Model answers-ACDA-2021
Short notes
Q3. Smart Card for access control
Answer- A smart card is a credit card sized plastic card with an embedded computer chip. The chip can
either be a microprocessor with internal memory or a memory chip with non-programmable logic. They
can be programmed to accept, store and send data. It is small and personal secure device.
Smart cards are a portable computational device with data storage ability. As such, they can be a
very reliable form of personal identification and a tamper-proof, secure information repository. The
main possible applications of smart cards in Industrial Security are the following:
a) ID Verification
b) Personnel identification
c) Access Control
d) Authentication
e) Physical access
f) Network access
g) Time registration
h) Secure e-mail & Web applications
i) Can be integrated with other security gadgets and gate access control like
• Boom barrier
• Flap barrier
• Tripod gate
• Turnstile gate
The computational power of smart cards allows running mutual authentication and public-key
encryption software in order to reliably identify the bearer of the card. For higher security needs, a smart
card is a tamper-proof device to store such information as a user's picture or fingerprints. Smart cards
can be used also for network access: in addition or in alternative to user IDs and passwords, a networked
computer equipped with a smart card reader can reliably identify the user.
Authentication.
Smart card technology provides mechanisms for authenticating others who want to gain access to the
card or device. These mechanisms can be used to authenticate users, devices, or applications wishing to
use the data on the card’s or device’s chip. These features can be utilized by a system to protect privacy
by, for example, ensuring that a banking application has been authenticated as having the appropriate
access rights before accessing financial data or functions on a card.
Physical Access Control
Employee access cards with secured ID and the potential to employ biometrics to protect physical
access to facilities.
================================END================================
Q5. Name any five PIDS/FIDS
Answer-Perimeter / Fence Intrusion Detection Systems (PIDS/FIDS) are a system deploy
in a facility to monitor and detect any form of intrusion from the perimeter into the protected
premises. There are many types of PIDS / FIDS system, each type using different technology to
do the detection. PIDS system can mitigate the risk of unauthorized site access, vandalism, theft
or destruction of critical infrastructure, and cover these topics.
Covert PIDS
Covert systems mean the Intrusion Detection Systems which are physically not visible or
not openly acknowledged or displayed to avoid the intruder’s sight. Covert PIDS is required
where hidden system is required. It may install inside wall, underground, etc.
PIDS/FIDS:
1. Active Infrared sensor
2. Passive infrared sensor
3. Microwave sensors
4. Buried cable
5. Seismic sensor
ActiveInfrared sensor
Active infrared is a high performance outdoor sensor for detection of walking and running of
intruders. It consists of
1. Transmitter: Transmits invisible active infrared beam.
2. Receiver: Receives the signals, analyzes them, and detects intruders passing between
the two units.
Passive infrared sensor
Passive Infrared (PIR) Intrusion Sensor is an advanced stand-alone sensor specifically designed
for indoor/outdoor intrusion detection applications. A passive infrared sensor (PIR sensor) is an
electronic sensor that measures infrared (IR) light radiating from objects in its field of
view.Passive infrared detects intruders by sensing the temperature (heat radiation) difference
between the background environment and that of the intruder.
Microwave sensors
It is used for outdoor intrusion detection.It consists of
1. Transmitter
2. Receiver
Microwave sensors generate an electromagnetic field between transmitter and receiver, creating
an invisible volumetric detection zone. When an intruder enters the detection zone an alarm is
generated.
Buried cable
Buried cable is used for outdoor intrusion detection. It is installed under ground level. Buried
cable detection systems offer reliable protection for applications where covert perimeter
protection is essential. Invisible electromagnetic detection field is generated above and below the
ground.
Seismic sensor
Seismic sensors are devices used to measure seismic vibrations by converting ground motion
into a measurable electronic signal. As the signal is analogue in nature, sensors must be linked to
a data acquisition unit to convert its output into a digital format that can be read by computers.
It is used for underground assets security- oil pipeline, water pipeline, Telephone line and
Internet line etc.
=======================================END=========================
Long answer
Q3. Explain about Contact & Contactless Cards, their types and security application in an
Industrial undertaking.
Answer-
1. Contact card
A card containing electronic information reads by touching the card with a special piece of
equipment (Reader).
OR
Cards require insert into the reader for communication each other for grant access.
Types of Contact cards
1. Contact smart cards
2. magnetic stripe card
Contact smart cards
A smartcard, chipcard, or integrated circuit card(ICC) is any pocket-sized card that has
embedded integrated circuits. Smart cards are made of plastic, generally polyvinyl chloride.
Smart cards can provide personal identification, authentication, data storage, and application
processing. Smart cards may provide strong security authentication for single sign-on
(SSO)within large organizations. The chip can either be a microprocessor with internal memory
or a memory chip. They can be programmed to accept, store and send data.
Howdoes a smart cardwork?
To use a smart card, an end users imply inserts it into a read/write device where it remains for
the duration of a session or transaction. The user provides a PIN or password as they would at
an ATM machine providing the added protection of two-factor authentication.
Magnetic stripe card
A magnetic stripe card is a type of Contact card capable of storing data by modifying
the magnetism of tiny iron-based magnetic particles on a band of magnetic material on the card.
The magnetic stripe, sometimes called swipe card or magstripe, is read by swiping magnetic
reading head.
Magnetic Stripe Reader
A magnetic stripe reader, also called a magstripe reader, is a hardware device that
reads the information encoded in the magnetic stripe located on the back of a plastic badge.
Application Areas of Magnetic stripe card
Magnetic stripe cards are commonly used in credit cards, identity cards, and
transportation tickets. They may also contain RFID tag, a transponder device and/or a
microchip mostly used for business premises access control or electronic payment.
2. Contactless card
Contact-less card communicates with the reader without any physical contact. It consists of an
antenna which is used to communicate with the RF band with the antenna on the smart card
reader. The antenna receives power from the card reader through the electromagnetic signal.
Various types ofcontactless cards
1. Contactless smart card
2. Proximity card
3. RFID card
Contactless smart card
A contactless smart card whose dimensions are credit-card size. It is embedded integrated
circuits can store and sometimes process data and communicate with a terminal via radio waves.
Contactless smart cards do contain read-only RFID called CSN (Card Serial Number) or UID,
and are-writeable smart card microchip that can betranscribed viaradio waves.
Proximity card
A proximity card or prox card is a "contactless” card which can be read without inserting it into
a reader device. The proximity cards are part of the contactless card technologies. Used for
limited applications (For example- Access Control)
RFID card
Radio-Frequency Identification (RFID) is the use of radio waves to read and capture
information stored on a tag attached to an object. A tag can be read from up to several feet away
and does not need to be within direct line-of-sight of the reader to be tracked. RFID tags include
an integrated circuit that typically stores a static number (an ID) and an antenna that enables the
chip to transmit the stored number to a reader. When the tag comes within range of the
appropriate RF reader, the tag is powered by the reader’s RF field and transmits its ID to the
reader.
Application areas of card technology:
Smart card is used in a wide variety of applications over different fields some of these areas are
discussed below.
a. Financial Applications
• Debit and Credit accounts, reproducing what is currently placed on the magnetic stripe
bank card, in a secure environment.
• Securing payment across the Internet as part of Electronic Commerce.
b. TransportationPurpose
Driving licenses
Electronic toll gate collection systems
Fare collection systems for huge crowd transportation
c. Physical Access ControlSystem
Smart card can be used by different public areas such as consumers and business
dealers or organizations to provide access to the members (employees of the organization) or
other persons to enter the secured areas. The smart card consists of identification of every
individual which is checked and scanned.
d. Telecommunications
The major and highly prominent use of smart card technology is in the development of
Subscriber Identity Module or SIM card. A SIM Card provides network access to the each
user or subscribes and manages its authentication. It also provides unique identification to
each subscriber
e. Domestic/Office Purpose
The most commonly used smart cards in domestic field are the DTH card. This DTH smart
card provides authorized access about the information coming from the satellites. The card
which gets access directly to the TV services in the home and office is nothing but a smart
card. The information gets encrypted and decrypted within a smart card.
Other Application Areas of Cards Technology
a. Entertainment- Set-top box
b. Retail-Sale of goods, using Electronic Purses, Credit / Debit, Tags & smart labels
c. E-commerce- POS, Sale of tickets, reservations
d. E-banking - Access to accounts, to do transactions
e. Office- Physical access, Network access, secure-mail &Web applications, employee
attendance, access control at gate integrated with card reader.
==============================END============================