latest technological developments in the field of security and privacy
TRANSCRIPT
![Page 1: LATEST TECHNOLOGICAL DEVELOPMENTS IN THE FIELD OF SECURITY AND PRIVACY](https://reader036.vdocuments.us/reader036/viewer/2022062314/56649e2f5503460f94b1f331/html5/thumbnails/1.jpg)
LATEST LATEST TECHNOLOGICAL TECHNOLOGICAL
DEVELOPMENTS IN DEVELOPMENTS IN THE FIELD OF THE FIELD OF SECURITY AND SECURITY AND
PRIVACYPRIVACY
LATEST LATEST TECHNOLOGICAL TECHNOLOGICAL
DEVELOPMENTS IN DEVELOPMENTS IN THE FIELD OF THE FIELD OF SECURITY AND SECURITY AND
PRIVACYPRIVACY
![Page 2: LATEST TECHNOLOGICAL DEVELOPMENTS IN THE FIELD OF SECURITY AND PRIVACY](https://reader036.vdocuments.us/reader036/viewer/2022062314/56649e2f5503460f94b1f331/html5/thumbnails/2.jpg)
OVERVIEW1. Home security2. Airport/tranport security3. Business security4. Bank security5. Prison security6. Internet security
![Page 3: LATEST TECHNOLOGICAL DEVELOPMENTS IN THE FIELD OF SECURITY AND PRIVACY](https://reader036.vdocuments.us/reader036/viewer/2022062314/56649e2f5503460f94b1f331/html5/thumbnails/3.jpg)
HOME SECURITY1. Heat and smoke detectors 2. Fire alarm3. Burglar alarm4. Intrusion alarm system5. Video door phone and lock system6. Visitor management and access
control systems
![Page 4: LATEST TECHNOLOGICAL DEVELOPMENTS IN THE FIELD OF SECURITY AND PRIVACY](https://reader036.vdocuments.us/reader036/viewer/2022062314/56649e2f5503460f94b1f331/html5/thumbnails/4.jpg)
![Page 5: LATEST TECHNOLOGICAL DEVELOPMENTS IN THE FIELD OF SECURITY AND PRIVACY](https://reader036.vdocuments.us/reader036/viewer/2022062314/56649e2f5503460f94b1f331/html5/thumbnails/5.jpg)
![Page 6: LATEST TECHNOLOGICAL DEVELOPMENTS IN THE FIELD OF SECURITY AND PRIVACY](https://reader036.vdocuments.us/reader036/viewer/2022062314/56649e2f5503460f94b1f331/html5/thumbnails/6.jpg)
AIRPORT SECURITY1. Biometrics2. Bottle liquid scanners3. Explosive detection system4. Explosive trace detection5. Threat image projection6. Paperless boarding passes
![Page 7: LATEST TECHNOLOGICAL DEVELOPMENTS IN THE FIELD OF SECURITY AND PRIVACY](https://reader036.vdocuments.us/reader036/viewer/2022062314/56649e2f5503460f94b1f331/html5/thumbnails/7.jpg)
![Page 8: LATEST TECHNOLOGICAL DEVELOPMENTS IN THE FIELD OF SECURITY AND PRIVACY](https://reader036.vdocuments.us/reader036/viewer/2022062314/56649e2f5503460f94b1f331/html5/thumbnails/8.jpg)
BUSINESS SECURITY1. Intrusion detection system2. Business surveillance system3. Access control system4. Intercom entry5. Asset protection system6. Alarm communications
![Page 9: LATEST TECHNOLOGICAL DEVELOPMENTS IN THE FIELD OF SECURITY AND PRIVACY](https://reader036.vdocuments.us/reader036/viewer/2022062314/56649e2f5503460f94b1f331/html5/thumbnails/9.jpg)
![Page 10: LATEST TECHNOLOGICAL DEVELOPMENTS IN THE FIELD OF SECURITY AND PRIVACY](https://reader036.vdocuments.us/reader036/viewer/2022062314/56649e2f5503460f94b1f331/html5/thumbnails/10.jpg)
BANK SECURITY1. Biometrics 2. Cctv surveillance3. Access control systems4. Intruder alarms5. Integrated systems6. Network/ip
![Page 11: LATEST TECHNOLOGICAL DEVELOPMENTS IN THE FIELD OF SECURITY AND PRIVACY](https://reader036.vdocuments.us/reader036/viewer/2022062314/56649e2f5503460f94b1f331/html5/thumbnails/11.jpg)
PRISON SECURITY1. Biometric scanners2. RFID(radio frequency identification
tracking)3. Videoconferencing4. Virtual checkups5. Body scanners and network
jammers
![Page 12: LATEST TECHNOLOGICAL DEVELOPMENTS IN THE FIELD OF SECURITY AND PRIVACY](https://reader036.vdocuments.us/reader036/viewer/2022062314/56649e2f5503460f94b1f331/html5/thumbnails/12.jpg)
![Page 13: LATEST TECHNOLOGICAL DEVELOPMENTS IN THE FIELD OF SECURITY AND PRIVACY](https://reader036.vdocuments.us/reader036/viewer/2022062314/56649e2f5503460f94b1f331/html5/thumbnails/13.jpg)
INTERNET SECURITY
1. Electronic mail security(E-mail)2. Online transaction on secured
website3. Firewall 4. Malicious softwares and antivirus
![Page 14: LATEST TECHNOLOGICAL DEVELOPMENTS IN THE FIELD OF SECURITY AND PRIVACY](https://reader036.vdocuments.us/reader036/viewer/2022062314/56649e2f5503460f94b1f331/html5/thumbnails/14.jpg)
CONCLUSION
Today due to rapid expansion of technology we have developed our security systems in a way that we couldn’t have imagined about some years ago.
We hope to see it improve and strengthen our security to a greater extent