Implementation of Biometric Access Control Using Fingerprint for Safety and Security System of Electric Vehicle

Author(s):  
Marey Jemima Raj ◽  
Sajitha Gadde ◽  
Ramesh Jayaraman
Author(s):  
Ito Setiawan ◽  
Aldistya Riesta Sekarini ◽  
Retno Waluyo ◽  
Fiby Nur Afiana

Bertambahnya ketergantungan organisasi terhadap penggunaan sistem informasi dalam rutinan sejalan dengan ancaman dan risiko yang timbul dari penggunaan sistem informasi tersebut. Permasalahan penggunaan sistem informasi juga dialami oleh Tripio Purwokerto. Tripio merupakan perusahaan yang bergerak di bidang teknologi di Purwokerto. Tripio memiliki dua sistem informasi untuk menunjang proses bisnisnya yaitu website dan Point of Sales (POS) systems. Dalam penggunaan sistem informasi mengalami permasalahan seperti server mengalami error, jaringan yang bermasalah, data yang rusak karena terkena virus dan human error. Tujuan penelitian adalah mengetahui risiko dan juga dampak dari penggunaan sistem informasi di Tripio Purwokerto. Metode yang digunakan adalah International Organization for Standardization (ISO) 3100:2018 dan standar pengendalian menggunakan International Organization for Standardization (ISO) 27001:2013. Dari hasil penelitian yang telah dilakukan dapat ditarik kesimpulan bahwa terdapat 15 risiko yang terdiri dari 6 risiko dengan tingkat risiko high, 7 risiko dengan tingkat risiko medium, dan 2 risiko dengan tingkat risiko low. Rekomendasi kontrol yang digunakan mengacu pada ISO 27001:2013 bagian human recource security, access control, physical and environmental security, operations security, protection from malware, communications security, system acquisition, development and maintenance.


2019 ◽  
Vol 6 (3) ◽  
pp. 235
Author(s):  
Kuat Indartono ◽  
Abdul Jahir

<p class="Body">Jumlah pengguna kendaraan bermotor semakin tahun semakin meningkat. Laju peningkatan tindak kriminal terhadap pengguna kendaraan bermotor juga semakin meningkat. Peningkatan tindak kriminal sebanding dengan peningkatan pengguna kendaraan bermotor di Indonesia. Permasalahan tindak kriminal pencurian tersebut perlu diselesaikan salah satunya dengan membuat sistem keamanan kendaraan bermotor khususnya mobil. Penelitian ini bertujuan untuk mengurangi tindak kejahatan pencurian mobil dengan membuat prototype sistem keamanan mobil dengan memanfaatkan quick response code sebagai authentication access control berbasis android yang terintegrasi dengan arduino. Metode yang diterapkan pada penelitian ini dengan 2 tahap, yaitu tahap yang pertama membuat aplikasi berbasis android dan tahap kedua membuat perangkat sistem keamanan mobil. Hasil pengujian aplikasi android dengan menggunakan <em>black box testing</em> berhasil sesuai fungsional dan hasil pengujian perangkat dengan running test, perangkat dapat bekerja dengan normal. Penelitian ini berhasil membuat sistem keamanan mobil berbasis android dan arduino.</p><p class="Body"><em><strong>Abstract</strong></em></p><p><em>The number of motor vehicle users is increasing every year. The increasing rate of criminal acts against motor vehicle users is also increasing. The increase in criminal acts is proportional to the increase in motor vehicle users in Indonesia. The problem of criminal acts of theft needs to be solved one of them by making the motor vehicle security system, especially the car. This study aims to make a prototype of car security system by utilizing quick response code as authentication access control based on Android integrated with Arduino. The method applied in this study with 2 stages, namely the first stage to create Android-based applications and the second stage to make the device system car security. Test results in Android applications using black box testing succeeded in accordance with functional and test results with the device running test and durability, the device can work normally. This research succeeded in making prototype car security system based on Android and Arduino.</em></p><p class="Body"><strong><br /></strong></p>


Author(s):  
Syafeeza Ahmad Radzi ◽  
M.K. Mohd Fitri Alif ◽  
Y. Nursyifaa Athirah ◽  
A. S. Jaafar ◽  
A. H. Norihan ◽  
...  

The home security system has become vital for every house. Previously, most doors can be open by using traditional ways, such as keys, security cards, password or pattern. However, incidents such as a key loss has led to much worrying cases such as robbery and identity fraud. This has become a significant issue. To overcome this problem, face recognition using deep learning technique was introduced and Internet of Thing (IoT) also been used to perform efficient door access control system. Raspberry Pi is a programmable small computer board and used as the main controller for face recognition, youth system and locking system. The camera is used to capture images of the person in front of the door. IoT system enables the user to control the door access.


Author(s):  
V.M. Dzhulij ◽  
V.A. Boychuk ◽  
V.Y. Titova ◽  
O.V. Selyukov ◽  
O.V. Miroshnichenko

The article proposes an approach to the development of protection methods against threatening programs in modern information systems, which consists in the development of security methods based on the implementation of access control to files by their types, which can be identified by file extensions that significantly exceed the known methods of antivirus protection, such as on the effectiveness of protection, as well as the impact on the load of computing resources of the information system. It is shown that the most important for protection are executable binary and script files, and that these classes of malware require mandatory storage of the threatening file on the hard disk before its execution (read). This led to the conclusion that protection against threatening programs can be built by implementing control (delineation) of access to files. A general approach to the implementation of protection against threatening programs is proposed, based on the implementation of control of access to files by their types, which can be identified by file extensions. The possibility of using such an approach is substantiated by a study of remedies. Methods of protection against threatening programs allow to protect the information system, both from loading, and from execution of binary and scripted threat files, differing in the possibility of taking into account the location of executable files, the possibility of administration with a working security system, the ability to control the modification of access objects, renaming access features, the ability to protect against scripted threat programs, including the ability to give threatening properties to interpreters (virtual x machines). Models of access control have been developed, which allowed the built-in access matrices to formulate requirements for building a secure system, the implementation of which prevents the leakage of given access rights of subjects to objects.


Sign in / Sign up

Export Citation Format

Share Document