Entity Configuration for Designing a Port Security Information System: Proposed Extensions of the Vocational Education and Training Curriculum
##plugins.themes.bootstrap3.article.main##
Port security is one of the most important fields of Vocational Education and Training (VET) maritime studies. In this article, we propose the configuration of entities that are used to design a port security information system for VET education. Our work integrates recent maritime Information Technology (IT) concepts into VET. We record the initial design for building educational software for a school-level security information system that can be used as an extension project for the existing maritime curriculum of VET. This plan, if implemented and completed, will strengthen and expand the boundaries of school knowledge and curriculum. This article describes the design part of the whole project.
Downloads
Download data is not yet available.
References
[1] R.V. Amorado, A.M. Sison, & R.P. Medina (2019, March). Enhanced Data Encryption Standard (DES) Algorithm based on Filtering and Striding Techniques. In Proceedings of the 2019 2nd International Conference on Information Science and Systems (pp. 252-256). ACM.
[2] F.H.M. Ali, R. Yunos, & M.A.M. Alias (2012, June). Simple port knocking method: Against TCP replay attack and port scanning. In Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec) (pp. 247-252). IEEE.
[3] M. Arhami, & H.T. Hidayat (2019, June). Analysis and implementation of the Port Knocking method using Firewall-based Mikrotik RouterOS. In IOP Conference Series: Materials Science and Engineering (Vol. 536, No. 1, p. 012129). IOP Publishing.
[4] S. Basu (2011). International Data Encryption Algorithm (Idea)–A Typical Illustration. Journal of global research in Computer Science, 2(7), 116-118.
[5] M. Krzywinski (2003). Port knocking from the inside out. SysAdmin Magazine, 12(6), 12-17.
[6] A. Oikonomou, N., Fotiou, K., Parastatides, K., Kaltsas (2018) Post-Gymnasium Guidelines - School Year 2018-2019, Open Library Education Pub.: Vocational Guidance Portal. ISBN: 978-618-00-0344-4
[7] I. Stamoulis, D., Ganavia (2013) Port fire stations (Second edition completed) Headquarters of fire brigade.
[8] N., Topaloglu, M. H., Calp, & and B., Turk (2019). A Novel Data Encryption Algorithm Design and Implementation in Information Security Scope. arXiv preprint arXiv:1902.04418.
[9] N. Polemi (2017). Port Cybersecurity: Securing Critical Information Infrastructures and Supply Chains. Elsevier.
[10] Directive 2000/59/EP of the European Parliament and the Council of 27 November 2000.
[11] EU Regulation 725/04 ‘Measures to improve security on ships and port facilities.
[12] I.S.P.S. Code, (2002), International Code for the Safety of Ships and Port Facilities of the IMO.
[13] Law 4504/2017 (Government Gazette A' 184/29-11-2017) Lifelong training for staff at the Ministry of Shipping and Island Policy, strengthening transparency and meritocracy in matters falling within the competence of the Ministry of Shipping and Island Policy, strengthening social participation in the coastal zone The Commission is aware of the need for the Member States to ensure that the European Union's internal market is properly implemented.
[14] Law 3622/2007(EP 281/A`/20.12.2007) Strengthening the security of ships, port facilities and ports and other provisions.
[2] F.H.M. Ali, R. Yunos, & M.A.M. Alias (2012, June). Simple port knocking method: Against TCP replay attack and port scanning. In Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec) (pp. 247-252). IEEE.
[3] M. Arhami, & H.T. Hidayat (2019, June). Analysis and implementation of the Port Knocking method using Firewall-based Mikrotik RouterOS. In IOP Conference Series: Materials Science and Engineering (Vol. 536, No. 1, p. 012129). IOP Publishing.
[4] S. Basu (2011). International Data Encryption Algorithm (Idea)–A Typical Illustration. Journal of global research in Computer Science, 2(7), 116-118.
[5] M. Krzywinski (2003). Port knocking from the inside out. SysAdmin Magazine, 12(6), 12-17.
[6] A. Oikonomou, N., Fotiou, K., Parastatides, K., Kaltsas (2018) Post-Gymnasium Guidelines - School Year 2018-2019, Open Library Education Pub.: Vocational Guidance Portal. ISBN: 978-618-00-0344-4
[7] I. Stamoulis, D., Ganavia (2013) Port fire stations (Second edition completed) Headquarters of fire brigade.
[8] N., Topaloglu, M. H., Calp, & and B., Turk (2019). A Novel Data Encryption Algorithm Design and Implementation in Information Security Scope. arXiv preprint arXiv:1902.04418.
[9] N. Polemi (2017). Port Cybersecurity: Securing Critical Information Infrastructures and Supply Chains. Elsevier.
[10] Directive 2000/59/EP of the European Parliament and the Council of 27 November 2000.
[11] EU Regulation 725/04 ‘Measures to improve security on ships and port facilities.
[12] I.S.P.S. Code, (2002), International Code for the Safety of Ships and Port Facilities of the IMO.
[13] Law 4504/2017 (Government Gazette A' 184/29-11-2017) Lifelong training for staff at the Ministry of Shipping and Island Policy, strengthening transparency and meritocracy in matters falling within the competence of the Ministry of Shipping and Island Policy, strengthening social participation in the coastal zone The Commission is aware of the need for the Member States to ensure that the European Union's internal market is properly implemented.
[14] Law 3622/2007(EP 281/A`/20.12.2007) Strengthening the security of ships, port facilities and ports and other provisions.