this proposal is not full version some of the missing data will be posted soon. and be sure to see the full version soon.
thanks
any advice you have you can comment me.
sorry for the English language, since it is not my mother tonge. i am such less in it.
thanks again
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Information security proposal for electronic door lock
1. WOLKITE UNIVERSITY
COLLAGE OF COMPUTING
AND INFORMATICS
DEPARTMENT OF SOFTWARE ENGINEERING
SECTION 1
PROJECT TITLE :- ORGANIZATION DOOR LOCK SECURITY
YEAR :- 2015/16
GROUP MEMBERS ID
1. TAGAGN DIRIBA CIR/333/06
2. MULUNEH NAGASH CIR/286/06
3. MERON MEZGEBE CIR/253/06
4. DEBEBE HABTE CIR/103/06
5. HABTAMU ABABU CIR/170/06
Submitted to Mr. ALEMU
Submission date :-
2. TABLE OF CONTENTS
1. Chapter one requirement analysis and design
1.1. Introduction
1.2. Background
1.3. Statement of problem
1.4. Objective
1.5. Constraints and scope
1.6. Feasiblity analysis
2. Chapter two description of the system
2.1. Major functions of the current system
2.2. Users of the Existing System
2.3. Components of the Existing System
2.4. Problems of the Current System
2.5. Business Rules/Security Policy of the current system
3. Chapter three :- Information Security Policy Development
3.1. Introduction
3.2. Purpose
3.3. Scope
3.4. Organization of Information Security/Responsibilities for Information Security
3.5. Policy Statement
3.6. Policy Framework
4. Chapter four :-system design
4.1. High level design
4.2. Low level design
4.3. Physical design
4.4. Logical design
4.5. Component design
4.6. Interfaces design
5. Chapter five
5.1. Testing Strategy
5.2. Maintenance Mechanismm
5.3. Conclusion
5.4. Recommendation
6. References
3. Chapter ONE (1)
1. Requirement Analysis and Elicitation on Organization Door Lock Security
1.1. INTRODUCTION
Organization Door Lock Security System is one mechanism of securing an organization from
an authorized user for sensitive sites within the organization, like Database, server room and
so on.The purpose of the Organization Door Lock Security System is to create an
environment within the organization that maintains system security, data integrity and
privacy by preventing unauthorized access to data and by preventing misuse of, damage to,
or loss of data. The organization will adhere to the policies identified in this document and
use these standards in which to develop, implement, and maintain the
security. Technological advances and changes in the District requirements will necessitate
periodic revisions; therefore, the organization will review and update IT security plans at
least annually or following any significant change to its business, computing, or
telecommunications environment.
the smart card access system will allow members of the organization to access the building
using a magnetic stripe card, such as a smartcard or atm card. a bas-enabled door would permit
users to swipe a valid card, open the door within five seconds, and enter the building. a secure,
off-site database will monitor system activity by keeping an audit trail of access attempts.
system administrators will be able to modify the list of approved users by adding new or
removing existing cards.in the event of a power failure, the system will be supported by a backup
battery.
users of the organization need a more efficient method of access control than currently employed.
the standard lock and key system requires monitoring the distribution of keys and periodic
replacement of locks and lost or stolen keys. the system will provide organization administrators
with better control over which users are granted access and will allow users to utilize cards that
they already carry with them.
1.2. BACKGROUND
This organization has a secured door lock system, since it holds very sensitive information, but
the system was highly vulnerable. Due to its high vulnerable rate it is recommended to use
4. highly secured system and here is how it works. Some of the basic mechanisms that used to
know the authorized user are :- finger print reading, granting password, using master card,
detecting iris, and when it is recommended to use highly secured situation the system is
designed in …….. stages, first the user that want to enter that room have to use its password,
and unlock the first door, since the password can be gate by many means, it is necessary to
check its iris, and if the iris detection is matched to the one of the authorized user, but this is
not the last detection, since when the system is secured it’s vulnerability also increase then,
what if the user is not the authorized person but has authorized iris, then the last chance is
catching the movement of his body like arm , leg, neck and so on when he/she is walking.
1.3. Statement of the problem
As it is told earlier no system is 100% secured with no vulnerability, but the level of
vulnerability is different, it is not possible to remove security vulnerability, but we can reduce
it,
In our security system the basic problems are,
a. Password cracking and accessing, passwords of the doors can be cracked or
unauthorized user can gate it throw many systems.
b. The second is some persons can create their id that seems the same to the systems,
and it would read it.
c. The third is, a person that wants to use the sensitive data would create an artificial iris
digitally by copping one of users’ iris.
1.4.Objective
The WCF will be provided with the Buzz Card Access System (BAS), which is an
electric access control system consisting of magnetic card readers and magnetic locks, all
controlled by a central single board computer (SBC). The BAS will replace the current lock
and key system on three of the five doors in the WCF. For each card swipe, the card reader
will transmit the data to the SBC. The SBC will then decode the information and compare it
against a locally stored access list, unlocking the door for five seconds if the user is
approved. Each access attempt will be logged and sent to a secure off-site location via FTP.
System administrators will be able to modify the approved users list, view the access logs,
and override lock status via a web server interface.
1.5.DISCRIPTION OF THE SYSTEM
Here we see the overall description of the security system. How it worked, how it remove
unauthorized user and
The system will be controlled by a Linux single board computer which will receive
information from the card readers and password reader keyboard, manipulate the magnetic
locks in response to that data, and maintain activity logs. The target price was chosen to be
realistic yet competitive. These goals ensure that WCF members will receive a secure,
efficient, and reliable system for controlling access to their facility.
1.6. Scope and constraints of the project
Magnetic locks were chosen in place of strike locks due to the difficulty that the
previous group found in installing the latter. However, magnetic locks draw a
5. constant current while active, which in turn may necessitate a larger backup battery.
The card readers were chosen based on convenience. They are the same model
employed throughout campus, and extras are readily available. The Linux SBC was
chosen due the available data from the work done with it by the previous group.
Magnetic stripe reading was selected over RFID-based access because users are far
more likely to carry cards with magnetic stripe encoding.When we come to the
password based doors, it is a low range circuit, i.e. it is not possible to operate the
circuit remotely.
1.7. Feasibility analysis
Chapter two
2. Description of current system
The traditional lock system presently used in this organization facility is cumbersome, time
consuming, and subject to user abuse. Currently, each facility member needs a key in order to
access the building. As the number of members of the organization varies, keys have to be
stored, redistributed, and duplicated. The possibility of unauthorized copying of keys poses a
security threat to the facility and requires periodic expensive lock replacement.The current
system costs the WCF a significant amount of time and money.
By implementing the BAS, administrative and maintenance costs will be reduced.
Approved members can swipe any magnetic stripe card, such as a BuzzCard, and instantly gain
access to the building. System administrators can easily revise the user list by logging on and
adding or removing cards as needed. The magnetic locks do not need to be replaced as different
users lose and gain access, and keys do not need to be issued
Flowchartof the system
Match not found
input combinations
given by user Match found
checking
Increment
counter
Unlock
door
Count
=3
Operation
disabled
6. 2.1. Major functions of the system
The goals for this project are as follows:
Reads magnetic stripe cards
Accept number passwords to access the door
Automatically locks and unlocks doors
Admits only authorized users
Records activity logs
Catch the neck, arm and leg movement to access very sensitive sites in the organization
Transmits logs off-site
Allows for administrative control via a web server
Contains a backup battery
Alarm
2.2. Users of the existing system
Anyone who used the existing system should have an understanding about the system, and how can
he/she use this system easily. So everyone in the organization should have a training for some days
untill it becomes easy to use. And everybody in the organization should have remember the
password or not forget the magnetic card everyday and time in order to access the room in the
organization, since it is managed digitally no-one is allowed to access the door without the given
password or card. Here it will be hard to implement for some days until the users understand the
system.
2.3. Components of the existing system
The existing system was not digital or electronics, it uses mechanical locks. It have only key and
pad.
2.4. problems of the existing system
if anyone gets the copy of the key he/she can get through it.
Generally, it is easy to say it was not secured.
2.5. Business Rules/Security Policy of the current system
The basic
3. Chapter three :- Information Security Policy Development
Here we see what are the basic information security policy development of the system.
alarm
7. 3.1. Introduction
3.2. Purpose
3.3. Scope
3.4. Organization of Information Security/Responsibilities
for Information Security
3.5. Policy Statement
3.6. Policy Framework
4. Chapter four :-system design
Design principle of password based doorlock security sysetm
Power supply
unit
Output
unit
Input unit
Control
unit
8. 4.1. High level design
The high level design of the system includes the overall System Design in terms
of Functional Architecture and Database design
Our project contains many hardware and software components that have to be
implemented and they have to be compatable with eachother. Some of them are
listed,
1. Hardware components
Workstation,server, ,door,card reader,keyboard,DC motor.lcd,relay.
2. Software components
Database,security system.
The image Below is how the system generally do its task.
Keypad is an input device that helps to enter a code to open the door. It gives the entered code
signals to the microcontroller.
LCD and BUZZER are the final indicating devices for displaying informayion and alarming.
DC Motor it moves the door opens and closes the door.
Relay it drives this motor by recieving control signals from microcontroller.
4.2. Low level design
Low level design is the operations performed in the system. High level design is created based
up on the low level design.
Here is how how the system is performing it’s task.
4.3. Physical design
4.4. Logical design
9. 4.5. Component design
4.6. Interfaces design
Here we see how the user can input data to the system and how the system gives the
output.
First we have to see how the system is lookslike to the endusers by diagrm.
5. Chapter five
5.1. Testing Strategy
5.2. Maintenance Mechanismm
5.3. Conclusion
Motor specificationistobe determined.
Choice of flip-flopstill hasascope of verification.
Microcontrollercanbe implementedforacquiringmore intelligence inoursystem.
16 bit registercanbe usedfor more protection.
We can alsolockour systembyusingthe same password.
5.4. Recommendation