8.02 Discuss considerations for safety and security.

Slides:



Advertisements
Similar presentations
AN ATM WITH AN EYE THE FUTURE,S TECHNOLOGY
Advertisements

RFID Access Control System March, 2003 Softrónica.
PRESENTED BY: FATIMA ALSALEH Credit Cards Fraud - skimmers -
devices... Inputs and Output Keyboard The commonest way to enter data into a computer. Each key is simply a switch, which when pressed, results in a.
Computer Security Computer Security is defined as:
Review of Patents Agenda Item 3: Report of the New Technologies Working Group.
ICT at Work Banking and Finance.
Automatic Data Capture Devices & Methods
HARDWARE INPUT DEVICES ITGS. Strand 3.1 Hardware Input Devices Keyboards Pointing devices: Mice Touch pads Reading tools: Optical mark recognition (OMR)
Discovering Computers 2010
Commercial Data Processing Lesson 2: The Data Processing Cycle.
e-Solutions for Access Control, CCTV, Attendance Monitoring, Personal Identification, Building Management and Fire Detection SECURITY & SAFETY IS ONE.
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
Warm-up: April 11 What’s the difference between a checking and savings account?
Debit Card Plastic card that looks like a credit card
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
8.02 Discuss considerations for safety and security.
Input devices, processing and output devices Hardware Senior I.
Machinery Guarding. Why are we here today? Training objectives –Explain the general requirements for guarding the hazardous of machines –Explain safety.
SMARTCARDS. What we’ll cover: How does the Smart Card work (layout and operating system)? Security issues for the card holder The present and future of.
Facial Recognition CSE 391 Kris Lord.
1 Introduction to Computers Day 2. 2 Input Devices Input devices are used to feed data and instructions to the computer systems.They consist of a range.
Card Access and Electronic Security Systems at SUNY Oneonta Installation, Commissioning and Implementation.
GCSE Information Technology Input Devices and Methods Objectives:  To understand what input devices are.  Identify their individual uses  Be able to.
RFID – An Introduction Murari Raghavan UNC-Charlotte.
Karthiknathan Srinivasan Sanchit Aggarwal
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Security Equipment Equipment for preventing unauthorised access to data & information.
Physical Security SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States.
By: Piyumi Peiris 11 EDO. Swipe cards are a common type of security device used by many people. They are usually a business-card-sized plastic card with.
By: Arkida Merizaj and Imelda Mahmutaj.
Radio Frequency Identification (RFID) Be Safe Security Solutions.
1 Interacting with your computer Chapter 3 Mailto: Web :
Data Capture and Sensing Evanna Agnew CBLT. AIDC Technologies Automatic Identification and Data Capture (AIDC)
The BOSS Project: Recent Advances in Facial Scanning Adam C. Champion.
Data Capture Understand the concept of data encoding. Describe methods of data capture and identify appropriate contexts for their.
Zulhizam Bin Ebrahim Mohd Shamir Bin Abd Azia Muhammad Salehin Bin Suhaimi
Commercial Data Processing Credit. Management Information CDP makes it easier for managers to control and process the information that is needed in the.
Site Security Policy Case 01/19/ : Information Assurance Policy Douglas Hines, Jr.
THE INTERNET OF THINGS (IOT). THE INTERNET OF THINGS Objects can transmit and share information without any human intervention.
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
Unit 1 Understanding computer systems: How to work with information and data to meet specific business needs OCR Cambridge Nationals in ICT Level 1/2 ©
Computer Studies Today Chapter 17 1 Chapter 17. Computer Studies Today Chapter 17 2 »Input devices and output devices (I/O devices) are known as peripherals.
The Big Picture Things to think about What different ways are there to collect information automatically? What are the advantages and disadvantages of.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Information Systems Design and Development Security Precautions Computing Science.
AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM
Biometrics Dr. Nermin Hamza
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
8.02 Discuss considerations for safety and security.
RECORDS MANAGEMENT Judith Read and Mary Lea Ginn Chapter 12 Electronic Media and Image Records 1 © 2016 Cengage Learning ®. May not be scanned, copied.
Input Devices.
A device tat transfers data from the outside world into a computer
Chp 4: Input and Output Devices
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Prepared by Hussein Alhashimi
DATA COLLECTION Data Collection Data Verification and Validation.
MAGNETIC STRIPE READER
Agenda Item 3: Report of the New Technologies Working Group
Computer Based Shopping Systems
Databases.
Making a Match.
The Office Procedures and Technology
Data Capture F451 - AS Computing.
Commercial Data Processing
Risk Management and Human Relations
8.02 Discuss considerations for safety and security.
Agenda Item 3: Report of the New Technologies Working Group
Presentation transcript:

8.02 Discuss considerations for safety and security.

Safety and security. Safety is providing the proper precaution to protect against harm, failure, breakage, or accident Security is any measure taken to guard against crime of attack

Types of indoor/outdoor security 1. Security guards are hired to protect venue and maintain order at event 2. Metal detectors are devices that detect presence of metal; device is usually hand- held or gatelike in structure 3. Searches are used to examine a person or their personal effects in order to find an inappropriate concealed item

Types of indoor/outdoor security, cont.. 4. Security badges include plastic cards, metal tags, devices, or tokens May be issued to employees, contractors, vendors, members of press, athletes or entertainers and their entourage, or any other person with valid reason for entering secure area or event

Types of indoor/outdoor security, cont.. Examples of security badges: Wristbands are plastic identification bands that encircle the wrist Photo-identification cards are plastic cards or bearing a photograph, name, and other identifying information about a person

Examples of security badges, cont.. Magnetic strips cards are plastic swipe cards with magnetic strip containing encoded data read by passing the card through slotted electronic device - Cards used especially to make electronic transactions and provide access to restricted or secure areas Types of indoor/outdoor security, cont..

Examples of security badges, cont.. Smart cards are plastic cards containing computer chip which allows holder to enter secured areas, buy good and services, or execute other operations requiring secured information stored on the chip Bar code cards are plastic cards with number of vertical lines set in a pattern, containing identifying security information Types of indoor/outdoor security, cont..

Examples of security badges, cont.. Proximity cards are plastic cards with magnetic strip containing encoded data that is read by passing the cards within a certain distance of a computerized electronic cards reader. - Used to provide access to restricted or secured areas Types of indoor/outdoor security, cont..

5. Facial recognition technology is a computer program that takes images filmed from camera and compares them to known database of criminal pictures. Crowds of people can be scanned instantly using single camera alleviating the long security lines Technology was first used on wide-scale basis at 2002 Winter Olympics Types of indoor/outdoor security, cont..

6. Surveillance cameras are used to observe attendees of an event Types of indoor/outdoor security, cont..