File - SCL Training
Download
Report
Transcript File - SCL Training
Access
Method
“
A key is usually intended to operate one specific lock or a
small number of locks that are keyed alike, so each lock
requires a unique key. The key serves as a security token for
access to the locked area; only persons having the correct
key can open the lock and gain access.
Lock and Key
Security
”
Those are often used in conjunction with staff ad visitor
identification systems . Ins teats of using key to access area
of building, the system relies on personnel using swap
cared or dongles as key . For example, using swipe card to
get access on IT room.
Sign In and
Sign Out
“
The technology of biometrics is constantly being
developed and refined . Common technologies in current
use are finger print recognition, retinal scans and voice
recognition.
Biometrics
”
“ Many organisation use visitor pass as a method of entry ,
with security and reception personnel checking
identification in entry. Visitor card are by their nature
temporary and indicate that the visitors has limited access
right.
.
Visitor Passes
”
“
Other Access methods
• Pin Lock.
• Fob Key.
• QI and Barcode scanner.
• Password.
• Magnetic Card.
”
WORK
STATION
A workstation is simply a
desktop computer terminal in
which itis a lot more powerful
than a personal computer. It
has been set up and wired for
one specific area/task. It is still
connected to the network as
well. It has the specific tools
required for the tasks it’s
assigned too that some other
computers cannot complete.
Server
• A server can either be a
computer or device on a
network which is used to
manage network resources.
There are multiple types of servers,
for example:
File server
File server – a server that is used as a storage device. Anyone
who is connected to the network will have access to the files
in the server.
Web server
Web server – a web server displays the content of the server by
loading a file from a disk and serving it across the network to the
requested person’s web browser. This exchange of information is
controlled by the browser and the servers communicate using
HTTP (Hypertext Transfer Protocol).
FTP server –
FTP server – FTP (File Transfer Protocol) is used to
transfer files between computers securely.
Servers can be a separate dedicated
device or can be hosted on a computer.
Having a dedicated device for a server is
a major advantage over a computer server
because the computer may get slowed
down. Also, a dedicated server usually has
more storage space compared to a
computer as computers will have other
non-server related files.
A dedicated server is similar to a
computer as it contains RAM, a
CPU and hard drives. However,
dedicated servers are designed to
process heavy-duty back-end
tasks. This means that they are
not suited to run normal desktop
workload, an example of this is
graphic heavy applications.
The CPU is a server is similar to
that of a desktop. A server will
usually have larger cache which
means that data can be accessed
quicker. Single core CPUs are
sufficient for a small server
which contains around 10 users.
However, an upgrade to a dual
core or quad core can greatly
increase the processing power of
the system.
Network
Card
Network card
A network card is a kind of computer
hardware which is an electronic device
that connects a computer to a
computer network. Mostly is the LAN
to connects the network. Nowadays,
majority of computers includes
network cards to allow a computer to
interchange data thru the network.
Network cards contain a appropriate
protocol. The physical layer and the
data link layer are the first two layers of
the OSI model and also network cards
frequently tool it. Many network cards
operate Ethernet on current days.
Network card for wireless networking
Least network cards do not operate a cable to connect to the network. People
usually use wireless lan or wifi for a long distance. For over a short distance,
bluetooth will be suitable for it.
NIC
• Similarly recognised as a NIC (Network Interface Card ), these cards connect
straight into the motherboard of your computer and feature an outside
network socket. This allows the computer to connect to a network via a
network cable. Traditionally these network cards use the PCI slot on a
motherboard, with fresher cards consuming a PCIe interface. Progressive
features contain two or more network ports for specific applications. Note
that network adaptors that convert a USB port into a network interface are
also obtainable.
TP-Link 300Mbps Wireless N PCI Adapter
(TL-WN851ND)
This PCI card employs MIMO technology and has two external detachable
omni directional antennas providing excellent wireless performance.