Smart Materials

Page 20 of 50 - About 500 Essays
  • Free Essay

    Atm Fraud

    ATM Fraud ATM fraud is common amongst all Americans. It happens to innocent people day in and day out. Anyone is at risk whether your card is stolen or not. Card trapping and card skimming are two types of ATM fraud. There are also ways to prevent it as well. Card trapping is one form of ATM fraudulence. Criminals manipulate ATM machines so that any card that is inserted gets stuck or trapped. The scammer then pretends to offer help to the victim and asks them to reenter their

    Words: 332 - Pages: 2

  • Premium Essay

    Smart Grid

    The first alternating current power grid system was installed in 1886.[5] At that time, the grid was a centralized unidirectional system of electric power transmission, electricity distribution, and demand-driven control. In the 20th century local grids grew over time, and were eventually interconnected for economic and reliability reasons. By the 1960s, the electric grids of developed countries had become very large, mature and highly interconnected, with thousands of 'central' generation power

    Words: 612 - Pages: 3

  • Premium Essay

    Nt2580: Introduction to Information Security Week 2 Essay

    Week 2 Essay Johnathan Terrance NT2580: Introduction to Information Security Brian Alley May 10, 2014 I have been given the task of designing a remote access control policy for establishing secure access between remote offices across several different states. Establishing this policy will protect the company and employees against attacks that may cost them tons of money and even their jobs. The policy will define several different security practices that employees need to adhere to in order

    Words: 617 - Pages: 3

  • Free Essay

    A Study on Customer Awareness Towards Atm Frauds

    TABLE OF CONTENTS CHAPTER NUMBER | TITLE | PAGE NUMBER | 1 | Introduction | 1 - 7 | 2 | Theoretical background of study | 8 - 21 | 3 | Analysis and Interpretation | 22 - 77 | 4 | Findings and suggestion | 77 - 82 | 5 | Conclusion | 83 | | Bibliography | vi - vii | | Annexure | viii - xi | LIST OF TABLES TABLE NO. | TITLE | PAGE NUMBER | 3.1 | Age of the respondent | 22 | 3.2 | Gender of the respondents | 24 | 3.3 | Educational qualification of the respondents

    Words: 12313 - Pages: 50

  • Free Essay

    Final Paper

    THE ART OF CYBER WAR — ASYMMETRIC PAYOFFS LEAD TO MORE SPENDING ON PROTECTION 151 As Physical Security Converges With IT Security and Becomes More Network-Based, Can Cisco Compete? Cisco recently introduced new video surveillance IP cameras and monitoring software targeted for small businesses. As corporate security technology and services become increasingly network-delivered and database-driven, the physical security market presents a compelling incremental growth opportunity for Cisco that

    Words: 10724 - Pages: 43

  • Premium Essay

    Jit2

    As a newly hired consultant, I have been tasked with the duties of creating and presenting a risk management and business contingency plan for my first client, ORAZON Corporation. ORAZON Corporation operates retail clothing stores worldwide and sells clothing on the web. A. A risk is the likelihood of something undesirable happening at a given time (Merna, 2008). Risk management is a two-step process ̶ identifying what risks exist and then handling them in the way best-suited to the business objectives

    Words: 9580 - Pages: 39

  • Free Essay

    Implementing Network Security

    Implementing Network Security Your Name here ISSC361: Final American Military University Implementing Network Security Network design teams have several aspects that need to be considered when presented with the task of building a network for an organization. These things range from how many devices to put on the network, what kinds of devices, location of devices, and even how the cable will be connected to the devices. The one item that should always be at the forefront of every network

    Words: 2592 - Pages: 11

  • Free Essay

    Chengdu Wisdom Urban Construction

    电 子 科 技 大 学 UNIVERSITY OF ELECTRONIC SCIENCE AND TECHNOLOGY OF CHINA 电 子 科 技 大 学 UNIVERSITY OF ELECTRONIC SCIENCE AND TECHNOLOGY OF CHINA 专业学位硕士学位论文 MASTER THESIS FOR PROFESSIONAL DEGREE 专业学位硕士学位论文 MASTER THESIS FOR PROFESSIONAL DEGREE (电子科技大学图标 论文题目 成都智慧城市建设的案例研究 专业学位类别 公共管理硕士 学 201122120760 号 作 姓 名 指 万方数据 者 导 教 师 杨宇锋 葛中全 教 授 分类号 密级 UDC 注 1 学 位 论 文 成都智慧城市建设的案例研究 杨宇锋 葛中全 指导教师 电子科技大学 陈晓军 中共四川省委政策研究室

    Words: 5118 - Pages: 21

  • Premium Essay

    Nt1330 Unit 2.1

    2.1 Ways to safeguard the computer from Power outages, surges and other electrical variations: Power surge refers to the time when the electricity flow is interrupted, then started again or when the electricity flowing is sent back into the system by something. It can also be caused by natural hazards such as the strike of a lightning, or heavy snow or ice. This damages a computer in such a way that the computer’s Power Supply Unit will no longer function, and therefore need to be replaced. This

    Words: 839 - Pages: 4

  • Premium Essay

    Unit 9 Card Security P1

    Card Security Code The card security code is different for different kinds of cards even the name of the card security code differs, the merchants should maintain a list of the possible patterns of the card security code and verify the identity of the consumer by checking if the security code pattern matches with the original pattern. Verified by VISA and MasterCard secure code VISA and Master card developed a software which helps in identifying the cards issued by them, here the user needs to enter

    Words: 726 - Pages: 3

Page   1 17 18 19 20 21 22 23 24 50