Simulation : authentication system for tracking staff and document in security room / Haireeza Abdul Rashid
Security room is a confidential place to keep confidential document. All documents in there are very secret and confidential. Security room needs a security system or devices to monitor everything go on. Security room at FTMSK does not have any security level to secure the room. Therefore we deve...
Saved in:
Main Author: | |
---|---|
Format: | Student Project |
Language: | English |
Published: |
Faculty of Information Technology and Quantitative Science
2006
|
Subjects: | |
Online Access: | http://ir.uitm.edu.my/id/eprint/849/1/PPb_HAIREEZA%20ABDUL%20RASHID%20CS%2006_5%20P01.pdf http://ir.uitm.edu.my/id/eprint/849/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Security room is a confidential place to keep confidential document. All documents in
there are very secret and confidential. Security room needs a security system or
devices to monitor everything go on. Security room at FTMSK does not have any
security level to secure the room. Therefore we develop an Authentication System for
Tracking Staff and Document in Security Room that use magnetic card and 4 unique
numbers as the security. User must have the magnetic card and remember the 4
unique numbers to enter the security room. An encrypted unique number is used in
this final project for security purpose. User has to swipe or touch the magnetic card to
the reader and key in 4 pin numbers. User identification number is program in the
magnetic card while the 4 unique numbers, user must memorize if user want to enter
the room or to take the document. Database examines the 4 unique numbers and if
allowed, user can enter the room or open the drawer where the document is placed.
By using this system, administrator manages to analyzed user’s activities by screening
last date accessed, staff identification, time, area of access and status of access. Area
of access is either door during enter and exit or drawer during taking the confidential
document. Administrator can also track document by viewing logs by identifying the
staff identification. In conclusion, Authentication System for Tracking Staff and
Document in Security Room provides features to administrator to investigate and
analyzed the users’ behaviors and activities. |
---|