Security

Institution Jomo Kenyatta University of Science and Technology
Course Information Technol...
Year 2nd Year
Semester Unknown
Posted By Jeff Odhiambo
File Type pptx
Pages
File Size 1.91 MB
Views 421
Downloads 0
Price: Buy Now whatsapp Buy via whatsapp
  • whatsapp
  • facebook
  • twitter

Description

This module focuses security cross-layer function of the cloud computing reference model. This module focuses on key security threats to a cloud infrastructure. It focuses on the various security mechanisms that enables the cloud service providers to mitigate these threats. Finally, this module focuses on the governance, risk, and compliance (GRC) aspect in a cloud environment.
Below is the document preview.

No preview available
AFN 3451: FOOD AND NUTRITION SECURITY PAST PAPER
Institution: Year: 2023/2024 Semester: 4th Year, 2nd Semester (4.2)
AFN 3451: FOOD AND NUTRITION SECURITY PAST PAPER
Institution: Year: 2023/2024 Semester: 4th Year, 2nd Semester (4.2)
AAA 3100: INTRODUCTION TO AGRICULTURE AND FOOD SECURITY PAST PAPER
Institution: Year: 2023/2024 Semester: 1st Year, 1st Semester (1.1)
AAD 2304: FOOD SECURITY PAST PAPER
Institution: Year: 2023/2024 Semester: 1st Year, 3rd Semester (1.3)
DESIGN OF DOOR SECURITY ALARM USING IR SENSOR PROJECT REPORT- ELECTRICAL POWER OPTION
This research focuses on detection of an authorized access to residential and commercial buildings when residents are away fromthe access gate of thehouse .The system is simple reliable and touch less activator security system and uses sensor technology to revolutionized the standard of living .The system provides the best resolution to most of the problems forced by house owners in their daily life. Due to its simple electronic component nature, it is more adaptable and cost effective .the system is divided into three units which employs both the use of the dc battery and the mains supply to ensure constant power supply to the circuit. The design of the system was achieved by considering some factors such as economy, availability of the components and research materials, efficiency, compatability and portability and also durability in the design process. The system works on the principal of thetouch lesssensor. The general performance of the system depends on the presence of intruder enterrring through the door .the overall system was constructed and tested and wok perfectly. The IR theft alarm consists of infrared IR Transmitter, IR receiver and comparator IC LM358. This detector circuit can be used to detect any human entry, obstacles, theft, etc, in order to use IR detector circuit to sense human entry, the IR sensor has to be placed opposite to each other .IR rays is directly falls on IR receiver which in turn is given as input to the ic LM358 which is used as a comparator. Comparator is a circuit which compares two voltages. (Reference voltage and input voltage) produced output according to the input. The output of the comparator is given to the transistor which acts as an inverter and drives a LED and a Buzzer. Buzzer will give you sound if LED is turned ON.
855 Views 0 Downloads 2.05 MB
DESIGN OF INFRARED BASED SECURITY ALARM PROJECT REPORT- ELECTRICAL POWER OPTION
This circuit is based on IR sensor where an infrared beam is continuously falling on a photodiode and whenever this infrared beam breaks by any kind of movement alarm is triggered. Infrared sensor consist an infrared LED and photodiode in which IR LED emits infrared radiation and photodiode detects the radiation photodiode conducts current in reverse direction whenever light falls on it and voltages across it changes this voltages charge is sensed by voltages comparator i.e.(LM358) and generates output accordingly. In this infrared based security alarm circuit we have placed infrared LED in front of photodiode so that IR light can directly falls in photodiode. Whenever someone moves through this beam IR rays stop falling on photodiode and Buzzer start beeping . Buzzer automatically stops after sometimes as buzzer is connected to 55 timer in mono stable mode.
1272 Views 0 Downloads 1.92 MB
APS 318:INTRODUCTION TO SECURITY PSYCHOLOGY
Security psychology is a term that brings together two important concepts being security and psychology. Security is a state of being protected or safe from harm (Merriam Webster). It is the degree of resistance to, or protection from, harm. A separation is created between the subject and the threat. Psychology is the scientific study of behaviour and mental processes in a context (Simons, Kalichman and Santrock, 1994, Santrock, 2006). Behaviours represent the actions and therefore are easily observed and studied. The mental processes are the feelings, cognitions, beliefs, values and motives and therefore are not directly observed. The context is the environment in which they prevail. Security psychology refers to the study of mental processes in the context of security. It is application of psychological concepts in the field of security
61 Pages 1043 Views 0 Downloads 1.59 MB