Title

One Card Security Assessment

Lead Author Major

Computer Science

Format

SOECS Senior Project Demonstration

Faculty Mentor Name

Jinzhu Gao

Faculty Mentor Department

Computer Science

Additional Faculty Mentor Name

Michael Doherty

Abstract/Artist Statement

The University of the Pacific has always trusted the One Card office to issue IDs and to prevent their fraudulent use. Since ID cards are used for multiple purposes, such as financial transactions and building/room access, it is important to know that there are security measures to help protect those who use them. The One Card Security Assessment project will identify potential flaws in the One Card office’s security implementations. The assessment be conducted in will multiple phases. First, it will assess how securely the information on the ID cards themselves is stored. Second, it will determine what is necessary to duplicate the ID cards. Third the potential for possible corruption in the One Card database to allow “special” cards to access any ID card accessible area will be investigated. The final step, after identifying security lapses, will be to determine measures to correct them.

Location

School of Engineering & Computer Science

Start Date

27-4-2013 2:00 PM

End Date

27-4-2013 3:30 PM

This document is currently not available here.

Share

COinS
 
Apr 27th, 2:00 PM Apr 27th, 3:30 PM

One Card Security Assessment

School of Engineering & Computer Science

The University of the Pacific has always trusted the One Card office to issue IDs and to prevent their fraudulent use. Since ID cards are used for multiple purposes, such as financial transactions and building/room access, it is important to know that there are security measures to help protect those who use them. The One Card Security Assessment project will identify potential flaws in the One Card office’s security implementations. The assessment be conducted in will multiple phases. First, it will assess how securely the information on the ID cards themselves is stored. Second, it will determine what is necessary to duplicate the ID cards. Third the potential for possible corruption in the One Card database to allow “special” cards to access any ID card accessible area will be investigated. The final step, after identifying security lapses, will be to determine measures to correct them.