Security Methods and Biometrics

Beschreibung

GCSE ICT B063 Revision on Security Methods and Biometrics
Connor Yohn
Mindmap von Connor Yohn, aktualisiert more than 1 year ago
Connor Yohn
Erstellt von Connor Yohn vor etwa 10 Jahre
33
0

Zusammenfassung der Ressource

Security Methods and Biometrics
  1. Biometrics
    1. Defenition: A method used to identify and individual based on physiological characteristics.
      1. Examples: Fingerprint recognition, Palm Print recognition and Facial Recognition.
        1. Facial recognition- The facial features of the user are scanned and compared to a database.
          1. Palm Print recognition- The user's palm is placed on the machine and then the features of the palm are compared to a database.
            1. Fingerprint recognition- The user puts their index finger on the reader sensor, and the fingerprint is then compared to a database.
        2. Security Methods
          1. Defenition- When measures are put in place to stop any intruders from accessing the place which you want to secure.
            1. Physical
              1. Security cameras
                1. Monitor's an area and creates video footage that can be viewed at a later time.
                2. Key Cards
                  1. Magnetic key cards that have a special ID that allows you to only access certain doors.
                  2. Number Locks
                    1. Simple passcoded lock that has a specialised number to it that should be changed on a regular basis to ensure that maximum security measures are enforced.
                    2. Security Guards
                      1. A security guard can be used to ensure that no intruders bypass the area. However, this is not always the best method as it costs a lot of money to pay for the guard's wages.
                    3. Software
                      1. Anti-virus software
                        1. Used to scan the computer on a regular basis to ensure that a virus isnt on the computer.
                        2. Encryption
                          1. Widely used to ensure that data that is transmitted on a network cannot be stolen by hackers.
                    Zusammenfassung anzeigen Zusammenfassung ausblenden

                    ähnlicher Inhalt

                    Weimar Revision
                    Tom Mitchell
                    Biology Revision - Y10 Mock
                    Tom Mitchell
                    Hitler and the Nazi Party (1919-23)
                    Adam Collinge
                    Geography Coastal Zones Flashcards
                    Zakiya Tabassum
                    FREQUENCY TABLES: MODE, MEDIAN AND MEAN
                    Elliot O'Leary
                    CUMULATIVE FREQUENCY DIAGRAMS
                    Elliot O'Leary
                    GCSE History – Social Impact of the Nazi State in 1945
                    Ben C
                    GCSE Biology AQA
                    isabellabeaumont
                    Physics Revision
                    Tom Mitchell
                    Maths GCSE - What to revise!
                    livvy_hurrell
                    STEM AND LEAF DIAGRAMS
                    Elliot O'Leary