camera’s 12/03/11 Totem International Ltd
    43. 43. High mega pixel cameras <ul><li>  IP security cameras provide optimum picture quality and better frame. </li></ul><ul><li>  These cameras use inexpensive sensors and mechanical shutters to control exposure and time </li></ul><ul><li>Offers a way to increase the detailed capture within an image without sacrificing the area of the camera. </li></ul>12/03/11 Totem International Ltd
    44. 44. <ul><li>Loss and theft prevention </li></ul>12/03/11 Totem International Ltd
    45. 45. ROI for security equipment and technology <ul><li>Are my employees being honest about their hours worked </li></ul><ul><li>  A security director can view and download incident online without having to pull the incident from the DVR. </li></ul><ul><li>Remote access can save a business in fleet expenses, travel expenditures, and time and resource management. </li></ul><ul><li>Be in multiple places at one time. </li></ul><ul><li>A win-win for all parties anytime, anywhere access. </li></ul><ul><li>Convergence opens new ROI opportunities for security providers, who are investing R&D dollars to position themselves at the forefront of the convergence revolution. </li></ul>12/03/11 Totem International Ltd
    46. 46. Using surveillance to prevent theft <ul><li>Generates hypotheses </li></ul><ul><li>Monitor trends </li></ul><ul><li>Detect clusters and outbreaks </li></ul><ul><li>objectives can be met very rapidly and often more accurately than with other reporting systems. </li></ul>12/03/11 Totem International Ltd