Lock And Key Importance

Improved Essays
Lock and key is the interaction between a several materials that allows you to have control of accessing to physical properties, which was created by ancient Egyptians and from the information I have found, the first lock and key was created so they could keep their belongings to themselves.
There are multiple models for security such as lock and key, padlock, safe and many more but I selected lock and key as the topic as I use it every day in my life from unlocking doors or even securing my locker at work and the invention made me curious on how it was created and what developments it has went through to the locks and keys we have today.
As explained previously the main use of the lock and key system is to have control of access to physical
…show more content…
The efficiency of the lock and keys is that it’s very easy to use for the public and it has a good sense of security yet there is a flaw due to it could hacked into by lock picking. There is many types of the lock and keys, which allows variety for the consumers when they consider buying these types of products.
Much like the lock and key, the smart lock is also efficient due to it being on your phone which allows people to carry less items and there is also the possibility of the smart locks malfunctioning so I would say that the normal lock and key system is a better option for people. The smart lock can also be an issue to those who don’t know much about technology but have the system built into their new house or apartment.
The interaction of the lock and keys succeed for its intended purpose which is to have control over access of physical properties. Personally, I think the strengths of this interaction are the sturdiness material that is used to make the main parts of the interaction and the intended purpose of the interaction is used correctly throughout all the

Related Documents

  • Improved Essays

    The lock should require multi-factor authentication, such as a card swipe and an access PIN, or a biometric id check and a PIN. Preferably, the PIN entry keypad would randomize the position of the digits for each PIN entry attempt. The system should be connected to the network, be centrally configured and record all access attempts in a log. c) Video Surveillance System: In order to keep records of who is physically accessing critical areas and devices, video monitoring cameras should be installed with good views of those areas. At a minimum, cameras should have a view of the inside of the wiring closet / server room, the entry point to the wiring closet / server room, and the main entrance to the company…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Jab Locksmiths Case Study

    • 433 Words
    • 2 Pages

    The Challenge For a long time the lock system that was used in Mackellar was the mechanical key system. This system was not without its challenges. The maintenance costs of locks in the school was becoming an uphill task.…

    • 433 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    3.2 Simulator Various methods available to measure the performance of data communication protocols involving live network tests, hardware emulation, test-beds and mathematical models. Software simulation, since, is usually a time effective and cost efficient method. Researchers around the globe are utilizing software simulation tools because it offers a controlled atmosphere within which any network model performance can be measured easily and efficiently. Nowadays, the popularity of the available network simulators and specifically that of Ad Hoc networks varies from one simulator to another.…

    • 1180 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    VPN A virtual private network is used by organisations to help secure data on a network. It’s very hard to access these private networks meaning that the data becomes much more secure and it can be used across a large area of a network, including many computers. This isn’t an expensive thing to do anyone can do it by using simple publicly available infrastructures. VPN also makes use of encryption firewalls and authentications services when sending data across the web.…

    • 767 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Opening Statement Written policies provide a means of security within organization. It establishes the regulations that all faculty must adhere to in order to protect important company and client information. The organizational policies should be read by and signed by each employee as a consensus that all regulations will be followed once joining the organization. And, for those who are current employees, to keep abreast of any amendments made to current policy, so that all employees are in compliance. These policies should be kept in an accessible place for everyone to read, so no one will be left out of the loop.…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Q- Why is it necessary to re-key your locks? - A- it's necessary to re-key your doors for several reasons. If you have got simply emotional to a brand new home, the previous home homeowners might have duplicated the key and have full access to enter your home and steal from you. one more…

    • 776 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Most of the organisation has a system that visitors cannot move around the building without an organisation employee to enter them to the building and escort them out. If the visitors in a wrong place of the building they can be identified to the organisation employee so they will escort them out, otherwise without visitors passes they cannot be identified and they might have a wrong reason of being on that building such as stealing equipment or stealing data, corrupting the system. • Sign in/out systems This security measure can be used within the system to secure and keep the data confidential. The organisation employees each one of them who uses a computer system can have a sign in and sign out system, which is User name and password that they need to enter before the system opened and that will prevent anyone from accessing the system without someone else permission .…

    • 806 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Case Study Porter Ranch

    • 440 Words
    • 2 Pages

    Commercial Locksmith Porter Ranch Finding a trustworthy and well established locksmith company to provide you with suitable security solutions for all your commercial locksmith needs can be a bit challenging, especially when there are several cut-throat companies offering depreciated services at exorbitant prices. As a leading commercial locksmith company in Porter Ranch, we know how important is for the residents of Porter Ranch to enjoy all round economical, low cost, budget friendly and low priced protection for their offices, stores, shops, and many other commercial property all year round. For several years, our elite team of technicians at Commercial Locksmith Porter Ranch have been assisting and providing security solutions to the…

    • 440 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Nt2580 Unit 7

    • 395 Words
    • 2 Pages

    In any location of business, there is a security system agency which takes in charge all information and physical controls of the local administration and associated rooms. As it is said by other writers, some businesses do not have physical security and someone responsible for it. This kind of security is related to having a control tower where someone: a guard, is available at this post, it is like a radar operating just to control coming enemies. All these is for areas like big buildings of factories, or campus for soldiers like Police Academy, etc. This is a function with tools/gadgets like micro-cameras, movement-sensor, heat detector, etc.…

    • 395 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    A1: Business Objective: Healthy Body Wellness Center (HBWC) Office of Grants Giveaway (OGG) business objective is to offer a proficient methodology that promotes improvement in the quality and usefulness of medical grants. HBWC disburses several medical grants through federally supported health research, and implemented the Small Hospital Grant Tracking System (SHGTS) to automate assignment and tracking of the grant disbursement, streamline review of completed evaluation submitted by grant seekers and promote sharing of health information among healthcare professionals. A2: Security Principle The guiding security principle that HBWC should use to meet Federal Information Processing Standards (FIPS) is an ISO 27002 security framework, accompanied…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    WHY WAS STANFORD’S PRISON EXPERIMENT CONDUCTED? In order to study psychological effects of prison life a experiment was conducted called “Stanford Prison Experiment”. The psychologists wanted to study what were the psychological effects of becoming a prisoner or prison guard. To do this experiment, a team of researchers led by the famous psychology professor named, “Philip Zimbardo” finally decided to set up a replicated prison so that they can carefully note effects of the behavior of all those within the walls of prison.…

    • 2257 Words
    • 10 Pages
    Superior Essays
  • Great Essays

    The evidence is probably sufficient to conclude the pool house is a dwelling because its use and structure support the theory that it is an extension of the living quarters. The State will likely be able to prove the Hernandezes’ pool house constitutes a dwelling because the facts support that its construction resembles that of the main dwelling and that it is frequently used for similar purposes as the living quarters, such as eating, sitting, watching television, and hosting friends. As defined in ILCS §5/19-3, “a person commits residential burglary when he knowingly enters or remains within the dwelling place of another, or any part thereof, with the intent to commit a felony.” For the purpose of this statute, dwelling is defined as “a house, apartment, mobile home, trailer, or other living quarters” in which a person “actually resides.”…

    • 1613 Words
    • 7 Pages
    Great Essays
  • Superior Essays

    This is ensuring no other patient or member of staff can access private files and it is to protect information. Computers within…

    • 2083 Words
    • 8 Pages
    Superior Essays
  • Superior Essays

    Parole Vs Parole

    • 1199 Words
    • 5 Pages

    It is normally used to enforce home confinement. The offender receives a call from the probation office and is told to place the device on a receiver attached to the phone. The activated devices send continuous signals that are picked up by a receiver (Clear). This monitoring system is much cheaper than incarceration, mostly because as an offender, they are usually responsible for paying any costs associated with using the electronic monitoring. This system is more humane than prison or jail because it allows the offenders to stay with their families and be able to keep a job.…

    • 1199 Words
    • 5 Pages
    Superior Essays
  • Great Essays

    Raising Minimum Wage

    • 1652 Words
    • 7 Pages

    Raising the Minimum Wage: The Wrong Turn Most everyone has had one. Almost everyone who has had one hated it. And almost everyone has moved on from it. What I am referring to is minimum wage jobs. Most of us have fond memories of summertime with friends and becoming an adult and charting our way in life.…

    • 1652 Words
    • 7 Pages
    Great Essays