Security Methods and Biometrics

Description

GCSE ICT B063 Revision on Security Methods and Biometrics
Connor Yohn
Mind Map by Connor Yohn, updated more than 1 year ago
Connor Yohn
Created by Connor Yohn about 10 years ago
31
0

Resource summary

Security Methods and Biometrics
  1. Biometrics
    1. Defenition: A method used to identify and individual based on physiological characteristics.
      1. Examples: Fingerprint recognition, Palm Print recognition and Facial Recognition.
        1. Facial recognition- The facial features of the user are scanned and compared to a database.
          1. Palm Print recognition- The user's palm is placed on the machine and then the features of the palm are compared to a database.
            1. Fingerprint recognition- The user puts their index finger on the reader sensor, and the fingerprint is then compared to a database.
        2. Security Methods
          1. Defenition- When measures are put in place to stop any intruders from accessing the place which you want to secure.
            1. Physical
              1. Security cameras
                1. Monitor's an area and creates video footage that can be viewed at a later time.
                2. Key Cards
                  1. Magnetic key cards that have a special ID that allows you to only access certain doors.
                  2. Number Locks
                    1. Simple passcoded lock that has a specialised number to it that should be changed on a regular basis to ensure that maximum security measures are enforced.
                    2. Security Guards
                      1. A security guard can be used to ensure that no intruders bypass the area. However, this is not always the best method as it costs a lot of money to pay for the guard's wages.
                    3. Software
                      1. Anti-virus software
                        1. Used to scan the computer on a regular basis to ensure that a virus isnt on the computer.
                        2. Encryption
                          1. Widely used to ensure that data that is transmitted on a network cannot be stolen by hackers.
                    Show full summary Hide full summary

                    Similar

                    Weimar Revision
                    Tom Mitchell
                    Biology Revision - Y10 Mock
                    Tom Mitchell
                    Hitler and the Nazi Party (1919-23)
                    Adam Collinge
                    Enzymes and Respiration
                    I Turner
                    GCSE Biology AQA
                    isabellabeaumont
                    Physics Revision
                    Tom Mitchell
                    GCSE Biology B2 (OCR)
                    Usman Rauf
                    Maths GCSE - What to revise!
                    livvy_hurrell
                    Ionic Bondic Flashcards.
                    anjumn10
                    Electrolysis
                    lisawinkler10
                    Forces and their effects
                    kate.siena