SlideShare a Scribd company logo
1 of 2
To: Nathaniel Alexander
From: William Browning, WCB
Subject: Implementation of biometric security for system supplies and server area
Date: June 6, 2012
Purpose:
The purpose of this proposal is to inform of a lack of security on our server and system
storage room. This issue can be addressed by the proposed security feature below.
Summary:
Our security issues can be treated by the cost effective method of biometric security.
This is done through adding a biometric fingerprint scanner lock to the door of the server room
only granting access for authorized personnel. This will save time and money for no outside
interference can occur to the server causing it to shut down or collapse.
Introduction
In the past year there have been three incidents where non authorized personnel were
able to access the system storage and server room. Among these one case was severely
detrimental to the company and caused a complete shutdown of the server for a little over 8
hours damaging work production. The other two cases though being less sever showed a
breach in the room’s security. I feel the issue is coming from the server room being accessed
through the master key which all main managers hold thus allowing them to enter the secured
room as they please to access the storage room inside for their own person use of the parts
being stored inside.
Initial Research Findings:
I have found an answer to our issue through a new biometric security lock that can be
installed on the door of the server/storage room to secure the room from the unauthorized
personal that have been intruding in this area. The “1TOUCH XL” is our inexpensive and reliable
solution costing only $725.00 it holds up to 99 fingerprints that can be added and changed
quickly on the lock itself. It also holds three codes for the main users. When the door is shut the
lock is instantly engaged thus taking away human error of forgetting to lock the server door
back. The only issue noticeable is the lock runs on four AA batteries which will eventually drain
of power but it has a warning sensor that will tell you when the batteries are getting low. Since
the room much be accessed each morning for the hard drives to be switched we will be able to
easily notice when to change the batteries of the door. The studies on biometrics show how
this lock will help resolve our issue of security since the three passwords can be divided among
yourself, John and I who are the only ones authorized to enter and we can grant temporary
access to those who need it and with fingerprints being unique to each person there is no way
for an outside user to gain access. Many companies are beginning to switch to the use of
biometrics for security purposes and this could start us on a new path of security enforcement
at the office.
Analysis of the Problem:
By adding the “1TOUCH XL” to the server door no one that is not authorized to be in the
storage or server room will be able to gain access. This will make it so that the 3 incidences
from the past year cannot be followed by further offences and will not allow for outside actions
to affect the server or cause it to need to be shut down and replaced as for the most serious
incident that we have been effected by.
Recommendation:
My recommendation is for the implantation of the “1TOUCH XL” on the server door by
July 1, 2012. This gives enough time to inform the staff of the new security feature and letting
them know that is off limits for anyone not authorized to be in that area of the office.
References:
"Â Fingerprint Scanner Door Lock with RF Remote." Intelligent Biometric Controls Store. N.p.,
n.d. Web. 07 June 2012
.<http://www.fingerprintdoorlocks.com/products/1touchXL/1TouchXL_Fingerprint_Lock
.php>.
Wilson, Tracy. "How Biometrics Works." HowStuffWorks. N.p., n.d. Web. 07 June 2012.
<http://www.howstuffworks.com/biometrics.htm>.
Boggo, Thomas. "Common Questions about Biometric Technology." Ezinearticles.com. Ezine
Articles, n.d. Web. <http://ezinearticles.com/?Common-Questions-about-Biometric-
Technology&id=531257>.

More Related Content

Similar to Implement Biometric Security for Server Room

Development of anti theft security system
Development of anti theft security systemDevelopment of anti theft security system
Development of anti theft security system96452128
 
Unconventional Security Devices
Unconventional Security DevicesUnconventional Security Devices
Unconventional Security DevicesRoger Johnston
 
Automated Door Lock System using Arduino Uno Chapter 1-5.docx
Automated Door Lock System using Arduino Uno Chapter 1-5.docxAutomated Door Lock System using Arduino Uno Chapter 1-5.docx
Automated Door Lock System using Arduino Uno Chapter 1-5.docxAkmadAliAbdul1
 
33 Unconventional Security Devices
33 Unconventional Security Devices33 Unconventional Security Devices
33 Unconventional Security DevicesRoger Johnston
 
IRJET - Face Recognition Door Lock using IoT
IRJET - Face Recognition Door Lock using IoTIRJET - Face Recognition Door Lock using IoT
IRJET - Face Recognition Door Lock using IoTIRJET Journal
 
Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.uNIX Jim
 
Facial Recognition Door unlock using Machine Learning.
Facial Recognition Door unlock using Machine Learning.Facial Recognition Door unlock using Machine Learning.
Facial Recognition Door unlock using Machine Learning.YuvrajGanguly2
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignRajat Jain
 
Managing IT Security
Managing IT SecurityManaging IT Security
Managing IT SecurityAjay Jassi
 
Design and Construction of Digital Locking System
Design and Construction of Digital Locking SystemDesign and Construction of Digital Locking System
Design and Construction of Digital Locking SystemTarek Erin
 
Designing a security policy to protect your automation solution
Designing a security policy to protect your automation solutionDesigning a security policy to protect your automation solution
Designing a security policy to protect your automation solutionSchneider Electric India
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersITExamAnswers.net
 
Introduction to Access Control Week6 Part1-IS Revis.docx
Introduction to Access Control  Week6 Part1-IS Revis.docxIntroduction to Access Control  Week6 Part1-IS Revis.docx
Introduction to Access Control Week6 Part1-IS Revis.docxmariuse18nolet
 
HOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULE
HOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULEHOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULE
HOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULEIRJET Journal
 
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...ADEIJ Journal
 
Data-centric Security: Using Information Protection and Control (IPC) Tools t...
Data-centric Security: Using Information Protection and Control (IPC) Tools t...Data-centric Security: Using Information Protection and Control (IPC) Tools t...
Data-centric Security: Using Information Protection and Control (IPC) Tools t...Chris Ross
 
3.Secure Design Principles And Process
3.Secure Design Principles And Process3.Secure Design Principles And Process
3.Secure Design Principles And Processphanleson
 

Similar to Implement Biometric Security for Server Room (20)

christopher owoicho project
christopher owoicho projectchristopher owoicho project
christopher owoicho project
 
Development of anti theft security system
Development of anti theft security systemDevelopment of anti theft security system
Development of anti theft security system
 
Unconventional Security Devices
Unconventional Security DevicesUnconventional Security Devices
Unconventional Security Devices
 
Automated Door Lock System using Arduino Uno Chapter 1-5.docx
Automated Door Lock System using Arduino Uno Chapter 1-5.docxAutomated Door Lock System using Arduino Uno Chapter 1-5.docx
Automated Door Lock System using Arduino Uno Chapter 1-5.docx
 
33 Unconventional Security Devices
33 Unconventional Security Devices33 Unconventional Security Devices
33 Unconventional Security Devices
 
IRJET - Face Recognition Door Lock using IoT
IRJET - Face Recognition Door Lock using IoTIRJET - Face Recognition Door Lock using IoT
IRJET - Face Recognition Door Lock using IoT
 
Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.
 
Facial Recognition Door unlock using Machine Learning.
Facial Recognition Door unlock using Machine Learning.Facial Recognition Door unlock using Machine Learning.
Facial Recognition Door unlock using Machine Learning.
 
Broken by design (Danny Fullerton)
Broken by design (Danny Fullerton)Broken by design (Danny Fullerton)
Broken by design (Danny Fullerton)
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect Design
 
Managing IT Security
Managing IT SecurityManaging IT Security
Managing IT Security
 
Internet Security Essay
Internet Security EssayInternet Security Essay
Internet Security Essay
 
Design and Construction of Digital Locking System
Design and Construction of Digital Locking SystemDesign and Construction of Digital Locking System
Design and Construction of Digital Locking System
 
Designing a security policy to protect your automation solution
Designing a security policy to protect your automation solutionDesigning a security policy to protect your automation solution
Designing a security policy to protect your automation solution
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
 
Introduction to Access Control Week6 Part1-IS Revis.docx
Introduction to Access Control  Week6 Part1-IS Revis.docxIntroduction to Access Control  Week6 Part1-IS Revis.docx
Introduction to Access Control Week6 Part1-IS Revis.docx
 
HOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULE
HOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULEHOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULE
HOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULE
 
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
 
Data-centric Security: Using Information Protection and Control (IPC) Tools t...
Data-centric Security: Using Information Protection and Control (IPC) Tools t...Data-centric Security: Using Information Protection and Control (IPC) Tools t...
Data-centric Security: Using Information Protection and Control (IPC) Tools t...
 
3.Secure Design Principles And Process
3.Secure Design Principles And Process3.Secure Design Principles And Process
3.Secure Design Principles And Process
 

Implement Biometric Security for Server Room

  • 1. To: Nathaniel Alexander From: William Browning, WCB Subject: Implementation of biometric security for system supplies and server area Date: June 6, 2012 Purpose: The purpose of this proposal is to inform of a lack of security on our server and system storage room. This issue can be addressed by the proposed security feature below. Summary: Our security issues can be treated by the cost effective method of biometric security. This is done through adding a biometric fingerprint scanner lock to the door of the server room only granting access for authorized personnel. This will save time and money for no outside interference can occur to the server causing it to shut down or collapse. Introduction In the past year there have been three incidents where non authorized personnel were able to access the system storage and server room. Among these one case was severely detrimental to the company and caused a complete shutdown of the server for a little over 8 hours damaging work production. The other two cases though being less sever showed a breach in the room’s security. I feel the issue is coming from the server room being accessed through the master key which all main managers hold thus allowing them to enter the secured room as they please to access the storage room inside for their own person use of the parts being stored inside. Initial Research Findings: I have found an answer to our issue through a new biometric security lock that can be installed on the door of the server/storage room to secure the room from the unauthorized personal that have been intruding in this area. The “1TOUCH XL” is our inexpensive and reliable solution costing only $725.00 it holds up to 99 fingerprints that can be added and changed quickly on the lock itself. It also holds three codes for the main users. When the door is shut the lock is instantly engaged thus taking away human error of forgetting to lock the server door back. The only issue noticeable is the lock runs on four AA batteries which will eventually drain of power but it has a warning sensor that will tell you when the batteries are getting low. Since the room much be accessed each morning for the hard drives to be switched we will be able to easily notice when to change the batteries of the door. The studies on biometrics show how this lock will help resolve our issue of security since the three passwords can be divided among yourself, John and I who are the only ones authorized to enter and we can grant temporary access to those who need it and with fingerprints being unique to each person there is no way for an outside user to gain access. Many companies are beginning to switch to the use of
  • 2. biometrics for security purposes and this could start us on a new path of security enforcement at the office. Analysis of the Problem: By adding the “1TOUCH XL” to the server door no one that is not authorized to be in the storage or server room will be able to gain access. This will make it so that the 3 incidences from the past year cannot be followed by further offences and will not allow for outside actions to affect the server or cause it to need to be shut down and replaced as for the most serious incident that we have been effected by. Recommendation: My recommendation is for the implantation of the “1TOUCH XL” on the server door by July 1, 2012. This gives enough time to inform the staff of the new security feature and letting them know that is off limits for anyone not authorized to be in that area of the office. References: "Â Fingerprint Scanner Door Lock with RF Remote." Intelligent Biometric Controls Store. N.p., n.d. Web. 07 June 2012 .<http://www.fingerprintdoorlocks.com/products/1touchXL/1TouchXL_Fingerprint_Lock .php>. Wilson, Tracy. "How Biometrics Works." HowStuffWorks. N.p., n.d. Web. 07 June 2012. <http://www.howstuffworks.com/biometrics.htm>. Boggo, Thomas. "Common Questions about Biometric Technology." Ezinearticles.com. Ezine Articles, n.d. Web. <http://ezinearticles.com/?Common-Questions-about-Biometric- Technology&id=531257>.