Investigating The Implementation Of Magnetic Access Control Card Security System Within The Swaziland College Of Technology Community

1428 words - 6 pages

1. Introduction
Access control is the restriction of access to a building or area and it can be achieved by different means of physical security. Magnetic access control card system is one of the many ways of restricting access to a building or area. According to Oke et al. (2009), magnetic access control systems are used to control entry to a room or building and were developed to reduce prodigious amount of theft and fraud.

Magnetic access control card security systems use smart cards which are small plastic cards made out of Polyvinyl Chloride incorporating one or more integrated circuits within its thickness to store and transact data (Hendry, 2007). Types of smart cards include Subscriber Identity Modules (SIM) cards, magnetic stripe cards, dual interface cards and many more. Smart card systems were developed in 1973 by a Frenchman called Roland Marino and they were commercialized in 1981 (Hsiao et al., 2011).

Colleges and universities are the leading adopters of smart cards security systems application for security reasons. The University Utara Malaysia (UUM) was the pioneer adopter and implementer of this system among universities in Malaysia (Mohammad, 2011). According to Sivalingam (2009), among the most reputable universities that use smart card security systems in its premises include University of Cambridge and University of Ottawa.

Magnetic access control systems reduce unauthorised access to facilities. The information embedded in the card is reset only by authorities (Kumar et al., 2013). Non repudiation is also ensured since a card is issued to only one user. However, the magnetic access control system is relatively expensive to put into place. The card is subject to bend in unusual ways resulting to a permanent damage. Swaziland College of Technology (SCOT) is one of the higher learning institutions in Swaziland. Ever since the college was established, it is using campus security personnel and padlock keys to control access to main areas and buildings.
2. Problem Statement
Access to the campus is through the campus gates where there are campus security personnel. There are entrances to the college which are not guarded by security personnel. There is no proper barrier around the institution which makes the posting of security personnel at the main gates insignificant. Trespassers gain access to the college residential areas and learning centres to vandalize college property.

Trespassers cut the padlocks with bolt cutters and open them. Keys are duplicated and used to gain access to restricted areas and they are habitually lost as they are relatively small in size. Once a key is reported missing or duplicated, the door locking mechanism has to be replaced which costs the college dearly as several locking points are replaced each year.

This research seeks to investigate the implementation of a magnetic access control card security system within the SCOT community. It aims is to lessen the problems of security experienced...

Find Another Essay On Investigating the Implementation of Magnetic Access Control Card Security System within the Swaziland College of Technology Community

A successful Enterprise Resource Planning (ERP) system implementation requires integration of technology with business strategy and assessing the impact of the system on all aspects of the business;

9755 words - 39 pages Integration of Technology 23Emergence of outsourcing in the Current Market: 26The impact of ERP system (Hypothesis #2) 27How the Business is affected? (Hypothesis #2) 29Analysis ERP Systems: (Hypothesis #3) 30Post-Implementation Scenario 33ERP Systems: Future Enhancements 34The Overview of Chapter-3(Methodology) 36The Overview of Chapter 4 (The Data Analysis Section) 38The Overview of Chapter-5 41Recommendations (An Overview) 45Solution to Shortage of

Security based volt/var control in distribution system in presence of distributed generators using teaching-learning-based optimization

925 words - 4 pages the same time, minimizing the predefined objective functions. Recently, multi-objective optimization problem of voltage and reactive power control has been considered by researchers [1-9]. For example, Ramakrishna et al. proposed volt/var control in distribution systems In order to reduce losses in the network without violating the voltage security of the system [1]. Yutian liu et al. present the optimal control is to find optimal dispatch schedule

The Dynamism of Access Control

2999 words - 12 pages information security environment. Current researches studies many methodologies and appreciations for the evaluation and implementation of protection and controls with information privacy [4]. However, since access control application is a major factor in information system security, there is a need for building a dynamic access control policy. These policies form the certificatory, regulatory and, legislator requirements to control the usage of the

Birth Control - Margaret Sanger's Birth Control Movement - Texas Community College/Sociology - Essay

1052 words - 5 pages planning, pregnancy prevention, fertility control, or contraception; birth control methods are designed either to prevent fertilization of an egg or implantation of a fertilized egg in the uterus.” Margaret Sanger believed that universal access to birth control would reduce abortion, decrease poverty, and strengthen families. She helped women gain the right to decide when or whether to have children, which was a struggle with not having protection

Converse Accident within Society - Writing 101 Honors, Bergen Community college - Essay Assignment

872 words - 4 pages with miniscule proof. Knowing converse accidents will allow you to not jump to broad conclusions about  topics based on a lack of evidence or examples.        Work Cited   “Ebola (Ebola Virus Disease).” Centers for Disease Control and Prevention, Centers for Disease Control and Prevention, 17 Mar. 2016, www.cdc.gov/vhf/ebola/outbreaks/2014-west-africa/distribution-map.html The Editors of Encyclopædia Britannica. “Mein Kampf.” Encyclopædia Britannica

The Implementation of Gun Control in Texas

2534 words - 11 pages The implementation of gun control in the United States is a large problem as it will take away the 2nd Amendment rights of citizens, while preventing law abiding citizens from protecting themselves from criminals.( Noyes, 3) The right to bear arms is promised to citizens of the United States. Crime is very high in states that have loose gun control laws. The state of Texas is known to have the most lenient gun control laws of any state in

Growth of, Control of, and Access to the Internet

4299 words - 17 pages communication in the form of email. Information can be sent to anyone who has access to a computer and the Internet. The Internet allows people to express their feelings and emotions anonymously. However, governments have looked to control information from the Internet. This presents a battle between freedom of speech and censorship by the government. With the terror attacks of September 11, 2001, governments have increased the security in order to

The Implementation of Fantasy and its Effects within “The South”

1312 words - 6 pages references to fantastic themes. This especially occurs within the short work, “The South,” in which a man by the name of Juan Dahlmann experiences a whimsical death that portrays his deepest regret: not following his ancestral history to become a cultural gaucho. Borges uses characterization and the implementation of his true reality to depict the ultimate idea that nothing is eternal and one must chase their dreams in order to live a satisfying life and die without being regretful.

The Credit Card System

663 words - 3 pages payment terminal or Point of Sale (POS) system with a communications link to the merchant's acquiring bank.The information technology of the system includes data management, networking, engineering computer hardware, database and software design, as well as the management and administration of entire systems and the security systems technology."The modern credit card was the successor of a variety of merchant credit schemes. It was first used in

The System of College Sports

1965 words - 8 pages sport system, it would not look anything like the current system American colleges use today. My system would rid of college athletics and create a separation between athletics and higher education. According to the Pew Research Center 47% of Americans believe the purpose of college is to teach work related skills while 39% feel that it is to help students grow personally and intellectually (PewResearchCenter, 2011). Personally I feel that the

The Overuse of Technology Within Education

1435 words - 6 pages better coverage system that will ensure equalitarian technology accessibility to all students. One factor for this solution to be carried out effectively is the creation of elementary plans for the correct use of technology within education, and their proper implementation in the academic process; moreover, the didactical plan to enhance the educational practice through technological use and not to fully rely on it. So it may be true that “the

Similar Essays

Investigating The Implementation Of Magnetic Access Control Card System Security Within The Swaziland College Of Technology Community

2815 words - 12 pages are narrated. Furthermore, the chapter gives scenarios of implementations narrated with relevance to educational facilities. Finally the advantages and disadvantages related to the implementation of the system are discussed. 2.1 Magnetic access control system Magnetic access control system is a security system that uses a magnetic card to hold identity information in a magnetic strip either for access to a place or for identity purposes (Oke

Investigating The Implementation Of An Electronic Document Management System (Edms) In The Swaziland Ministry Of Education And Training (Moe

1609 words - 7 pages reducing costs for buying files, cabinets and folders to increase the productivity of business processes. Tibiyo Taka Ngwane is an example of a company in Swaziland using an EDMS to curb flaws of paper work. Yu et al. (2010) found that EDMS benefit organizations in that they can easily access, process, handle, standardize, retrieve and manage external and internal information in a secure and stable environment. However, the system is costly to

Investigating The Implementation Of An Electronic Document Management System (Edms) In The Swaziland Ministry Of Education And Training (Moe

1514 words - 7 pages team to retain control, particularly if this is the first implementation of the system. After the team has the tools needed and then they know how to implement the system. Now is the time to document exactly how the information is going to be structured, develop the user interface and populate the database. As implementation begins, test the system as the process goes and track the progress. If the implementation begins without a plan, the team is

The Importance Of A Control System Within The Business

1108 words - 4 pages minimal and this will save time and money for the business.- Protection for staff:With an internal control system, staff will have the protection of the system to back themselves up if in any way there is a dispute with an action. The employee can say that he/she acted in the way noted by the internal control system and acted within their limits resulting in the business not being able to blame the worker.- Detection:A good internal control