Stovall and Klee Security

Slides:



Advertisements
Similar presentations
Hannah King and Makayla Black.  Our goal is to better our clients way of security and help them keep a safe environment for their clients as well. 
Advertisements

Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
Security: Playing in Safe By: Matt Hill Identification and Access Identification and Access | When Disaster Strikes | Disaster Recovery Plan | Software.
Security, Privacy, and Ethics Online Computer Crimes.
By: Monika Achury and Shuchita Singh
“OUR MISSION IS TO STRENGTHEN OUR WORLD’S SECURITY WITH BIOMETRIC TECHNOLOGY”
The Role of Computers in Surveillance ~ Katie Hatland.
Face Recognition By: Thanh Do Warren Ju. Face Recognition By: Thanh Do Warren Ju.
VOICE BOX® VOICE RECOGNITION Using YOUR Voice to Protect YOUR Identity! By Neil Madadi, Allison Wright, Ava Embry, Jacob Howard.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
“KEEPING YOU TOGETHER, BUT APART” BY: KANISHA NEWMAN United Identity Bank.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
PROVIDING THOROUGH PROTECTION FOR OUR CLIENTS AND THEIR ASSOCIATES. WITH BIOMETRICS INC.
Information Technology Department NNK Investment & Banking Team 3-F Bao Nguyen | Henrik Nilsen | Yoonjin Kim 1.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
DNA DNA contains information of genetic make up and is often used to solve cases. The information of DNA made public may lead to genetic discrimination.
AIRPORT SECURITY Christiane, Kayla, Ally, Gracie.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Hand Scanning for Entering the Building  Hand scanning will keep intruders out and improve the security between the bank and their clients.  This reliable.
Acalade Your everyday worriers.. Mission Statement Puns are bad, but security threats are worse. –Keep your private information private with cutting edge.
Biometrics.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
 Biometrics refers to the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification.
Biometric Technologies
BETTER SAFE THAN SORRY Unit 6. Which item do you think is the most/least useful? How often do you/your parents use these items? What other pieces of equipment.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Molar Money Banking By: Nathan Arey, Jacob Smith, James Hansen, and Collin Deathrige.
JAAK Security Systems Angela Cannava Ann Bhare Joe Paysse Kristal Pride.
Biome-NO-trics Securing your business through biometrics so there are no tricks. Hailey Nealen, Rebekah O’Bryan, and Mirada McCormick.
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
Information Systems Design and Development Security Precautions Computing Science.
Technical Implementation: Security Risks
PATIENT IDENTITY RESOLUTION FOR SMARTER HEALTHCARE
Diane DiLorenzo Cosc 101 section 7
Case Study Consumer held liable for disputed transactions made with her debit card.
SUBMITTED BY ATHIRA BALAKRISHNAN
Black Ice Security Services
Discover the Boom in Electronic Banking!
By: Nathan Arey, Jacob Smith, James Hansen, and Collin Deathrige
By Neil Madadi, Allison Wright, Ava Embry, Jacob Howard
Biometrics.
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
Biometric Security Fujitsu Palm Vein Technology
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Hailey Nealen, Rebekah O’Bryan, and Mirada McCormick
by- A.Swetha (13FF1A0401) G.Pradeep (14FF5A0407) B.Gopi (14FF5A0402)
حقوق الملكية الفكرية إعداد الطالبة: مها عبدالله
Discover the Boom in Electronic Banking!
Outlined Plan We will have initial retinal and fingerprint scans at check-ins for passengers that go with the person’s identity. There will be retinal.
Angela Cannava Ann Bhare Joe Paysse Kristal Pride
Max, Abbie, Kalen, and Cassie Members of B.U.N.S
Ian Ramsey C of E School GCSE ICT On the move Final steps.
BSC Biometric Security System
Biometrics.
Margaret Brown 3rd period October 14, 2007
BSC Biometric Security System
Biometric technology.
A SEMINAR REPORT ON BIOMETRICS
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
Commercial Data Processing
K.C.C.A. : Key Crime Ceasing Association
G061 - Network Security.
BY: Michael Etse and Maverick Fermill
Identity Theft Samuel H. Slater.
Presentation transcript:

Stovall and Klee Security By: Samantha Klee and Emma Stovall Mission Statement: Our main goal is to keep our customers safe by all means possible.

Over the Phone Packages Total Price- $600 (equipment, installation, and warranty) Includes- Voice Recognition Password Protected Program Randomized Questions Program

ATM Packages 1st Package- Total Price- $300 (equipment, installation, and warranty) Includes- Password keyboard Security cameras

ATM Packages 2nd Package- Total Price- $1,200 (equipment, installation, warranty) Includes- Password keyboard Security cameras Face scan Eye scan Fingerprint scan

ATM Packages 3rd Package- Total Price- $5,000 (equipment, installation, warranty) Includes- Password keyboard Security cameras Face scan Eye scan Fingerprint scan DNA scan

Bank Security 1st Package- Total Price- $2,500 (equipment, installation, warranty) Includes- ID maker and scanner Hand scan Fingerprint scan Security cameras

Bank Security 2nd Package- Total Price- $3,300 (equipment, installation, warranty) Includes- ID maker and scanner Hand scan Fingerprint scan Security cameras Face scan Eye scan

Bank Security 3rd Package- Total Price- $8,300 (equipment, installation, warranty) Includes- ID maker and scanner Hand scan Fingerprint scan Security cameras Face scan Eye scan Body scan DNA scan

Biometrics Background Everyone is different that is why we use things such as fingerprints and iris scans as a form of security. It is harder for a person to commit fraud if you have many forms of biometric security. The person trying to steal from you would have to match a number of biometric test before being able to get your bank account. Let's say you were to get the 2nd package for Bank Security. The person trying to steal from you would have to match ID, handprint, fingerprint, face scan, and iris scan making it basically impossible for them even to get into the bank.

Accuracy and Limitations Each piece of equipment is accurate, but they each have certain limitations. Voice recognition- limited when people’s voices change (illness) Security cameras- limited number that can be viewed at once ID cards- may get lost easily Face scan- people may alter their appearance (makeup)

Story of our success On April 24, 2016 Dakota Vinnson broke into First Priority Bank using his twin brother’s ID card. However, we stopped Vinnson in his tracks by using our intense security system. Vinnson was on the track of emptying his brother’s bank accounts and fleeing the country. By using our security system Vinnson is now in jail and charged with fraud.

Beating the System It would be difficult for people to beat the system with each because of the steps that each person goes through. Over the phone- Could record voice Would not know the random question of that call ATM- Could get password somehow Would have a difficult time passing all scans while on video Bank Security- A card could be stolen, but there is other equipment to make sure the identity is correct.

Privacy Customers may be worried about their privacy of this information Some may think that the business or government will keep their information in order to create a profile on them or track them. This could be put under control by making sure all private information, such as fingerprints, DNA, face scan, and other account information, is only allowed access to certain people when needed.

Sec-UR-rity - You are at the center Amateurs hack systems, professionals hack people Sec-UR-rity - You are at the center