Search This Blog

Sunday, August 14, 2011

Different Types Security Technologies Sample Picture

Biometric

Encryption

Access Control Software

Firewall




all images are credited from google

Security Technologies

Biometrics





Biometrics (or biometric authentication) consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In computer science, in particular, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance.



My Experience:





When I worked in Ortigas, as a Call Center Agent, in Global -Sky, Inc. that was my first time I used the biometric. We are using that whenever we log in or enter in the office, whenever we have breaks and every time we log out or end of our shift. That biometrics helps the Finance officer to determine what time we log in and what time we log out.







Encryption



Encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encryptedinformation (in cryptography, referred to as ciphertext). In many contexts, the word encryption also implicitly refers to the reverse process,decryption (e.g. “software for encryption” can typically also perform decryption), to make the encrypted information readable again (i.e. to make it unencrypted).

credit from youtube


Firewall


firewall is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass.

credit from google



Access Control Software







Access control is a system that enables an authority to control access to areas and resources in a given physical facility or computer-based information system. An access control system, within the field of physical security, is generally seen as the second layer in the security of a physical structure.

Tuesday, July 5, 2011

computers

Hacking is a form of subversion or stretching of the capability or purpose of various systems. Hacker is the one who creating a program that can harm some gadgets particularly in computers.A hacker is a person who breaks into computers and computer networks for profit, in protest, or because they are motivated by the challenge.

                                                                      credit from youtube.com

Sunday, June 19, 2011

The relationship of law, ethics and computer technology

Law is defined as a backed by the power of the state to compel, to punish and coerce compensation of loss.The law is the written agreement that we have as a society that dictates appropriate and acceptable conduct we display toward each other. It is said as the foundation of our society and can only exist as an entity and rule if we all agree to abide and maintain its very existence.
http://www.hlhlc.com/eng/images/law_books.png

http://youngtokd.blogspot.com/2010/02/tok-blog-project.html
Ethics are principles of conduct which cultures generally agree upon ... Says that there is no state coercion involved if you don't behave in accordance with the standards




Computer Technology

A computer is a programmable machine designed to sequentially and automatically carry out a sequence of arithmetic or logical operations. The particular sequence of operations can be changed readily, allowing the computer to solve more than one kind of problem.
http://www.dreamstime.com/stock-image-computer-technology-image8145551
The first electronic computers were developed in the mid-20th century (1940–1945). Originally, they were the size of a large room, consuming as much power as several hundred modern personal computers (PCs).[1]