Transcript: Victoria, Jorge, Carmen y Mary SECURITY SYSTEM Characteristics Characteristics of the hotel Location The Corona de Granada is a four stars hotel, and it is located in the city center of Granada, on Pedro Antonio de Alarcón street, 10 Facilities The hotel has 5 floors and 121 rooms. -Parking - Solarium - Restaurant - Banquet room - Bar - Meeting room - Laundry - Business center - Swimming pool - 2 Lifts - Safe-deposit box - Squash court Security systems Its objective is to guarantee the protection of people, properties and normal operation of the services of the Hotel. FIRE ALARMS AND SMOKE DETECTORS To detects fires and warns the guests and the staff of the presence of fire. Smoke detector in the corridor, facilities and rooms Alarm button in all the facilities FIRE EXTINGUISHERS Hotel corridors and facilities equipped with fire extinguishers and fire hydrants. All rooms and corridors equipped with sprinklers. To extinguish fires to avoid material and personal losses. CAMERAS System of surveillance by cameras in the accesses and corridors. Video surveillance system in the hotel lobby and parking To supervise the work of the employees, the behavior of the clients, and to prevent crimes. SIGNS To guide guests in case of emergency to the exits, and inform them about the location of the fire-fighting equipment. The hotel has emergency lights Emergency exits in each floor properly signalized Evacuation plan map in each room and facilities Extinguishers, fire hydrants and alarm button properly placed LOCKS To avoid that other people enter the rooms. Room doors that close automatically Door with security lock in all rooms SAFES To protect confidential documents, valuable objects and money. Safe deposit box in the rooms Hotel's general safe deposit box OTHERS Emergency power generator Seismograph Firebreak doors First aid kit Emergencies and security equipment Security equipments are the set of tools and people specially trained and organized for the prevention and action in case of accidents. Emergencies and security equipment Possibles contingencies In Corona of Granada we have several types of risk, below we will name some of them: Earthquake Gas Leakage Assault Fire Fire extinguisher (A,B,C,F,D) Smoke detectors (ionic or optical) Fire sprinklers Alarm button Fire hydrant Firebreak doors Emergency exit Seismograph Gas detector Cameras Signs Locks First aid kit We have many tools to avoid or combat the contingencies that may occur in our hotel Security equipment In case of fire: We use fire extinguishers, smoke detectors, fire sprinklers, alarm button, fire hydrant, firebreak doors, emergency exit, signs. In case of assault: We have locks, cameras and the security staff. In case of gas leakage: We use gas detector, the alarm buttons, the emergency exits and all the signs. In case of earthquake: Seismographs detect the emergency, we will follow the emergency exits and signs. Relation between them Types of Security Staff Elements of the security system Off-Duty Police Contract Security In-House Security Different Possibilities Security Guards Service Assistant Head of Security Chief Security Manager Alarm and Evacuation Team Main duties First Intervention Team First Aid Team Second intervention Team Chief Security Manager Evacuation Plan Evacuation plan Evacuation it is the action of moving victims from a dangerous place to a safe one. The alarm transmission A siren alarm starts sound when the evacuation would be ordered. The alarm will be different to the fire alarm with a specific tone and cadence. The alarm transmission It will be taken by the Emergency Manager after to be informed by the chief security manager Use sentences as “…We have an emergency, get everybody out from here” . The order The order The maximum time to evacuate all the building will be 24 minutes. Each floor must be evacuated in 4 minutes. And the maximum duration to evacuate all hotel installations is 30 minutes. The evacuation ways are always the stairs and the emergency exits. The evacuation ways Evacuation ways According to the security normative, all the evacuation maps must be visible in main areas, corridors and in each room. The evacuation map Evacuation map There is only a meeting point and it is 300 meters from the building, in Alhamar Street´s square. The meeting points The meeting points Keep calm. Don´t run. Don't use the elevators and the services lifts. Follow always the evacuation team´s instructions. Follow the direction of the emergency exit arrows. Don't try to return in any case. Go to the meeting point. Basic guidelines The guidelines
Transcript: Create a programmed digital circuit that only the user will access the box using tools and quality materials with an appropriate cost for good security in each box . SPECIFIC GOAL They also have adjustable legs and hidden standard key lock or padlock. Do well in the box is safe but sometimes these forced coveted locks or padlock that has gripped the locks broken and is outside do so in this way that the box that unsafe and your appointment one theft in the box do well in that the person who lost their property ent the deposit in said box JUSTIFICATION CONCLUTION Use seen our basic knowledge of our specialty area for a good functioning of our project Safeguard modern and safe goods , information and areas for greater comfort and benefit people . Provide better security and tranquility in the students when the store belongings Update the old locks using analog to digital system and the safety of belongings To improve system security lockers college making them safer against theft and facilitating the use of these users avoiding the problems of loss of keys and break the locks failing . Also facilitate control of lockers apartment manager if you do not renew the service box is blocked them with another code . This project will address the problem of distrust and system security locker Technological University of Tabasco implementing a circuit made up of students from the university with high-tech electronic materials to ensure optimal use of the project. security system GENERAL PURPOSE RESULTS BACKGROUND Lockers have been a means to give them security to students and that the store their personal belongings for use in training cycles of middle and upper level. student hairdresser, art, mechanics, catering, etc. They are required for books, tools, folders, etc. Its versatility is that it can be supplied different heights to put under a window or depending on the number of students these are created with blocks of sheet 0.8 mm thick with corrosion epoxy paint finish are glued on top of each other with tape double-sided. The base, however, is riveted to the front row of lockers. INNOVATION The first innovation is to implement the box it will be used with electric current of 9 v for the operation of the lock The second innovation an alarm for when they try to put several times the wrong password is activated and notified be added. And the latest innovation is to be opened by a Arduino to be used by a hexadecimal keyboard. Thank you! Using technology developed the prototype of a school locker electronic locks , that dare a keyboard and a security code gives us greater security against any attack on our personal belongings , so we substitute the use of padlocks and traditional braces , making this a most practical way to take care of your belongings.
Transcript: Risky Business Natalia Grossa Divina Rayos Michelle Danielczok Carson Heinzel Zach Wallace Introduction Introduction Cybersecurity is the technologies, processes and practices that protects networks and computers from attacks and unauthorized access Any business, small or large, is at risk for a cyberattack Cybersecurity protects the information of both the customer and the business and is essential to any business plan Defends against ransomware, viruses, spyware, malware and other online threats Helps protect your finances, privacy and personal information every time you go online Utilizes one of the largest global civilian intelligence networks to spot threats faster What does it do? What does it do? Products/costs Products/costs Basic Standard Deluxe Premium $29.99 $39.99 $49.99 $54.99 1 PC 1 PC, 1 Mac or 1 mobile device Up to 5 PCs, Macs, smartphones or tablets Up to 10 PCs, Macs, smartphones or tablets Why Norton ? Why did we pick Norton Securty? It's the most commonly used software from our generation It's been around for more than 20 years It has a 100% money back guarantee You can buy a protection plan for up to 10 computers It has gained mutiple awards for its high performance How small and midsized businesses can use Norton How can it be applied to SMB? You can use this software for 1-10 different computers It's inexpensive to use Offers same protection as it would for a Fortune 500 company 24/7 support Cloud based, no need for server hardware Conclusion Takeaway Cyber security is an essential part of keeping a business running Keeping your customers' private information secure helps build a solid reputation as a safe place to do business Some businesses also have trade secrets that need to be kept out of the hands of competitors We decided that Norton would be a good fit for a small starting business because it is very affordable Norton provides some of the strongest cyber security available
Transcript: Value Chain Introduction The Security Systems Firm Porter's Five Forces Strategy The Firm's Environment Environmental Analysis Activities Resources Capabilities P-E-S-T-L
Transcript: Noninvertible transform 2 Advantages Direct key generation from biometrics is an appealing template protection approach which can also be very useful in cryptographic applications. 7 Biometrics — the automated recognition of people via distinctive anatomical and behavioral traits. a feature transformation approach 5 Enrollment-Template-Algorithm-Verification TEMPLATE PROTECTION SCHEMES 9 Key-binding biometric cryptosystem Advantages Introduction of key results in low false accept rates. Since the key is user-specific, multiple templates for the same user biometric can be generated by using different keys (allowing diversity). Also in case a template is compromised, it is easy to revoke the compromised template and replace it with a new one generated by using a different user-specific key (allowing revocability). Key generating biometric cryptosystem Advantages (1) Since it is hard to recover the original biometric template even when the key is compromised, this scheme provides better security than the salting approach. (2) Diversity and revocability can be achieved by using application-specific and user-specific transformation functions, respectively. 1 18 3 4 Information Systems Security Advantages This approach is tolerant to intrauser variations in biometric data and this tolerance is determined by the error correcting capability of the associated codeword. Biometric Template Security Salting 16 Limitations The main drawback of this approach is the trade off between discriminability and noninvertibility of the transformation function. BIOMETRIC SYSTEM VULNERABILITY Ratha et al proposed and analyzed three noninvertible transforms for generating cancelable fingerprint emplates. The three transformation functions are cartesian, polar and functional. Limitations It is difficult to generate key with high stability and entropy. one-way function Limitations Matching has to be done using error correction schemes and this precludes the use of sophisticated matchers developed specifically for matching the original biometric template. This can possibly lead to a reduction in the matching accuracy. In general, biometric cryptosystems are not designed to provide diversity and revocability. However, attempts are being made to introduce these two properties into biometric cryptosystems mainly by using them in conjunction with other approaches such as salting. The helper data needs to be carefully designed; it is based on the specific biometric features to be used and the nature of associated intrauser variations. Enrollment-Template-Algorithm-Verification 12 use key to increases the entropy of the biometric template helper data = key + biometric template Tài liệu tham khảo : 2008-Biometric Template Security 6 Categorization of template protection schemes. Problem with encrypted form (using standard encryption techniques like RSA, AES, etc.) 15 INTRODUCTION. BIOMETRIC SYSTEM VULNERABILITY. TEMPLATE PROTECTION SCHEMES. IMPLEMENTATION OF TEMPLATE SECURITY APPROACHES. INTRODUCTION 11 Các yêu cầu chính : Diversity (đa dạng) Revocability ( có thể huỷ bỏ) Security (bảo mật) Performance (hiệu suất) 3 14 19 secure sketch and fuzzy extractor Outline 2 17 The End ! 13 10 Limitations If the user-specific key is compromised, the template is no longer secure, because the transformation is usually invertible, that is, if an adversary gains access to the key and the transformed template, she can recover the original biometric template. Sincematching takes place in the transformed domain, the salting mechanism needs to be designed in such a way that the recognition performance does not degrade, especially in the presence of large intrauser variations. INTRODUCTION 4 Biometrics — the automated recognition of people via distinctive anatomical and behavioral traits. 8 GVHD : Nguyễn Thị Ái Thảo Sinh viên : Trương Huỳnh Tiến 51103617 Nguyễn Huy Khánh 51201637 Thank you !
Transcript: MOST POPULAR PASSWORDS COMPUTER FIREWALL INTERNET SECURITY SECURITY OR ELSE YOUR DEVICE COULD TURN INTO A: https://prezibase.com Having your identity stolen.... It might just happen with 1 wrong click! A computer firewall controls access between networks. It generally consists of gateways and filters which vary from one firewall to another. Firewalls also screen network traffic and are able to block traffic that is dangerous. is a branch of computer security specifically related to the Internet, often involving browser security but also network security on a more general level as it applies to other applications or operating systems on a whole. Its objective is to establish rules and measures to use against attacks over the Internet. Cloud storage is a model of data storage where the digital data is stored in logical pools, the physical storage spans multiple servers and the physical environment is typically owned and managed by a hosting company PREZI TEMPLATE ZOOM IN FOR MORE DETAILS ALL SEPARATED DESIGN ELEMENTS: Get this Prezi Template from: EMAIL SECURITY CLOUD STORAGE Trojan-Spy.HTML.Fraud.gen remained the most popular malicious program spread by email in 2014. This malicious program is designed to look like an HTML page used as a registration form for online banking services. It is used by phishers to steal financial information. Zoom in to show the details INSERT IMAGES OR VIDEOS CHANGE THE LAYOUT AND ADD COLORS BE SURE TO FOLLOW ALL THE INTERNET SAFETY RULES! "password" 9% 1 5% "qwerty" "monkey" 4% 8% "123456" BRAINS...
Transcript: Attractions Festivals Cruises Smart Card Technology doodles Security and Biometrics San Francisco Travel Trade Cloud Computing Conferences & Meetings A) Credit Not Processed B) Card Not Processed C) Card Not Present D) Credit Not Present Panic-Bar Bolt Doors Credit Card Security Attractions Stockholm Current State & Trends (cc) photo by jimmyharris on Flickr What fingerprint system does Canada's transport department use? A) Passive, aggressive, hard B) Passive, active, hard C) Soft, active, hard D) Passive, active, solid Cruises The three levels of security in hotels are: Attractions Airport Security Procedures In-Room Safes Metal Detector-body Hand-held metal sensor-body X-Ray for bag Three Levels Fire Safety photo frame (cc) photo by Metro Centric on Flickr Railway Ticket Process: 1. Order from 2. Get reference number 3. Leave fingerprint 4. Data in system 5. Get your ticket with fingerprint Result: 1.Ticket save 2.Control buying Behavior more sequence Assets Special Events Cruises Important Details electrionic system no paper inkless save cost Attractions, Conferences & Events Information Systems Successful National & International Airport - Security Cameras - Restricted Areas - Baggage Screening - Security Checkpoints - Full Body Metal Detectors - Security is High, just like Airports Festivals Singarport (cc) photo by Metro Centric on Flickr Conferences & Meetings T.V. Visitor Screens T/F Conferences & Meetings A benefit of using fingerprint scanning to buy the railway ticket is that it saves costs. AIRPORT SECURITY notes Budapest Research A) Transport Canada Manual Fingerprint System B) Department of Transport Canada Automated Fingerprint System C) Transport Canada Automated Fingerprint System D) None of the above - Fingerprint Scanning - Metal Dectectors - Hand Stamps - Security Cameras Notes Festivals (cc) photo by Franco Folini on Flickr - Security Cameras - Security Guards - Bag/Purse Checks Special Events Double click to crop it if necessary Fingerprint Facial images Demographic data Personal history information US-fingerprint system Internet Security The term CNP stands for: - Security Cameras - Bag/Purse Checks - Security is low - Security Guards - Bag/Purse Checks Special events have fingerprint scanners as a measure of security. T/F - Fingerprint Scanning - Metal Dectectors - Hand Stamps - Security Cameras outlook Transport Canada Automated Fingerprint System Special Events fingerprint usp Travel Transactions Video Surveillance Place your own picture behind this frame! details Identity Theft Hotels & Resorts map Transportation Computerized Electronic Key Card Locking System Brainstorming
Transcript: What Happens when an intrusion occurs? What is security system Different ways of security system Security System Numerous studies show homes without security systems, when compared to those with professionally monitored systems, are up to three times more likely to be burglarized because burglars are opportunistic by nature and are on the hunt for easy targets. What is the usage of security system They typically feature a touchpad for easy programming and interaction, is where pass codes are entered to arm and disarm the system, can work on voice commands, and can be programmed to work with wireless remote controls called key fobs. Security systems are designed to perform certain tasks when a secured zone is breached. What your security systems does in the event of an intrusion depends on the type of system you're using. security alarm is a system designed to detect intrusion – unauthorized entry – into a building or area. Security alarms are used in residential, commercial, industrial, and military properties for protection against burglary (theft) or property damage, as well as personal protection against intruders. Car alarms likewise protect vehicles and their contents. Prisons also use security systems for control of inmates. Door and window sensors are comprised of two parts installed adjacent to each other. One part of the device is installed on the door or window and the other on the door frame or window sill. When a door or window is closed, the two parts of the sensor are joined together, creating a security circuit. Security systems are designed to... How does a security system work? We can use it in our homes . Home security systems work on the simple concept of securing entry points into a home with sensors that communicate with a control panel or command center installed in a convenient location somewhere in the home. The sensors are typically placed in doors that lead to and from a house as well as easily accessible windows, particularly any that open, especially those at ground level. Open spaces inside of homes can be secured with motion sensors. Security System in homes security system ? The control panel is the computer that arms and disarms the security systems, communicates with each installed component, sounds the alarm when a security zone is breached, and communicates with an alarm monitoring company. Door and Window Sensors: CONTROL PANAL: What are advantages of having a home security system?
Description: Show the big picture, zoom in on details, and explain clearly how it all relates with this Prezi executive brief or Prezi nonprofit template. The lively image and bold colors make it easy to create compelling, engaging executive brief or nonprofit presentations.
Description: A well-organized training presentation template is a critical tool for education professionals. From roadmaps to reviews, this training template will help you take your next EDU training presentation to the top of the class.
Description: A well-organized lesson plan is the difference between getting things done and things getting out of hand. This vibrant, customizable, easy-to-use Prezi presentation template features a sticky note theme, so you'll be able to keep track of topics, assignments, exams, and more without missing a beat.
Description: Stand far above the stacks and stacks of flat, boring resumes on any hiring manager’s desk with a Prezi resume template. Just customize this Prezi presentation template to create your very own “Prezume” and impress them with your dynamism, coolness, and originality.
Now you can make any subject more engaging and memorable