Академический Документы
Профессиональный Документы
Культура Документы
Motion detector, or motion sensor, as it name suggests, served as an instrument to detect movement in
the place where it was installed. It was used, primarily, to identify if there is an intruder within its range.
Aside from its security purposes, motion detector is also used to shut down dangerous equipment in a
factory when someone gets too close to it, to open/close automatic doors and to control ATM displays.
(http://www.safewise.com/resources/motion-sensor-guide)
HEAT DETECTOR
Heat detectors were set to alarm if the temperature in the place where it was mounted reached a fixed
point. Basically, the use of a heat detector is to indicate if there is fire.
(https://www.systemsensor.com/en-us/Pages/Spot-Conventional-Heat-Detectors.aspx)
CCTV
Closed-circuit television, or CCTV, is probably the most widely-known security equipment. It uses cameras
that transmit signal to a set of monitors; thus, enabling someone to secure his place even if he’s not there.
(https://en.wikipedia.org/wiki/Closed-circuit_television#Home_Security)
COMBINATION LOCK
Combination locks are used primarily on vaults. Combination locks are typically made up of wheels that
must be manipulated for the code to be deciphered. The number of these wheels depends on the number
of character in the code; one wheel for each character.
(http://home.howstuffworks.com/home-improvement/household-safety/security/combination-
lock.htm)
METAL DETECTOR
Metal detectors, which can frequently be seen in establishments like airports and malls, are used to detect
if the person that will enter the establishment has something that can harm anyone inside. Basically, it
can only detect knives and other metal objects.
(https://en.wikipedia.org/wiki/Metal_detector)
AMPLIFIER
An amplifier is an electronic device which magnifies a signal. This device is used in wireless
communications and broadcasting, and in audio equipment. Based from the fields they are being used,
these devices can be categorized into either weak-signal amplifiers or power amplifiers.
(http://whatis.techtarget.com/definition/amplifier)
CRYPTOGRAPHY
Cryptography is a technique of sending a message using a code which can only be known to the sender
and to the receiver. Modern cryptography are centralized on various aspects in information security such
as data confidentiality, integrity, authenticity and non-repudiation.
(http://searchsoftwarequality.techtarget.com/definition/cryptography)
LIFE HACKS
1. Use HTTPS everywhere.
When you visit a website, make sure it says HTTPS in the address bar; “S” stands for security.
2. Get two-step verification.
Two-step verification makes the life of would-be-hackers more difficult. Wherever you are using a
password, check if the website have this awesome feature.
3. Have two e-mail addresses.
Having only one e-mail address can lead into a lot of spam messages that can put your security at risk.
To avoid that, have an e-mail address for important accounts (e.g. banking) and have another for
social media accounts.
4. Stay anonymous.
Surfing the net completely intractable can make you truly secured over the internet. For starters, you
can use your browser's incognito mode. If you think that you really need an utmost confidentiality,
you may use Tor.
5. Secure online purchases.
Never opt to store your credit card information on the server itself; you never know if the company's
server might be compromised or who might have an access to that data.
6. Select public network.
When using internet connection in home, school or cafeteria, always select the public network to
make sure that you're not sharing your private files with the rest of the users.
7. Change your pet name.
In setting up security questions, you might have been asked what the name of your pet is. Using their
real names makes it easier for hackers to be in control of your account. For your account to be safer,
put in a word which only you know.
8. Share carefully on social media accounts.
While it is nice to share with your friends and family what you're up to, make sure that your privacy
setting is set in such a way that not just anyone can see where you've checked in or when you might
be leaving the house.
9.
10.
11.
7.
8.
9.
10.
11.