This article needs additional citations for verification .(September 2021) |
A key retainer device (KRD) is a small metal unit that is wall or door mounted, usually designed for the interchangeable core that retains one key (Key A) while the second key (Key B) is used for authorized purposes. When the key in use (Key B) is returned into the key retainer, the key held captive (Key A) is turned and then can be released. Now, the special key, perhaps top master (Key B) is held captive again. The key retainer is a method for providing visual key control.
These include janitorial or custodial staff, irregular or temporary users, guests and other authorized users that require access to a certain key but to whom that key is not issued directly. The KRD acts as a "mechanical sign-out sheet", physically controlling access to the key and providing accountability for its eventual return.
One key (High Level/Special) is retained in a core (at 1/4 turn) until another "release" key is inserted in the other core and rotated 90° (1/4 turn). Then the "retained" key can be removed for use while the "release" key is held (trapped) for visual accountability purposes. This cycle is repeated in reverse when the normally "retained" key is returned and the "release" key is removed "retrieved" by the authorized user.
The term "key retainer" can also refer to a padlock that does not allow the key to be removed when the shackle is in the open position. This prevents accidentally leaving the padlock unlocked, and it also prevents accidentally locking the key inside a locker, shed, etc.
Cocoa is Apple's native object-oriented application programming interface (API) for its desktop operating system macOS.
In computer science, a lock or mutex is a synchronization primitive that prevents state from being modified or accessed by multiple threads of execution at once. Locks enforce mutual exclusion concurrency control policies, and with a variety of possible methods there exist multiple unique implementations for different applications.
A combination lock is a type of locking device in which a sequence of symbols, usually numbers, is used to open the lock. The sequence may be entered using a single rotating dial which interacts with several discs or cams, by using a set of several rotating discs with inscribed symbols which directly interact with the locking mechanism, or through an electronic or mechanical keypad. Types range from inexpensive three-digit luggage locks to high-security safes. Unlike ordinary padlocks, combination locks do not use keys.
A captive portal is a web page accessed with a web browser that is displayed to newly connected users of a Wi-Fi or wired network before they are granted broader access to network resources. Captive portals are commonly used to present a landing or log-in page which may require authentication, payment, acceptance of an end-user license agreement/acceptable use policy, survey completion, or other valid credentials that both the host and user agree to adhere by. Captive portals are used for a broad range of mobile and pedestrian broadband services – including cable and commercially provided Wi-Fi and home hotspots. A captive portal can also be used to provide access to enterprise or residential wired networks, such as apartment houses, hotel rooms, and business centers.
rm
is a basic command on Unix and Unix-like operating systems used to remove objects such as computer files, directories and symbolic links from file systems and also special files such as device nodes, pipes and sockets, similar to the del
command in MS-DOS, OS/2, and Microsoft Windows. The command is also available in the EFI shell.
Lock out, tag out or lockout–tagout (LOTO) is a safety procedure used to ensure that dangerous equipment is properly shut off and not able to be started up again prior to the completion of maintenance or repair work. It requires that hazardous energy sources be "isolated and rendered inoperative" before work is started on the equipment in question. The isolated power sources are then locked and a tag is placed on the lock identifying the worker and reason the LOTO is placed on it. The worker then holds the key for the lock, ensuring that only that worker can remove the lock and start the equipment. This prevents accidental startup of equipment while it is in a hazardous state or while a worker is in direct contact with it.
An electronic lock is a locking device which operates by means of electric current. Electric locks are sometimes stand-alone with an electronic control assembly mounted directly to the lock. Electric locks may be connected to an access control system, the advantages of which include: key control, where keys can be added and removed without re-keying the lock cylinder; fine access control, where time and place are factors; and transaction logging, where activity is recorded. Electronic locks can also be remotely monitored and controlled, both to lock and to unlock.
An interlock is a feature that makes the state of two mechanisms or functions mutually dependent. It may consist of any electrical or mechanical devices, or systems. In most applications, an interlock is used to help prevent any damage to the machine or to the operator handling the machine. For example, elevators are equipped with an interlock that prevents the moving elevator from opening its doors and prevents the stationary elevator from moving.
Data loss prevention (DLP) software detects potential data breaches/data exfiltration transmissions and prevents them by monitoring, detecting and blocking sensitive data while in use, in motion, and at rest.
An interchangeable core or IC is an adaptable locking key cylinder, which can be rapidly exchanged in the field via the use of specialized "control keys".
A retainer agreement is a work-for-hire contract. It falls between a one-off contract and permanent employment, which may be full-time or part-time. Its distinguishing feature is that the client or customer pays in advance for professional work to be specified later. The purpose of a retainer fee is to ensure that the employed reserves time for the client in the future when their services are needed.
A Supervisor Call instruction (SVC) is a hardware instruction used by the System/360 family of IBM mainframe computers up to contemporary zSeries, the Amdahl 470V/5, 470V/6, 470V/7, 470V/8, 580, 5880, 5990M, and 5990A, and others; Univac 90/60, 90/70 and 90/80, and possibly others; the Fujitsu M180 (UP) and M200 (MP), and others; and is also used in the Hercules open source mainframe emulation software. It causes an interrupt to request a service from the operating system. The system routine providing the service is called an SVC routine. SVC is a system call.
OAuth is an open standard for access delegation, commonly used as a way for internet users to grant websites or applications access to their information on other websites but without giving them the passwords. This mechanism is used by companies such as Amazon, Google, Meta Platforms, Microsoft, and Twitter to permit users to share information about their accounts with third-party applications or websites.
Hardware-based full disk encryption (FDE) is available from many hard disk drive (HDD/SSD) vendors, including: Hitachi, Integral Memory, iStorage Limited, Micron, Seagate Technology, Samsung, Toshiba, Viasat UK, Western Digital. The symmetric encryption key is maintained independently from the computer's CPU, thus allowing the complete data store to be encrypted and removing computer memory as a potential attack vector.
Best Lock Corporation was an American publicly traded door hardware and lock manufacturer. Founded in 1925 as Best Universal Lock Company by Frank Ellison Best, the privately held company relocated from Seattle, Washington, to Indianapolis, Indiana, in 1938, where operations expanded and evolved. Product offerings are now marketed under the Best Access brand, which is one of several trademarked corporate divisions in Stanley Black & Decker's Stanley Security group.
The Online Copyright Infringement Liability Limitation Act (OCILLA) is United States federal law that creates a conditional 'safe harbor' for online service providers (OSP), a group which includes Internet service providers (ISP) and other Internet intermediaries, by shielding them for their own acts of direct copyright infringement as well as shielding them from potential secondary liability for the infringing acts of others. OCILLA was passed as a part of the 1998 Digital Millennium Copyright Act (DMCA) and is sometimes referred to as the "Safe Harbor" provision or as "DMCA 512" because it added Section 512 to Title 17 of the United States Code. By exempting Internet intermediaries from copyright infringement liability provided they follow certain rules, OCILLA attempts to strike a balance between the competing interests of copyright owners and digital users.
Trapped-key interlocking utilizes locks and keys for sequential control of equipment and machinery to ensure safe operation. Trapped-key interlocks are widely used to ensure safe access to potentially live or dangerous plant or equipment in an industrial setting.
Cloud computing security or, more simply, cloud security, refers to a broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructure of cloud computing. It is a sub-domain of computer security, network security, and, more broadly, information security.
A Depot Protection System (DPS) is a system designed to protect staff and equipment by ensuring the safe and controlled movement of rail vehicles into and out of train maintenance depots, a process sometimes known as train movements or shunting. This allows train maintenance operations to be conducted without endangering the safety of staff, and damaging other maintenance equipment in the depot.
Internet security awareness or Cyber security awareness refers to how much end-users know about the cyber security threats their networks face, the risks they introduce and mitigating security best practices to guide their behavior. End users are considered the weakest link and the primary vulnerability within a network. Since end-users are a major vulnerability, technical means to improve security are not enough. Organizations could also seek to reduce the risk of the human element. This could be accomplished by providing security best practice guidance for end users' awareness of cyber security. Employees could be taught about common threats and how to avoid or mitigate them.
"Small Format Interchangeable Cores: Advanced" ©2005 by William M. Lynk; Published by The National Publishing Company, Chicago, Illinois; pp. 212–214.