Summary: Access control is a security function with the ability to authenticate an individual and grant or deny access to an individual into a designated area for security reasons. This goal can be achieved more effectively with the use of biometric devices. Biometric access control devices authenticate an individual by its unique physical or
Summary: Building automation systems (BAS) are an important part of modern automated buildings. This system ensures the operational performance of the facility as well as functions affecting occupant’s safety, security and health. Contemporary industrial control systems no longer operate in isolation, but use other networks (e.g., corporate
Summary: The crime, opportunities for rule breaking violations, weakness or gap in a security program include structural, procedural, policy, electronic, human and other elements would provide opportunities to attack government assets and critical information. Statistics and case study shows that the vulnerable area need to improve soon. Thus,
Summary: Advanced Persistent Threats (APT) has targeted the financial institutions (FI) for intelligence gathering on sensitive customer information and monetize the attack. The possible attack could cause disastrous impact to the targeted FIs and the country’s economy if there is a lack of preparation to confront these challenges and attack
Summary: Cloud Based Learning Systems (CBLS) refers to the systems that provide electronic or online contents to enable the learning process by offering tools and functionalities on the platform available in Cloud. All the contents and functionalities of the system are available as services that can be accessed anywhere through internet. The s
Summary: This dissertation investigates the factors influencing user acceptance of physical access control systems (PACS) in one of law enforcement agency in Malaysia. PACS is a security systems function as an access control that created to restrict physical access to buildings or rooms. In security field, physical access control is one of the
Summary: Data Leakage Prevention (DLP) system is used in Chief Government Security Office (CGSO) to protect classified information in the organization. This study aims to investigate the effectiveness of DLP system by analyzing the relationship between the effectiveness and the challenges towards the system acceptance. It also examines the acc
Summary: This study examines the characteristics of the transit rail networks making them vulnerable to threat and more difficult to secure and make any security and safety measures impossible. This sector often viewed as "a soft target".
The transit rail
networks systems are designed to operate openly (non-restricted), with ma
Summary: This dissertation is concerned with the good image of the Malaysian Army has slowly been damaged by some misconduct by the armed forces personnel, especially in the case of drug abuse. This research is to observe the phenomenon of drug abuse in the Malaysian Army in Selangor and at the same time identifying the traditional drug and an