Professional Documents
Culture Documents
MINI PROJECT 1
1. 21DDT21F1182
2. 21DDT21F1173
MATRIC NUM:
3. 21DDT21F1128
4. 21DDT21F1054
1
TABLE OF CONTENTS
NO ITEM PAGE
2
MINI PROJECT 1
1.1 INTRODUCTION
SOPHIC Solution Technology is a company located in Bayan Baru, Penang, which is currently
planning to upgrade its physical access control facilities into a systematic access control
system. This project aims to provide enhanced security measures by implementing an efficient
and effective access control system for all the entrances to SOPHIC Solution Technology and
its restricted access control rooms.
The proposed access control system is expected to be based on Physical Access Control
System (PACS) which will enable the company to monitor and control access to its premises
more effectively. The PACS will utilize various security technologies to ensure that only
authorized personnel can gain entry to the company's facilities.
This system analysis report will provide an in-depth analysis of the proposed access control
system, including its objectives, scope, requirements, and key deliverable. The report will
also outline the project plan, including the timeline, budget, and resources required to
implement the new access control system.
The key deliverable of this project will include the design and implementation of the PACS,
testing and validation of the system, user training, and documentation of the system for future
reference. Overall, the new access control system is expected to enhance the security of
SOPHIC Solution Technology and provide peace of mind to its employees, customers, and
stakeholders.
3
1.2 SYSTEM ANALYSIS
1.3.1 Define minimum THREE (3) different user category for this system with
explanation.
i. System Administrators
The Physical Access Control System at the SOPHIC Solution Technology
office is controlled and accessible to these individuals to the greatest level. The
system's setup and configuration, user account management, and system
security and integrity are all their responsibilities. Administrators frequently
have full control over the system's features and capabilities, including the
ability to control physical access devices like door locks, security cameras, and
card readers. In addition, they may design and control the permissions and
access controls for both visitors and workers.
ii. Employees
The SOPHIC Solution Technology office and all restricted access control
rooms must be accessed by these users via the Physical Access Control
System. Access is frequently obtained using identification credentials, such as
access cards or biometric scanners. Only features and functions related to their
own access, such as requesting access to a particular area or reporting lost or
stolen credentials, are available to employees who have limited access to the
system.
4
iii. Security Personnel
These are users who are responsible for monitoring and responding to security
incidents at SOPHIC Solution Technology office. They have access to certain
features and functions of the system, such as the ability to view security camera
footage, log security incidents, and respond to security alerts. They may also
have the ability to grant or deny access to specific individuals or groups based
on security policies and procedures. Security personnel may be employed by
SOPHIC Solution Technology or by a third-party security provider.
(5 marks)
1.3.2 Define minimum FIVE (5) main features/menu/process for this system with
explanation.
i. User Management
System administrators can use this capability to create, manage, and remove
access privileges for staff members and guests. An interface for managing user
credentials, assigning access levels, and adding new users should be available.
5
iv. Audit Trail
This function offers a log of all successful and unsuccessful access attempts,
offering an audit trail for security reasons. Information like the time and date
of the access attempt, the user's identity, and whether the attempt was
successful or not are included in this.
6
1.3.3 Design a Functional Decomposition Diagram (FDD) for your system
PHYSICAL ACCESS
CONTROL
SYSTEM
ADMIN PERMISSION
ACCESS
Access Cards
Identify
(10 marks)
Verify
7
1.3.4 Design a Context Diagram for your system.
Allow Authorized
Employee
ADMIN EMPLOYEE
Send Details
Create/Modify
Employee 0 Verify ID
Employee
PHYSICAL ACCESS
CONTROL SYSTEM
Identify Access
Store User Card
Credentials
Manage
Control
Server
Biometric Data
For Processing
Verify Access
ACCESS CONTROL BIOMETRIC Card ACCESS CARD
DATABASE Processed SCANNER READER
Biometric
Data
(5 marks)
8
1.3.5 Design a Data Flow Diagram (DFD) Level 0 for your system and provide
explanations:
Captured 2.0
Biometric Data
BIOMETRIC
SCANNER CHECK
BIOMETRIC
RESULT
4.0 3.0
Verification
Result
GENERATE VERIFY
MESSAGES EMPLOYEE
ACCESS CONTROL
DATABASE
Records Of
Data
Verification
Result
5.0
Records Employee
ADMIN MANAGE AND D2
Records
ORGANIZE Records
RECORDS
9
Explanation
At process 1.0, a SOPHIC Solutions Technology employee scans the system's biometric
scanner, and the system captures the employee's bio-metrics. The recorded biometric data
will then be sent to process 2.0, where the system will look for comparable data about the
person in the first data store, Person information. The result will then be sent to the third
process, where the employee will be verified, and if the result of the verification produces a
message, which is process 4.0, such as if the verification is successful or if the identification
is not successful, the system will display a message to the employee. The results of the
verification will then be controlled and compiled into the correct records, which will be
recorded in the employee's record and notified to the administrator and the access control
database.
(30 marks)
10
1.3.6 Select TWO (2) main process from DFD Level 0 designed in (e) other than Log in
Process.
i. Process 1 (State the process name, draw a complete DFD Level 1 and
explanation)
BIOMETRIC
SCANNER
Notice
4.1 Warning
Verification Verification
Message
Success Tail
RECEIVE
VERIFICATION
RESULT
4.2 4.3
Result Result
CHECK IN REJECT
NOTICE MESSAGE
D3 Verification Result
(10 marks)
11
Explanation
Process 4.0 will receive the verification result and determine whether it was successful or not.
If the authentication is successful, a check-in message will be shown in the biometric scanner
for the employee. If the authentication is not successful, a refused message with a warning will
be issued for the user of the biometric scanner. Both successful and failed results will be saved
as validation results.
(10 marks)
12
ii. Process 2 (State the process name, draw a complete DFD Level 1 and
explanation)
5.1
Verification Verification
Result Result
RECEIVE
VERIFICATION
RESULT
5.2 5.3
5.4
Data Employee
RECORD DATA D2
Records
Verification Verification
ADMIN Data Data ACCESS CONTROL
DATABASE
13
Explanation
Process 5.0 will receive authentication results and compile both successful and unsuccessful
authentication data into the data. The organized data will then be recorded, and the recorded
data will be stored in the employee record data repository. The data will then be captured and
organized before being placed in an access control database.
(10 marks)
14
1.3 CONCLUSION
Physical access control is a type of physical security that authorities and controls admission
to a certain area or structure. As a consequence, our organization has developed a physical
accesscontrol system that is beneficial to a business. And our organization has mentioned all
of the system's features in the report. By employing our system, the firm may have better
facilities management. Not only that, but our company has some future plans, one of which is
to put a Thermal Detector in the system to make the system more efficient and useful to the
SOPHIC Solution Technology Office. Also, we have elaborated on the user category and the
characteristics of our system in the report so that the organization has a better grasp of the user
category and the system's features. Not only that, but we have included a Functional
Decomposition Diagram (FDD), context diagram, and Data Flow Diagram (DFD) level 0 and
1 of the system in the report so that the organization has a clear understanding of the Physical
Access Control System that our company has produced.
1.4 REFERENCES
ii. Hawkin Saeger. (2023, March 14). Lucidchart. Data flow diagram examples, symbols, types, and tips.
Retrieved May 7, 2023, from https://www.lucidchart.com/blog/data-flow-diagram-tutorial
iii. Sonoo Jaiswal. (n.d.). Javatpoint . Data Flow Diagrams. Retrieved May 7, 2023, from
https://www.javatpoint.com/software-engineering-data-flow-diagrams
15