Free Essay

Sas Based on Fingerprint

In:

Submitted By stevOo
Words 456
Pages 2
Draft Project Proposal Form

Student Name:

Student No

Email Address:

Programme Name:

Title of project: Home security system based on microcontroller

Please record which modules your topic is related to:

---------------------------------------------------------------------------------------------------------------------------------

Instruction:
This is the draft proposal of your FYP which needs to be submitted to the project administrator by hardcopy – refer to your timeline for submission deadline.

1. Introduction

In this project , a new system with advancement of technology things are becoming simpler and easier for users. Microcontroller is the use of control systems and information technologies to reduce the need for human work in the production of goods and services. The HSSMicro can be adopted at Home it has various type of Sensors such as (magnetic sensors, Wire Loop sensors, Fire sensors). Therefore, users can deal with home HSSMicro to get more efficiently and secure without using complex devices .

2. Problem Statement

Security Systems Co (Kuwait) is still developing in terms of technology. There is a shortage in technological implementations across the continent. Kuwait being among the middle class countries in Middle East has one of the least technological implementations more especially in public operations. The fundamental point of the research however is on the home security system based in microcontroller which is utilized across the nation. In addition, the commercial available security system is too expensive. Thus, this project aims to develop the same functionality with affordability, accuracy and more encryption in terms of security monitoring.

2. Project Aims and Objectives

1- Research Aims

The research aims to design a system for guarding and alarm the remote monitoring of home, in particular, and can be used for other purposes such as guarding the factories and shops, etc. it combines the three cases (guard – observation – alert), and it will alert the system owner in person and yet without the intervention of one or declare a state of penetration to the public as in the existing systems, and these specification that may not exist in other systems and is a guard house and facilities through the system of inform the owner called .

2.0 Research Objectives

2.1 Main objective

❖ Achieve the system by substituting a fixed telephone line to any microcontroller such as (smart phones ) because that make using the system very easy with new technology .

2.2 Specific objectives

❖ To analyze and identify the weaknesses of existing home security systems. ❖ To design a flexible internet based wireless home security system. ❖ To simulate and test the designed system.

4. Deliverables

Provide a clear list of the outputs from the project. 1- HSSMicro save energy, reduce home operating expenses, provide increased comfort while helping our environment. 2- Control of Appliances 3- HSSMicro has a unique encryption method, that make it so completed to hack .
-----------------------
[pic]

Similar Documents

Premium Essay

Biometric Attendance System

...ABSTRACT This project is about designing and developing a system, Student’s Attendance System (SAS) that will record the attendance of student in FEDERAL POLYTECHNIC NEKEDE. SAS using fingerprint technology to authenticate every student by using their fingerprint in order to get an accurate record. The fingerprint technology is cheaper and easy to implement compared to other biometrics technology. The fingerprint only authenticates the validated student. SAS with the fingerprint features can make the system secure because no student can record their attendance except to be authenticated by the system. Besides provides security, this new system provides efficiency to both lecturers and students. SAS focused on the developing system using SDLC as the methodology. This system using personal computer that is run under Windows platform and develop using VB, PHP and MySQL. This system uses the questionnaire method in order to analyze the user acceptance among respondents. In conclusion, this is important to provide the reliable and efficient record. 1.1 INTRODUCTION This chapter will focus on background of this project, problem of the manual system, the objectives, scope and significance of the project. 1.2 BACKGROUND Biometrics refers to the automatic identification of a person based on his or her physiological or behavioral characteristics. It includes fingerprint, iris, facial and retinal. Biometrics technologies are becoming the foundation of an extensive array...

Words: 2173 - Pages: 9

Premium Essay

Research

...Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Web Based Attacks Copyright SANS Institute Author Retains Full Rights fu ll r igh ts. ins ut ho rr eta Web Based Attacks 07 ,A GCIA Gold Certification te 20 Key fingerprint = AF19 Justin Crist, jcrist@secureworks.com Author: FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 © SA NS In sti tu Adviser: Jim Purcell © SANS Institute 2007, As part of the Information Security Reading Room Author retains full rights. Web Based Attacks Abstract Attacks upon information security infrastructures have continued to evolve steadily overtime; legacy network based attacks have largely been replaced by more sophisticated This paper will introduce fu ll r igh ts. web application based attacks. and address web based attacks from attack to detection. Information security professionals new to application layer attacks will be in a better position to understand the ins underlying application attack vectors and methods of 07 ,A ut ho rr eta mitigation after reading this paper. © SA NS In sti tu te 20 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Justin Crist © SANS Institute 2007, 2 As part of the Information Security Reading Room Author retains full rights. Web Based Attacks Table of Contents Abstract.................................................................... 2 Table of Contents...............

Words: 10335 - Pages: 42

Premium Essay

Dlp Dlp Dlp

...Institute Author Retains Full Rights . 08 , Au tho rr eta ins ful l rig hts Data Loss Prevention 20 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 Prevention Data Loss 06E4 A169 4E46 te GIAC Gold Certification Ins titu Author: Prathaben Kanagasingham Advisor: John C.A Bambenek © SA NS Accepted: August 15th 2008 Prathaben Kanagasingham © SANS Institute 2008, 1 As part of the Information Security Reading Room Author retains full rights. . ins Table of Contents ful l rig hts Data Loss Prevention Introduction....................................................................................3 2. Deeper Look at DLP Solution........................................................4 3. Identification of Sensitive Data......................................................6 tho rr eta 1. Data in Motion.....................................................................8 3.2 Data at Rest.....................................................................…9 3.3 Data at End Points.............................................................10 08 , Au 3.1 Choosing a Vendor.......................................................................11 Ins titu te 4. 20 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Monitoring vs. Prevention...................................................11 4...

Words: 8522 - Pages: 35

Premium Essay

Student Attendance System Using Fingerprint

...Title: STUDENT’S ATTENDANCE SYSTEM USING FINGERPRINT TECHNOLOGY by FARAHANUM BT MASRUNI (2004219959) FACULTY OF INFORMATION TECNOLOGY AND QUANTITATIVE SCIENCES BACHELOR OF SCIENCE (Hons) IN DATA COMMUNICATION AND NETWORKING Approved by the examining committee: ……………………………….. ( En. Syamsul Ariffin b Yahaya ) Project Supervisor ……………………………….. ( En. Farok b Azmat ) Project Examiner MARA UNIVERSITY OF TECHNOLOGY SHAH ALAM MAY 2006 CERTIFICATION OF ORIGINALITY This is to certify that I responsible for the work submitted in this project that the original work is my own except as specified in the reference and acknowledgement and that the original work contain here in have not been taken or done by unspecified sources or persons. ……………………………………….. Farahanum bt Masruni 2004219959 ii COPYRIGHT © UiTM ACKNOWLEDGEMENT Alhamdulillah, praise to Allah s.w.t, the most gracious and merciful for giving me the strength and wisdom in finishing this research. At last after a period of time, I have completed my final year project. For this golden opportunity, first and foremost, I would like to express my hearties gratitude to my supervisor, Encik Syamsul Ariffin b Yahaya, my examiner, Encik Farok b Azmat and my coordinator, Encik Adzhar b Abd Kadir for their understanding, and professional way s in assisting and giving their encouragement, guidance, comment and ideas that are useful towards in the development of my project paper. Very special thanks also...

Words: 3961 - Pages: 16

Premium Essay

Minicase

...Biometrics and how it has been influenced by such pseudo-sciences as Phrenology, the study of human skull characteristics and Anthropometry, the study of human body measurement. We discuss how finger-scan technology was influenced by French and British police advancements in the nineteenth century and still remain the most widely used Biometric technology today. Facial-scan technology is ... AD Copyright SANS Institute Author Retains Full Rights fu ll r igh ts Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 © SA NS In sti tu te 20 03 ,A ut ho rr eta ins Edmund Spinella SANS GSEC Original Submission San Francisco, CA Dec 2002 28 May 2003 Biometric Scanning Technologies: Finger, Facial and Retinal Scanning Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 © SANS Institute 2003, As part of the Information Security Reading Room. Author retains full rights. Abstract © SA NS In sti tu te 20 03 ,A ut ho rr eta ins fu ll r igh ts This paper discusses several Biometric scan technologies: finger-scan, facialscan and retinal-scan. We discuss the recent history of Biometrics and how it has been influenced by such pseudo-sciences as Phrenology, the study of human skull characteristics and Anthropometry, the study of human body measurement. We discuss how finger-scan technology was influenced...

Words: 5748 - Pages: 23

Premium Essay

Wirless Security

...implemented a Local Area Network (LAN), and of those 21 million homes 65% will use wireless solutions. [1] The rapidly decreasing cost for wireless devices and the proliferation of wireless solutions provided by the major Internet Service Providers seems to clearly support these growth estimates. Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Home wireless users and security professionals the world over are conceptually trying to solve similar problems. They both need to find a way to provide a secure working environment. There are two distinct approaches to this security dilemma, security prevention, and security detection. An example of security prevention would be a firewall device that restricts specific traffic or ports to or from specific hosts. Although this provides protection against unauthorized traffic, it has no means for determining if an attack is being attempted via an authorized port. An example of security detection would be an IDS (Intrusion Detection System) device that contains a signature to identify a specific attack via authorized or unauthorized ports. [2] Security professionals often have the technology and resources to develop security solutions based on prevention, detection, or a combination of the two. However, home wireless users do not have the luxury of evaluating their security approach since the guidelines and wireless devices marketed to the home user demographic have an overwhelming dependency on preventative mechanisms. The first...

Words: 6220 - Pages: 25

Premium Essay

Blank

...feasibility of mounting an MITM attack on the protocol, but a properlyconfigured client SSL implementation would warn the user about problems with the server certificate. This paper examines the mechanics of the SSL protocol attack, then focuses o... Copyright SANS Institute Author Retains Full Rights AD SSL Man-in-the-Middle Attacks Peter Burkholder February 1, 2002 (v2.0) Abstract TCP/IP protocols have long been subject to man-in-the-middle (MITM) attacks, but the advent of SSL/TLS was supposed to mitigate that risk for web transactions by providing endpoint authentication and encryption. The advent of Dug Song's 'webmitm' in late 2000 demonstrated the feasibility of mounting an MITM attack on the protocol, but a properlyKey fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 configured client SSL implementation would warn the user about problems with the server certificate. This paper examines the mechanics of the SSL protocol attack, then focusses on the greater risk of SSL attacks when the client is not properly implemented or configured. One faulty SSL client implementation, Microsoft's Internet Explorer, allows for transparent SSL MITM attacks when the attacker has any CA-signed certificate. An even greater risk is posed by unprotected systems where an attacker can preload his/her own trusted root authority certificates. In...

Words: 6154 - Pages: 25

Premium Essay

It Penetration Testing

...(SEC504)" at https://pen-testing.sans.org/events/ Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 A Management Guide to Penetration Testing David A. Shinberg © SANS Institute 2003, © SA NS In sti tu As part of GIAC practical repository. te 20 03 ,A ut ho rr Version 2.1a eta Practical Assignment ins SANS Hacker Techniques, Exploits, and Incident Handling (GCIH) fu ll r igh ts. Author retains full rights. Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Abstract Penetration tests are an excellent method for determining the strengths and weaknesses of a network consisting of computers and network devices. However, the process of performing a penetration test is complex, and without care can have disastrous effects on the systems being tested. This paper provides guidance, primarily focused around planning and management, on how to conduct a penetration test comprised of five phases – Preparation, Public Information, Planning, Execution and Analysis and Reporting. However, due to the technical and sometimes sensitive nature of penetration testing only a cursory overview how to compromise a system is provided.1 1. Introduction • 1 Prior approval for this topic was obtained from certify@sans.org because the topic is not one of the specified topics. © SANS Institute 2003, © SA • Planning: Based on the publicly available information, the next step is...

Words: 4111 - Pages: 17

Free Essay

Sans Institute Infosec Reading Room

...Information Server, and Apache. Copyright SANS Institute Author Retains Full Rights AD Brad Bell August 19, 2001 Security Strengths and Weaknesses of Two Popular Web Servers As the mediator between your business and the world the Web Server that you choose must be completely sound in regards to security. You do have many options when choosing which Web Server package you will use to transmit your company's on-line presence to the rest of the world. There are two Web Server packages in particular that dominate the market for Web Servers. These two Web Server packages are Microsoft's Internet Information Server, and Apache. What is a Web Server? Key definition andAF19 FA27 a web998D FDB5 DE3D F8B5 06E4 A169 4E46 static content to The fingerprint = purpose of 2F94 server is a software package that serves either a Web browser at a basic level, or dynamic content that require end-user interaction. For example, a web server may receive a request for a Web page such as www.amazon.com/index.html. The Web Server would then map the Uniform Resource Locator (URL) to a local file on the host server. In this case the file, index.html is somewhere on the host file system. The server then...

Words: 3755 - Pages: 16

Premium Essay

324fd

...creating havoc amongst the university community. And this can all be done from the convenie... AD Copyright SANS Institute Author Retains Full Rights Network Security Concepts and Essentials: A University Overview Matthew Wu Leng Version 1.2e September 2001 Abstract fu ll r igh ts. Have you ever tried looking at your company’s network from a different perspective? You work daily, usually long hours, drink high caffeine drinks, looking after your company’s prized possession – network and system infrastructure. But just for a moment, imagine yourself as a hacker trying to get into your network. Could it be done? Have you tried it? What are the Key possibilities? AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 fingerprint = eta ins We could say that secure networks are those that combine skill and knowledge with successful implementation and management direction. But imagine a university network for a second… ,A ut ho rr How many computers would a university have? Estimate the number of users? A very large number is the answer, probably in the 10’s of thousands and possibly higher. Do all these users...

Words: 6840 - Pages: 28

Free Essay

Thesis

...view the Readme file on-screen in Windows Notepad, maximize the Notepad window. On the Edit menu, click Word Wrap. To print the Readme file, open it in Notepad or another word processor, and then use the Print command on the File menu. --------- CONTENTS --------- 1. INSTALLATION 2. COMPATIBILITY 3. SYSTEM REQUIREMENTS 4. RELEASE NOTES 4.1 XTF Templates 4.2 Changes in Documentation and Header Files 4.3 Sample Code for Delphi 6 4.4 U.are.U 4000B Fingerprint Reader Support 5. KNOWN ISSUES 5.1 Installation on NT4 Computers 5.2 Windows NT4 Multiple Fingerprint Readers Support 5.3 Windows Server 2003 SP1 5.4 Windows Users in the Local Database 5.5 Installation of DigitalPersona Pro Workstation 3.2.1 over DigitalPersona Platinum software 6. SUPPORT AND FEEDBACK ---------------- 1. INSTALLATION ---------------- You must have local administrator rights to install this product on the supported Windows NT-based operating systems. 1- Insert the Platinum SDK CD in the CD-ROM drive. 2- Run Setup.exe located in the root of the CD. 3- If needed, the installer will install Microsoft Windows Installer and ask you to restart your computer. After the computer...

Words: 947 - Pages: 4

Premium Essay

It World

...Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without express written permission. Interested in learning more? Check out the list of upcoming events offering "Security Essentials Bootcamp Style (Security 401)" at http://www.giac.org/registration/gsec Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 © SA NS In sti tu te © SANS Institute 2004, As part of GIAC practical repository. 20 04 Valdo Araiza 3/30/2004 ,A GIAC Security Essentials Certification (GSEC) Practical Assignment Version 1.4b ut ho rr Technological Advances and the Effect on Physical Security eta ins fu ll r igh ts. Author retains full rights. Abstract The strides in technology each year have surpassed the previous year by leaps and bounds and will probably continue to do so in the future. Information technology continues to advance in ways that greatly benefit society on many levels but as the increasing benefits develop so do the security vulnerabilities associated with information technology. Hardware and software is being released to the general public that can help people be more productive but this same technology can be used to infiltrate or impede practiced physical security measures whether that effort is intentional or not. In this paper we will explore both...

Words: 5538 - Pages: 23

Premium Essay

Chinese

...Full Rights AD Security Essentials V1.4b Title: Security Policies: Where to Begin Name: Laura Wills Date: December 12, 2002 Introduction A company that realizes that they have unfortunately been applying security in an ad-hoc fashion and have not put the necessary security policies in place to reduce the risk to their corporate assets, has hired you as the Security Officer. They have implemented many of the standard security products and technologies (firewalls, anti-virus, IDS, etc.), but without the policies and processes defined, they find viruses and intrusions still occur. As the newly appointed Security Officer you are to develop their security policies and procedures from top FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Key fingerprint = AF19to bottom to provide a cohesive approach to addressing security going forward. This is an enormous job; where do you begin? Many organizations and their staff truly lack the understanding of what security policies are designed to do. Your mission, should you chose to accept it, (it will feel, at times, like “Mission...

Words: 6709 - Pages: 27

Premium Essay

Perimeter Network Security System

...Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Taking advantage of Ext3 journaling file system in a forensic investigation AD Copyright SANS Institute Author Retains Full Rights Taking advantage of Ext3 journaling file system in a forensic investigation fu ll r igh ts. Taking advantage of Ext3 journaling file system in a forensic investigation rr eta ins GCFA Gold Certification Author: Gregorio Narváez, gnarvae@yahoo.com Adviser: Paul Wright th 07 ,A ut ho Accepted: December 30 , 2007 © SA NS In sti tu te 20 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Gregorio Narváez © SANS Institute 2007, 1 As part of the Information Security Reading Room Author retains full rights. Taking advantage of Ext3 journaling file system in a forensic investigation TABLE OF CONTENT 1. INTRODUCTION............................................................................................................................... 3 1.1 Lab Setup .................................................................................................................................... 3 2. EXT3FS JOURNAL FUNDAMENTALS......................................................................................... 4 fu ll r igh ts. 2.1...

Words: 15276 - Pages: 62

Premium Essay

Fingerptrint Attendance System

...Journal of Engineering, Computers & Applied Sciences (JEC&AS)                       ISSN No: 2319‐5606       Volume 2, No.6, June 2013                                                                                                                                _________________________________________________________________________________     Automatic Biometric Student Attendance System: A Case Study Christian Service University College Dr Thomas Yeboah Dr Ing Edward Opoku-Mensah Mr Christopher Ayaaba Abilimi ABSTRACT In many tertiary institutions in Ghana such as Christian Service University the attendance of students is very important factor since it forms part of the students’ assessment and evaluation. It has therefore become imperative that proper measures should be put in place to ensure that no student signs for another. It has been observed that at Christian Service University College lecturers sometimes give the attendance book to students to sign without actually supervising them to see whether the right student is signing or making sure that no student signs for another. Moreover, if a lecturer wants to supervise the signing of the attendance book to make sure that the right student is signing and no student signs for a friend then the lecturer may end up by wasting a significant amount of the lecture period on the signing supervision. Furthermore, in the larger classes lecturers sometimes use their own ideology and principles to award the attendance...

Words: 2527 - Pages: 11