Fault trees for security system design and analysis

2003 ◽  
Vol 22 (3) ◽  
pp. 256-264 ◽  
Author(s):  
Phillip J. Brooke ◽  
Richard F. Paige
2018 ◽  
Vol 17 (1) ◽  
pp. 14
Author(s):  
I.W.A Wijaya ◽  
I.G.N Janardana ◽  
C.G.I. Partha ◽  
I.N. Budiastra ◽  
I.B.A. Swamardika ◽  
...  

design of electricity power installation, there are some items that have to be focused, one of them is thesecurity system design. In security system, accurate calculation is highly required to avoid dangers caused bythe usage of electricity power. One public facility that will be built in Pekutatan village is Wantilan. InWantilan, all villagers’ activities can be done. To support these activities, electricity installation must beinstalled. In order to correctly use the electricity, a design of security system is required to prevent dangerscaused by electricity failures. In designing electricity installation for Wantilan, it must refer to the PUIL2011. To answer the above issue, a public service to the villagers of Pekutatan village has been done. Thepublic service is composed by security system design, electricity power installation, security panelinstallation, and providing a tutorial about the danger of electricity and how to correctly use electricityenergy.


2011 ◽  
Vol 268-270 ◽  
pp. 1874-1878
Author(s):  
Ling Qiang Wang ◽  
Chen Xi Yan

Regional safety alarm system is a security system widely used in enterprises and institutions, residential districts and office buildings, which has a complex structure and higher costs. This design is mainly to use SCM and some simple photoelectric sensors to achieve a regional safety alarm system with high reliability and low misoperation, and its size can be easily extended according to user needs.


2019 ◽  
Vol 19 (1) ◽  
pp. 41
Author(s):  
I Gede Sujana Eka Putra ◽  
Ni Luh Putu Labasariyani

System security is important in information systems to prevent unauthorized users from accessing data. Login system applies security using encrypted passwords stored on RFID cards. This research designed login security system storing encrypted password using MD5 encryption into the Mifare Tag RFID card and equipped NFC reader to read data from RFID Card. By storing encrypted password characters on RFID cards, login system security is stronger and cannot be traced by unauthorized parties to log into systems. Some stage of system design are through study of literature, designing process flow, system algorithms, designing encryption methods and system interfaces, writing card module coding, card reading module coding, implementation, and system testing. The system login applied by scanning RFID card on the NFC reader, if the password on RFID matches then the user successfully logs into the system. Based on the testing of RFID Tag readings, the maximum distance from the reading of RFID Tag cards is up to 7 cm with a reading range of 00 to 300 with a success rate of 100% authentication. By using RFID Tag cards, increase security for logging into the system, because user cannot log in without having a card with the appropriate password.


Sign in / Sign up

Export Citation Format

Share Document