95 Pages
|
13,313 Words
Cloud Computing is a flexible, cost-effective, and proven delivery platform for providing business or consumer IT services over the Internet. However, cloud Computing presents an added level of risk because essential services are often outsourced to a third party, which makes it harder to maintain data security and privacy, support data and service availability, and demonstrate compliance. Cloud Computing leverages many technologies (S […]
ABSTRACT This electronic security system can be used in banks and other high security areas. A normal electronic security system will have a transmitter and a receiver. The transmitter sends out an IR laser and this will be received by the receiver. When an intruder walks past the device, the IR beam is cut and thus the alarm is activated. Instead of infrared or laser transmitters and receivers, PIR (Passive Infrared Radial) sensors a […]
ABSTRACT Traditional lock systems using mechanical lock and key mechanism are being replaced by new advanced techniques of locking system. These techniques are an integration of mechanical and electronic devices and highly intelligent. One of the prominent features of these innovative lock systems is their simplicity and high efficiency. Such an automatic lock system consists of electronic control assembly which controls the output lo […]
1.0 Introduction In the past, security was simply a matter of locking the door or storing files in a locked filing cabinet or safe. Today, paper is no longer the only medium of choice for housing information. Files are stored in computer databases as well as file cabinets. Hard drives and floppy disks hold many of our secret information. In the physical world, security is a fairly simple concept. If the locks on your house’s doors and […]