The document discusses securing airport terminals from passenger and cargo threats. It recommends taking a multi-layered security approach using technology and inter-agency communication. Key aspects include identifying threats, implementing multiple security deterrent layers that work together and allow reporting between layers, conducting regular security reviews and penetration testing, and ensuring multi-agency information sharing and coordinated response planning.
Elevate Developer Efficiency & build GenAI Application with Amazon Q
Securing Airport Terminals Passengers And Cargo By Geoff warren
1. E C U R IN G A IR P O R T T E R M IN A L S
PAS S ENGER AND C ARGO
by
G E O F F WA R R E N
A R M A T U S R IS K S
2. ID E N T IF Y T H E T H R E A T
M U L T I L A YE R E D S E C U R IT Y
U S E O F TE C H N O L O G Y
M U L T I A G E N C Y C O M M U N IC A T IO N A N D L IA S IO
A
3. TH E TH R E A T
Analysis of Threats
Know your Enemy
Understand the Phases of Attack
M
Understand Attack Indicators
Be Unpredictable and NEVER set patterns
4. M U L T I L A YE R E D S E C U R IT Y
A multiple layer of security deterrents using both overt
and covert methods
Use layers that compliment each other
Allow each layer to have the ability to report and react if needed
Conduct regular Security Reviews and Penetration Tests
5. T H E S E C U R IT Y A U D IT
S e c u r it y A u d it s h o u ld c o v e r :
ng security policies.
management policies and procedures.
ngency planning/procedures/incident control.
ity training
ity management
rable points
unding area
eter security
systems and surveillance
C
nces and exits
s control
ng
munications
ows and their protection
and their efficiency
keep/sanctuary
e parking and security
ity of work assets (equipment)
6. P E N E T R A T IO N T E S T IN G
Penetration Testing is a key part of the security review process.
The smallest weakness in any organisation's security measures
could have an immediate impact and long-term consequences.
Any successful physical attack can cause irreversible damage to a
company’s reputation, not to mention financial damage.
Penetration testing is essential when delivering a full security
review of any organisation.
7. TH E C O R R E C T U S E O F TE C H N O L O G Y
1. Use technology as part of your layered deterrent
3. Keep up to date with what is available. The terrorists will!!!
5. Technology is only as useful as the operators. Train them well
7. Use dogs correctly trained and handled
r
8. A G E N C Y IN T E R A C T IO N
Agencies M U S T share information
All agencies must be tested and reviewed together
Each Agency must come up with a plan that will
dovetail
U
9. IN S U M M A R Y
RECRUIT AND SELECT THE RIGHT PEOPLE
TRAIN THOSE PEOPLE WELL
CONTINUALLY RE- TRAIN
d
EQUIP THEM WELL
USE TECHNOLOGY BOTH OVERTLY AND COVERTLY
CONSTANTLY REVIEW AND TEST YOUR SECURITY MEASURE
CHANGE IS GOOD AND BE UNPREDICTIBLE
Hinweis der Redaktion
Welcome to the Armatus Risks company presentation.
Welcome to the Armatus Risks company presentation.
Welcome to the Armatus Risks company presentation.
Welcome to the Armatus Risks company presentation.