Nobody downloaded yet

Maritime security - Coursework Example

Comments (0) Cite this document
The continuous usage of water carried has attracted the need for security. Security issues like piracy, criminality, terrorism and border control have…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.8% of users find it useful
Maritime security
Read TextPreview

Extract of sample
"Maritime security"

Download file to see previous pages The Navy has been maintaining the maritime security until recently when their activities are being downsized by the introduction of Private Maritime Organizations. Factors such as reduced spending on the military by armed forces in developed nations, availability of fewer people to enlist and smaller forces available for counter-piracy. In addition, increased use of military robots (UUVs, UAVs, USvs), concentrated in the Asia Pacific region and increased reliance on private maritime security companies to defend themselves will reduce the role and capabilities of the military in the future (Klein 2011, p. 23).
The insecurities in the marine have increased in this current century more than the other centuries because of the technological advancement. Hijackers have advanced the weapons that they used to improve their piracy works. The Private maritime operations were seen to adapt quickly to having modern weapons to fight the terrorists and the pirates. It is one of the reasons as to why it has attracted many employers along the coast.
For example, the West Africa region has suffered theft, and it has increased since 1990s. The hijacking of cargo is intense in the Bight of Benin in Lagos, Ivory Coast, and Gabon. The hijackers are usually targeting the ships that have petroleum goods and sell the stolen petroleum products at low prices. Kidnapping activities are intense to the South of the Niger Delta Region, in Bight of Bonny. Maritime security operations should be put in place so that the West region can be transporting the petroleum safely to the market. Nigeria’s economy depends on the oil sales (Klein 2011, p. 24). Therefore, there is much need to enhance security in the marine area to ensure safety and to reduce casualties in case is of an attack. Today, the PMOs are at the forefrontofgiving security to the navigators and to ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Maritime security Coursework Example | Topics and Well Written Essays - 1500 words”, n.d.)
Retrieved de https://studentshare.org/social-science/1691195-maritime-security
(Maritime Security Coursework Example | Topics and Well Written Essays - 1500 Words)
“Maritime Security Coursework Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/social-science/1691195-maritime-security.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
Maritime law
Under the general rules of the Maritime law, a ship or the vessel owner is responsible for providing a sea worthy vessel. In this sense, the ship or the vessel owner is required to exercise due diligence, through ensuring that the vessel or the ship the owner is releasing to the sea is well manned, equipped and supplied, to ensure that the ship or the vessel remains seaworthy for the whole duration that it is meant to be in the sea2.
4 Pages(1000 words)Coursework
NMS105 Coursework 1
It has specifically dealt with International Maritime Organization (IMO), Maritime Coastguard Agency (MCA), and Marine Accident investigation Branch (MAIB). It extends to explore the codes of practices that govern shipping in an effort to prevent
5 Pages(1250 words)Coursework
Examine the opportunities and limitations of adopting a sustainable development approach within a sector of your choice. Draw on the principles and dimensions of sustainable development in answering this question
1). Moreover, Adams (2009) argued that sustainable development involves increasing the economic capability of a given region or country without necessarily causing harm to the environment. Harm is caused to the environment when unnatural
12 Pages(3000 words)Coursework
Private Security Companies of Hostile Countries
The results of security operations and anti insurgency operations are presented and recommendations for the security companies for the operations in hostile regions like Iraq are given. The expatriate security companies from Western Countries in hostile areas like Iraq are a result of volatile situation that demands security for private organisations, government offices as well as public installations.
32 Pages(8000 words)Coursework
Cyber security
This is a true reflection of what takes place when digital data storage is used. The fact that digital storage can cause delays when authorization is needed before
2 Pages(500 words)Coursework
Food Security
Food security refers to “when all people at all times have access to sufficient, safe, nutritious food to maintain a healthy and active life” (WHO, 2013). Food security is, therefore, build on three major attributes: sufficiency, safety and nutritive value and include both economic and physical access to dietary and preference needs of the people.
3 Pages(750 words)Coursework
Risk Methodology
Risk methodologies generally provide laid down procedures or steps used to determine and manage the occurrence of unpredicted events. There are various risk assessment methodologies available and include:
4 Pages(1000 words)Coursework
Maritime law
Therefore, if a foreigner ship-owner of an arrested vessel presents him/herself before the court of proceedings and deposits a security to bail a vessel upon which an action in rem has been taken, he is deemed to have submitted himself to the jurisdiction and the proceedings
12 Pages(3000 words)Coursework
Cyber security
However, if he or she has been caused to experience intrusions and hacking act before, they will be acquainted with the risks out of need. In this scenario, getting
1 Pages(250 words)Coursework
Network Security and the Demilitarized Zone

According to the research findings, it can, therefore, be said that the functionality of DMZ is similar to a proxy server, as the workstations configured in DMZ interact with the public networks. Furthermore, the most significant advantage of a DMZ is that it protects the local area network domains by segregating the network layer.

4 Pages(1000 words)Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Coursework on topic Maritime security for FREE!
logo footer
Contact us:
Contact Us Now
FREE Mobile Apps:
  • StudentShare App Store
  • StudentShare Google play
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • Miscellaneous
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us