Document Security in the 21 st Century Amgraf User Group February 21, 2002.

Slides:



Advertisements
Similar presentations
New Cheque Standards! Effective January 1st, 2007 What do you need to know? Canadian Payments Association.
Advertisements

New Cheque Standards! Effective July 1st, 2007 What do you need to know? Canadian Payments Association.
What do Immigration Officers look for in a travel document?
 Physical Logical Access  Physical and Logical Access  Total SSO and Password Automation  Disk/Data Encryption  Centralized management system  Biometric.
With Microsoft Excel 2007 Comprehensive 1e© 2008 Pearson Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Excel 2007 Comprehensive.
Lesson 3: Advanced Collaboration Unit 2: Advanced Word 2007: Business Communications.
Using Track Changes in Microsoft Word Navigating Directions Click on the arrows or the home button located in the bottom right-hand corner of each.
Chapter 10 Handwriting Analysis, Forgery, and Counterfeiting By the end of this chapter you will be able to: Describe 12 types of handwriting characteristics.
FDA Prescription Drug Importation - Public Meeting April 14, Prescription Drug Importation Public Meeting April 14, 2004 Jim Rittenburg Authentix.
By : Captain Rick Ollic Berkeley County Sheriff’s Office.
BUSINESS 8 MARKETING: ADVERTISING Keyboarding KEYBOARDING TIP OF THE DAY SHOULDERS & BACK.
Transportation Fringe Benefit Vouchers Presentation to the Federal ETC Advisory Committee April 26, 2011.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
New Cheque Standards! Effective January 1st, 2007 What do you need to know? Canadian Payments Association.
KEEPING YOUR SECURE DATA SECURE TRUECRPYT. WHAT IS TRUECRYPT Small program for encrypting files What is encrypting? Scrambling the data Password protecting.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Fraud Prevention Strategies at Georgia Tech
11 SUPPORTING LOCAL USERS AND GROUPS Chapter 3. Chapter 3: Supporting Local Users and Groups2 SUPPORTING LOCAL USERS AND GROUPS  Explain the difference.
TROY Group Products and Features Presentation
AN OVERVIEW OF MAC PDF TOOLS 1. PDF Tools for Mac PDF files can be used either in Windows, Unix or Apple’s Mac OS operating system commonly. It still.
Procurement Forum October 16, ELECTRONIC SIGNATURES Arkansas Department of Human Services Ray Stafford.
Microsoft Office Excel 2013 Expert Microsoft Office Excel 2013 Expert Courseware # 3254 Lesson 6: Protecting and Configuring Workbooks.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
What is Check Tampering? Form of Fraudulent Disbursement Employee does one of two things: Prepares a fraudulent check for own benefit Converts a check.
Hands-On Microsoft Windows Server 2008
Preview of AVM-2000 Electronic Signatures Function Add signatures to documents such as 337’s, 8130’s, Log Book Stickers, Work Order and Invoice RTS Statements.
BUSINESS 8 MARKETING: ADVERTISING Keyboarding KEYBOARDING TIP OF THE DAY SHOULDERS & BACK.
Cosmos Security Feature Overview Product Planning Group Samsung IT Solutions Business 12 July 2010.
Vital Statistics in Canada Certificate Renewal. Background 10 Provinces and 3 Territories issue Vital Event Certificates in Canada; Jurisdictions collaborate.
Verify your data entry You could use data types and field properties for adding any validation on your date: EX: Data type: number : allow the user to.
Money History of Money Lydian Coin B.C. Chinese Note Reserve Note 1968 Greek Coin B.C. New York Note 1776 Silver Certificate.
The New Twenty Dollar Bill Presented By: Lauren Firmin.
Electronic Commerce Semester 2 Term 2 Lecture 8. Digital Copyrights & Electronic Publishing Intellectual property rights (copyrights, trademarks, and.
PowerPoint Lesson 10 Sharing and Delivering Presentations Microsoft Office 2010 Advanced Cable / Morrison 1.
1 Check Fraud and Mitigating Risk Western NY AFP September 23, 2009.
2 steps ahead. Preventing Fraud! Key to prevent fraud is to always be ahead of the fraudster! This is best achieved by: –Making security features work.
1. Chapter 25 Protecting and Preparing Documents.
Chapter 10 Handwriting Analysis, Forgery, and Counterfeiting By the end of this chapter you will be able to: describe 12 types of handwriting characteristics.
Copyright © First Option 2008 First Option WebCheck The 1st Option in IT.
Microsoft Access 2010 Chapter 10 Administering a Database System.
Chapter 10: Rights, User, and Group Administration.
Forensic Science: Fundamentals & Investigations, Chapter 10 1 Introduction Document analysts examine and compare questioned documents with known material.
PRINTMAKING ABSTRACTION & PATTERN.
Chapter 4- Part3. 2 Implementing User Profiles A local user profile is automatically created at the local computer when you log on with an account for.
Access The L Line The Express Line to Learning 2007 L Line L © Wiley Publishing All Rights Reserved.
©Copyright Audit Serve, Inc All Rights Reserved Application design issues which cause database management issues Database Authentication Approaches:
All rights Reserved Cengage/NGL/South-Western © 2016.
 Introduction  Tripwire For Servers  Tripwire Manager  Tripwire For Network Devices  Working Of Tripwire  Advantages  Conclusion.
Counterfeiting Aim: How are counterfeit bills detected? Do Now: Name any ways you know of to tell if a bill is real or fake.
COMPREHENSIVE PowerPoint Tutorial 6 Creating Special Types of Presentations.
Counterfeit Currency Detective AnDrea Scott City of LaGrange Police Department.
1 Import File Process File 2 3 Export File for Reporting Print Check 4 BIG PICTURE.
Information Security and Privacy By: Mike Battestilli.
What do Immigration Officers look for in a travel document?
Impregnable Brand Protection For Non-Electronic Products
Fraud Prevention Strategies at Georgia Tech
Big Picture How many ways can a system be attacked? What can we do about it?
Applying Robust Solutions
Lesson 14 Sharing Documents
Security in Web Applications
Exploring Microsoft® Word® 2016 Series Editor Mary Anne Poatsy
Intro to Document Analysis
California Tax Stamp Example
Dos and Don’ts.
Chapter 10 Handwriting Analysis, Forgery, and Counterfeiting By the end of this chapter you will be able to: describe 12 types of handwriting characteristics.
Check21 The Check Truncation Act of the 21st Century
Chapter 10 Handwriting Analysis, Forgery, and Counterfeiting By the end of this chapter you will be able to: describe 12 types of handwriting characteristics.
Technology Used in Handwriting Analysis
Banknotes, coins, security features and symbols
Banknotes, coins, security features and symbols
Presentation transcript:

Document Security in the 21 st Century Amgraf User Group February 21, 2002

Two Themes Prevent or detect alteration Prevent or detect counterfeit

Goals Keep honest people honest Drive the professional to someone else’s document Pass detection (and liability) close to document presentation source

Combine With Other Programs Positive Pay Reverse Positive Pay Regular reconciliation

Paper-based features Level 1 – basket weave pantograph Level 2 – Adds brown stain, black stain, and multi-language void Level 3 – Adds visible and invisible fibers – may be florescent, acid detection, artificial watermarks, controlled distribution Level 4 – Custom watermarks, security threads, Planchettes

Printed Features Void pantographs Intricate borders White ink printing Micro printing Iridescent printing (split fountain) Warning bands Drop-out inks

More Printed Features Step & repeat pantographs Consecutive numbers Bleed-through inks Thermo chromic inks Holograms More…

Electronic Document Security Logon and password Signature validation Locked fields Hidden fields Encryption Secure servers

Summary Technology keeps improving, making it easier to counterfeit documents Technology also adds new ways to protect documents – resulting in a “game” of leap frog