3. introduction
W will learn how to build a face recognition system using computer vision in
Python. Face recognition is an image classification problem and is a step
further to face detection. In face detection, we only detect the location of
the human face in an image, but in the face recognition classifier, we make a
system that can identify humans.
4.
5. Record management in cyber security is the process of
creating, storing, and managing digital records in a
secure and organized manner. This includes ensuring
that records are properly classified, stored, and
protected from unauthorized access or modification. It
also involves regularly auditing and monitoring records
to ensure their accuracy and integrity.
6. Different Types of Security In Records Management
Security threats in records
management come from all
directions ranging from malware
and data breaches to theft, fire,
or flood, making it essential to
incorporate multiple types of
security in records management.
7. Locked Storage Areas
Using locks in storage areas like filing
cabinets is the first and easiest method for
securing paper files. By keeping them
locked it will keep prying eyes away and the
records safe from theft.
8. Fire and Flood Protection
Although natural disasters are still
a risk to filing cabinets in an office
even if they’re locked, off-site
records storage facilities use fire-
suppression and climate-control
systems to protect from natural
disasters.
9. In addition to natural disaster
protections, off-site storage facilities
also implement securities like 24/7
video monitoring, locked premises,
and on-site security staff.
Secure Storage Facilities
10. ACLs are used for limiting access to
sensitive files for only those who
need it. Predefined lists with
authorized users can be configured
while any other prying eyes are
locked out.
Access Control Lists (ACL)
11. Why Using Different Security
Types Is Important
Organizations face a range of
security threats that come from all
different angles, including:
•Employee theft and misuse of
information
•Fire, flood, and other natural disasters
•Data breaches caused by viruses,
trojans, and other forms of malware
12. Ultimately, Records Management
ensures that institutional records
of vital historical, fiscal, and legal
value are identified and
preserved, and that non-essential
records are discarded in a timely
manner according to established
guidelines and identified
legislation.
why is records management important