This website uses cookies to ensure you have the best experience. Learn more

Investigating The Implementation Of Magnetic Access Control Card System Security Within The Swaziland College Of Technology Community

2815 words - 12 pages

2. Introduction
This chapter gives a brief description of a magnetic card access control security system. It briefly narrates a general background of the magnetic access control system. The chapter also describes the processes followed by the system from when a card is provided at the entrance until the user is logged out of the system. The components of the magnetic card access control system and the types of magnetic card access control system are narrated. Furthermore, the chapter gives scenarios of implementations narrated with relevance to educational facilities. Finally the advantages and disadvantages related to the implementation of the system are discussed.

2.1 Magnetic access control system
Magnetic access control system is a security system that uses a magnetic card to hold identity information in a magnetic strip either for access to a place or for identity purposes (Oke et al., 2009). Magnetic card access control security has gained recognition as one of the secure methods of protecting areas and building in the recent years. People and organizations have transformed from physical locks and keys to magnetic cards to secure their premises using magnetic card access control security systems. Access control has also risen to be a measure concern for businesses, organizations, education centres to secure data, resources and many other assets (Olagbedi, 2013).

There are many different ways of controlling access to buildings. According to Taherdoost et al. (2011), existing previous work agree that access control systems are diverse but they all share a similar goal of verifying legitimate users and provide access to sanctioned individuals to access resources. Al-Khouri and Bal (2007) describes the ways used to control access to a facility and included voice recognition, face recognition and card based systems as some of the security ways that provide security today. Card based access control systems have been widely adopted by large corporations for its legitimacy.

Magnetic access control system is a multi unit security system that includes a credit card sized device with magnetic band or chip integrated within plastic card made out of polyvinyl chloride (PVC) (Acharya et al., 2013). The plastic card is of a credit card size and shape. Smart card functions with other authentication technologies to store combinations of password files for unique identification of a legitimate card holder (Lawler and Arslan, 2005). This is a card that has its own microprocessor that can do operations on data, alter the data and store it on the card.

In 1970, Dr. Kunitaka Arimura of Japan filed the first and only patent on the smart card concept (Indepreet, 2010). There have been many claims regarding the inventor of magnetic access cards. The concept of embedding microchips in the plastic card was first experimented by two German inventors, Jurgen Dethloff and Helmut Grotrupp in 1968, then Motorola and Bull produced the first smart card microchip in...

Find Another Essay On Investigating the Implementation of Magnetic Access Control Card System Security within the Swaziland College of Technology Community

A successful Enterprise Resource Planning (ERP) system implementation requires integration of technology with business strategy and assessing the impact of the system on all aspects of the business;

9755 words - 39 pages Integration of Technology 23Emergence of outsourcing in the Current Market: 26The impact of ERP system (Hypothesis #2) 27How the Business is affected? (Hypothesis #2) 29Analysis ERP Systems: (Hypothesis #3) 30Post-Implementation Scenario 33ERP Systems: Future Enhancements 34The Overview of Chapter-3(Methodology) 36The Overview of Chapter 4 (The Data Analysis Section) 38The Overview of Chapter-5 41Recommendations (An Overview) 45Solution to Shortage of

Security based volt/var control in distribution system in presence of distributed generators using teaching-learning-based optimization

925 words - 4 pages the same time, minimizing the predefined objective functions. Recently, multi-objective optimization problem of voltage and reactive power control has been considered by researchers [1-9]. For example, Ramakrishna et al. proposed volt/var control in distribution systems In order to reduce losses in the network without violating the voltage security of the system [1]. Yutian liu et al. present the optimal control is to find optimal dispatch schedule

The Dynamism of Access Control

2999 words - 12 pages information security environment. Current researches studies many methodologies and appreciations for the evaluation and implementation of protection and controls with information privacy [4]. However, since access control application is a major factor in information system security, there is a need for building a dynamic access control policy. These policies form the certificatory, regulatory and, legislator requirements to control the usage of the

The Implementation of Gun Control in Texas

2534 words - 11 pages The implementation of gun control in the United States is a large problem as it will take away the 2nd Amendment rights of citizens, while preventing law abiding citizens from protecting themselves from criminals.( Noyes, 3) The right to bear arms is promised to citizens of the United States. Crime is very high in states that have loose gun control laws. The state of Texas is known to have the most lenient gun control laws of any state in

Growth of, Control of, and Access to the Internet

4299 words - 17 pages communication in the form of email. Information can be sent to anyone who has access to a computer and the Internet. The Internet allows people to express their feelings and emotions anonymously. However, governments have looked to control information from the Internet. This presents a battle between freedom of speech and censorship by the government. With the terror attacks of September 11, 2001, governments have increased the security in order to

The Implementation of Fantasy and its Effects within “The South”

1312 words - 6 pages references to fantastic themes. This especially occurs within the short work, “The South,” in which a man by the name of Juan Dahlmann experiences a whimsical death that portrays his deepest regret: not following his ancestral history to become a cultural gaucho. Borges uses characterization and the implementation of his true reality to depict the ultimate idea that nothing is eternal and one must chase their dreams in order to live a satisfying life and die without being regretful.

The System of College Sports

1965 words - 8 pages sport system, it would not look anything like the current system American colleges use today. My system would rid of college athletics and create a separation between athletics and higher education. According to the Pew Research Center 47% of Americans believe the purpose of college is to teach work related skills while 39% feel that it is to help students grow personally and intellectually (PewResearchCenter, 2011). Personally I feel that the

The Credit Card System

663 words - 3 pages payment terminal or Point of Sale (POS) system with a communications link to the merchant's acquiring bank.The information technology of the system includes data management, networking, engineering computer hardware, database and software design, as well as the management and administration of entire systems and the security systems technology."The modern credit card was the successor of a variety of merchant credit schemes. It was first used in

Reviews the seriousness of college campus security

617 words - 2 pages Security on college campuses is becoming an area of concern for many university officials. With recent developments in the world, as well as the rise in the use of alcohol and drugs on campus, security teams have an even more challenging task ahead of them then ever before. According to the organization Citizens Against Crime, a crime against a person, such as murder, rape, robbery or assault, occurs every seventeen seconds in the United States

The Overuse of Technology Within Education

1435 words - 6 pages better coverage system that will ensure equalitarian technology accessibility to all students. One factor for this solution to be carried out effectively is the creation of elementary plans for the correct use of technology within education, and their proper implementation in the academic process; moreover, the didactical plan to enhance the educational practice through technological use and not to fully rely on it. So it may be true that “the

Peer Groups and the Institute of the Community College

4988 words - 20 pages a maintenance mechanic for an automotive repair shop and he says, “My company is going to pay for me to go through the Automotive Service Technology program at Shoreline. Once I finish it I get a raise. What a deal, they pay for my schooling and I get a raise.” Thus it seems that the community college can play a large role in furthering the education and expertise of technical laborers and mechanics. While there are certainly no guarantees in

Similar Essays

Investigating The Implementation Of Magnetic Access Control Card Security System Within The Swaziland College Of Technology Community

1428 words - 6 pages locking mechanism has to be replaced which costs the college dearly as several locking points are replaced each year. This research seeks to investigate the implementation of a magnetic access control card security system within the SCOT community. It aims is to lessen the problems of security experienced in the college. Research Motivation The motivation behind this research project is driven by the number of shortfalls of the security system

Investigating The Implementation Of An Electronic Document Management System (Edms) In The Swaziland Ministry Of Education And Training (Moe

1609 words - 7 pages reducing costs for buying files, cabinets and folders to increase the productivity of business processes. Tibiyo Taka Ngwane is an example of a company in Swaziland using an EDMS to curb flaws of paper work. Yu et al. (2010) found that EDMS benefit organizations in that they can easily access, process, handle, standardize, retrieve and manage external and internal information in a secure and stable environment. However, the system is costly to

Investigating The Implementation Of An Electronic Document Management System (Edms) In The Swaziland Ministry Of Education And Training (Moe

1514 words - 7 pages team to retain control, particularly if this is the first implementation of the system. After the team has the tools needed and then they know how to implement the system. Now is the time to document exactly how the information is going to be structured, develop the user interface and populate the database. As implementation begins, test the system as the process goes and track the progress. If the implementation begins without a plan, the team is

The Importance Of A Control System Within The Business

1108 words - 4 pages minimal and this will save time and money for the business.- Protection for staff:With an internal control system, staff will have the protection of the system to back themselves up if in any way there is a dispute with an action. The employee can say that he/she acted in the way noted by the internal control system and acted within their limits resulting in the business not being able to blame the worker.- Detection:A good internal control