Acalade Your everyday worriers.. Mission Statement Puns are bad, but security threats are worse. –Keep your private information private with cutting edge.

Slides:



Advertisements
Similar presentations
AN ATM WITH AN EYE THE FUTURE,S TECHNOLOGY
Advertisements

Part I: Making Good Online Choices
Hannah King and Makayla Black.  Our goal is to better our clients way of security and help them keep a safe environment for their clients as well. 
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
CCTV TECHNOLOGY AND PRIVACY CONCERNS Susan F. Brinkley, Ph.D. University of Tampa.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Using a Bank or Credit Union consumer.gov. Why use a bank? A bank is a place to keep your money safe A bank’s services include: – checking accounts and.
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Substitute FAQs SubFinder Overview. FAQs Do I have to have touch-tone service to use SubFinder? No, but you do need a telephone that can be switched from.
Security, Privacy, and Ethics Online Computer Crimes.
“OUR MISSION IS TO STRENGTHEN OUR WORLD’S SECURITY WITH BIOMETRIC TECHNOLOGY”
VOICE BOX® VOICE RECOGNITION Using YOUR Voice to Protect YOUR Identity! By Neil Madadi, Allison Wright, Ava Embry, Jacob Howard.
{ BORN CONNECTED © By: Autumn Coomes. Shelby Wathen, Chelsea Sams, & Cameron Buckman.
“KEEPING YOU TOGETHER, BUT APART” BY: KANISHA NEWMAN United Identity Bank.
Max, Abbie, Kalen, and Cassie Members of B.U.N.S.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Protecting your money: Identity Theft
PROVIDING THOROUGH PROTECTION FOR OUR CLIENTS AND THEIR ASSOCIATES. WITH BIOMETRICS INC.
Social effect: Facebook is a site available to anyone. Many people use it in order to contact friends and relatives from all around the world, and to meet.
Karthiknathan Srinivasan Sanchit Aggarwal
Banking: Checking Account What is a Checking Account? An account where money is deposited and kept for day-to-day expenses Also called demand deposit.
Banking:
Information Technology Department NNK Investment & Banking Team 3-F Bao Nguyen | Henrik Nilsen | Yoonjin Kim 1.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
ICT in Banking.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
ATM Card & PIN: Enables you to use anytime or day, PIN allows you to make authorized transactions to your account. ATM deposits: May submit currency.
Hand Scanning for Entering the Building  Hand scanning will keep intruders out and improve the security between the bank and their clients.  This reliable.
 A place you put money that you spend quickly  Not money intended for saving  Monthly statement sent to your house by the bank.
Biometrics.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
By: Ash, Jess, Natasha, Eslie.  Prevent customers from using fraud identity (false tickets) when being admitted into the theme park.
F INDING F INANCIAL S ERVICES AND T RACKING Y OUR M ONEY.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
GOALS BUSINESS MATH© Thomson/South-WesternLesson 3.2Slide 1 3.2Electronic Banking Record electronic banking transactions Find account balance when banking.
ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Society & Computers PowerPoint
Do This file can be found at
JAAK Security Systems Angela Cannava Ann Bhare Joe Paysse Kristal Pride.
Physical security By Ola Abd el-latif Abbass Hassan.
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
Etsy.com. What you need: An Etsy account! A valid address A credit/debit card An idea and a creation A digital camera A computer And a paypal account.
1.7.2.G1 © Family Economics & Financial Education – Revised May 2005 – Financial Institutions Unit – Electronic Banking Funded by a grant from Take Charge.
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
Aladdin Security We supply what others can only assure.
Unit 32 – Networked Systems Security
Physical Security Concerns for LAN Management By: Derek McQuillen.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
An Introduction to Biometrics
Unit 9 Finance and Banking. Electronic Banking What is E-Banking Electronic banking or e- banking gives people electronic access to bank accounts and.
Describe the use of technology in the financial-information management function.
Creating your online identity
MAGNETIC STRIPE READER
By Neil Madadi, Allison Wright, Ava Embry, Jacob Howard
Stovall and Klee Security
Open, Manage, and Reconcile
Outlined Plan We will have initial retinal and fingerprint scans at check-ins for passengers that go with the person’s identity. There will be retinal.
Module 3 Selling Security
Window Replacement Options To Choose From
Angela Cannava Ann Bhare Joe Paysse Kristal Pride
Max, Abbie, Kalen, and Cassie Members of B.U.N.S
By: Julia Elder, Anna Eades, Marques Angel
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
K.C.C.A. : Key Crime Ceasing Association
Presentation transcript:

Acalade Your everyday worriers.

Mission Statement Puns are bad, but security threats are worse. –Keep your private information private with cutting edge technology only Acalade® can provide.

The Team Annie Miller Mariah Hamilton Tara Knott Samantha Hall Amie Woolard

Our Plan Our plan is three-fold, you may take any and all parts as you see fit. –We provide for in building security –Over-the-telephone security –And ATM security. *Please note: all of our products come with the option to add up to 5 people to an account. Of course, the others added to the account will need their fingerprint, retinal patterns, and voice patterns put into the system under the owner’s account.

In Buildings We have come to know that you already have Bill-in-Trap, a security guard, and a panic button, but we will add the following: –Locked vestibule until unlocked by bank teller –A metal detector Will detect in case of guns or other weapons –An eye scanner Works by scanning the retina and iris and picks out distinct patterns –Fingerprint scanner Analyzes details about a fingerprint and picks out the furrows and picks in the fingerprint, also dries itself to rid the pad of oils.

Over-the-Telephone Our telephone plan must be bought as is, and the components are as followed –Three customer-chosen security questions –The last four digits of their social security number –Their PIN number –Their card number –Name –Account number –The calls will be set up with a program that connects to the computer and bank teller and measures the accuracy of the voice. It measures speech patterns and accuracy

ATM As for the ATM, our systems can be bought as separate pieces or all together. We understand that you have a place to insert your PIN number, a video camera, and a card slot, but we can add so much more. Our pieces are listed below: –Eye scan This works the same way as the one inside the building –Fingerprint scan Works the same way as the buildings

Downfalls Downfalls of eye scanners –Colored contacts can make less accurate Downfalls of the fingerprint: –It’s easy to beat with simple replication of fingerprint Downfalls of voice measurements –Could cause someone with a cold/sinus infection to have the inability to access their account

Privacy Overall, our system is very minimally invasive for technology at this level –The over-the-phone does require a lot of information, but not much more than is required right now. Also, it’s safer to use less social security numbers –The metal detector might make some a little uneasy but there are metal detectors all over the place now, and they will feel better knowing their money is safe

“Beating the System” If you purchase all of the products you’ve seen, it would extremely difficult to beat the system. –Retinal Scan A retinal scan is harder to beat, being the most accurate form of protection we offer. The odds of someone beating our eye scanners is very slim, given that no one tries to rip out an eye. –Fingerprint Scan There are multiple ways to beat a fingerprint scanner, such as using jello, glue, or even taking someone’s fingerprint forcibly. Although with us having cameras stationed at our ATMs and having a teller next to the scanner inside the bank, we don’t think this should be much of an issue.

“Beating the System” (cont.) –Voice Measurements Voice measurements aren’t as accurate, though we have reason to believe they will help you greatly in the event someone unauthorized is trying to get into a bank account. It will measure speech patterns, and could potentially be fooled by a device such as a tape recorder. We are very positive that our company can provide yours with safe, accountable protection. With all of our security measures, it would be extremely difficult to beat our systems.

Success Story Recently, a bank with many security issues came to us and switched to our program. They had been robbed or had been hacked 12 times in a year. After switching to our program… –Their crime rate dropped to zero within two years –They saved 1,500 dollars in two years –Their customers felt safer and happier than ever!

Why us? We have dedicated our company to finding ways of making business safer for you! –We have combined many cutting edge pieces of technology to make banking one of the safest things someone can do –You have the option to choose as much or as little coverage as you feel you need –Our company is always dedicated to our customers and will follow up and see what think about our technology –We are a very affordable price! –Our success rate is 100%!