cit access card
TRANSCRIPT
-
8/6/2019 CIT Access Card
1/15
Computer and IT in Workplaceindividual
assignment
2010
Table of Contents
Table of Contents .................................................................................................. 1
Abstract ................................................................................................................ 2
Acknowledgement ................................................................................................. 3
The Card ................................................................................................................ 7
The Reader ............................................................................................................ 8
The Access Control Panel (Controller) .................................................................... 8
Impact of the Technology .................................................................................... 10
Differences ......................................................................................................... 12
............................................................................................................................ 12
Chapter 1 Human Aspects of computing ........................................................... 12
Recommendation ................................................................................................. 14
............................................................................................................................ 14
In this part I want to recommend this organization (Sky villa) to usemodern cards that give the controller ability to cancel the card when is been lost.
That will make the lost card useless. That because when the owner lost his or her
card and someone find it he could easily enter the building without any notice. I
also recommend sky villa to make a yearly check and updates the owner's
information. That because when the residence leave the condominium he\she
left the card to another person and that person uses it under the old owner
name. ............................................................................................................... 14
Conclusion .......................................................................................................... 14
............................................................................................................................ 14
To make a long story short, Access Card System is a vital program to Sky Villa
Condominium. And it improves the security of this organization. I hope that every
houses or organization would get the benefit of this system.............................. 14
..................................................................................................................... 14
References ........................................................................................................... 15
............................................................................................................................ 15
1
-
8/6/2019 CIT Access Card
2/15
Computer and IT in Workplaceindividual
assignment
2010
{Sky Villa Condominium Administration 2009} ................................................. 15
........................................................................................................................... 15
Abstract
This is a research explaining a scenario that would benefit from using computers
and information technology. The report is about the Card Access System. This system is
worthy because it can be applied in many different places such as homes, hotels, companies
and condominiums. It is the ability to log and keep track of who access a particular door and
2
-
8/6/2019 CIT Access Card
3/15
Computer and IT in Workplaceindividual
assignment
2010
when it was accessed is a great advantage when it comes to investigating a security breach or
theft.
Besides that, the research is also explain the functionality, advantages,
disadvantages, and impact of the technology in the organization, as well as identify and
discuss the similarities and differences with at threetechnologies covered in the CITW
Module. Three modules areHuman Aspects of Computing and Enterprise ComputingThe writer is also come up with few recommendation that can be done in order to solve some
problems enhance the current situation.
Acknowledgement
I am very pleased to this assignment because it is my first time. I am also
pleased to say that I learned a lot of things in my Computing in Work Place classes. Before
this I had no idea about this subject. But now I have a lot of information which are new for
my knowledge.
For this I would like to thinkboth Ms.KHALIDA SHAJARATUDDUR BT.
HARUN and Mr.ABUBAKAR S. SANTURAKIfor theircontinued help and supervision
3
-
8/6/2019 CIT Access Card
4/15
Computer and IT in Workplaceindividual
assignment
2010
during my assignment. They always give me the useful information in order to help my
complete this assignment. Honestly without their guidelines I would not be able to complete
this assignment.
Your student
Introduction
Nowadays there is a shortage in free space epically in the modern cities like
Kuala Lumpur and because of that people try hard to find the most secure and comfortable
to live in. So they start to build condominiums and those condominiums should have a good
security system in order to attract the customers. One of these condominiums is Sky Villa
condominium.
Sky villa is the organization name that my research is about. It is
condominium located in serdang, near south city plaza, UPMuniversity,Kuala
Lumpur, Malaysia. This condominium was built about seven years ago. It is content of twomain buildings. Each one is content of twenty floors and each floor is content of twenty
apartments. This condominium is owned by different owners. The subservices in this
condominium are service apartment, with security, swimming pool, gym, sauna room. There
are about 3200 residences in this condominium and it is necessary to secure all of them.
Therefore the organization finds a way to which is the access card system. {Sky Villa
4
-
8/6/2019 CIT Access Card
5/15
Computer and IT in Workplaceindividual
assignment
2010
Condominium Administration,2009}
Current Scenario
Now, more than ever, security is fast becoming a concern for many. From large
private corporations to Small Medium Enterprises, from Private Condominium to Public
Apartments, more and more people are installing security systems, protecting what matters
most, and gaining for themselves the peace of mind protection they desire.
5
-
8/6/2019 CIT Access Card
6/15
Computer and IT in Workplaceindividual
assignment
2010
Before this technology most of organizations were depending on the human
guards and all those old methods, but after this technology the organization gets the benefit in
many different ways such as it will reduce the expenditure on employing human security.
There are various companies that manufacture card-based access control systems
for doors and elevators. The best products are built on a foundation of versatility. Physical
access control systems should satisfy a wide range of needs, suitable for all budgets.
Strong sturdy doors with good locks are the front line defense against break-in. However no
matter how good the lockset, how sturdy the door, its greatest weakness lies in the way we
manage the distribution and allocation of keys. As keys are cheap and easy to duplicate, it
poses a security risk whenever a key is lost. Do we simply replace the lost key or do we
changed the lock? And what if disgruntled residences dismissed or had resigned? Do we
know for a fact that they did not hold any duplicates?
Electronic Card Access System offers a better alternative as their authorization to your office
is programmable. A residence that leaves the condominium can be notes simply by
programming the reader.
Functionality
Any card access system will consist offour basic elements. Depending on the size and
purpose of the system, there may be many additional types of devices however the four basic
elements are:
1. Cards
2. Readers (possibly equipped with keypads)
3. Access control panels (controllers)
6
-
8/6/2019 CIT Access Card
7/15
Computer and IT in Workplaceindividual
assignment
2010
4.An operator interface or Host PC
}www.securevision.com} {Accessed in September 26, 2009{
The Card
A card (or transponder) is a passive electronic device that relies on a reader to provide the
necessary power for start-up and communication. Any access card simply carries a set of
binary numbers (ones and zeros) that are used to identify the cardholder. HID Global
produces technology-based identity and access management and identification, HID makes
cards that are capable of carrying this kind of binary data including:
Magnetic Stripe
Wiegand (swipe)
125 kHz Prox
MIFARETM contactless smart cards
13.56 MHz iCLASS contactless smart cards
There are special characteristics of both MIFARE and iCLASS cards
and readers that will be briefly addressed at the end of this document.
The means of encoding data on the card and conveying the data to the
reader varies according to the technology involved. In every case,
however, the data on the card is a string of binary numbers of some
fixed configuration and length.
In the vast majority of cases, the data on the card is comprised only of the format that will
eventually be received by the controller.
In extremely rare cases, an additional code will be carried on the card that is linked to a
specific group of readers. This ID code will be stripped off by the reader and only the format
sent to the controller.
The card itself has no awareness of the makeup of its format, nor is it aware of any access
privileges for the cardholder. That information exists only at the controller, and possibly the
host (if present).
7
-
8/6/2019 CIT Access Card
8/15
Computer and IT in Workplaceindividual
assignment
2010
The ReaderA reader is an electronic component of a physical access
control system. Usually a self-contained unit, the is an
autonomous device that performs the single purpose of
interfacing to a card and providing an output to an access
control panel.HID makes readers that are compatible with
each of the five types of cards listed above. In every case,
each reader can only talk to its corresponding card type sinceeach of the technologies is unique.
All standard readers using any listed technology simply
convert the binary card data to Wiegand (or other) Protocol
and send it without changes to the controller.
Certain proprietary readers will receive the site-specific ID code from
matching proprietary cards. Those readers will strip away the ID code and
send only the remaining binary data to their controller.
The reader itself has no awareness of the makeup of the card data format,
nor is it aware of any access privileges for the cardholder.
}http://www.pdffactory.com}{Accessed on 12 September , 2009
The Access Control Panel (Controller)
When the controller receives the data from the reader, its software begins the process of
deciding whether or not to grant access. This is usually done in several stages.
Does the length of the data format match what the controller is expecting? Some controllers
are designed to only accept a certain length of data (34 bits for example.) If the data from the
8
-
8/6/2019 CIT Access Card
9/15
Computer and IT in Workplaceindividual
assignment
2010
card is too long or too short, the controller may ignore it completely. Other controllers may
have a special access denied for a non-matching format length.
Does the format structure make sense to the controller? If the length is acceptable, the
controller then breaks the binary string down into its component parts. These might include:
o Facility Code
o Site Code
Does the Facility Code match? The controller will examine the data to determine if the
Facility Code portion matches the one that has been programmed into the controller. Some
controllers can support many different Facility Codes, possibly even multiple formats. If the
Facility Code doesnt match, access will be denied and a log message generated. Does the Site Code match? If the format contains a Site Code or other secondary identifier,
it will be handled just like the Facility Code above.
Is the Card Number within the allotted range? If yes, the decision process will continue. If
no, access will be denied and a log is generated.
Is the Card Number in memory? If yes, the process continues. If no, access is denied and a
card not in memory log is generated. Is the card valid at the reader at this day and time?
Yes, access will be granted and the lock relay will be activated. If no, a log message will be
generated that will identify the reason for denial.
{www.hidcorp.com}{Accessed September 10, 2009}
Advantages
This technology has many advantages. Some of them are:
Light in size. It is easy to be carried to anywhere.
It will reduce the expedition of the human guards.
It is fixable. It can be replaced in another place or door.
9
-
8/6/2019 CIT Access Card
10/15
Computer and IT in Workplaceindividual
assignment
2010
Anyone can depend in it this is because you do not have to
worry ofhonest less of the human guards.
Time Attendance report. Another important advantage is that
this organization uses this technology as attendance evidence in any
crimes situation.
Disadvantages
The card is easy to be stolen. That simply because it small that
make the holder to forget that it is with him or not.
Anyone can use it without the owner promotion. And that
could harm the owner in if a crime happened. The system will show his
name as an evidence.
Impact of the Technology
Access control is a vital concern for a business of any size, today. With the rising
number of attack crimes, and by this technology the organization can make high level of
security. And that will benefit the organization by raising the number of customers. This
technology also helps the organization by reducing the amount of money that without this
technology the organization would spend it to hired human guards.
Similarities
Chapter 1 Human Aspects of Computing
10
-
8/6/2019 CIT Access Card
11/15
Computer and IT in Workplaceindividual
assignment
2010
There are some similarities between access card system and the
Human Aspects of Computing chapter in the CITW module. One of the
similarity is that HCI and access card system are designed a computer
systems that support people so that they can carry out their activities
productively and safely.HCI is used to describe the interaction between a
user and a computer and in the access card there is an interaction between
the user and the computer.
Another similarity is the card shape. The design of the card
made to by comfort the user by soft plastic that is because to make
usability and simplicity.
Chapter 13 Enterprise Computing
In this chapter access card system is like distribution systems
because all the information in one computer and the readers are in many places.
Also this system is like the information system because it monitors and
only gives access to the allowed people to enter.
Also in this chapter access card system is considered as Information
System in the Enterprise because it is set of hardware which is the card and the readers,
software which is the controller, data, and people that work together to produce safety. The
access card system is considered as Transaction processing system TPS because it Captures
and processes data from day-to-day transactions in the organization.
Chapter Ethical & Legal Issues
In this chapter access card system is similar to this topic in the unauthorized
access. When the owner lost his\her card anyone can enter the building easily. Another
similarity is information privacy. This system protracts the information of the user by
11
-
8/6/2019 CIT Access Card
12/15
Computer and IT in Workplaceindividual
assignment
2010
putting them in the server not in the card. And that make it secure if the card lost that no one
can read the information because the information are not in the card the number is only in the
card.
Differences
Chapter 1 Human Aspects of computing
There are some differences between Access Card System and the Human Aspects
of computing chapter. One of those differences is Health Concerns of Computer such as
Computer vision syndrome CVS and Repetitive strain injury (RSI). But in access card
system there is not health concern.
Another different in this topic is that the computer in the access card system is
always on and that against the green computing because the electricity is on and that
consider as waste while using computer.
Chapter 13 Enterprise Computing
In this topic the different is functional unit in the Enterprise and the functional
unit in the access card system. In the Enterpriseare usually departments and centersbut in
this system the functional unit are the three elements of the system which are card, reader
and controller.
12
-
8/6/2019 CIT Access Card
13/15
Computer and IT in Workplaceindividual
assignment
2010
Another different is the access card system is similar to the TPS but not to the
CMS or CAD programs because it does not make computer aided. It is just a software
that in a server (computer).
Chapter Ethical & Legal Issues
In this topic the different is that in the access card system does not have cookies
in the card reader because it just check the card and send the number to the computer and the
computer see if the number is correct will allowed by sending back to the reader to open, so
the reader does not store any information in it that can be cookies.
Another different is, since anyone could lost his\her card the system cannot tell that
the person is having the right card or not and that could be unauthorized access.
13
-
8/6/2019 CIT Access Card
14/15
Computer and IT in Workplaceindividual
assignment
2010
Recommendation
In this part I want to recommend this organization (Sky villa) to use modern cards
that give the controller ability to cancel the card when is been lost. That will make the
lost card useless. That because when the owner lost his or her card and someone find it he
could easily enter the building without any notice. I also recommend sky villa to make a
yearly check and updates the owner's information. That because when the residence leave
the condominium he\she left the card to another person and that person uses it under the old
owner name.
Conclusion
To make a long story short, Access Card System is a vital program to Sky VillaCondominium. And it improves the security of this organization. I hope that every houses or
organization would get the benefit of this system.
14
-
8/6/2019 CIT Access Card
15/15
Computer and IT in Workplaceindividual
assignment
2010
References
{Sky Villa Condominium Administration 2009}
{http://www.securevision.com} {Accessed 26 September 2009}
{http://www.hidcorp.com}{Accessed 10 September 2009}
}http://www.pdffactory.com}{accessed 12 September 2009{
15