cit access card

Upload: pheonixflame993859

Post on 08-Apr-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/6/2019 CIT Access Card

    1/15

    Computer and IT in Workplaceindividual

    assignment

    2010

    Table of Contents

    Table of Contents .................................................................................................. 1

    Abstract ................................................................................................................ 2

    Acknowledgement ................................................................................................. 3

    The Card ................................................................................................................ 7

    The Reader ............................................................................................................ 8

    The Access Control Panel (Controller) .................................................................... 8

    Impact of the Technology .................................................................................... 10

    Differences ......................................................................................................... 12

    ............................................................................................................................ 12

    Chapter 1 Human Aspects of computing ........................................................... 12

    Recommendation ................................................................................................. 14

    ............................................................................................................................ 14

    In this part I want to recommend this organization (Sky villa) to usemodern cards that give the controller ability to cancel the card when is been lost.

    That will make the lost card useless. That because when the owner lost his or her

    card and someone find it he could easily enter the building without any notice. I

    also recommend sky villa to make a yearly check and updates the owner's

    information. That because when the residence leave the condominium he\she

    left the card to another person and that person uses it under the old owner

    name. ............................................................................................................... 14

    Conclusion .......................................................................................................... 14

    ............................................................................................................................ 14

    To make a long story short, Access Card System is a vital program to Sky Villa

    Condominium. And it improves the security of this organization. I hope that every

    houses or organization would get the benefit of this system.............................. 14

    ..................................................................................................................... 14

    References ........................................................................................................... 15

    ............................................................................................................................ 15

    1

  • 8/6/2019 CIT Access Card

    2/15

    Computer and IT in Workplaceindividual

    assignment

    2010

    {Sky Villa Condominium Administration 2009} ................................................. 15

    ........................................................................................................................... 15

    Abstract

    This is a research explaining a scenario that would benefit from using computers

    and information technology. The report is about the Card Access System. This system is

    worthy because it can be applied in many different places such as homes, hotels, companies

    and condominiums. It is the ability to log and keep track of who access a particular door and

    2

  • 8/6/2019 CIT Access Card

    3/15

    Computer and IT in Workplaceindividual

    assignment

    2010

    when it was accessed is a great advantage when it comes to investigating a security breach or

    theft.

    Besides that, the research is also explain the functionality, advantages,

    disadvantages, and impact of the technology in the organization, as well as identify and

    discuss the similarities and differences with at threetechnologies covered in the CITW

    Module. Three modules areHuman Aspects of Computing and Enterprise ComputingThe writer is also come up with few recommendation that can be done in order to solve some

    problems enhance the current situation.

    Acknowledgement

    I am very pleased to this assignment because it is my first time. I am also

    pleased to say that I learned a lot of things in my Computing in Work Place classes. Before

    this I had no idea about this subject. But now I have a lot of information which are new for

    my knowledge.

    For this I would like to thinkboth Ms.KHALIDA SHAJARATUDDUR BT.

    HARUN and Mr.ABUBAKAR S. SANTURAKIfor theircontinued help and supervision

    3

  • 8/6/2019 CIT Access Card

    4/15

    Computer and IT in Workplaceindividual

    assignment

    2010

    during my assignment. They always give me the useful information in order to help my

    complete this assignment. Honestly without their guidelines I would not be able to complete

    this assignment.

    Your student

    Introduction

    Nowadays there is a shortage in free space epically in the modern cities like

    Kuala Lumpur and because of that people try hard to find the most secure and comfortable

    to live in. So they start to build condominiums and those condominiums should have a good

    security system in order to attract the customers. One of these condominiums is Sky Villa

    condominium.

    Sky villa is the organization name that my research is about. It is

    condominium located in serdang, near south city plaza, UPMuniversity,Kuala

    Lumpur, Malaysia. This condominium was built about seven years ago. It is content of twomain buildings. Each one is content of twenty floors and each floor is content of twenty

    apartments. This condominium is owned by different owners. The subservices in this

    condominium are service apartment, with security, swimming pool, gym, sauna room. There

    are about 3200 residences in this condominium and it is necessary to secure all of them.

    Therefore the organization finds a way to which is the access card system. {Sky Villa

    4

  • 8/6/2019 CIT Access Card

    5/15

    Computer and IT in Workplaceindividual

    assignment

    2010

    Condominium Administration,2009}

    Current Scenario

    Now, more than ever, security is fast becoming a concern for many. From large

    private corporations to Small Medium Enterprises, from Private Condominium to Public

    Apartments, more and more people are installing security systems, protecting what matters

    most, and gaining for themselves the peace of mind protection they desire.

    5

  • 8/6/2019 CIT Access Card

    6/15

    Computer and IT in Workplaceindividual

    assignment

    2010

    Before this technology most of organizations were depending on the human

    guards and all those old methods, but after this technology the organization gets the benefit in

    many different ways such as it will reduce the expenditure on employing human security.

    There are various companies that manufacture card-based access control systems

    for doors and elevators. The best products are built on a foundation of versatility. Physical

    access control systems should satisfy a wide range of needs, suitable for all budgets.

    Strong sturdy doors with good locks are the front line defense against break-in. However no

    matter how good the lockset, how sturdy the door, its greatest weakness lies in the way we

    manage the distribution and allocation of keys. As keys are cheap and easy to duplicate, it

    poses a security risk whenever a key is lost. Do we simply replace the lost key or do we

    changed the lock? And what if disgruntled residences dismissed or had resigned? Do we

    know for a fact that they did not hold any duplicates?

    Electronic Card Access System offers a better alternative as their authorization to your office

    is programmable. A residence that leaves the condominium can be notes simply by

    programming the reader.

    Functionality

    Any card access system will consist offour basic elements. Depending on the size and

    purpose of the system, there may be many additional types of devices however the four basic

    elements are:

    1. Cards

    2. Readers (possibly equipped with keypads)

    3. Access control panels (controllers)

    6

  • 8/6/2019 CIT Access Card

    7/15

    Computer and IT in Workplaceindividual

    assignment

    2010

    4.An operator interface or Host PC

    }www.securevision.com} {Accessed in September 26, 2009{

    The Card

    A card (or transponder) is a passive electronic device that relies on a reader to provide the

    necessary power for start-up and communication. Any access card simply carries a set of

    binary numbers (ones and zeros) that are used to identify the cardholder. HID Global

    produces technology-based identity and access management and identification, HID makes

    cards that are capable of carrying this kind of binary data including:

    Magnetic Stripe

    Wiegand (swipe)

    125 kHz Prox

    MIFARETM contactless smart cards

    13.56 MHz iCLASS contactless smart cards

    There are special characteristics of both MIFARE and iCLASS cards

    and readers that will be briefly addressed at the end of this document.

    The means of encoding data on the card and conveying the data to the

    reader varies according to the technology involved. In every case,

    however, the data on the card is a string of binary numbers of some

    fixed configuration and length.

    In the vast majority of cases, the data on the card is comprised only of the format that will

    eventually be received by the controller.

    In extremely rare cases, an additional code will be carried on the card that is linked to a

    specific group of readers. This ID code will be stripped off by the reader and only the format

    sent to the controller.

    The card itself has no awareness of the makeup of its format, nor is it aware of any access

    privileges for the cardholder. That information exists only at the controller, and possibly the

    host (if present).

    7

  • 8/6/2019 CIT Access Card

    8/15

    Computer and IT in Workplaceindividual

    assignment

    2010

    The ReaderA reader is an electronic component of a physical access

    control system. Usually a self-contained unit, the is an

    autonomous device that performs the single purpose of

    interfacing to a card and providing an output to an access

    control panel.HID makes readers that are compatible with

    each of the five types of cards listed above. In every case,

    each reader can only talk to its corresponding card type sinceeach of the technologies is unique.

    All standard readers using any listed technology simply

    convert the binary card data to Wiegand (or other) Protocol

    and send it without changes to the controller.

    Certain proprietary readers will receive the site-specific ID code from

    matching proprietary cards. Those readers will strip away the ID code and

    send only the remaining binary data to their controller.

    The reader itself has no awareness of the makeup of the card data format,

    nor is it aware of any access privileges for the cardholder.

    }http://www.pdffactory.com}{Accessed on 12 September , 2009

    The Access Control Panel (Controller)

    When the controller receives the data from the reader, its software begins the process of

    deciding whether or not to grant access. This is usually done in several stages.

    Does the length of the data format match what the controller is expecting? Some controllers

    are designed to only accept a certain length of data (34 bits for example.) If the data from the

    8

  • 8/6/2019 CIT Access Card

    9/15

    Computer and IT in Workplaceindividual

    assignment

    2010

    card is too long or too short, the controller may ignore it completely. Other controllers may

    have a special access denied for a non-matching format length.

    Does the format structure make sense to the controller? If the length is acceptable, the

    controller then breaks the binary string down into its component parts. These might include:

    o Facility Code

    o Site Code

    Does the Facility Code match? The controller will examine the data to determine if the

    Facility Code portion matches the one that has been programmed into the controller. Some

    controllers can support many different Facility Codes, possibly even multiple formats. If the

    Facility Code doesnt match, access will be denied and a log message generated. Does the Site Code match? If the format contains a Site Code or other secondary identifier,

    it will be handled just like the Facility Code above.

    Is the Card Number within the allotted range? If yes, the decision process will continue. If

    no, access will be denied and a log is generated.

    Is the Card Number in memory? If yes, the process continues. If no, access is denied and a

    card not in memory log is generated. Is the card valid at the reader at this day and time?

    Yes, access will be granted and the lock relay will be activated. If no, a log message will be

    generated that will identify the reason for denial.

    {www.hidcorp.com}{Accessed September 10, 2009}

    Advantages

    This technology has many advantages. Some of them are:

    Light in size. It is easy to be carried to anywhere.

    It will reduce the expedition of the human guards.

    It is fixable. It can be replaced in another place or door.

    9

  • 8/6/2019 CIT Access Card

    10/15

    Computer and IT in Workplaceindividual

    assignment

    2010

    Anyone can depend in it this is because you do not have to

    worry ofhonest less of the human guards.

    Time Attendance report. Another important advantage is that

    this organization uses this technology as attendance evidence in any

    crimes situation.

    Disadvantages

    The card is easy to be stolen. That simply because it small that

    make the holder to forget that it is with him or not.

    Anyone can use it without the owner promotion. And that

    could harm the owner in if a crime happened. The system will show his

    name as an evidence.

    Impact of the Technology

    Access control is a vital concern for a business of any size, today. With the rising

    number of attack crimes, and by this technology the organization can make high level of

    security. And that will benefit the organization by raising the number of customers. This

    technology also helps the organization by reducing the amount of money that without this

    technology the organization would spend it to hired human guards.

    Similarities

    Chapter 1 Human Aspects of Computing

    10

  • 8/6/2019 CIT Access Card

    11/15

    Computer and IT in Workplaceindividual

    assignment

    2010

    There are some similarities between access card system and the

    Human Aspects of Computing chapter in the CITW module. One of the

    similarity is that HCI and access card system are designed a computer

    systems that support people so that they can carry out their activities

    productively and safely.HCI is used to describe the interaction between a

    user and a computer and in the access card there is an interaction between

    the user and the computer.

    Another similarity is the card shape. The design of the card

    made to by comfort the user by soft plastic that is because to make

    usability and simplicity.

    Chapter 13 Enterprise Computing

    In this chapter access card system is like distribution systems

    because all the information in one computer and the readers are in many places.

    Also this system is like the information system because it monitors and

    only gives access to the allowed people to enter.

    Also in this chapter access card system is considered as Information

    System in the Enterprise because it is set of hardware which is the card and the readers,

    software which is the controller, data, and people that work together to produce safety. The

    access card system is considered as Transaction processing system TPS because it Captures

    and processes data from day-to-day transactions in the organization.

    Chapter Ethical & Legal Issues

    In this chapter access card system is similar to this topic in the unauthorized

    access. When the owner lost his\her card anyone can enter the building easily. Another

    similarity is information privacy. This system protracts the information of the user by

    11

  • 8/6/2019 CIT Access Card

    12/15

    Computer and IT in Workplaceindividual

    assignment

    2010

    putting them in the server not in the card. And that make it secure if the card lost that no one

    can read the information because the information are not in the card the number is only in the

    card.

    Differences

    Chapter 1 Human Aspects of computing

    There are some differences between Access Card System and the Human Aspects

    of computing chapter. One of those differences is Health Concerns of Computer such as

    Computer vision syndrome CVS and Repetitive strain injury (RSI). But in access card

    system there is not health concern.

    Another different in this topic is that the computer in the access card system is

    always on and that against the green computing because the electricity is on and that

    consider as waste while using computer.

    Chapter 13 Enterprise Computing

    In this topic the different is functional unit in the Enterprise and the functional

    unit in the access card system. In the Enterpriseare usually departments and centersbut in

    this system the functional unit are the three elements of the system which are card, reader

    and controller.

    12

  • 8/6/2019 CIT Access Card

    13/15

    Computer and IT in Workplaceindividual

    assignment

    2010

    Another different is the access card system is similar to the TPS but not to the

    CMS or CAD programs because it does not make computer aided. It is just a software

    that in a server (computer).

    Chapter Ethical & Legal Issues

    In this topic the different is that in the access card system does not have cookies

    in the card reader because it just check the card and send the number to the computer and the

    computer see if the number is correct will allowed by sending back to the reader to open, so

    the reader does not store any information in it that can be cookies.

    Another different is, since anyone could lost his\her card the system cannot tell that

    the person is having the right card or not and that could be unauthorized access.

    13

  • 8/6/2019 CIT Access Card

    14/15

    Computer and IT in Workplaceindividual

    assignment

    2010

    Recommendation

    In this part I want to recommend this organization (Sky villa) to use modern cards

    that give the controller ability to cancel the card when is been lost. That will make the

    lost card useless. That because when the owner lost his or her card and someone find it he

    could easily enter the building without any notice. I also recommend sky villa to make a

    yearly check and updates the owner's information. That because when the residence leave

    the condominium he\she left the card to another person and that person uses it under the old

    owner name.

    Conclusion

    To make a long story short, Access Card System is a vital program to Sky VillaCondominium. And it improves the security of this organization. I hope that every houses or

    organization would get the benefit of this system.

    14

  • 8/6/2019 CIT Access Card

    15/15

    Computer and IT in Workplaceindividual

    assignment

    2010

    References

    {Sky Villa Condominium Administration 2009}

    {http://www.securevision.com} {Accessed 26 September 2009}

    {http://www.hidcorp.com}{Accessed 10 September 2009}

    }http://www.pdffactory.com}{accessed 12 September 2009{

    15