Today’s Castles Class 6. When the cannon came into use it made castles redundant as they could be easily breached. So we don’t build Castles any more.

Slides:



Advertisements
Similar presentations
Bell Ringer List at least 5 measures your family has taken to make your home a safe place to live example: baby proofing cabinets where harmful products.
Advertisements

BESEIGING CASTLES AND TOWNS : Old Sarum, Salisbury.
Can you guess what we are going to be investigating today?
Step two in developing a food defense plan.  Foot and Mouth Disease (FMD)  Spring 2001 outbreak in UK  Complete ban on sale of British cattle, pigs.
Starter – Spot the difference Try and pick out as many differences between these castles as you can in the back of your books.
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
Learn all about castles By ps123 and jbnumber1fan.
Features of a castle By Year 2. The Keep By Adam Natalia Anja and Connor The keep is the tallest part of the castle. The keep is at the top of a turret.
Residential Security System Services in Westchester, NY Phone:
What we learned last lesson?
Castles.
The Development of Castles
Do you know how to keep yourself safe?
MILITARY TECHNOLOGY IN THE MIDDLE AGES Nicolás Gómez C.
Social 8/9. Matsumoto Castle Matsuyama Castle Matsue Castle Hikone Castle Hiroshima Castle- reconstruction Ueno Castle – feudal (reconstruction) Reconstructed.
The “Powergraph Paragraph” Method
LATEST TECHNOLOGICAL DEVELOPMENTS IN THE FIELD OF SECURITY AND PRIVACY.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
 Biometric Time & Attendance System  Biometric Door Lock System  Passport Biometrics solution  IP Surveillance System  Analog camera System  Intrusion.
Security and backups GCSE ICT.
Designing Castles From all over the world! Himeji Castle, JapanBrissa Castle, France.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
Photograph © GJT2004 Rhuddlan Castle. Image © CADW. Crown Copyright. Rhuddlan Castle was built under the order of the English King, Edward I - known as.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
System Security Basics. Information System Security The protection of information systems against unauthorized access to or modification of information,
Housebreaking (a presentation by MCPF Penang)
Staying safe at home Your home should be a safe place. Most callers to your home will be people you know. But you need to be careful when people you don’t.
Emergency Procedures. Fire Drill AS A CLASS- 1) Walk out the class door 2) Proceed down stairs/hallway 3) Exit the building through designated door 4)
Castles were built to make sure that they could not be seized in a battle. The picture opposite shows how a castle could be defended..
SAM-21 Fortress Model and Defense in Depth Some revision on Computer Architecture.
WIRELESS NETWORKING TOT AK Agenda Introduction to Wireless Technologies Wireless Networking Overview Non-Technical considerations Other Comparable.
 A castle was built to prevent attack from the enemy. Castle builders added many clever defence tricks to make their castles difficult to attack.
This term we are going to learn what houses were like a long time ago. Castles.
Introduction The White Tower Why were stone castles easier to defend?
Site Layout constructionsite.
Choose the stage of Innovation you’ve submitted: IdeaPrototypeEstablishedScaling We have developed the complete prototype of our project that exactly replicates.
Definition of a Castle Miss Green.
M EDIEVAL C ASTLES : P ARTS OF THE C ASTLE Elizabeth Hamil.
The Stone Keep Castle You need to prepare a pitch to sell this castle design to the judges. Think about the strengths of this castle and what is good about.
Castle Project Name___________________ Period___________________ Mr. Martin- World History- Room 8.
THE DEVELOPMENT OF CASTLES
Don’t let them catch your computer!!!!!
Our castle ! By Rosie Williamson, Cameron Garden, Gregor Todd Shamanta Rahman.
Onguardonline.gov By Austin Kellogg. Main ideas  Protect your personal information  Know who your dealing with  Use security software that updates.
The High Middle Ages ( ) PopulationPower of Catholic Church Agriculture Key Events:  Norman conquest of Britain  Development of feudalism  Development.
What were the first castles called? Where were the first castles built? What were stone castles? What were Concentric castles? Castles in Britain Glossary.
Jeff Moses KSSPC1 THE CURTAIN WALL CASTLE By the start of the thirteenth century the Normans were building stronger castles which had inner and outer baileys.
Food and Drink – What did they eat? Where did they eat? Did they all eat in the same place? How did they get their food?
Physical Security Concerns for LAN Management By: Derek McQuillen.
CAN YOU GUESS THE PASSWORD You and your teacher are going to work through a program with 5 different passwords. And you need to try and guess them. You.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Parts of a Castle.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
From Cold War to Reunification
Risk management.
Definition of a Castle Miss Green.
Medieval Castles.
CASTLES IN THE MIDDLE AGES
Systemy obronne zamków.
Data integrity and security
5 Reasons to Get a Townhouse in CDO. Cagayan de Oro Realty offers individuals and families hoping to move to the city the chance to acquire an affordable.
Castles.
Parts of a castle.
Inventor 2015 Training.
Castles in the Middle Ages
BY LUKE,CLAIRE,ELLIE AND AFFAN.
When Berlin was a walled city
BY DEC, CHRIS, MAIA AND EVE
Cyber Security For Civil Engineering
Cybersecurity at WAJ What is it? Are we at risk?.
Presentation transcript:

Today’s Castles Class 6

When the cannon came into use it made castles redundant as they could be easily breached. So we don’t build Castles any more or do we?

Defence in Depth A castle has many hurdles to overcome before reaching the centre, there is the moat, castle walls, draw bridge, inner walls and towers. These together are defence in depth. Today security facilities use the same idea with perimeter fencing, watch towers, guarded entrances and buildings with their own security.

Turrets Tanks use the idea of turrets (a section that sticks out) instead of having a hole to fire arrows from the turret has a gun.

Virtual Castles Computer are protected using the same defence in depth idea, you have firewalls, web filters, antivirus, usernames and passwords. These protect the information on phones, PC’s and tablets the same way castles protected people.

Coast Line Castles Castles are used to protect the coast line such as Edward I Castles in Wales. The same idea was used in by Germany in World War 2 to protect the coast line of France from invasion by the allies.

Your home as a Castle Today home have gates (front door), guards( burglar alarms), portholes (windows) which use locks.

Defence in Depth 2 Electric fences are the modern day equivalent of castle walls to stop people getting into where there should not be.

Castles at the centre of life Castles could have markets, festivals and theatre. Also people felt safe around them so wanted to live close to them. So city centres grew around them like this picture of Lincoln castle.

A long time ago in a galaxy far, far away….