Preview

Proposal: Iris Recognition and Penn State Harrisburg

Powerful Essays
Open Document
Open Document
1156 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Proposal: Iris Recognition and Penn State Harrisburg
To:
From:
Subject: Recommendation Report “Topic” Proposal
Date: The purpose of this proposal is to outline my plans for a recommendation report. I will be comparing two different security measure tools, besides smartcards and security cameras to protect Penn State Harrisburg classrooms, severed rooms, main entrances and student dorm for Penn State Harrisburg. I will briefly describe the situation, including what they are using now. Next I will list the two security tools that would help as well as relevant qualities of each one, elaborating and describing as necessary.
Case study:
Penn State Harrisburg is a branch campus of Penn State university with a growing number of students enrolled each year. The enrolled number of students in 2013 for Penn State Harrisburg was 4441 and increased in 2014 to 4519. With Penn State Harrisburg campus being 218 acres, security needs to make sure no intruder gets on the premises that should not be here. Right now they have security cameras, security on campus, and cards for staff but it takes the security takes 3- 5 minutes to get to the intruder and the intruder could easily break into a classroom or hid somewhere in one these rooms with just a lock on it or someone could easily steal a maintainer person’s card to get in a room. One experience I had last year was when 2 guys who were homeless got on campus and I was sitting with a friend near Olmsted and they asked what campus this was and if there were any parties going on campus. We didn’t really tell them anything and asked another guy beside us and left their things in front of Olmsted building and went inside. About 3-5 minutes later the security on campus came asking if saw 2 guys with stuff on them coming though that way and we said yes and told the campus security they were in Olmsted building. Most security consultants say that rapid communication will solve response time as well as training annually will help reduce the response time. Bob Lang was once a



Citations: 2. Stephens, Lawrence. "Information on Fingerprint Scanners." EHow. Demand Media, 20 Sept. 2010. Web. 16 Oct. 2014 3 4."Iris Recognition Technology." Iris Recognition Technology. IRIS ID, n.d. Web. 10 Oct. 2014. 8. "Iris Scanners & Recognition." RSS 20. Findbiometrics, n.d. Web. 15 Oct. 2014.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Psy/250 Appendix G

    • 398 Words
    • 2 Pages

    | Metal detectors at all entrances, have armed guards and unarmed guards, security cameras and CCTV installed.…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Wilson , T. V. (2005, November 11). How Biometrics Works. Retrieved November 29, 2013, from HowStuffWorks.com: http://science.howstuffworks.com/biometrics.htm…

    • 1902 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Memorize the number of campus security. All universities have programs and resources in place to keep students safe, so familiarize yourself with the best methods to reach the police or security office. You might never need to call campus security, but you will be glad you memorized the number if you ever need help.…

    • 381 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door.…

    • 1220 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    ANT 101 Week 2 Assignment

    • 578 Words
    • 2 Pages

    Memorize the number of campus security. All universities have programs and resources in place to keep students safe, so familiarize yourself with the best methods to reach the police or security office. You might never need to call campus security, but you will be glad you memorized the number if you ever need help.…

    • 578 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    References: Greene, S. (2006). Security policies and procedures principles and practices. Upper Saddle River, NJ: Pearson Prentice-Hall.…

    • 1366 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Security is a compelling concern for business and employees. Employers need to establish that they carry out complete risk assessment and address security issues by implementing required security systems. Physical security system is a fundamental component of an establishment, which protects a several aspects such as building security, theft, vandalism and falsification of records. Therefore, organizations and companies need to highly aware of to protect their physical assets. The foundation of a competent security management can prevents such risk like discovering solutions, authorization, and controlling employee’s activities. As a result, organizations can ensure the safety and protection of employees and property.…

    • 1377 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Arizona vs Grant

    • 1130 Words
    • 5 Pages

    Kathy Davis, John Kelsey, Dia Langellier, Misty Mapes, and Jeff Rosendahl Surveillance in Schools: Safety vs. Personal Privacy Locker Searches students.ed.uiuc.edu/jkelsey/surveillance/locker.htm…

    • 1130 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Dna Evidence

    • 397 Words
    • 2 Pages

    Henry, Lee & Gaensslen, Robert.2001. Advances in Fingerprint Technology, 2nd Edition. Retrieved February 26, 2009. Available Online:…

    • 397 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Biometric Devices Paper

    • 301 Words
    • 2 Pages

    Rossi, Marcell Enrico. "How to Use Fingerprint Readers." Digital Security Review Aug. 2014: n. pag. Web. 3 Oct. 2014.…

    • 301 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Alphonse Bertillion developed a method of recording physical features of a person in such a way that the record would be unique to that person. It consisted of taking measurements of various parts of the body, such as the head, shoulders, fingers, and skull. This method was referred to as Bertillionage, after its creator. Bertillion developed a set of precise measuring instruments to be used with his method. The Bertillionage system became very popular throughout Europe and the United States. It became widely used in U.S. prisons, which needed a way to track the prisoners. The Bertillion system was plagued by problems of reproducibility (2 people could have the exact same measurements therefore one person could be charged with the wrong doings of multiple people. In 1903 a prisoner named William West was admitted to the prison to serve a sentence. When he was measured using the Bertillion system, it was found that a man with the name William West with virtually the same set of measurements was already at the prison! This discredited the Bertillionage and opened the door for the study of fingerprints. Bertillion used fingerprints in his system but didn’t have a good way to organize them for mass searches. Dr. Juan Vucetich conceived of a method of fingerprint classification in 1894 that provided for 1,048,576 primary classifications of fingerprints. His work was largely unheard of in Europe until Sir Edward Henry devised a fingerprint classification system, still used today to categorize sets of fingerprints and store them for easy…

    • 252 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Research Paper

    • 271 Words
    • 2 Pages

    In the 1800’s Francis Henry Galton undertook the first definitive study of fingerprints. He developed a methodology of classifying them for filing. In 1892 Galton published a book called “Fingerprints”. The book contained the first statistical proof supporting the uniqueness of his method of personal identification. Galton’s work went on to describe the basic principles of the present fingerprinting identification system that we use today.…

    • 271 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Criminology in the Future

    • 590 Words
    • 3 Pages

    Everyone wanted security in life. Whether faced with threat or danger, people could use protection in any given situation. New technologies created to ease the worries of an individual. An example was biometrics. The tools refer to automatic identification or verification of living persons using his or her enduring physical or behavioral characteristics (Johnson, p. 92, 2004). Examples of applications were fingerprints and facial traits.…

    • 590 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    School Shootings

    • 669 Words
    • 3 Pages

    There are various solutions to fix this obstacle and this includes a simple process. The main key is to protect everyone and anyone at all times to the best of your ability. It seems that many security officers slack off and honestly cannot bother themselves to fully protect and watch over their school. This can easily be fixed by installing cameras in schools everywhere. These cameras could give an extra eye to watch these protectors and to make sure they are performing their job efficiently and effectively.…

    • 669 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Parents and politicians focused on physical things such as security officers, bullet-proof glass, metal detectors and video surveillance cameras for school safety. The difference between these suggestions are mental and physical, to explain, training someone how to be safe and to ready the staff for a response to any emergencies, lockdowns, evacuation procedures, and student threats compared to actually installing a safety device such as cameras and bulletproof windows. In regards to the parents and police suggestions, In the article School Support Staff Security and Emergency / Crisis Planning Training, Ken Trump writes “National School Safety and Security Services offers specialized support staff emergency preparedness training for secretaries, custodians and maintenance staff, and food services staff. This program has been designed to be conducted in a series of one or two hour sessions (longer if time permits) per employee group (separate sessions for secretaries, custodians and food services staff) in a manner respective of time constraints for staff release from buildings. Sessions will be specific to each employee group roles and responsibilities in security and emergency…

    • 1741 Words
    • 7 Pages
    Good Essays