Concept explainers
Smart Airport Passenger Processing System (SAPPS) will replace the human ID control, Airport check-in and boarding-pass process.
The new airport will have faster process timing and better security with SAPPS. The passenger will not interact with any officer at the airport with SAPPS. There will be no direct human interaction at the airport. The passenger will simply walk through a passage surrounded with hidden cameras and other remote readers.
Once SAPPS installed, in the new airport, the passenger will walk through a passage surrounded with cameras, microphones and other remote readers to do “ID control, Airport check-in and boarding-pass process” all at the same time. ID control, Airport check-in and boarding-pass process will be done while the passenger is walking from terminal entrance to his/her seat in the aircraft. The passenger will not interact with any officer at the airport.
In the new airport, passenger will get RFID bracelet at automated kiosk, this is an ATM type machine has face recognition cameras, finger-print reader and connection to DMV and IRS to authenticate the passenger and update the Airport
You as the IT Manager for SAPPS were expected to address the following questions
Question 1: SAPPS will need new software for ID and passport control, Airport check-in and boarding-pass processes. How can you fulfill the software needs of SAPPS project? Provide the list of software package and answer the following questions; What would be your software acquisition method? And, what type of Software Development Options you would recommend for each software package? And, explain your reasoning for the solution you selected? Why?
Trending nowThis is a popular solution!
Step by stepSolved in 3 steps
- It is possible to present some examples of organisations on the internet that need a secure connection.arrow_forwardlegal aspects of cybersecurity Michael Bluth is starting his first day in management at the Bluth Company following hisfather’s incarceration. Towards the end of the day, FBI agents enter his office and servehim with a subpoena. The subpoena seeks the contents of various SMS messages sentduring the previous two months from Bluth subscriber Tobias Funke and Bluth subscriberLindsey Funke. The FBI agents inform Michael that if he does not turn over the SMSmessages requested, he will face severe repercussions, including jail time if the FBI returns with a new subpoena seeking only information relating tosubscriber names, locations, and time stamps of messages, but no information relating tocontent, how should Michael respond?A. Turn over the SMS messages because the FBI has a valid subpoena.B. Turn over the SMS messages because they concern two Bluth subscribers.C. Refuse to turn over the SMS messages until presented with a search warrant.D. Refuse to turn over the SMS messages until…arrow_forwardExplain the usefulness and limitations of traffic engineering as a solution for the problem of network congestion.arrow_forward
- Analyse the diverse categorizations of access control mechanisms. Examine the diverse range of controls that can be incorporated into various electronic devices.arrow_forwardlegal aspects of cybersecurity Michael Bluth is starting his first day in management at the Bluth Company following hisfather’s incarceration. Towards the end of the day, FBI agents enter his office and servehim with a subpoena. The subpoena seeks the contents of various SMS messages sentduring the previous two months from Bluth subscriber Tobias Funke and Bluth subscriberLindsey Funke. The FBI agents inform Michael that if he does not turn over the SMSmessages requested, he will face severe repercussions, including jail time. Which of the following statutes would be most helpful to Michael to consult indeciding how to respond to the FBI agents?A. The Electronic Communications Privacy Act.B. The Wiretap Act.C. The Stored Communications Act.D. The Pen Register Act.arrow_forwardOne-time-use credit card numbers are issued by certain credit card providers as an extra layer of protection for online transactions. Customers must visit the website of the company that issued their credit card to get the one-time-use number. Describe the differences between this technology and the traditional method of utilizing credit card numbers. What advantages and disadvantages do they have in comparison to electronic payment gateway authentication?arrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education