SlideShare une entreprise Scribd logo
1  sur  24
METHODS
  USE TO
 ENHANCE
THE VALUE
Either way, organisations cannot
function without accurate information,
and they do not want unauthorized people
getting into the system and changing
information .

In addition, much of this data is used in
the organisations decision making and
problem solving .
Organizations need to secure not only
their data but also the systems on which the
data is stored.

They need protection from natural
disasters acts of sabotage, theft and
unlawful access.
ACCESS
CONTROL
Organisations generally protect their
hardware and software by restricting access
to the areas in which the computer itself.

This is sometimes done by means of doors
that cannot be opened without a PIN, this
number being known only by certain people.
Encryptio
n
  Is the transforming of normal text,
  which can be read by all, into
  something that requires a code or
  decryption key.
Symmetric encryption

  Is the traditional encryption method
   and relies on both the sender and the
   receiver of a message knowing the
   key.
  How ever, if a key is used by two
   people who are considerable distance
   apart, then at some stage the key must
   be transmitted to the receiver.
Asymmetric or public key
encryption of encryption uses different
  This kind
   keys to encrypt and decrypt.
  This system gives all users a public
   key that all know and can use and a
   private key that is secret.
  A message is encrypted using the
   public key and the private key is used
   to decrypt the message.
  At no point is the private key
PASSWORD
  Most organization use a password
   system that requires a user to enter
   a name and password to log on the
   system.
  This system of identification and
   access control is also adopted in
   networks giving each user different
   privileges.
  Passwords can also be used on
ACCESS CARDS
  By using swipe cards and
   proximity cards, employees can
   gain access to buildings and
   specialized areas, depending on
   the privileges allowed by that
   card.
ACTIVE BADGES
  Active badges restrict access by
   tracking an employee’s location
   using their badge.
  Employees and their whereabouts
   can be monitored by a central
   system that knows where they are
   at any given time.
FIREWALLS
  Are type of software designed to
   protect files and data from
   unauthorized, external access of a
   network through the internet.
  Firewalls have a range of features,
   including access control through
   passwords and encryption, and a log
   that records all unauthorized access
BIOMETRICS
 Refers to the automatic identification
  of a person based on a certain
  physiological        or     behavioral
  characteristics.
 This method is growing in popularity
  over the above methods because the
  person to be identified is required to
  be physically present at the point of
 By replacing PIN’s and passwords with
  biometrics techniques, the risk of
  unauthorized access and fraudulent use
  is decreased.
 Biometric identification can be applied
  to a range of technology, such as
  ATM’s’ mobile phone phones, smart
  cards and desktop computers.
AN AUTOMATED
  BIOMETRIC
  DEVICE HAS
 THREE MAJOR
1.A mechanism to scan and capture an
  image of the characteristics
2. compression,       processing      and
  comparison of the image
3. an interface with application system
OTHER
BIOMETRIC
METHODS:
 voice- matches the sound patterns of
 someone speaking their name or
 passwords to those file.

 facial identification- converts a facial
 image on video to a digital one and
 compares it with one on file.

 fingerprints- compares the ridges on
 fingers with those in a central database.

 palm prints- compares the ridges on a
 hand veins- scans the vein pattern on
 the back on the hand

 handwriting    acoustic emissions-
 analyses sounds generated with
 someone signs their name

 iris- a video image of the coloured
 part of the eye is mapped by the
 computer and each person is given an
 individual code based on their iris
The end!!!!
Presented by:
         Mary Jesette E. Penaojas
         BLIS-III

                                    Presented to:
                                             Mrs. Sheryl C. Farquerabao

Contenu connexe

Tendances

Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methodslapao2014
 
Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Ali Raw
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesLeMeniz Infotech
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesLeMeniz Infotech
 
Personal Data Protection
Personal Data ProtectionPersonal Data Protection
Personal Data ProtectionCreatorsCircle
 
Passwords are everywhere these days
Passwords are everywhere these daysPasswords are everywhere these days
Passwords are everywhere these daysEssaysREasy
 
Mit project
Mit projectMit project
Mit projectAwhydot
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to SolusSolus
 
Biometrics n authentication divices kerja khursus
Biometrics n authentication divices kerja khursusBiometrics n authentication divices kerja khursus
Biometrics n authentication divices kerja khursusSMK Hamid Khan Tapah
 
Electronic Authentication More Than Just A Password
Electronic Authentication More Than Just A PasswordElectronic Authentication More Than Just A Password
Electronic Authentication More Than Just A PasswordNicholas Davis
 
Arkami product overview
Arkami product overviewArkami product overview
Arkami product overviewMark Thacker
 
Wireless communication
Wireless communicationWireless communication
Wireless communicationRandy Vicky
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemIJSRD
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authenticationHai Nguyen
 
Android security a survey of issues, malware penetration, and defenses
Android security a survey of issues, malware penetration, and defensesAndroid security a survey of issues, malware penetration, and defenses
Android security a survey of issues, malware penetration, and defensesLeMeniz Infotech
 
Advanced authentication scheme using a Predefined Keystroke Structure
Advanced authentication scheme using a Predefined Keystroke StructureAdvanced authentication scheme using a Predefined Keystroke Structure
Advanced authentication scheme using a Predefined Keystroke Structureijcsit
 
Keystroke Dynamics Support For Authentication
Keystroke Dynamics Support For AuthenticationKeystroke Dynamics Support For Authentication
Keystroke Dynamics Support For AuthenticationMayank Sachan
 

Tendances (20)

Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
 
SolusDeck
SolusDeckSolusDeck
SolusDeck
 
Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
 
Layers of control
Layers of controlLayers of control
Layers of control
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
 
Personal Data Protection
Personal Data ProtectionPersonal Data Protection
Personal Data Protection
 
Passwords are everywhere these days
Passwords are everywhere these daysPasswords are everywhere these days
Passwords are everywhere these days
 
Mit project
Mit projectMit project
Mit project
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to Solus
 
Biometrics n authentication divices kerja khursus
Biometrics n authentication divices kerja khursusBiometrics n authentication divices kerja khursus
Biometrics n authentication divices kerja khursus
 
Nfc
NfcNfc
Nfc
 
Electronic Authentication More Than Just A Password
Electronic Authentication More Than Just A PasswordElectronic Authentication More Than Just A Password
Electronic Authentication More Than Just A Password
 
Arkami product overview
Arkami product overviewArkami product overview
Arkami product overview
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
 
Android security a survey of issues, malware penetration, and defenses
Android security a survey of issues, malware penetration, and defensesAndroid security a survey of issues, malware penetration, and defenses
Android security a survey of issues, malware penetration, and defenses
 
Advanced authentication scheme using a Predefined Keystroke Structure
Advanced authentication scheme using a Predefined Keystroke StructureAdvanced authentication scheme using a Predefined Keystroke Structure
Advanced authentication scheme using a Predefined Keystroke Structure
 
Keystroke Dynamics Support For Authentication
Keystroke Dynamics Support For AuthenticationKeystroke Dynamics Support For Authentication
Keystroke Dynamics Support For Authentication
 

En vedette

Library orientation
Library orientationLibrary orientation
Library orientation10-30-06
 
Readers advisory services final
Readers advisory services finalReaders advisory services final
Readers advisory services final10-30-06
 
Readers advisory services_in_public_libraries
Readers advisory services_in_public_librariesReaders advisory services_in_public_libraries
Readers advisory services_in_public_libraries10-30-06
 
Historical background
Historical backgroundHistorical background
Historical background10-30-06
 
Lib.instruction
Lib.instructionLib.instruction
Lib.instruction10-30-06
 

En vedette (8)

Library orientation
Library orientationLibrary orientation
Library orientation
 
Dmbbb
DmbbbDmbbb
Dmbbb
 
Mj
MjMj
Mj
 
Readers advisory services final
Readers advisory services finalReaders advisory services final
Readers advisory services final
 
Emjheiy
EmjheiyEmjheiy
Emjheiy
 
Readers advisory services_in_public_libraries
Readers advisory services_in_public_librariesReaders advisory services_in_public_libraries
Readers advisory services_in_public_libraries
 
Historical background
Historical backgroundHistorical background
Historical background
 
Lib.instruction
Lib.instructionLib.instruction
Lib.instruction
 

Similaire à Methods

Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
 
Computing safety ryr
Computing safety ryrComputing safety ryr
Computing safety ryrryrsyd
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintSonuSawant
 
It security
It securityIt security
It securityavi2607
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
 
Location based authentication new words approch secuirity
Location based authentication new words approch secuirityLocation based authentication new words approch secuirity
Location based authentication new words approch secuiritySarath K
 
Recognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docxRecognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docxdanas19
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignRajat Jain
 
CHAPTER 7 Authentication and Authorization On
CHAPTER  7 Authentication and Authorization OnCHAPTER  7 Authentication and Authorization On
CHAPTER 7 Authentication and Authorization OnMaximaSheffield592
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryptionDeepák Soni
 

Similaire à Methods (20)

Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
 
Computing safety ryr
Computing safety ryrComputing safety ryr
Computing safety ryr
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
It security
It securityIt security
It security
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Biometrics
BiometricsBiometrics
Biometrics
 
Physical Security and Digital Security
Physical Security and Digital SecurityPhysical Security and Digital Security
Physical Security and Digital Security
 
Location based authentication new words approch secuirity
Location based authentication new words approch secuirityLocation based authentication new words approch secuirity
Location based authentication new words approch secuirity
 
Physical Security and Digital Security
Physical Security and Digital SecurityPhysical Security and Digital Security
Physical Security and Digital Security
 
Recognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docxRecognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Data security
Data securityData security
Data security
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect Design
 
CHAPTER 7 Authentication and Authorization On
CHAPTER  7 Authentication and Authorization OnCHAPTER  7 Authentication and Authorization On
CHAPTER 7 Authentication and Authorization On
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 

Dernier

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 

Dernier (20)

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 

Methods

  • 1. METHODS USE TO ENHANCE THE VALUE
  • 2. Either way, organisations cannot function without accurate information, and they do not want unauthorized people getting into the system and changing information . In addition, much of this data is used in the organisations decision making and problem solving .
  • 3. Organizations need to secure not only their data but also the systems on which the data is stored. They need protection from natural disasters acts of sabotage, theft and unlawful access.
  • 5. Organisations generally protect their hardware and software by restricting access to the areas in which the computer itself. This is sometimes done by means of doors that cannot be opened without a PIN, this number being known only by certain people.
  • 6. Encryptio n Is the transforming of normal text, which can be read by all, into something that requires a code or decryption key.
  • 7. Symmetric encryption  Is the traditional encryption method and relies on both the sender and the receiver of a message knowing the key.  How ever, if a key is used by two people who are considerable distance apart, then at some stage the key must be transmitted to the receiver.
  • 8. Asymmetric or public key encryption of encryption uses different  This kind keys to encrypt and decrypt.  This system gives all users a public key that all know and can use and a private key that is secret.  A message is encrypted using the public key and the private key is used to decrypt the message.  At no point is the private key
  • 9. PASSWORD  Most organization use a password system that requires a user to enter a name and password to log on the system.  This system of identification and access control is also adopted in networks giving each user different privileges.  Passwords can also be used on
  • 10. ACCESS CARDS  By using swipe cards and proximity cards, employees can gain access to buildings and specialized areas, depending on the privileges allowed by that card.
  • 11. ACTIVE BADGES  Active badges restrict access by tracking an employee’s location using their badge.  Employees and their whereabouts can be monitored by a central system that knows where they are at any given time.
  • 12. FIREWALLS  Are type of software designed to protect files and data from unauthorized, external access of a network through the internet.  Firewalls have a range of features, including access control through passwords and encryption, and a log that records all unauthorized access
  • 13. BIOMETRICS  Refers to the automatic identification of a person based on a certain physiological or behavioral characteristics.  This method is growing in popularity over the above methods because the person to be identified is required to be physically present at the point of
  • 14.
  • 15.  By replacing PIN’s and passwords with biometrics techniques, the risk of unauthorized access and fraudulent use is decreased.  Biometric identification can be applied to a range of technology, such as ATM’s’ mobile phone phones, smart cards and desktop computers.
  • 16. AN AUTOMATED BIOMETRIC DEVICE HAS THREE MAJOR
  • 17. 1.A mechanism to scan and capture an image of the characteristics 2. compression, processing and comparison of the image 3. an interface with application system
  • 19.  voice- matches the sound patterns of someone speaking their name or passwords to those file.  facial identification- converts a facial image on video to a digital one and compares it with one on file.  fingerprints- compares the ridges on fingers with those in a central database.  palm prints- compares the ridges on a
  • 20.  hand veins- scans the vein pattern on the back on the hand  handwriting acoustic emissions- analyses sounds generated with someone signs their name  iris- a video image of the coloured part of the eye is mapped by the computer and each person is given an individual code based on their iris
  • 21.
  • 22.
  • 23.
  • 24. The end!!!! Presented by: Mary Jesette E. Penaojas BLIS-III Presented to: Mrs. Sheryl C. Farquerabao