access method. “ ” a key is usually intended to operate one specific lock or a small number of...

21
Access Method

Upload: hortense-oconnor

Post on 17-Jan-2016

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Access Method. “ ” A key is usually intended to operate one specific lock or a small number of locks that are keyed alike, so each lock requires a unique

Access

Method

Page 2: Access Method. “ ” A key is usually intended to operate one specific lock or a small number of locks that are keyed alike, so each lock requires a unique

A key is usually intended to operate one specific lock or a small number of locks that are keyed alike, so each lock requires a unique key. The key serves as a security token for access to

the locked area; only persons having the correct key can open the lock and gain access.

Lock and Key Security

Page 3: Access Method. “ ” A key is usually intended to operate one specific lock or a small number of locks that are keyed alike, so each lock requires a unique

Those are often used in conjunction with staff ad visitor identification systems . Ins

teats of using key to access area of building, the system relies on personnel using swap

cared or dongles as key . For example, using swipe card to get access on IT room.

Sign In and Sign Out

Page 4: Access Method. “ ” A key is usually intended to operate one specific lock or a small number of locks that are keyed alike, so each lock requires a unique

The technology of biometrics is constantly being developed and refined . Common

technologies in current use are finger print recognition, retinal scans and voice

recognition.

Biometrics

Page 5: Access Method. “ ” A key is usually intended to operate one specific lock or a small number of locks that are keyed alike, so each lock requires a unique

Many organisation use visitor pass as a method of entry , with security and

reception personnel checking identification in entry. Visitor card are by their nature

temporary and indicate that the visitors has limited access right. .

Visitor Passes

Page 6: Access Method. “ ” A key is usually intended to operate one specific lock or a small number of locks that are keyed alike, so each lock requires a unique

”Other Access methods• Pin Lock.• Fob Key.•QI and Barcode scanner.• Password.•Magnetic Card.

Page 7: Access Method. “ ” A key is usually intended to operate one specific lock or a small number of locks that are keyed alike, so each lock requires a unique

WORK STATION

Page 8: Access Method. “ ” A key is usually intended to operate one specific lock or a small number of locks that are keyed alike, so each lock requires a unique

A workstation is simply a desktop computer terminal in which itis a lot

more powerful than a personal computer. It has been set up and

wired for one specific area/task. It is still connected to the network as well. It has the specific tools required for the tasks it’s assigned too that some other computers cannot complete.

Page 9: Access Method. “ ” A key is usually intended to operate one specific lock or a small number of locks that are keyed alike, so each lock requires a unique

Server

• A server can either be a computer or device on a network which is used to

manage network resources.

Page 10: Access Method. “ ” A key is usually intended to operate one specific lock or a small number of locks that are keyed alike, so each lock requires a unique

There are multiple types of servers, for example:

File server File server – a server that is used as a storage device. Anyone who is connected to the network will have access to the files in the server.

Page 11: Access Method. “ ” A key is usually intended to operate one specific lock or a small number of locks that are keyed alike, so each lock requires a unique

Web server Web server – a web server displays the content of the server by loading a file from a disk and serving it across the network to the requested person’s web browser. This exchange of information is controlled by the browser and the servers communicate using HTTP (Hypertext Transfer Protocol).

Page 12: Access Method. “ ” A key is usually intended to operate one specific lock or a small number of locks that are keyed alike, so each lock requires a unique

FTP server – FTP server – FTP (File Transfer Protocol) is used to transfer files between computers securely.

Page 13: Access Method. “ ” A key is usually intended to operate one specific lock or a small number of locks that are keyed alike, so each lock requires a unique

Servers can be a separate dedicated device or can be hosted on a computer. Having a dedicated device for a server is a major advantage over a computer server because the computer may get slowed down. Also, a dedicated server usually has more storage space compared to a computer as computers will have other non-server related files.

Page 14: Access Method. “ ” A key is usually intended to operate one specific lock or a small number of locks that are keyed alike, so each lock requires a unique

A dedicated server is similar to a computer as it contains RAM, a CPU and hard drives. However, dedicated servers are designed to process heavy-duty back-end tasks. This means that they are not suited to run normal desktop workload, an example of this is graphic heavy applications.

Page 15: Access Method. “ ” A key is usually intended to operate one specific lock or a small number of locks that are keyed alike, so each lock requires a unique

The CPU is a server is similar to that of a desktop. A server will usually have larger cache which means that data can be accessed quicker. Single core CPUs are sufficient for a small server which contains around 10 users. However, an upgrade to a dual core or quad core can greatly increase the processing power of the system.

Page 16: Access Method. “ ” A key is usually intended to operate one specific lock or a small number of locks that are keyed alike, so each lock requires a unique

Network Card

Page 17: Access Method. “ ” A key is usually intended to operate one specific lock or a small number of locks that are keyed alike, so each lock requires a unique

Network card

Page 18: Access Method. “ ” A key is usually intended to operate one specific lock or a small number of locks that are keyed alike, so each lock requires a unique

A network card is a kind of computer hardware which is an electronic device that connects a computer to a computer network. Mostly is the LAN to connects the network. Nowadays, majority of computers includes network cards to allow a computer to interchange data thru the network. Network cards contain a appropriate protocol. The physical layer and the data link layer are the first two layers of the OSI model and also network cards frequently tool it. Many network cards operate Ethernet on current days.

Page 19: Access Method. “ ” A key is usually intended to operate one specific lock or a small number of locks that are keyed alike, so each lock requires a unique

Network card for wireless networking

Least network cards do not operate a cable to connect to the network. People usually use wireless lan or wifi for a long distance. For over a short distance, bluetooth will be suitable for it.

Page 20: Access Method. “ ” A key is usually intended to operate one specific lock or a small number of locks that are keyed alike, so each lock requires a unique

NIC

• Similarly recognised as a NIC (Network Interface Card ), these cards connect straight into the motherboard of your computer and feature an outside network socket. This allows the computer to connect to a network via a network cable. Traditionally these network cards use the PCI slot on a motherboard, with fresher cards consuming a PCIe interface. Progressive features contain two or more network ports for specific applications. Note that network adaptors that convert a USB port into a network interface are also obtainable.

Page 21: Access Method. “ ” A key is usually intended to operate one specific lock or a small number of locks that are keyed alike, so each lock requires a unique

TP-Link 300Mbps Wireless N PCI Adapter (TL-WN851ND)

This PCI card employs MIMO technology and has two external detachable omni directional antennas providing excellent wireless performance.