0% found this document useful (0 votes)
105 views5 pages

EAS Tags

The document discusses various methods for controlling risks from subversive threats, including intrusion prevention systems that use deep packet inspection to detect denial of service attacks. It also discusses subversion of computer systems by covertly undermining controls to gain unauthorized access to resources and information. The document further discusses RSA Security, a company that creates encryption and security products, and their public key infrastructure that secures much of the internet's communication. It provides information on RSA encryption and SecurID security tokens.

Uploaded by

Shame Bope
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
105 views5 pages

EAS Tags

The document discusses various methods for controlling risks from subversive threats, including intrusion prevention systems that use deep packet inspection to detect denial of service attacks. It also discusses subversion of computer systems by covertly undermining controls to gain unauthorized access to resources and information. The document further discusses RSA Security, a company that creates encryption and security products, and their public key infrastructure that secures much of the internet's communication. It provides information on RSA encryption and SecurID security tokens.

Uploaded by

Shame Bope
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

[20:44, 30/11/2022] +263 71 711 5601: CONTROLLING RISKS FROM SUBVERSIVETHREATS

Controlling Denial of Service Attacks•

AnIntrusion Prevention System (IPS)uses deep packet inspection (DPI) todetermine when an attack is in
progress.•Deep packet inspection (DPI)is a program used to determine when a DOSattack is in progress
through a variety of analytical and statistical techniques that evaluate the message pankets contents.

Don't know what's happening with my mic. Not audible

[20:53, 30/11/2022] +263 78 242 0946: Recall from chapter I that subversion of a computer system
involves the covert and methodical undermining of internal and external computer system controls to
allow unauthorized and undetected access to computer system resources and/or information. But to
understand the real implications of this definition, further amplification is required.

[12:03, 30/11/2022] +263 71 711 5601: RSA Security is a United States-based organization that creates
encryption, network and computer security products. Ron Rivest Adi Shamir, and Len Adleman founded
RSA as an independent company in 1982. RSA derives from the initials of each of the founders names.

[12:03, 30/11/2022] +263 71 711 5601: DAS is a customer-hosted (on-premise or cloud) web service that
performs cryptographic operations (such as decryption, signing, and key agreement) on behalf of
properly authenticated users.

[12:04, 30/11/2022] +263 71 711 5601: EAS Security is protection for your shop or retail chain and the
word it self means Electronic Article Surveillance. An EAS Security system usually consists of EAS
Antennas and EAS Tags or labels. These components signals to each other if they come too close.

[21:23, 30/11/2022] +263 71 711 5601: RSA products:

RSA makes the public key infrastructure (PKI) encryption standards by which much of the Internet’s
secure communication are run. Other RSA products include hardware tokens, software tokens, SecurID,
Besafe and enVision.

RSA encryption is based on use of a public and a private key. Typically a key fob (such as an RSA SecurID
security token) is used by employees in security-sensitive companies. The token generates a public key
that changes every minute. This string is combined with a user’s password to make a hybrid one-time
use password

[21:27, 30/11/2022] +263 71 711 5601: EAS Security is protection for your shop or retail chain and the
word it self means Electronic Article Surveillance. An EAS Security system usually consists of EAS
Antennas and EAS Tags or labels. These components signals to each other if they come too close. For
instance if someone is trying to get a tagged item through the antennas, e.g. stealing it. Protecting your
store with EAS Security is an easy way to decrease external shrinkage. The EAS antennas are in
themselves deterrent for shoplifters and reports show that EAS Security systems can decrease external
shrinkage with 50-90%.

[21:29, 30/11/2022] +263 71 711 5601: Who has a need for EAS Security?

Everyone who has a brick and mortar store and has a problem with shrinkage could benefit from a EAS
system. Today the worst shoplifting problem is organized groups that go in to stores and steal items in
big quantities. But one shouldn´t underestimate the amateur shoplifting either. With an EAS Security
system you can prevent a big part of that from happening to your store. For extra security you can
choose to integrate metal detection into your system. This will give you a silent alarm if someone enters
your store with a metal foiled bag. A metal foiled bag is something that organized shoplifters do to avoid
the standard EAS Security systems. You can read more about Integrated Metal Detection via the link
below.

Read more about Integrated Metal Detection here>>

EAS Tag

Where do I buy my EAS Security solution?

Gateway offer complete EAS Security systems for every need. We produce systems within all available
technologies (AM, RF and EM) to make sure we meet your needs. Our Security Solution Specialist will
help to guide you to the right EAS Solution.

Which EAS-security solution fits my specific needs?

Every store is unique and has its own needs regarding security. But in general, your type of sales items
determines the type of EAS Security solution you need.

An EAS Security System with RF technology is usually preferred by fashion stores or Supermarkets. Use
of the AM technology is a good option for most stores but work extra well for department stores,
cosmetic and health retailers and hardware stores. The EM technology is the oldest of the three. This
technology is mostly used by libraries these days, due to the corresponding EAS labels being possible to
activate and deactivate over and over again.

The easiest way to find the right solution for your business is to contact our skilled Security Solution
Specialists. That will be able to help and guide you through the jungle of EAS systems.

What is EAS Security?


EAS Security is protection for your shop or retail chain and the word it self means Electronic Article
Surveillance. An EAS Security system usually consists of EAS Antennas and EAS Tags or labels.  These
components signals to each other if they come too close. For instance if someone is trying to get a
tagged item through the antennas, e.g. stealing it. Protecting your store with EAS Security is an easy way
to decrease external shrinkage. The EAS antennas are in themselves deterrent for shoplifters and
reports show that EAS Security systems can decrease external shrinkage with 50-90%.

Electronic Article Surveillance or EAS for short is a cost effective anti-shoplifting system that permits staff
to focus on customers and not worry about theft. Often called shrinkage in the retail industry,
preventing shoplifting can be one of the biggest drivers for increasing profits by a retailer.

EAS systems work by attaching an electronic device, called a “tag” or “label”, to the displayed
merchandise. If merchandise bearing the electronic device passes by an antenna installed at the store
entrance/exit, an alarm sounds alerting your staff that unpaid merchandise is leaving the store.

EAS systems work well as a visual deterrent to the casual shoplifter, letting them know they will be
caught if they try to steal an item. For the more hardened criminal, the systems will notify the store staff
when something is being stolen. Typically these systems will reduce a stores shoplifting losses by almost
70%, adding a strong lift to the bottom line.

For paying customers, when the customer brings his or her selection to the cash counter to pay for the
item to be purchased, the sales clerk removes the tag from the item or deactivates the label on the item
so that the alarm will not sound when the customer leaves the store with the purchased merchandise.

  

Three Types of EAS Systems

Radio Frequency (RF) Systems

RF systems work by installing an antenna at the store entrance/exit which creates a narrow, low-
frequency, electro-magnetic radio field around itself. When a tag or label enters this field, it causes the
antenna to alarm. The systems are offered in a variety of frequencies in the RF spectrum with 8.2MHz
being the most popular. Other frequencies are 1.81, 1.95, 2.0, 3.25 and 4.7.

RF EAS Systems are most commonly used by retailers and tend to be the least expensive. Works well for
apparel, shoes, sporting goods, liquor and housewares.

Acoustic Magnetic (AM) Systems

AM EAS works similar to the RF EAS System, but when the tag or label enters the field, it vibrates. It is
this vibration which generates a signal that is picked up by the antenna. AM systems use a 58KHz
frequency and are a nice option in environments that have a lot of radio noise from other sources.

AM EAS Systems work well for consumer electronic, home improvement, grocery and pharmaceuticals.

 
Electro Magnetic (EM) Systems

EM EAS System also works in a manner similar to the RF EAS System, but uses a different part of the
electro-magnetic spectrum to communicate. The transmitting antenna sends a signal at a specific
frequency and the receiving antenna waits and listens for a tag of specific frequency to enter the range
of detection. If an active tag comes into the range of detection, it sends a signal to the receiving antenna
which identifies a different frequency and sounds the alarm.

EM EAS Systems are the preferred choice of vendors of books and art supplies as the EM labels long and
narrow - they are slightly larger than the width of a human hair and attach inconspicuously to the
merchandised item. They can be deactivated and reactivated again which works well for checking out
book and then checking them back in again.

INEO offers all three types of EAS security systems from various manufacturers, in different price ranges,
and with many different feature sets. We would be pleased to review your merchandising approach and
your store layout with you and give our recommendation of which system will work best for your store.

Types of EAS Antennas

Transceiver EAS Antennas

Transceiver EAS Antennas are single antennas which act both as a creator of a magnetic field and a
receiver of input from that field. EAS Systems using transceiver antennas are the least expensive
systems. They typically broadcast up to a metre (39 inches effectively, and one unit can cover a typical
door. Two units can easily protect a double door and if spaced properly two units can also cover a 4
metre opening into a mall environment. Since the units broadcast and receive they typically do so in all
directions thus tagged or labeled merchandise can not be placed too close to the installed antenna.
Transceiver antennas are available for both RF and AM EAS Systems. These units are the most popular
on the market today and come in a variety of form factors including the wildly popular INEO Clarity,
clear acrylic system which looks very modern and elegant.

Multiple Antennas EAS Systems

The most common form of Multiple Antenna EAS Systems is the Single Aisle Dual Antenna EAS System in
which more than one antennae are used to form an aisle to the store entrance. One of these antennas is
a transmitter and the other is a receiver. The antennas create a low frequency radio wave field between
them so that if tagged merchandise passes through this field, the tag or label on the merchandise is
sensed by the antennas and causes an alarm.

The Single Aisle Dual Antenna System is used where the door opening into your store is more than one
meter (36″) and is therefore too wide to employ an EAS Transceiver System. Because the focus of
the radio wave field is between the antennas, this type of EAS System permits tagged or labeled
merchandise to be placed within 2 meters (72″) of the EAS System.

When a door opening exceeds 2 meters (72″), additional EAS System antennas are installed to create
additional aisles to the width of the door opening.

You might also like