Preview

Smart Card Access Control

Powerful Essays
Open Document
Open Document
3570 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Smart Card Access Control
Computer System Information

Table of Contents

Introduction
Short Introduction of Task 1
In this assignment, Yale Bank which is formally familiar with the name of Yale Bank Corporation and in short, it is name as YBC. YBC has been first established as the newest commercial bank in the country and yet it turned out to be the fastest growing commercial bank in the country in terms of assets.
Descriptions of the report of Task 1
In this assignment, the newest established bank has employed me as one of their colleague to be the Project Manager of IT Department of Yale Bank. As the Yale Bank has been growing commercially, they need to address the increasing number of employees by automating the access control of each department to protect their company’s interest. Only selected number of employees that has the valid credentials can enter or have access to a certain offices and electronic files that can be accessed through various system tools.
My part of the job was to assign two different types of access control systems namely, the smart card access control and the biometric access control, requested by the Chief Information Officer of the company itself. Once I’ve done with the research of both access control system, I would be voicing out my point of views based on which of the two access control system is more efficient and also less costly without compromising the interest of the bank itself.
Task 1 Objectives
Minimum of 3 objectives of the assignment:-
To assign two different types of Access Control System ( Smart Cards & Biometric Access Control)
Gives out a sound recommendation based on which Access Control System would be suitable for Yale Bank
To recommend the most efficient and affordable Access Control System for Yale Bank to install

Task 1 Main Content :-
Smart Card & Biometric Access System Control

Task 1
Smart Card Access Control
A Smart Card is a small card that has the same identical of a common

You May Also Find These Documents Helpful

  • Good Essays

    Prepare a 5 to 10 minute PowerPoint assisted presentation on important access control infrastructure, and management aspects from each location.…

    • 991 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Biometric scanners should be used for all sensitive areas as a second method to prevent card cloning . Those that have access to sensitive areas or doors that can allow more than one person through such as the shipping area and front double doors will be issued a Personal Identity Verification…

    • 1902 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    During operation, the system uses the access control rules to decide whether access requests consumers shall be approved or disapproved. Resources include individual files or items data, computer programs, computer devices and functionality provided by computer applications. Examples of consumers are computer users, computer programs and other devices on the…

    • 711 Words
    • 3 Pages
    Good Essays
  • Good Essays

    7) When granting access to LAN systems for GUESTS (i.e. auditors, consultants, third-party individuals, etc.), what security controls do you recommend be implemented in order to maximize CIA of production systems and data?…

    • 518 Words
    • 2 Pages
    Good Essays
  • Good Essays

    With so many different modes of Access Control to choose from it is my assessment that by choosing only one model would not be appropriate for Richman Investments. My recommendation would be a combination of multiple Access Control Models that overlap to provide maximum coverage and overall security. Here are my suggestions for access controls.…

    • 651 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Nt2580 Final Project

    • 1848 Words
    • 6 Pages

    Based on the premises that Richman has 5000 employees throughout the main office and several branch offices, this document dictates research solutions and details the appropriate access controls including policies, standards, and procedures that define who users are, what they can do, which resources they can access, and which operations they can perform on a system.…

    • 1848 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    CMGT430 2015 SYLLABUS

    • 2598 Words
    • 16 Pages

    This course covers the managerial and technical considerations related to access controls, authentication, external attacks,…

    • 2598 Words
    • 16 Pages
    Satisfactory Essays
  • Good Essays

    Lab 3 nt2580

    • 321 Words
    • 2 Pages

    . What are the three fundamental elements of an effective access control solution for information…

    • 321 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Sandhu, R., & Samarati, P. (1996). Authentication, access control, and audit. ACM Computing Surveys (CSUR), 28(1), 241-243.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    1. Identify the touch points between the objectives and requirements of PCI DSS and YieldMore’s IT environment.…

    • 619 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    • Define strict access control policies, standards, procedures, and guidelines. Implement a second-level test to verify a user’s right to gain access.…

    • 447 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Relate how Windows Server 2008 R2 Active Directory and the configuration of access controls achieve CIA for departmental LANs, departmental folders, and data.…

    • 263 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Access control methods are a process that determines what services or company resources an employee has access to. These methods will be used to determine what an employee can and cannot access, as well as ways to make sure that all employees are being granted the correct access levels. Authentication is a process of determining whether someone or something is who or what they say they are. Authentication can be a form of determining whether an employee is actually the person that they say they are. Employees can be authenticated by being able to answer personal questions that only they would know or by providing a username and password that only the employee knows.…

    • 3217 Words
    • 13 Pages
    Better Essays
  • Good Essays

    Cac Card

    • 1245 Words
    • 5 Pages

    I am writing this essay about the importance of a Common Access Card. Which is also known as a “CAC” card. The Common Access Card (CAC) is a United States Deparrtment of Defense (DoD) Smart Card. The card is issued to Active-duty Military Personnel, Reserve Personnel, Civilian Personnel, state employees of the National Guard, contractor personnel, and other non-DoD government employees. The CAC is the size of a standard credit card and stores 64 or 128 kB of data storage and memory on a single integrated circuit. The CAC is used as a general identification card as well as for authentication to enable access to DoD computers, networks, and certain DoD facilities. It also serves as an identification card under the Geneva Coventions. You must input a PIN number in order to access any Government Computer using the CAC card. The CAC card enables encrypting and cryptographically signing email, facilitating the use of authentication tools, and establishes an authoritative process for the use of identity credentials. The CAC has many objectives, including controlling access to computer networks, enabling users to sign documents electronically, encrypt email messages, and enter controlled facilities.…

    • 1245 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    This course covers the managerial and technical considerations related to access controls, authentication, external attacks, and other risk areas facing the enterprise. This course will also survey the techniques to prevent unauthorized computer and facility access as well the concepts for protecting the hardware and software assets of the enterprise.…

    • 2331 Words
    • 10 Pages
    Satisfactory Essays

Related Topics