8.02 Discuss considerations for safety and security.

Slides:



Advertisements
Similar presentations
AN ATM WITH AN EYE THE FUTURE,S TECHNOLOGY
Advertisements

What Are the Functions of ATM Machines?
PRESENTED BY: FATIMA ALSALEH Credit Cards Fraud - skimmers -
Secure Your Store Understand the measures used in securing a retail store.
devices... Inputs and Output Keyboard The commonest way to enter data into a computer. Each key is simply a switch, which when pressed, results in a.
International Business and Technology Consultants AMS confidential & proprietary Identification Security Meeting The New Challenge Barry Goleman American.
Helping you protect your customers against fraud Division of Finance and Corporate Securities.
1.7.2.G1 © Family Economics & Financial Education – Revised February 2008 – Financial Institutions Unit – Electronic Banking Funded by a grant from Take.
Business Risks How much of a risk are you willing to take? Going out on a limb.
Automatic Data Capture Devices & Methods
HARDWARE INPUT DEVICES ITGS. Strand 3.1 Hardware Input Devices Keyboards Pointing devices: Mice Touch pads Reading tools: Optical mark recognition (OMR)
Discovering Computers 2010
Commercial Data Processing Lesson 2: The Data Processing Cycle.
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
Warm-up: April 11 What’s the difference between a checking and savings account?
Debit Card Plastic card that looks like a credit card
Groups 23 & 24. What is it? Radio frequency identification Small electronic device consisting of a microchip or antenna containing up to 2 KB of data.
Credit cards and Debit Cards, Credit and Debt
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
Facial Recognition CSE 391 Kris Lord.
Data Security and Privacy
 A device that has the ability to read or identify a product or an object  Mainly tracks and identifies objects  Used for security and identification,
Card Access and Electronic Security Systems at SUNY Oneonta Installation, Commissioning and Implementation.
GCSE Information Technology Input Devices and Methods Objectives:  To understand what input devices are.  Identify their individual uses  Be able to.
RFID – An Introduction Murari Raghavan UNC-Charlotte.
Security Equipment Equipment for preventing unauthorised access to data & information.
By: Piyumi Peiris 11 EDO. Swipe cards are a common type of security device used by many people. They are usually a business-card-sized plastic card with.
Smart Card Application. Smart-card is a plastic card, the size of a standard credit card, with one or several integrated circuits (chips) capable to store.
Visitor Management Solution Wednesday, September 16, 2015.
1.7.2.G1 © Family Economics & Financial Education – Revised May 2009 – Financial Institutions Unit – Electronic Banking Funded by a grant from Take Charge.
Data Capture and Sensing Evanna Agnew CBLT. AIDC Technologies Automatic Identification and Data Capture (AIDC)
The BOSS Project: Recent Advances in Facial Scanning Adam C. Champion.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Data Capture Understand the concept of data encoding. Describe methods of data capture and identify appropriate contexts for their.
Chapter 6 Enhancing Security Through Procedural Controls.
Crime Prevention Part I CHECKS & CREDIT CARDS © ©TCLEOSE Course #2101 Crime Prevention Part I Curriculum is the intellectual property of TxSSC-ICJS (2010)
Commercial Data Processing Credit. Management Information CDP makes it easier for managers to control and process the information that is needed in the.
THE INTERNET OF THINGS (IOT). THE INTERNET OF THINGS Objects can transmit and share information without any human intervention.
Chapter 10 Electronic Commerce. E-commerce is the buying and selling of products and services electronically over the Internet.
Marketing Math Chapter 16. Functions of a cash register Record sales Record sales Store cash and sales documents Store cash and sales documents Provide.
The Before….. And After Story The first prototype of magnetic stripe card created by IBM in the late 1960s Today’s Cards.
Describe direct data entry and associated devices, e. g
Math for Liberal Studies. What is an identification number?  An identification number is a sequence of digits and/or numbers that identifies an object,
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
Computer Studies Today Chapter 17 1 Chapter 17. Computer Studies Today Chapter 17 2 »Input devices and output devices (I/O devices) are known as peripherals.
Magnets Science SOL K.3. Magnets are Useful They help make work easier. You can find magnets in the lab, in jewelry, for fishing, on the construction.
The Big Picture Things to think about What different ways are there to collect information automatically? What are the advantages and disadvantages of.
LMZ Retail: Asset Protection through Robbery Prevention Nate Toon Unit 7 Project CJ 180 Prof. Bashore.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
8.02 Discuss considerations for safety and security.
8.02 Discuss considerations for safety and security.
RECORDS MANAGEMENT Judith Read and Mary Lea Ginn Chapter 12 Electronic Media and Image Records 1 © 2016 Cengage Learning ®. May not be scanned, copied.
A device tat transfers data from the outside world into a computer
Chp 4: Input and Output Devices
DATA COLLECTION Data Collection Data Verification and Validation.
MAGNETIC STRIPE READER
3 Reasons Why you need to Hire Security Guard Services in Townsville
Databases.
SOLUTION ID CARDS AND DRIVER’S LICENSES
Take Charge of Your Finances
Commercial Data Processing
Risk Management and Human Relations
8.02 Discuss considerations for safety and security.
Key and Key Control A key is a device which is used to open a lock. A typical key consist of two parts: The blade, which slides into the keyhole to unlock.
Inventories LO 1 – Controlling Inventory.
Colorado “Protections For Consumer Data Privacy” Law
Take Charge of Your Finances
Presentation transcript:

8.02 Discuss considerations for safety and security.

Safety and security. Safety is providing the proper precaution to protect against harm, failure, breakage, or accident Security is any measure taken to guard against crime of attack

Types of indoor/outdoor security 1. Security guards are hired to protect venue and maintain order at event 2. Metal detectors are devices that detect presence of metal such as guns and knives; device is usually hand-held or gatelike in structure 3. Searches are used to examine a person or their personal effects in order to find an inappropriate concealed item

Types of indoor/outdoor security, cont.. 4. Security badges include plastic cards, metal tags, devices, or tokens May be issued to employees, contractors, vendors, members of press, athletes or entertainers and their entourage, or any other person with valid reason for entering secure area or event

Types of indoor/outdoor security, cont.. Examples of security badges: Wristbands are plastic identification bands that encircle the wrist Photo-identification cards are plastic cards or bearing a photograph, name, and other identifying information about a person

Examples of security badges, cont.. Magnetic strips cards are plastic swipe cards with magnetic strip containing encoded data read by passing the card through slotted electronic device - Cards used especially to make electronic transactions and provide access to restricted or secure areas Types of indoor/outdoor security, cont..

Examples of security badges, cont.. Smart cards are plastic cards containing computer chip which allows holder to enter secured areas, buy good and services, or execute other operations requiring secured information stored on the chip Bar code cards are plastic cards with number of vertical lines set in a pattern, containing identifying security information Types of indoor/outdoor security, cont..

Proximity cards are plastic cards with magnetic strip containing encoded data that is read by passing the cards within a certain distance of a computerized electronic cards reader. - Used to provide access to restricted or secured areas Types of indoor/outdoor security, cont..

Which Badge? 1. The Bobcats store uses this form of “badge” on merchandise, so that they can keep up with inventory and prevent theft. Bar code 2. A drivers license Photo id card 3. A credit card has this in order for a person to make a purchase Magnetic stripe card

Which Term? 4. So bouncers know you are in VIP you might need this to type of “identification” Wristband 5. To get into the secured door Bank of America employees “swipe” this. Proximity card 6. These are put in your phone – it has all of you contacts stored on it Smart card

5. Facial recognition technology is a computer program that takes images filmed from camera and compares them to known database of criminal pictures. Crowds of people can be scanned instantly using single camera alleviating the long security lines Technology was first used on wide-scale basis at 2002 Winter Olympics Types of indoor/outdoor security, cont..

6. Surveillance cameras are used to observe attendees of an event Types of indoor/outdoor security, cont..

Which type of security? 1. Garinger’s security guards go from class to class making sure they do not have a inappropriate items at school - Search 2. - facial recognition 3. The bank robbers were Caught b/c the forgot About this form of security - Surveillance cameras

Which type of security? 3. In order for anchors to interview on the red carpet, they need this security measure. Security badge 4. Bouncers are an example of …. Security guards 5. Everyone has to go through these before they enter the Bobcat arena Medal detectors