Security

Institution Jomo Kenyatta University of Science and Technology
Course Information Technol...
Year 2nd Year
Semester Unknown
Posted By Jeff Odhiambo
File Type pptx
Pages
File Size 1.91 MB
Views 419
Downloads 0
Price: Buy Now whatsapp Buy via whatsapp
  • whatsapp
  • facebook
  • twitter

Description

This module focuses security cross-layer function of the cloud computing reference model. This module focuses on key security threats to a cloud infrastructure. It focuses on the various security mechanisms that enables the cloud service providers to mitigate these threats. Finally, this module focuses on the governance, risk, and compliance (GRC) aspect in a cloud environment.
Below is the document preview.

No preview available
UCI: DATA SECURITY AND CONTROL Trending!
Data & Information must be protected against unauthorized access, disclosure, modification or damage. This is because; it is a scarce & valuable resource for any business organization or government. It is mostly used in transactions, it can be shared, and has high value attached to it.
3654 Views 0 Downloads 177 KB
DATA AND COMPUTER SECURITY Trending!
Data and information must be protected against unauthorised access, modification or damage. this is because it is a scarce and valuable resource for any business organisation
No pages found 2352 Views 0 Downloads 1.47 MB
DATA SECURITY AND CONTROL
Data and information must be protected against unathorized access, modification or acces
No pages found 255 Views 0 Downloads 1.47 MB
SCS 436: INTERNAL CONTROL AND SECURITY ISSUES Trending!
Information Systems audit is the process of collecting and evaluating evidence to determine whether the information systems and related resources adequately safeguard assets, maintain data and system integrity, provide relevant and reliable information, achieve organizational goals effectively, consume resources efficiently, and have in effect internal controls that provide reasonable assurance.
4 Pages 2143 Views 0 Downloads 409.47 KB
APS 318: SECURITY PSYCHOLOGY Trending!
Security psychology is a term that brings together two important concepts being security and psychology. Security is a state of being protected or safe from harm (Merriam Webster). It is the degree of resistance to, or protection from, harm. A separation is created between the subject and the threat. Psychology is the scientific study of behaviour and mental processes in a context (Simons, Kalichman and Santrock, 1994, Santrock, 2006).
61 Pages 2086 Views 0 Downloads 1.92 MB
INFORMATION SECURITY AND PRIVACY NOTES Trending!
Information System is a particular discipline or branch of learning that is concerned with the application of information to organizational needs.
241 Pages 2382 Views 0 Downloads 3.82 MB
SECURITY ANALYSIS AND PORTFOLIO MANAGEMENT NOTES Trending!
In every economic system, some units which may be individual or institutions are surplus-generating, others are deficit-generating.
351 Pages 2568 Views 0 Downloads 2.72 MB
NTELLIGENT SYSTEMS APPLICATIONS FOR COMPUTER NETWORKS AND SECURITY
What is AI? The process of of simulating human consciousness and thinking, mainly used to research and develop technologies, theories and methods related to human behaviour and thinking. What are intelligent systems?. These are advanced computer systems that can gather, analyze and respond to the data it collects from surrounding environment.
11 Pages 1897 Views 0 Downloads 275.34 KB
DESIGN OF INFRARED BASED SECURITY ALARM- diploma electrical trade project Trending!
Technology development has made automation process simpler. The rise in population in the country increases demand for electrical knowledge, Security personnel and more application of electricity in their lives for better improvement and efficient services in homes and the country at large. The need of security is essential to human and living creatures. Considering the need of security we realized that the level of crimes such as theft is increasing, which causes poverty to low class people and class beings. Security is a vital tool in life as it helps people comfortably do business, live well hence encouraging investment the act of employing people to keep monitoring the area is expensive, Therefore a unit need to be designed to solve this problem. In considering the need of many I care up with infrared Based Security Alarm system which alerts one when the intruder interference with IR. i.e. when someone enters in a given area it turns on the security lamps and hence the Buzzer/ac alarm using Relay can produce sound hence detection at the intruder. Infrared based security alarm circuit an detect any movement trigger the alarm. THIS circuit is very useful in homes, banks, shops restricted areas where an alert alarm is needed on any movement. This circuit is based on IR sensor where an infrared beam is continuously falling on a photodiode and whenever this infrared beam breaks by any kind of movement alarm is triggered. Infrared sensor consist an infrared LED and photodiode in which IR LED emits infrared radiation and photodiode detects the radiation photodiode conducts current in reverse direction whenever light falls on it and voltages across it changes this voltages charge is sensed by voltages comparator i.e.(LM358) and generates output accordingly. In this infrared based security alarm circuit we have placed infrared LED in front of photodiode so that IR light can directly falls in photodiode. Whenever someone moves through this beam IR rays stop falling on photodiode and Buzzer start beeping . Buzzer automatically stops after sometimes as buzzer is connected to 55 timer in mono stable mode. OBJECTIVE Main objectives To design infrared based security alarm.
2534 Views 0 Downloads 1.92 MB
DESGIN OF DOOR SECURITY ALARM USING IR SENSOR- electrical power option trade project
ABSTRACT This research focuses on detection of an authorized access to residential and commercial buildings when residents are away fromthe access gate of thehouse .The system is simple reliable and touch less activator security system and uses sensor technology to revolutionized the standard of living .The system provides the best resolution to most of the problems forced by house owners in their daily life. Due to its simple electronic component nature, it is more adaptable and cost effective .the system is divided into three units which employs both the use of the dc battery and the mains supply to ensure constant power supply to the circuit. The design of the system was achieved by considering some factors such as economy, availability of the components and research materials, efficiency, compatability and portability and also durability in the design process. The system works on the principal of thetouch lesssensor. The general performance of the system depends on the presence of intruder enterrring through the door .the overall system was constructed and tested and wok perfectly. The IR theft alarm consists of infrared IR Transmitter, IR receiver and comparator IC LM358. This detector circuit can be used to detect any human entry, obstacles, theft, etc, in order to use IR detector circuit to sense human entry, the IR sensor has to be placed opposite to each other .IR rays is directly falls on IR receiver which in turn is given as input to the ic LM358 which is used as a comparator. Comparator is a circuit which compares two voltages. (Reference voltage and input voltage) produced output according to the input. The output of the comparator is given to the transistor which acts as an inverter and drives a LED and a Buzzer. Buzzer will give you sound if LED is turned ON.
43 Pages 1328 Views 0 Downloads 657.56 KB