A SMART CARD SECURITY SYSTEM (A CASE STUDY OF ECO BANK)


  • Department: Computer Science
  • Project ID: CPU1386
  • Access Fee: ₦5,000
  • Pages: 62 Pages
  • Reference: YES
  • Format: Microsoft Word
  • Views: 2,267
Get this Project Materials
ABSTRACT
In the up to date electronic planet, authentication of an individual is a vital assignment in numerous territories of everyday existence. Smart Cards are secure compact space gadgets utilized for a few requisitions specifically security identified ones including access to framework's database either connected or disconnected from the net. Smartcard are regularly “secure” movable units. It is an elevated amount outline system for installed informative data frameworks. Normally a smartcard consist a memory or a microprocessor chip. Mainly this paper presents an integrated system for high security objectives. Such as: defense, and nuclear or any critical entering areas. This system is operated with the three factors; they are having a smartcard, password, and any user specific identification components. These may be: fingerprint, or any facial elements. The purpose of this application is to limit the access of the unauthorized person to high security locations, based on access rights of different persons.
This project was centered on card based security system. The current process of security is being operated manually and due to this procedure numerous problem are been encountered. A design was taken to computerized the manual process in order to check this problem. The problems were identified after series of interviews and examination of documents after which analysis was made and a computerized procedure recommended. This project will also suggest how to successfully implement the computerized procedure and to overcome the obstacle that would hinder the successful implementation of the system. The new system was designed using Microsoft visual basic 6.0 programming language. This language was chosen because of its easy syntax and features for developing windows based applications.
 Keywords: Authentication, Biometric, Chip, fingerprint, PIN, Smartcard.
 
TABLE OF CONTENT

Title page                                     i
Approval page                                     ii
Dedication                                     iii
Acknowledgement                                iv
Table of content                                 v
Abstract                                         vi

CHAPTER ONE
1.0    Introduction historical background                
1.1    Objective of the study                        
1.2    Statement of the problem                    
1.3    Significance of the researchers study                
1.4    Scope of study                            
 1.5    Limitation of study                       
1.6    Brief history of case study                   
1.7    Definition of terms                        

CHAPTER TWO
2.0    Review of related literature                    
2.1.2    Historical Perspective
2.2         What is a Smartcard?
2.2.1    Why Smart Cards
2.2.2    SIM Cards and Telecommunication
2.2.3    Loyalty and Stored Value
2.2.4    Securing Digital Content and Physical Assets
2.2.5    E-Commerce
2.2.6     Bank Issued Cards
2.3        Types of Smartcards:
2.3.2    Essence of Smartcard
2.4        Smart Card Security
2.4.1    What Is Security
2.4.2    What Is Information Security?
2.6.1    Host-Based System Security
2.6.1    Card-Based System Security
2.6.2    Threats To Cards and Data Security
2.6.3    Security Architectures
CHAPTER THREE
3.0    System investigation analysis and design            
3.1    System investigation                       
3.2    Fact finding                                
3.3    Analysis of finding                        
3.3.1 Problem of formal system                   
3.3.2 Reason for new system                        
3.4    System specification                        
3.5    Input and output forms and design               

CHAPTER FOUR
4.0    System programming and implementation           
4.1    Choice of implementation                    
4.2    Program flow chart and algorithm                
4.3    Source code and debugging                    
4.4    Testing and documentation                    
4.5    Staff training                            
4.6    Hardware and software requirement                
4.7    Implementation (handover)                   

CHAPTER FIVE
5.0    Summary, Recommendation and Conclusion        
5.1    Summary                               
5.2    Recommendation                           
5.3    Conclusion                                
    References                                
    Appendix

 
X
  • Department: Computer Science
  • Project ID: CPU1386
  • Access Fee: ₦5,000
  • Pages: 62 Pages
  • Reference: YES
  • Format: Microsoft Word
  • Views: 2,267
Get this Project Materials
whatsappWhatsApp Us