Document Sample
TECH Powered By Docstoc

             Survey Results
 13-1 believed Pres. Bush crossed the line
 11-3 would not like to see CCTV installed in
  Public facilities
 9-5 believed CCTV is a invasion of priacy
 10-4 would not feel safer with the installment of
 13-1 believe the “Naked Scaner” is an invasion of
 10-4 would take the machine over a frisk
 9-0 would not fly if they had to wear only a
  surgeons gown
 8-6 believe with the advancement of RFID
                Quick Fixes

 How long has is taken for 2.5 million CCTV
  cameras to be installed in the UK?
   The use of CCTV began in the 70’s and 80’s on a
    small scale
   One of the first cases of outdoor CCTV was in
    Bournemouth in 1985
   CCTV started on the big scale in the 1990’s
   With the passing of CCTV: Looking Out for you
    issued by Home Office in 1994, CCTV took off
             More Quick Fixes

 Is there a special type of holder available to
  prevent the use of an unwanted scanner?
    There are other protections used as well:
       The chips come installed with extra layers of metal
       The chips can also sense a differentiation in thermal and
        UV light usage.
           Consent Debate
Legal in public place
Legal if non profit
Illegal in place where privacy is expected
 ( bathroom, bedroom)
Illegal if ease dropping
Illegal if you slander what people have
 said (Borat the Movie)
         RFID on Containers
 Currently two government initiatives to help
the screening process of shipping containers:
  •CSI (Container Security Initiative)
  •SST (Smart and Secure Tradelanes)
•The primary advantage to RFID in a port is
it is automatic data collection. Two benefits:
  • Accurate and complete data collection
  •Better utilization of employees’ time.

• CSI is intended to extend the U.S.’s zone
  of security outward, making them the last
  line of defense.
• CSI consists of four core elements:
  • Establish security criteria for identifying high
    risk containers based on advance information
  • Pre-screen containers ASAP
  • Use technology to quickly pre-screen high
    risk containers.
  • Develop secure and "smart" containers.
 Trying to improve the security and
  productivity of cargo shipments with the
  technology available including RFID
  “smart seals”:
   Monitor container’s security at all times
   Speed shipments through the supply chain
   Verify the container was loaded securely
   Reduce probability of a tamper event
   Gather data to conduct a "virtual inspection"
   Make sure containers meet governmental
    security regulations.
   Receive "green lane" through customs
   Avoid delays in the shipment process
   Minimize the cost of handling
      RFID Security Features

RFID also allows increase in security in
 5 ways:
   Access Control
   Container Security
   Container Identification/Location
   Activity Tracking
   Regulatory Compliance
 Show video clip: Email Phishing
   The act of “phishing” is referred to as an attempt to
    fraudulently obtain personal information such as credit
    card numbers, passwords, and/or your social security
   A “phishing” email contains official looking urls,
    addresses, and logos to gain your trust so you are easily
    persuaded to hand over your information on a platter.
   On February 28th 2005, the Anti-Phishing Act was
    passed. The act in a nutshell criminalized Internet
    scams involving fraudulently obtaining personal
    information, commonly known as phishing.
         QuickTime™ an d a
TIFF (Uncompressed) decompressor
   are need ed to see this picture.
          Phishing Prevention
How to protect yourself from a phishing
   DON’T respond
   Report the suspicious website
   Don’t click any links on the email you receive
   Check the security certificates of the website
   Type the url of the website you need directly
   Don’t type personal information into pop up
   Update prevention software


Shared By: