ISPS - PowerPoint PPT Presentation

About This Presentation
Title:

ISPS

Description:

ISPS 4. Ship Security Assessment Ship Security Assessment Risk Assessment Methodology Assessment Tools On-scene security surveys Practical steps to conduct a SSA ... – PowerPoint PPT presentation

Number of Views:157
Avg rating:3.0/5.0
Slides: 44
Provided by: Usernamepl216
Category:
Tags: isps | port

less

Transcript and Presenter's Notes

Title: ISPS


1
ISPS
  • 4. Ship Security Assessment

2
Ship Security Assessment
  1. Risk Assessment Methodology
  2. Assessment Tools
  3. On-scene security surveys
  4. Practical steps to conduct a SSA
  5. Security assessment documentation

3
I. Risk Assessment Methodology
  • What is SSA It is a process that identifies
    weaknesses in physical structures, personnel
    protection systems, processes, or other areas
    that may lead to a security breach, and may
    suggest options to eliminate or mitigate those
    weaknesses.
  • Objective Detect threats to critical assets of
    the company and define preventive measures
    against security incidents affecting the company
    and the ships in order to prioritise security
    measures.

4
I. Risk Assessment Methodology
  • Must be carried out by Persons With Appropriate
    Skills To Evaluate The Security of A Ship (see
    next)
  • Under supervision of / assigned by Company
    Security Officer
  • And this In Accordance With Part A Of The Code,
    Taking Into Account Part B Of The Code.

5
I. Risk Assessment Methodology
  • Persons With Appropriate Skills
  • Remark by Classification Company
  • We understand the CSO should decide who has the
    appropriate skills although the Code does not
    stipulate specifically who will evaluate the
    appropriate skills. We also understand persons to
    carry out SSA may draw upon expert assistance as
    in Code B/8.4 in addition to his own skills. The
    specific ways to draw upon expert assistance are
    considered to be security consultant, literature,
    internet web site, services delivered by e-mail
    and various information issued by each country.
    We advise to make a list of those assistance
    methods to use for carrying out SSA.

6
I. Risk Assessment Methodology
  • 3 Key steps
  • Identify the key ship board operations important
    to protect. RISK ASSESSMENT
  • Identify the possible threats to the ship and
    their probability of occurrence against the
    requirements of the ISPS Code. THREAT ASSESSMENT
  1. Risk Assessment
  2. Threat Assessment

7
I. Risk Assessment Methodology
  • What is RISK for What?


X
  1. Risk Assessment
  2. Threat Assessment

8
I. Risk Assessment Methodology
  • Sequence of activities
  • Define the system being studied
  • Identify the hazards associated with that system
  • Assess the likelihood of the hazards occurring
  • Identify how each hazard might progress to
    various outcomes
  1. Risk Assessment
  2. Threat Assessment

9
I. Risk Assessment Methodology
  • Sequence of activities (contd)
  • Assess the likelihood of progression to each
    outcome
  • Asses the consequences associated with each
    outcome
  • Multiply likelihood and consequence to obtain the
    risk associated with each outcome
  • Sum the risks associated with the outcomes to
    produce an overall risk
  1. Risk Assessment
  2. Threat Assessment

10
I. Risk Assessment Methodology
  • The Threats according to the ISPS Code are
  • Damage to, or destruction of, the port facility
    or of the ship (by explosive devices, arson,
    sabotage, vandalism)
  • Hijacking or seizure of the ship or the persons
    on board
  • Tampering with cargo, essential ship equipment or
    systems or ships stores
  • Attacks whilst at sea or from seaward at berth or
    at anchor
  1. Risk Assessment
  2. Threat Assessment

11
I. Risk Assessment Methodology
  • Threats according to the ISPS Code are (Cont.)
  • Unauthorized access or use including the presence
    of stowaways
  • Smuggling weapons or equipment
  • Use of the ship to carry those intending to cause
    a security incident and their equipment
  • Use of the ship itself as a weapon or as means to
    cause damage or destruction
  • Blockage of port entrances, locks, approaches,
    etc.
  • Nuclear, biological and chemical attack
  1. Risk Assessment
  2. Threat Assessment

12
I. Risk Assessment Methodology
  • Security Objects according to the ISPS Code are
  • The ports infrastructure, especially the ports
    accesses, entrances, approaches, etc
  • The ports facilities
  • The ports employees / the employees of the
    ports companies
  • The cargo present at the port
  • The ports environment (surrounding areas, air,
    water)
  • The ships (and the passengers) in the port
  • The IT systems
  1. Risk Assessment
  2. Threat Assessment

13
I. Risk Assessment Methodology
  • Items to be protected include
  • The ships personnel
  • Passengers, visitors, vendors, repair
    technicians, port facility personnel etc.
  • The capacity to maintain safe navigation and
    emergency response
  • The cargo, particularly dangerous goods or
    hazardous supstances
  • Ships stores
  1. Risk Assessment
  2. Threat Assessment

14
I. Risk Assessment Methodology
  • Items to be protected include (Cont.)
  • Any ship security communication equipment and
    systems
  • Any ships security surveillance equipment and
    systems
  1. Risk Assessment
  2. Threat Assessment

15
I. Risk Assessment Methodology
  • Items to be taken into account that could create
    vulnerabilities
  • Conflicts between safety and security measures
  • Conflicts between shipboars duties and security
    assignments
  • Watchkeeping duties, number of ships personnell,
    and any implications to crew fatigue, alertness
    and performance
  • Any identified security training dificiencies
  • Any security equipment and systems , including
    communication systems
  1. Risk Assessment
  2. Threat Assessment

16
Ship Security Assessment
  1. Risk Assessment Methodology
  2. Assessment Tools
  3. On-scene security surveys
  4. Practical steps to conduct a SSA
  5. Security assessment documentation

17
II. Assessment Tools
  • The Ship Security Officer must use systematic and
    consistent approaches to evaluate the security
    conditions and vulnerabilities.
  • The operational aspects will be the main focus.
  • A checklist can/will be used and must include
    items like

18
II. Assessment Tools
  • Minimum Checklist items
  • General layout of the ship
  • Location of areas that should have restricted
    access, such as the bridge, engine room, radio
    room etc.
  • Location and function of each or potential access
    point to the ship
  • Open deck arrangements including the height of
    the deck above water
  • Emergency and stand-by equipment available to
    maintain essential services

19
II. Assessment Tools
  • Minimum Checklist items (Cont.)
  • Numerical strength, reliability, and security
    duties of the ships crew
  • Existing security and safety equipment for
    protecting the passengers and crew
  • Existing agreements with private companies for
    providing ship an waterside security services
  • Existing protective measures and procedures in
    practice, uncluding inspection, control and
    monitoring equipment, personnel identification
    documents and communication, alarm, lighting,
    access control and other appropriate systems

20
Ship Security Assessment
  1. Risk Assessment Methodology
  2. Assessment Tools
  3. On-scene security surveys
  4. Practical steps to conduct a SSA
  5. Security assessment documentation

21
III. On-scene security surveys
  • The on-scene security survey is an integral part
    of any SSA.
  • A SSA is not complete without an on-scene
    security survey.
  • A company can use 1 assessment for different
    ships but the survey is unique for every vessel.

22
III. On-scene security surveys
  • The survey should fulfill the following
    functions
  • Identification of existing security measures,
    procedures and operations
  • Identification and evaluation of key shipboard
    operations that it is important to protect
  • Identification of possible threats to the key
    shipboard operations and the likelihood of their
    occurrence, in order to establish and prioritize
    security measures
  • Identification of weaknesses, including human
    factors in the infrastructure, policies and
    procedures

23
III. On-scene security surveys
  • Min. items to be examined by On-scene security
    survey
  • Ensuring the performance of all ship security
    duties
  • Monitoring restricted areas to endure that only
    authorized persons have access
  • Controlling access to the ship, including any
    identification systems
  • Monitoring of deck areas and areas surrounding
    the ship

24
III. On-scene security surveys
  • Min. items to be examined by On-scene security
    survey (Cont.)
  • Controlling the embarkation of persons and their
    effects (accompanied and unaccompanied baggage
    and ships personnel personal effects)
  • Supervising the handling of cargo and the
    delivery of ships stores
  • Ensuring that ship security communication,
    information, and equipment are readily available

25
III. On-scene security surveys
  • Threats...
  • May imply risks for...
  • Security Objects.

Preventive Measures Detective Measures Correctiv
e Measures
26
Ship Security Assessment
  1. Risk Assessment Methodology
  2. Assessment Tools
  3. On-scene security surveys
  4. Practical steps to conduct a SSA
  5. Security assessment documentation

27
Overall steps to produce a SSA
IV. Practical steps to conduct a SSA
28
IV. Practical steps to conduct a SSA
  • Step 1 Obtain and record the following
    information required to conduct an assessment
  • Ship and company documentation as detailed in
    section 1 (should contribute to the threat
    evaluation phase)
  • Record and document the following in detail
  • Authorised access points as detailed in section 4
  • Restricted areas as detailed within section 5
  • Escape and evacuation routes as detailed in
    section 6
  • Existing security equipment/systems as detailed
    in section 7

29
IV. Practical steps to conduct a SSA
  • A copy of the ships general arrangement plan
    annotated with
  • Authorised access points as detailed in section 4
  • Restricted areas as detailed within section 5
  • Escape and evacuation routes as detailed in
    section 6
  • Existing security equipment/systems as detailed
    in section 7
  • This gathered information will be used in the
    following steps.

30
IV. Practical steps to conduct a SSA
  • Step 2 Conduct and document a detailed threat
    evaluation and risk assessment for the ship as
    detailed in section 8. Assess for any weaknesses,
    note them and address them in the on-scene
    security survey. Keep a copy of this
    documentation and add them to the final SSA.

31
IV. Practical steps to conduct a SSA
  • Step 3 Conduct the on-scene security survey
    during which all previous information gathered
    must be confirmed and any weaknesses identified
    as detailed in section 9. Keep a copy of this
    survey in the final SSA

32
IV. Practical steps to conduct a SSA
  • Step 4 If any ammendments are to be made to one
    of the previous documents, due to the making of
    the security survey, it must be done at this
    point. All additions and ammendments must be
    documented and copied in the ship security plan.
    They must also be retained in the SSA.

33
IV. Practical steps to conduct a SSA
  • Step 5 Present the SSA to the company for review
    and acceptance. The SSP will be finalised with
    the SSA.
  • Step 6 The SSP, accompanied with the assessment,
    is put forward for approval by the Administration
    or Recognised Security Organisation (RSO)

34
IV. Practical steps to conduct a SSA
  • Practical steps for the mitigation of different
    threats/ scenarios
  • Step 1 Scenario Selection
  • Step 2 Evaluate/score the scenario in terms of
    potential consequences
  • Step 3 Evaluate/score the scenario in terms of
    ships vulnerability
  • Step 4 Determine if the scenario requires a
    mitigation strategy
  • Step 5 Implement mitigation strategy

35
Potential Threat Scenarios
IV. Practical steps to conduct a SSA
36
Step 1 Scenario Selection
IV. Practical steps to conduct a SSA
37
Step 2 Evaluate, score the scenario in terms of
potential consequences
IV. Practical steps to conduct a SSA
38
Step 3 Evaluate, score the scenario in terms of
ships vulnerability
IV. Practical steps to conduct a SSA
39
Step 4 Determine if the scenario requires a
mitigation strategy
IV. Practical steps to conduct a SSA
40
Step 5 Implement mitigation strategy
IV. Practical steps to conduct a SSA
41
IV. Practical steps to conduct a SSA
  • Exercise Restricted Areas
  • Sum up the restricted areas o/b
  • Read Comment

42
Ship Security Assessment
  1. Risk Assessment Methodology
  2. Assessment Tools
  3. On-scene security surveys
  4. Practical steps to conduct a SSA
  5. Security assessment documentation

43
V. Security assessment documentation
  • After completion of the SSA a report must be
    prepared, consisting of a summary of how the
    assessment was cinducted, a description of each
    vernerability found during the assessment, and a
    description of counter measures thet could be
    used to address each vulnerability.
  • This report must be protected from unautherized
    access or disclosure.
Write a Comment
User Comments (0)
About PowerShow.com