Вы находитесь на странице: 1из 3

MOTION DETECTOR

Motion detector, or motion sensor, as it name suggests, served as an instrument to detect movement in
the place where it was installed. It was used, primarily, to identify if there is an intruder within its range.
Aside from its security purposes, motion detector is also used to shut down dangerous equipment in a
factory when someone gets too close to it, to open/close automatic doors and to control ATM displays.
(http://www.safewise.com/resources/motion-sensor-guide)

HEAT DETECTOR
Heat detectors were set to alarm if the temperature in the place where it was mounted reached a fixed
point. Basically, the use of a heat detector is to indicate if there is fire.
(https://www.systemsensor.com/en-us/Pages/Spot-Conventional-Heat-Detectors.aspx)

CCTV
Closed-circuit television, or CCTV, is probably the most widely-known security equipment. It uses cameras
that transmit signal to a set of monitors; thus, enabling someone to secure his place even if he’s not there.
(https://en.wikipedia.org/wiki/Closed-circuit_television#Home_Security)

COMBINATION LOCK
Combination locks are used primarily on vaults. Combination locks are typically made up of wheels that
must be manipulated for the code to be deciphered. The number of these wheels depends on the number
of character in the code; one wheel for each character.
(http://home.howstuffworks.com/home-improvement/household-safety/security/combination-
lock.htm)

MINI RADIO TRANSMITTER


A transmitter, or radio transmitter, is a device that has an antenna which has the ability to produce radio
waves. This device generates radio waves for communication, radar and navigational purposes. The
information being fed to the transmitter includes audio from a microphone, video from a camera, or a
digital signal for wireless networking devices.
(http://www.futureelectronics.com/en/wireless-rf-radio-frequency/transmitter-ics.aspx)

METAL DETECTOR
Metal detectors, which can frequently be seen in establishments like airports and malls, are used to detect
if the person that will enter the establishment has something that can harm anyone inside. Basically, it
can only detect knives and other metal objects.
(https://en.wikipedia.org/wiki/Metal_detector)

AMPLIFIER
An amplifier is an electronic device which magnifies a signal. This device is used in wireless
communications and broadcasting, and in audio equipment. Based from the fields they are being used,
these devices can be categorized into either weak-signal amplifiers or power amplifiers.
(http://whatis.techtarget.com/definition/amplifier)

CRYPTOGRAPHY
Cryptography is a technique of sending a message using a code which can only be known to the sender
and to the receiver. Modern cryptography are centralized on various aspects in information security such
as data confidentiality, integrity, authenticity and non-repudiation.
(http://searchsoftwarequality.techtarget.com/definition/cryptography)

LIFE HACKS
1. Use HTTPS everywhere.
When you visit a website, make sure it says HTTPS in the address bar; “S” stands for security.
2. Get two-step verification.
Two-step verification makes the life of would-be-hackers more difficult. Wherever you are using a
password, check if the website have this awesome feature.
3. Have two e-mail addresses.
Having only one e-mail address can lead into a lot of spam messages that can put your security at risk.
To avoid that, have an e-mail address for important accounts (e.g. banking) and have another for
social media accounts.
4. Stay anonymous.
Surfing the net completely intractable can make you truly secured over the internet. For starters, you
can use your browser's incognito mode. If you think that you really need an utmost confidentiality,
you may use Tor.
5. Secure online purchases.
Never opt to store your credit card information on the server itself; you never know if the company's
server might be compromised or who might have an access to that data.
6. Select public network.
When using internet connection in home, school or cafeteria, always select the public network to
make sure that you're not sharing your private files with the rest of the users.
7. Change your pet name.
In setting up security questions, you might have been asked what the name of your pet is. Using their
real names makes it easier for hackers to be in control of your account. For your account to be safer,
put in a word which only you know.
8. Share carefully on social media accounts.
While it is nice to share with your friends and family what you're up to, make sure that your privacy
setting is set in such a way that not just anyone can see where you've checked in or when you might
be leaving the house.
9.

10.

11.

MOVIE versus REALITY


1. Security Cameras
Security Cameras exist both in the movies and in real life. There is no notable difference between
surveillance cameras used in films and in real life.
2. Motion Sensors
Motion Sensors depicted in movies are not as sophisticated as they are in real life. As shown in 007 or
Mission impossible movies, such devices are not as accurate or sensitive as their realistic counterparts.
Motion Sensors in real life have some sort of trigger (e.g. A string to be pulled or a pedal to be pressed)
before sounding the alarm: not as sophisticated as the ones in the movies: where no triggers are
visually present.
3. Laser Security
Probably the most common type of electronic security found in movies is Laser Security. Though it
seems cool in the big screen, the technology is considered impractical and is not practiced in real life.
4. Fingerprint Security
Opening doors that can only be unlocked using a fingerprint has always been one of the highlights in
a spy-themed movie. These fingerprint-coded locks are also in existence in real-life.
5. Eye-scanning Door Lock
One of the movies that have used an eye-scanning door lock is Charlie’s Angels. The iris is considered
as the most uniquely identifiable part of your body’s interior and that might be the reason why the
use of this security device was brought into reality.
6.

7.

8.

9.

10.

11.

Вам также может понравиться