SlideShare a Scribd company logo
METHODS
  USE TO
 ENHANCE
THE VALUE
Either way, organisations cannot
function without accurate information,
and they do not want unauthorized people
getting into the system and changing
information .

In addition, much of this data is used in
the organisations decision making and
problem solving .
Organizations need to secure not only
their data but also the systems on which the
data is stored.

They need protection from natural
disasters acts of sabotage, theft and
unlawful access.
ACCESS
CONTROL
Organisations generally protect their
hardware and software by restricting access
to the areas in which the computer itself.

This is sometimes done by means of doors
that cannot be opened without a PIN, this
number being known only by certain people.
Encryptio
n
  Is the transforming of normal text,
  which can be read by all, into
  something that requires a code or
  decryption key.
Symmetric encryption

  Is the traditional encryption method
   and relies on both the sender and the
   receiver of a message knowing the
   key.
  How ever, if a key is used by two
   people who are considerable distance
   apart, then at some stage the key must
   be transmitted to the receiver.
Asymmetric or public key
encryption of encryption uses different
  This kind
   keys to encrypt and decrypt.
  This system gives all users a public
   key that all know and can use and a
   private key that is secret.
  A message is encrypted using the
   public key and the private key is used
   to decrypt the message.
  At no point is the private key
PASSWORD
  Most organization use a password
   system that requires a user to enter
   a name and password to log on the
   system.
  This system of identification and
   access control is also adopted in
   networks giving each user different
   privileges.
  Passwords can also be used on
ACCESS CARDS
  By using swipe cards and
   proximity cards, employees can
   gain access to buildings and
   specialized areas, depending on
   the privileges allowed by that
   card.
ACTIVE BADGES
  Active badges restrict access by
   tracking an employee’s location
   using their badge.
  Employees and their whereabouts
   can be monitored by a central
   system that knows where they are
   at any given time.
FIREWALLS
  Are type of software designed to
   protect files and data from
   unauthorized, external access of a
   network through the internet.
  Firewalls have a range of features,
   including access control through
   passwords and encryption, and a log
   that records all unauthorized access
BIOMETRICS
 Refers to the automatic identification
  of a person based on a certain
  physiological        or     behavioral
  characteristics.
 This method is growing in popularity
  over the above methods because the
  person to be identified is required to
  be physically present at the point of
 By replacing PIN’s and passwords with
  biometrics techniques, the risk of
  unauthorized access and fraudulent use
  is decreased.
 Biometric identification can be applied
  to a range of technology, such as
  ATM’s’ mobile phone phones, smart
  cards and desktop computers.
AN AUTOMATED
  BIOMETRIC
  DEVICE HAS
 THREE MAJOR
1.A mechanism to scan and capture an
  image of the characteristics
2. compression,       processing      and
  comparison of the image
3. an interface with application system
OTHER
BIOMETRIC
METHODS:
 voice- matches the sound patterns of
 someone speaking their name or
 passwords to those file.

 facial identification- converts a facial
 image on video to a digital one and
 compares it with one on file.

 fingerprints- compares the ridges on
 fingers with those in a central database.

 palm prints- compares the ridges on a
 hand veins- scans the vein pattern on
 the back on the hand

 handwriting    acoustic emissions-
 analyses sounds generated with
 someone signs their name

 iris- a video image of the coloured
 part of the eye is mapped by the
 computer and each person is given an
 individual code based on their iris
The end!!!!
Presented by:
         Mary Jesette E. Penaojas
         BLIS-III

                                    Presented to:
                                             Mrs. Sheryl C. Farquerabao

More Related Content

What's hot

Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
lapao2014
 
SolusDeck
SolusDeckSolusDeck
SolusDeck
andreeabrodo
 
Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)
Ali Raw
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
LeMeniz Infotech
 
Layers of control
Layers of controlLayers of control
Layers of control
Rebecca Jones
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
LeMeniz Infotech
 
Personal Data Protection
Personal Data ProtectionPersonal Data Protection
Personal Data Protection
CreatorsCircle
 
Passwords are everywhere these days
Passwords are everywhere these daysPasswords are everywhere these days
Passwords are everywhere these days
EssaysREasy
 
Mit project
Mit projectMit project
Mit project
Awhydot
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to Solus
Solus
 
Biometrics n authentication divices kerja khursus
Biometrics n authentication divices kerja khursusBiometrics n authentication divices kerja khursus
Biometrics n authentication divices kerja khursus
SMK Hamid Khan Tapah
 
Nfc
NfcNfc
Electronic Authentication More Than Just A Password
Electronic Authentication More Than Just A PasswordElectronic Authentication More Than Just A Password
Electronic Authentication More Than Just A Password
Nicholas Davis
 
Arkami product overview
Arkami product overviewArkami product overview
Arkami product overview
Mark Thacker
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
Randy Vicky
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
IJSRD
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
Hai Nguyen
 
Android security a survey of issues, malware penetration, and defenses
Android security a survey of issues, malware penetration, and defensesAndroid security a survey of issues, malware penetration, and defenses
Android security a survey of issues, malware penetration, and defenses
LeMeniz Infotech
 
Advanced authentication scheme using a Predefined Keystroke Structure
Advanced authentication scheme using a Predefined Keystroke StructureAdvanced authentication scheme using a Predefined Keystroke Structure
Advanced authentication scheme using a Predefined Keystroke Structure
ijcsit
 
Keystroke Dynamics Support For Authentication
Keystroke Dynamics Support For AuthenticationKeystroke Dynamics Support For Authentication
Keystroke Dynamics Support For Authentication
Mayank Sachan
 

What's hot (20)

Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
 
SolusDeck
SolusDeckSolusDeck
SolusDeck
 
Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
 
Layers of control
Layers of controlLayers of control
Layers of control
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
 
Personal Data Protection
Personal Data ProtectionPersonal Data Protection
Personal Data Protection
 
Passwords are everywhere these days
Passwords are everywhere these daysPasswords are everywhere these days
Passwords are everywhere these days
 
Mit project
Mit projectMit project
Mit project
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to Solus
 
Biometrics n authentication divices kerja khursus
Biometrics n authentication divices kerja khursusBiometrics n authentication divices kerja khursus
Biometrics n authentication divices kerja khursus
 
Nfc
NfcNfc
Nfc
 
Electronic Authentication More Than Just A Password
Electronic Authentication More Than Just A PasswordElectronic Authentication More Than Just A Password
Electronic Authentication More Than Just A Password
 
Arkami product overview
Arkami product overviewArkami product overview
Arkami product overview
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
 
Android security a survey of issues, malware penetration, and defenses
Android security a survey of issues, malware penetration, and defensesAndroid security a survey of issues, malware penetration, and defenses
Android security a survey of issues, malware penetration, and defenses
 
Advanced authentication scheme using a Predefined Keystroke Structure
Advanced authentication scheme using a Predefined Keystroke StructureAdvanced authentication scheme using a Predefined Keystroke Structure
Advanced authentication scheme using a Predefined Keystroke Structure
 
Keystroke Dynamics Support For Authentication
Keystroke Dynamics Support For AuthenticationKeystroke Dynamics Support For Authentication
Keystroke Dynamics Support For Authentication
 

Viewers also liked

Library orientation
Library orientationLibrary orientation
Library orientation
10-30-06
 
Dmbbb
DmbbbDmbbb
Dmbbb
10-30-06
 
Mj
MjMj
Readers advisory services final
Readers advisory services finalReaders advisory services final
Readers advisory services final
10-30-06
 
Emjheiy
EmjheiyEmjheiy
Emjheiy
10-30-06
 
Readers advisory services_in_public_libraries
Readers advisory services_in_public_librariesReaders advisory services_in_public_libraries
Readers advisory services_in_public_libraries
10-30-06
 
Historical background
Historical backgroundHistorical background
Historical background
10-30-06
 
Lib.instruction
Lib.instructionLib.instruction
Lib.instruction
10-30-06
 

Viewers also liked (8)

Library orientation
Library orientationLibrary orientation
Library orientation
 
Dmbbb
DmbbbDmbbb
Dmbbb
 
Mj
MjMj
Mj
 
Readers advisory services final
Readers advisory services finalReaders advisory services final
Readers advisory services final
 
Emjheiy
EmjheiyEmjheiy
Emjheiy
 
Readers advisory services_in_public_libraries
Readers advisory services_in_public_librariesReaders advisory services_in_public_libraries
Readers advisory services_in_public_libraries
 
Historical background
Historical backgroundHistorical background
Historical background
 
Lib.instruction
Lib.instructionLib.instruction
Lib.instruction
 

Similar to Methods

Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
Sampat Patnaik
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
nayakslideshare
 
Computing safety ryr
Computing safety ryrComputing safety ryr
Computing safety ryr
ryrsyd
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
SonuSawant
 
It security
It securityIt security
It security
avi2607
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET Journal
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET Journal
 
Biometrics
BiometricsBiometrics
Biometrics
Priyanka Sharma
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
Vuda Sreenivasarao
 
Biometrics
BiometricsBiometrics
Biometrics
Shivani Gautam
 
Physical Security and Digital Security
Physical Security and Digital SecurityPhysical Security and Digital Security
Physical Security and Digital Security
PLN9 Security Services Pvt. Ltd.
 
Location based authentication new words approch secuirity
Location based authentication new words approch secuirityLocation based authentication new words approch secuirity
Location based authentication new words approch secuirity
Sarath K
 
Physical Security and Digital Security
Physical Security and Digital SecurityPhysical Security and Digital Security
Physical Security and Digital Security
PLN9 Security Services Pvt. Ltd.
 
Recognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docxRecognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docx
danas19
 
Biometrics
BiometricsBiometrics
Biometrics
shweta-sharma99
 
Biometrics
BiometricsBiometrics
Biometrics
shweta-sharma99
 
Data security
Data securityData security
Data security
Soumen Mondal
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect Design
Rajat Jain
 
CHAPTER 7 Authentication and Authorization On
CHAPTER  7 Authentication and Authorization OnCHAPTER  7 Authentication and Authorization On
CHAPTER 7 Authentication and Authorization On
MaximaSheffield592
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
Deepák Soni
 

Similar to Methods (20)

Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
 
Computing safety ryr
Computing safety ryrComputing safety ryr
Computing safety ryr
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
It security
It securityIt security
It security
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Biometrics
BiometricsBiometrics
Biometrics
 
Physical Security and Digital Security
Physical Security and Digital SecurityPhysical Security and Digital Security
Physical Security and Digital Security
 
Location based authentication new words approch secuirity
Location based authentication new words approch secuirityLocation based authentication new words approch secuirity
Location based authentication new words approch secuirity
 
Physical Security and Digital Security
Physical Security and Digital SecurityPhysical Security and Digital Security
Physical Security and Digital Security
 
Recognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docxRecognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Data security
Data securityData security
Data security
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect Design
 
CHAPTER 7 Authentication and Authorization On
CHAPTER  7 Authentication and Authorization OnCHAPTER  7 Authentication and Authorization On
CHAPTER 7 Authentication and Authorization On
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 

Recently uploaded

Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 

Recently uploaded (20)

Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 

Methods

  • 1. METHODS USE TO ENHANCE THE VALUE
  • 2. Either way, organisations cannot function without accurate information, and they do not want unauthorized people getting into the system and changing information . In addition, much of this data is used in the organisations decision making and problem solving .
  • 3. Organizations need to secure not only their data but also the systems on which the data is stored. They need protection from natural disasters acts of sabotage, theft and unlawful access.
  • 5. Organisations generally protect their hardware and software by restricting access to the areas in which the computer itself. This is sometimes done by means of doors that cannot be opened without a PIN, this number being known only by certain people.
  • 6. Encryptio n Is the transforming of normal text, which can be read by all, into something that requires a code or decryption key.
  • 7. Symmetric encryption  Is the traditional encryption method and relies on both the sender and the receiver of a message knowing the key.  How ever, if a key is used by two people who are considerable distance apart, then at some stage the key must be transmitted to the receiver.
  • 8. Asymmetric or public key encryption of encryption uses different  This kind keys to encrypt and decrypt.  This system gives all users a public key that all know and can use and a private key that is secret.  A message is encrypted using the public key and the private key is used to decrypt the message.  At no point is the private key
  • 9. PASSWORD  Most organization use a password system that requires a user to enter a name and password to log on the system.  This system of identification and access control is also adopted in networks giving each user different privileges.  Passwords can also be used on
  • 10. ACCESS CARDS  By using swipe cards and proximity cards, employees can gain access to buildings and specialized areas, depending on the privileges allowed by that card.
  • 11. ACTIVE BADGES  Active badges restrict access by tracking an employee’s location using their badge.  Employees and their whereabouts can be monitored by a central system that knows where they are at any given time.
  • 12. FIREWALLS  Are type of software designed to protect files and data from unauthorized, external access of a network through the internet.  Firewalls have a range of features, including access control through passwords and encryption, and a log that records all unauthorized access
  • 13. BIOMETRICS  Refers to the automatic identification of a person based on a certain physiological or behavioral characteristics.  This method is growing in popularity over the above methods because the person to be identified is required to be physically present at the point of
  • 14.
  • 15.  By replacing PIN’s and passwords with biometrics techniques, the risk of unauthorized access and fraudulent use is decreased.  Biometric identification can be applied to a range of technology, such as ATM’s’ mobile phone phones, smart cards and desktop computers.
  • 16. AN AUTOMATED BIOMETRIC DEVICE HAS THREE MAJOR
  • 17. 1.A mechanism to scan and capture an image of the characteristics 2. compression, processing and comparison of the image 3. an interface with application system
  • 19.  voice- matches the sound patterns of someone speaking their name or passwords to those file.  facial identification- converts a facial image on video to a digital one and compares it with one on file.  fingerprints- compares the ridges on fingers with those in a central database.  palm prints- compares the ridges on a
  • 20.  hand veins- scans the vein pattern on the back on the hand  handwriting acoustic emissions- analyses sounds generated with someone signs their name  iris- a video image of the coloured part of the eye is mapped by the computer and each person is given an individual code based on their iris
  • 21.
  • 22.
  • 23.
  • 24. The end!!!! Presented by: Mary Jesette E. Penaojas BLIS-III Presented to: Mrs. Sheryl C. Farquerabao