Security Methods and Biometrics

Descripción

GCSE ICT B063 Revision on Security Methods and Biometrics
Connor Yohn
Mapa Mental por Connor Yohn, actualizado hace más de 1 año
Connor Yohn
Creado por Connor Yohn hace más de 10 años
34
0

Resumen del Recurso

Security Methods and Biometrics
  1. Biometrics
    1. Defenition: A method used to identify and individual based on physiological characteristics.
      1. Examples: Fingerprint recognition, Palm Print recognition and Facial Recognition.
        1. Facial recognition- The facial features of the user are scanned and compared to a database.
          1. Palm Print recognition- The user's palm is placed on the machine and then the features of the palm are compared to a database.
            1. Fingerprint recognition- The user puts their index finger on the reader sensor, and the fingerprint is then compared to a database.
        2. Security Methods
          1. Defenition- When measures are put in place to stop any intruders from accessing the place which you want to secure.
            1. Physical
              1. Security cameras
                1. Monitor's an area and creates video footage that can be viewed at a later time.
                2. Key Cards
                  1. Magnetic key cards that have a special ID that allows you to only access certain doors.
                  2. Number Locks
                    1. Simple passcoded lock that has a specialised number to it that should be changed on a regular basis to ensure that maximum security measures are enforced.
                    2. Security Guards
                      1. A security guard can be used to ensure that no intruders bypass the area. However, this is not always the best method as it costs a lot of money to pay for the guard's wages.
                    3. Software
                      1. Anti-virus software
                        1. Used to scan the computer on a regular basis to ensure that a virus isnt on the computer.
                        2. Encryption
                          1. Widely used to ensure that data that is transmitted on a network cannot be stolen by hackers.
                    Mostrar resumen completo Ocultar resumen completo

                    Similar

                    Weimar Revision
                    Tom Mitchell
                    Biology Revision - Y10 Mock
                    Tom Mitchell
                    Hitler and the Nazi Party (1919-23)
                    Adam Collinge
                    History of Medicine: Ancient Ideas
                    James McConnell
                    Geography Coastal Zones Flashcards
                    Zakiya Tabassum
                    Biology- Genes and Variation
                    Laura Perry
                    FREQUENCY TABLES: MODE, MEDIAN AND MEAN
                    Elliot O'Leary
                    CUMULATIVE FREQUENCY DIAGRAMS
                    Elliot O'Leary
                    Enzymes and Respiration
                    I Turner
                    GCSE AQA Biology - Unit 2
                    James Jolliffe
                    GCSE AQA Physics - Unit 3
                    James Jolliffe