8.02 Discuss considerations for safety and security.

Slides:



Advertisements
Similar presentations
What Are the Functions of ATM Machines?
Advertisements

PRESENTED BY: FATIMA ALSALEH Credit Cards Fraud - skimmers -
The Office Procedures and Technology
In put Devices and Media In order for a computer to do anything it must be told what to do.
devices... Inputs and Output Keyboard The commonest way to enter data into a computer. Each key is simply a switch, which when pressed, results in a.
Computer Security Computer Security is defined as:
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
1.7.2.G1 © Family Economics & Financial Education – Revised February 2008 – Financial Institutions Unit – Electronic Banking Funded by a grant from Take.
ICT at Work Banking and Finance.
Input & Output Devices ASHIMA KALRA.
Commercial Data Processing Lesson 2: The Data Processing Cycle.
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
Warm-up: April 11 What’s the difference between a checking and savings account?
Debit Card Plastic card that looks like a credit card
Essential Introduction to Computers
What are the questions really asking?
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
Security, Privacy, and Ethics Online Computer Crimes.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
8.02 Discuss considerations for safety and security.
Credit cards and Debit Cards, Credit and Debt
Input devices, processing and output devices Hardware Senior I.
Machinery Guarding. Why are we here today? Training objectives –Explain the general requirements for guarding the hazardous of machines –Explain safety.
Facial Recognition CSE 391 Kris Lord.
Card Access and Electronic Security Systems at SUNY Oneonta Installation, Commissioning and Implementation.
GCSE Information Technology Input Devices and Methods Objectives:  To understand what input devices are.  Identify their individual uses  Be able to.
Administrative Practices Outcome 1
By: Piyumi Peiris 11 EDO. Swipe cards are a common type of security device used by many people. They are usually a business-card-sized plastic card with.
Microsoft Office 2010 Introduction to Computers and How to Purchase Computers and Mobile Devices.
By: Arkida Merizaj and Imelda Mahmutaj.
1.7.2.G1 © Family Economics & Financial Education – Revised May 2009 – Financial Institutions Unit – Electronic Banking Funded by a grant from Take Charge.
Chapter 15 Industrial Security. Loss Specific to Industry  Industrial losses frequently include:  Tools.  Materials.  Supplies.  Products.  Pallets.
1 Interacting with your computer Chapter 3 Mailto: Web :
Examples of TPS 1 In this section, we examine the: components of a TPS the examples of real-time transaction processing batch transaction processing.
1 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Chapter 12 Designing Systems Interfaces, Controls, and Security.
Checking data Chapter 7 Prepared by:Sir Mazhar Javed.
Data Capture Understand the concept of data encoding. Describe methods of data capture and identify appropriate contexts for their.
Chapter 6 Enhancing Security Through Procedural Controls.
Zulhizam Bin Ebrahim Mohd Shamir Bin Abd Azia Muhammad Salehin Bin Suhaimi
Commercial Data Processing Credit. Management Information CDP makes it easier for managers to control and process the information that is needed in the.
Site Security Policy Case 01/19/ : Information Assurance Policy Douglas Hines, Jr.
Computer Vocabulary Peripheral a device that can be connected to a computer for input or output.
T RADE S ECRETS Copyright © 2010 by Jeffrey Pittman.
Computer Studies Today Chapter 17 1 Chapter 17. Computer Studies Today Chapter 17 2 »Input devices and output devices (I/O devices) are known as peripherals.
AVOIDING AND PREVENTING VIOLENCE. Violence in Our Society Violence is any act that causes physical or psychological harm to a person or damage to property.
The Big Picture Things to think about What different ways are there to collect information automatically? What are the advantages and disadvantages of.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
8.02 Discuss considerations for safety and security.
RECORDS MANAGEMENT Judith Read and Mary Lea Ginn Chapter 12 Electronic Media and Image Records 1 © 2016 Cengage Learning ®. May not be scanned, copied.
Input Devices.
A device tat transfers data from the outside world into a computer
DATA COLLECTION Data Collection Data Verification and Validation.
MAGNETIC STRIPE READER
Essential Introduction to Computers
Take Charge of Your Finances
Administrative Practices Outcome 1
DATA COLLECTION, MANAGEMENT AND ANALYSIS
Databases.
Security of Data  
Take Charge of Your Finances
Making a Match.
The Office Procedures and Technology
Data Capture F451 - AS Computing.
Commercial Data Processing
Risk Management and Human Relations
8.02 Discuss considerations for safety and security.
Presentation transcript:

8.02 Discuss considerations for safety and security.

Safety and security. Safety is providing the proper _____ to protect against harm, failure, breakage, or ______ Security is any measure taken to guard against crime of attack

Types of indoor/outdoor security 1. _____ _____ are hired to protect venue and maintain order at event 2. Metal detectors are devices that detect presence of metal; device is usually hand- held or gatelike in structure 3. Searches are used to examine a person or their personal effects in order to find an inappropriate concealed item

Types of indoor/outdoor security, cont.. 4. Security badges include: _____,_____, _____ May be issued to employees, contractors, vendors, members of press, athletes or entertainers and their entourage, or any other person with valid reason for entering secure area or event

Types of indoor/outdoor security, cont.. Examples of security badges: ________________

Examples of security badges, cont.. __________are plastic swipe cards with magnetic strip containing encoded data read by passing the card through slotted electronic device - Cards used especially to make electronic transactions and provide access to restricted or secure areas Types of indoor/outdoor security, cont..

Examples of security badges, cont.. ________ are plastic cards containing computer chip which allows holder to enter secured areas, buy good and services, or execute other operations requiring secured information stored on the chip ________are plastic cards with number of vertical lines set in a pattern, containing identifying security information Types of indoor/outdoor security, cont..

Examples of security badges, cont.. _________ are plastic cards with magnetic strip containing encoded data that is read by passing the cards within a certain distance of a computerized electronic cards reader. - Used to provide access to restricted or secured areas Types of indoor/outdoor security, cont..

5. ______ ______ ______ is a computer program that takes images filmed from camera and compares them to known database of criminal pictures. Crowds of people can be scanned instantly using single camera alleviating the long security lines Technology was first used on wide-scale basis at 2002 Winter Olympics Types of indoor/outdoor security, cont..

6. ______ ______ are used to observe attendees of an event Types of indoor/outdoor security, cont..