You are on page 1of 15

DEPARTMENT OF INFORMATION AND COMMUNICATION TECHNOLOGY

DFC40243 – SYSTEM ANALYSIS &DESIGN

MINI PROJECT 1

 PRASANNAH A/P CHELVARAJ


 JIVATARSHANI A/P PACHAIMUTHU
MEMBERS’ NAME:
 PREMA VASHINI A/P KIRUBANANTHAN
 NIVETHAA A/P PALANISAMY

 1. 21DDT21F1182
 2. 21DDT21F1173
MATRIC NUM:
 3. 21DDT21F1128
 4. 21DDT21F1054

CLASS SECTION: DDT5A(S1)

LECTURER: PUAN NURUL DAYANA BINTI MOHD DAZID

1
TABLE OF CONTENTS

NO ITEM PAGE

1.0 SYSTEM ANALYSIS AND SYSTEM DESIGN


1.1 INTRODUCTION................................................................ 3
1.2 SYSTEM ANALYSIS
1.3.1 Define System User Company............................... 4
1.3.2 Define System Menu/Process................................. 5
1.3.3 Functional Decomposition Diagram.......................6
1.3.4 Context Diagram..................................................... 7
1.3.5 DFD Level 0............................................................ 8
1.3.6 DFD Level 1 for Process A and Process B…..........9
1.3 CONCLUSION.......................................................................11
1.4 REFERENCES….................................................................. 12

2
MINI PROJECT 1

1.1 INTRODUCTION

SOPHIC Solution Technology is a company located in Bayan Baru, Penang, which is currently
planning to upgrade its physical access control facilities into a systematic access control
system. This project aims to provide enhanced security measures by implementing an efficient
and effective access control system for all the entrances to SOPHIC Solution Technology and
its restricted access control rooms.

The proposed access control system is expected to be based on Physical Access Control
System (PACS) which will enable the company to monitor and control access to its premises
more effectively. The PACS will utilize various security technologies to ensure that only
authorized personnel can gain entry to the company's facilities.

This system analysis report will provide an in-depth analysis of the proposed access control
system, including its objectives, scope, requirements, and key deliverable. The report will
also outline the project plan, including the timeline, budget, and resources required to
implement the new access control system.

The key deliverable of this project will include the design and implementation of the PACS,
testing and validation of the system, user training, and documentation of the system for future
reference. Overall, the new access control system is expected to enhance the security of
SOPHIC Solution Technology and provide peace of mind to its employees, customers, and
stakeholders.

3
1.2 SYSTEM ANALYSIS

1.3.1 Define minimum THREE (3) different user category for this system with
explanation.

i. System Administrators
The Physical Access Control System at the SOPHIC Solution Technology
office is controlled and accessible to these individuals to the greatest level. The
system's setup and configuration, user account management, and system
security and integrity are all their responsibilities. Administrators frequently
have full control over the system's features and capabilities, including the
ability to control physical access devices like door locks, security cameras, and
card readers. In addition, they may design and control the permissions and
access controls for both visitors and workers.

ii. Employees
The SOPHIC Solution Technology office and all restricted access control
rooms must be accessed by these users via the Physical Access Control
System. Access is frequently obtained using identification credentials, such as
access cards or biometric scanners. Only features and functions related to their
own access, such as requesting access to a particular area or reporting lost or
stolen credentials, are available to employees who have limited access to the
system.

4
iii. Security Personnel
These are users who are responsible for monitoring and responding to security
incidents at SOPHIC Solution Technology office. They have access to certain
features and functions of the system, such as the ability to view security camera
footage, log security incidents, and respond to security alerts. They may also
have the ability to grant or deny access to specific individuals or groups based
on security policies and procedures. Security personnel may be employed by
SOPHIC Solution Technology or by a third-party security provider.
(5 marks)

1.3.2 Define minimum FIVE (5) main features/menu/process for this system with
explanation.

i. User Management
System administrators can use this capability to create, manage, and remove
access privileges for staff members and guests. An interface for managing user
credentials, assigning access levels, and adding new users should be available.

ii. Access Policies


System Administrators can create access controls and regulations for various
facilities sections using this functionality. In addition to creating access levels
for various user groups and configuring access schedules for certain regions,
this also entails setting up security breach alerts and notifications.

iii. Access Request


Employees and guests can use this function to ask to enter the building's
restricted areas. This may be done through a request interface where they may
submit access requests, or it may be done through an approval procedure where
their manager or security professionals must first grant the request.

5
iv. Audit Trail
This function offers a log of all successful and unsuccessful access attempts,
offering an audit trail for security reasons. Information like the time and date
of the access attempt, the user's identity, and whether the attempt was
successful or not are included in this.

v. Integration with Security Systems


This feature allows the Physical Access Control System to integrate with other
security systems, such as security cameras or alarms, to provide a
comprehensive security solution for the facility. This could include the ability
to trigger alarms or send notifications based on security breaches, or to view
security camera footage in real-time from within the access control system.
(5 marks)

6
1.3.3 Design a Functional Decomposition Diagram (FDD) for your system

PHYSICAL ACCESS
CONTROL

SYSTEM
ADMIN PERMISSION
ACCESS

Access Control Biometric


Admin
Database Scanner

System Manage Biometric Data


Maintenance Control Server Processing

Employee Store Data Processed


Credentials Biometric Data

Access Cards

Identify

(10 marks)
Verify

7
1.3.4 Design a Context Diagram for your system.

Allow Authorized
Employee
ADMIN EMPLOYEE
Send Details

Create/Modify
Employee 0 Verify ID
Employee

PHYSICAL ACCESS
CONTROL SYSTEM
Identify Access
Store User Card
Credentials

Manage
Control
Server

Biometric Data
For Processing

Verify Access
ACCESS CONTROL BIOMETRIC Card ACCESS CARD
DATABASE Processed SCANNER READER
Biometric
Data

(5 marks)

8
1.3.5 Design a Data Flow Diagram (DFD) Level 0 for your system and provide
explanations:

Captured 2.0
Biometric Data
BIOMETRIC
SCANNER CHECK
BIOMETRIC
RESULT

Captured Check For


Biometric Data Similar
Identification
Biometric
Result
1.0
Employee Employee
D1
Information Information
EMPLOYEE SCAN
BIOMETRIC
Result

4.0 3.0
Verification
Result
GENERATE VERIFY
MESSAGES EMPLOYEE

ACCESS CONTROL
DATABASE
Records Of
Data

Verification
Result
5.0

Records Employee
ADMIN MANAGE AND D2
Records
ORGANIZE Records
RECORDS

9
Explanation

At process 1.0, a SOPHIC Solutions Technology employee scans the system's biometric
scanner, and the system captures the employee's bio-metrics. The recorded biometric data
will then be sent to process 2.0, where the system will look for comparable data about the
person in the first data store, Person information. The result will then be sent to the third
process, where the employee will be verified, and if the result of the verification produces a
message, which is process 4.0, such as if the verification is successful or if the identification
is not successful, the system will display a message to the employee. The results of the
verification will then be controlled and compiled into the correct records, which will be
recorded in the employee's record and notified to the administrator and the access control
database.

(30 marks)

10
1.3.6 Select TWO (2) main process from DFD Level 0 designed in (e) other than Log in
Process.

Develop DFD Level 1 for :

i. Process 1 (State the process name, draw a complete DFD Level 1 and
explanation)

BIOMETRIC
SCANNER

Notice
4.1 Warning
Verification Verification
Message
Success Tail

RECEIVE
VERIFICATION
RESULT

4.2 4.3

Result Result

CHECK IN REJECT
NOTICE MESSAGE

D3 Verification Result
(10 marks)

11
Explanation

Process 4.0 will receive the verification result and determine whether it was successful or not.
If the authentication is successful, a check-in message will be shown in the biometric scanner
for the employee. If the authentication is not successful, a refused message with a warning will
be issued for the user of the biometric scanner. Both successful and failed results will be saved
as validation results.

(10 marks)

12
ii. Process 2 (State the process name, draw a complete DFD Level 1 and
explanation)

5.1
Verification Verification
Result Result
RECEIVE
VERIFICATION
RESULT

5.2 5.3

Manage Data Manage Data


ORGANIZE ORGANIZE
SUCCESSFUL UNSUCCESSFUL
VERIFICATION VERIFICATION DATA

5.4

Data Employee
RECORD DATA D2
Records

Verification Verification
ADMIN Data Data ACCESS CONTROL
DATABASE

13
Explanation

Process 5.0 will receive authentication results and compile both successful and unsuccessful
authentication data into the data. The organized data will then be recorded, and the recorded
data will be stored in the employee record data repository. The data will then be captured and
organized before being placed in an access control database.

(10 marks)

14
1.3 CONCLUSION

Physical access control is a type of physical security that authorities and controls admission
to a certain area or structure. As a consequence, our organization has developed a physical
accesscontrol system that is beneficial to a business. And our organization has mentioned all
of the system's features in the report. By employing our system, the firm may have better
facilities management. Not only that, but our company has some future plans, one of which is
to put a Thermal Detector in the system to make the system more efficient and useful to the
SOPHIC Solution Technology Office. Also, we have elaborated on the user category and the
characteristics of our system in the report so that the organization has a better grasp of the user
category and the system's features. Not only that, but we have included a Functional
Decomposition Diagram (FDD), context diagram, and Data Flow Diagram (DFD) level 0 and
1 of the system in the report so that the organization has a clear understanding of the Physical
Access Control System that our company has produced.

1.4 REFERENCES

i. https://www.researchgate.net/profile/Maria-Larrondo-Petrie. (2007, July). ResearchGate Logo.


Security Patterns for Physical Access Control Systems. Retrieved May 6, 2023, from
https://www.researchgate.net/publication/221495421_Security_Patterns_for_Physical_Access_Co
ntrol_Systems

ii. Hawkin Saeger. (2023, March 14). Lucidchart. Data flow diagram examples, symbols, types, and tips.
Retrieved May 7, 2023, from https://www.lucidchart.com/blog/data-flow-diagram-tutorial

iii. Sonoo Jaiswal. (n.d.). Javatpoint . Data Flow Diagrams. Retrieved May 7, 2023, from
https://www.javatpoint.com/software-engineering-data-flow-diagrams

15

You might also like