Unit 4 Seminar/Unit 5 Review Case Study: ABC Valve Plant Al Dauser, CPP, CFI Adjunct Professor.

Slides:



Advertisements
Similar presentations
COMPUTERS: TOOLS FOR AN INFORMATION AGE Chapter 5 Input and Output.
Advertisements

RFID Access Control System March, 2003 Softrónica.
Tool Marks and Impressions. Tool Manufacturing  When tools are made, during the manufacturing process imperfections are left on the tools’ surface. 
Chapter 5 p. 6 What Is Input? What is input? p. 230 and 232 Fig. 5-1 Next  Input device is any hardware component used to enter data.
The Handling Camera1 Trainer Training The Handling Camera.
Automatic Data Capture Devices & Methods
HARDWARE INPUT DEVICES ITGS. Strand 3.1 Hardware Input Devices Keyboards Pointing devices: Mice Touch pads Reading tools: Optical mark recognition (OMR)
Input & Output Devices ASHIMA KALRA.
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
SECURITY HARDWARE & TECHNOLOGY CCPOA REGION 3 TRAINING CLASS MAY 11, 2011.
Before The Bank Robbery. Before The Robbery Following Measures Should Be Taken Prior to a Robbery:  Regularly conducted teller training  Implementation/installation.
Biometrics and Authentication Shivani Kirubanandan.
Basics of Access Control A new & exciting world.
Input devices, processing and output devices Hardware Senior I.
Marjie Rodrigues
Security-Authentication
= Home Button. This is a portable memory device. It can hold from around 32Mb up to 256GB. These are sometimes called ‘Flash Drives’ and they are universal,
1 Introduction to Computers Day 2. 2 Input Devices Input devices are used to feed data and instructions to the computer systems.They consist of a range.
Three Lines of Defense Presented by the Arapahoe County Sheriff’s Office.
Technology and Hotel Security Hotel Mgmt. Hospitality Services R. McCann.
GCSE Information Technology Input Devices and Methods Objectives:  To understand what input devices are.  Identify their individual uses  Be able to.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
OCR GCSE ICT DATA CAPTURE METHODS. LESSON OVERVIEW In this lesson you will learn about the various methods of capturing data.
Alternative Input Devices Part B There will be a test on this information (both part a & b).
© 2008 Delmar, Cengage Learning Property Security, Emergency Response, and Fire Protection Systems Chapter 13.
1 Interacting with your computer Chapter 3 Mailto: Web :
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
Page 1 Onity OS Series Safes 20/03/2003. Page 2 Onity OS Series Safes 20/03/2003 Onity OS Series Safes.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
“ Getting to Know Networks”. What Is a Network? A network is a collection of computers hooked up together, usually by cables or telephone wires, for the.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Biometrics.
Physical (Environmental) Security
Smart Schools Bond Act High-Tech Security Projects Protecting Our Greatest Assets Conference December 2.
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
Review Future Technology. Definition Biometrics refers to technologies used to detect and recognize human physical characteristics.
Physical security By Ola Abd el-latif Abbass Hassan.
BIOMETRICS.
Course of Study 6. Security Management  Security and its Importance  Security of the Guest and their Property  Security Needs for the Staff and the.
Physical Security By Nathan Conroy COSC Outline Purpose of physical security Two types of physical security Different types of security devices.
Unit 32 – Networked Systems Security
Physical Security Concerns for LAN Management By: Derek McQuillen.
Access Control Jeff Wicklund Computer Security Fall 2013.
SEC 410 Entire Course (UOP) SEC 410 Week 1 DQ 1 (UOP)  SEC 410 Week 1 Individual Physical Security Paper   SEC 410 Week 1 DQ 1   SEC 410 Week 1 DQ.
The Big Picture Things to think about What different ways are there to collect information automatically? What are the advantages and disadvantages of.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
CJ-180 Private Security Seminar Unit 4. Overview of Unit 4 Security Concerns Interior Exterior Intrusion Access Control Contingency Planning Fire Protection.
LMZ Retail: Asset Protection through Robbery Prevention Nate Toon Unit 7 Project CJ 180 Prof. Bashore.
An Introduction to Biometrics
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
Unit 1: Protecting the Facility (Virtual Machines)
Standard Input Devices
Blue Access Technologies
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
MAGNETIC STRIPE READER
KeyGuard Key Management System
Chapter 5 - Input.
Better safety to your valuable things! one way “ Padlocks ” - Qilocks Padlocks.
OCR GCSE ICT Data capture methods.
OCR GCSE ICT Data capture methods.
Seminar Presentation on Biometrics
Biometric technology.
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
1 Stadium Company Network. The Stadium Company Project Is a sports facility management company that manages a stadium. Stadium Company needs to upgrade.
Key and Key Control A key is a device which is used to open a lock. A typical key consist of two parts: The blade, which slides into the keyhole to unlock.
Presentation transcript:

Unit 4 Seminar/Unit 5 Review Case Study: ABC Valve Plant Al Dauser, CPP, CFI Adjunct Professor

Tonight’s Question In this week’s seminar, be prepared to discuss surveillance devices including cameras, closed-circuit television, and alarm systems as described in your readings.

Unit 5 Case Study We will also use part of the class to go over the ABC Valve Plant case study that is due during Unit 5.

As we discuss: What type of CCTV system do you have where you work? What type of access control? Has your system been recently upgraded? Were you part of the process? Help select/test/etc?

Keying Devices and Systems Warded locks – the keyway is open and can be seen through Disc tumbler locks – Used as desk locks, files locks, and padlocks Pin tumbler – keyway, which is irregular in shape, and the key, which is grooved on both sides – can be master keyed Lever locks – used in safe deposit boxes and are for all practical purposes pickproof

Keying Devices and Systems Warded locks – the keyway is open and can be seen through Disc tumbler locks – Used as desk locks, files locks, and padlocks Pin tumbler – keyway, which is irregular in shape, and the key, which is grooved on both sides – can be master keyed Lever locks – used in safe deposit boxes and are for all practical purposes pickproof

Removable Cores Used where locks are changes often Made to be removed if necessary with a core key, allowing a new core to be inserted

Keying Systems The change key – One key to a single lock within a master-keyed system The submaster key – Will open all the locks within a particular area or grouping in a given facility The master key – Where two or more submaster systems exist, a master key system is established The grand master key – One that will open everything in a system involving two or more master-key groups

Other Operating Mechanisms for Access Control Combination locks – have three dials that must be aligned in the proper order before the lock will open Code-operated locks – opened by pressing a series of numbered buttons in the proper sequence Card-operated locks – presenting a card and code to open lock

Advantages of Access Control Systems a. Security staff no longer need to spend hours rotating key cores and keeping detailed logs. b.Card keys can be programmed to function in a variety of ways. c.Lost cards can be deactivated in a matter of seconds. d.The systems often allows the hotel to keep track of the time and number of entries at a given site

Types of Card-Operated Systems Magnetic coded cards – contains a flexible magnetic sheet sealed between two sheets of plastic Wiegan Effect cards – short-length magnetic wires embedded within the card Optical coded cards – contain bar codes Proximity cards – send a code to a receiver via magnetic, optical, or ultrasonic pulses Radio Frequency Identification (RFID) – radio frequency identification

Types of Card-Operated Systems (cont.) Biometric systems – designed to recognize biological features Fingerprint recognition systems – optically scan a chosen fingerprint area and compare the scanned area with a file Signature recognition systems – no two people write with the same motion or pressure Hand geometry recognition systems – use the geometry of the hand

Types of Card-Operated Systems (cont.) Speaker verification systems – Uses the uniqueness of voice patterns to determine identification and control admittance Eye retina recognition – systems analyze the blood vessel pattern in the retina of the eye Padlocks – detachable, portable locks that have a shackle adapted to be opened for engagement through a hasp or chain

Types of Card-Operated Systems (cont.) High-security locks iButton – an extension of the “smart card” technology being used by the banking industry – contains a hermetically sealed computer chip in a stainless steel container

Locking Devices Electromagnetic locking devices – hold doors closed by magnetism Double-cylinder locking devices – installed in doors that must be secured from both sides, requiring a key to open them from either side – most common application is in doors with glass panels Emergency exit locking devices – panic-bar installations

Locking Devices (cont.) Recording devices – provide for a printout of door use by time of day and by the key used Vertical throw devices – lock into the jamb vertically instead of the usual horizontal bolt Electric locking devices – activated remotely by an electric current that releases the strike and thus permits entrance Sequence locking devices – designed to ensure that all doors covered by the system are locked

Effective Surveillance Systems Should produce an identifiable image of persons engaging in criminal behavior Sequence cameras record still pictures at regular intervals Motion picture cameras using high-speed 16 mm film and fast shatter speeds can be set up to take pictures in normal light CCTV systems coupled with recording equipment or computers should be used

Technological Advances In CCTV Reduced size of the camera Reduced price of color cameras Improved reliability of color cameras “Starlight” cameras – allow for good video reproduction in low light situations

Replacing CCTV Camera’s Variables to be considered during a site survey – Is the camera to be visible and used as a deterrent to crime or hidden and used in civil or criminal prosecutions? – What effect, if any, will the sun have on the operation of the system? – Where is the best location for a camera? – Should the placement of the camera be high? – What type of lighting is in use?

Old Construction Difficulties – exterior fire escapes – old and frequently badly worn locks – common walls – roof access from neighboring buildings – unused and forgotten connecting doors

New Construction Modern construction creates offices that are essentially open-top boxes Any given floor of a building has a crawl space that runs from exterior wall to exterior wall

The ABC Valve Plant Assess the potential risks and provide solutions for the ABC Valve Plant. Each proposed change should be supported in terms of why it is needed. Include references to the security systems and procedures you referenced in the course. Do not attempt to redraw the facility. (Do not cut and paste the diagram into your case study).

ABC Valve Plant Some students in the past have found this to be a difficult project. The key is to use the textbook as your guide since it touches on all the problems listed on the assignment. Physical security, locks, lighting, card access, alarms, guards, fire, hiring, visitor control, CCTV, shipping/receiving, etc. Do not cut and paste the site plan into your case study. A suggestion is to follow a good/better/best format. The problem with consultants is that they do not necessarily have a budget to follow. Does the cost of the upgrades outweigh the benefit of implementing them?? Do you get a return on your investment (ROI) in a short period of time (3 years??) Also do not forget to mention controls for raw materials, finished goods, and tools.

The ABC Valve Plant Three to five page in length (this does not include title and reference pages) The paper should contain a cover page and a list of references in APA format. All internal citation of outside sources plus the listing of all references should also adhere to APA format. All text pages should be double-spaced and in 12-point font.

The ABC Valve Plant What questions do you have?