Pritam7th Sem
Pritam7th Sem
Pritam7th Sem
on
“Data warehouse”
Dept. of Computer Science Engineering
DECLARATION
1
I, Pranaya Pritam Barik bearing Regd. No.2121337034 hereby
ACKNOWLEDGEMENT
2
I am extremely gratified to Er Alina Kumari swain. , Asst.
of my seminar.
classmates and the entire faculty members and other staff who have
my seminar.
CERTIFICATE
3
This is to certify that Pranaya Pritam Barik , student of 6th
Of Technology (BPUT).
has not been submitted anywhere else for the award of any other
degree.
4
ABSTRACT
IIntensive research and reading of many programmers security
has landed them in the hacking world of which computer
security were felt with including manual based security. His has
brought the idea of implementing a CARD BASED SECURITY
SYSTEM to curb this illegal act of intruding into system. This
project deals with securing a system with card of which only an
authorized (card holder) users will be allow and unauthorized
users will not be allow in the system. The project also cut across
the importance, advantages and disadvantages if there is any.
5
CONTENTS
• Introduction
Subject-Oriented
Integrated
Time-Variant
Non-Volatile
• Conclusion
• references
6
INTRODUCTION
7
WHAT IS A data were ouse
A Data Warehouse (DW) is a relational database that is designed for query and
analysis rather than transaction processing. It includes historical data derived from
transaction data from single and multiple sources.
A Data Warehouse is a group of data specific to the entire organization, not only to
a particular group of users.
It is not used for daily operations and transaction processing but used for making
decisions.
A Data Warehouse can be viewed as a data system with the following attributes:
8
What is a smart card?
A smart card is a physical card that has an embedded integrated chip that acts as a security
token. Smart cards are typically the same size as a driver's license or credit card and can be
made out of metal or plastic. They connect to a reader either by direct physical contact --
also known as chip and dip -- or through a short-range wireless connectivity standard such
as radio-frequency identification (RFID) or near-field communication.
The chip on a smart card can be either a microcontroller or an embedded memory chip.
Smart cards are designed to be tamper-resistant and use encryption to provide protection for
in-memory information. Cards with microcontroller chips can perform on-card processing
functions and manipulate information in the chip's memory.
Smart cards are used for a variety of applications but are most commonly used as credit
cards and other payment cards. The payment card industry's support of smart cards for the
Europay, Mastercard and Visa (EMV) card standard has driven the distribution of smart
cards. Smart cards capable of short-range wireless connectivity can be used for contactless
payment systems. They can also be used as tokens for multifactor authentication (MFA).
9
How smart cards work
Smart card microprocessors or memory chips exchange data with card readers and other systems over a
serial interface. The smart card itself is powered by an external source, usually the smart card reader.
Smart cards communicate with readers via direct physical contact or using RFID or another short-range
wireless connectivity standard. The chip or processor on the card contains data that the card reader
accesses. The processor on the card contains a basic operating system (OS) that lets the card hold,
transmit and protect the data.
10
A. Uses of smart cards
Smart cards are generally used in applications that must deliver fast,
secure transactions. They can protect personal information in numerous
situations, including the following:
credit cards;
Smart cards, such as debit cards, are often used with a personal
identification number (PIN). Organizations also use them for security
purposes, as MFA tokens and for authenticating single sign-on (SSO)
users and enabling passwordless authentication.
11
A. Types of smart cards
Smart cards are categorized based on criteria such as how the card reads
and writes data, the type of chip used and its capabilities. They include the
following types:
Contact smart cards are the most common type of smart card. They
are inserted into a smart card reader that has a direct connection to a
conductive contact plate on the surface of the card. Commands, data
and card status are transmitted over these physical contact points.
Hybrid smart cards contain more than one smart card technology. For
example, a hybrid smart card might have an embedded processor chip
that is accessed through a contact reader and an RFID chip for
proximity connection. The different chips may be used for different
applications linked to a single smart card -- for example, when a
proximity chip is used for physical access control to restricted areas
and a contact chip is used for SSO authentication.
Memory smart cards only contain memory chips and can only store,
read and write data to the chip. The data on these cards can be
overwritten or modified, but the card itself is not programmable. So,
data can't be processed or modified programmatically. These cards can
be read-only and used to store data such as a PIN, password or public
key. They can also be read-write and used to write or update user data.
Memory smart cards can be configured to be rechargeable or
12
disposable, in which case the data they contain can only be used once
or for a limited time before being updated or discarded.
13
A. Advantages of smart cards
Multiple uses. Multiservice smart card systems let users access more
than one service with one smart card.
14
A. Disadvantages of smart cards
While smart cards have many advantages, there also drawbacks, including the
following:
Cost. The cards and the smart card readers can be expensive.
Compatibility. Not all smart card readers are compatible with all types of
smart cards. Some readers use nonstandard protocols for data storage and
card interface, and some smart cards and readers use proprietary software
that is incompatible with other readers.
Security vulnerabilities. Smart cards are secure for many applications, but
they are still vulnerable to certain types of attack. For example, attacks that
can recover information from the chip can target smart card
technology. Differential power analysis (DPA) can be used to deduce the on-
chip private key used by public key algorithms, such as the Rivest-Shamir-
Adleman (RSA) algorithm. Some implementations of symmetric ciphers are
vulnerable to timing attacks or DPA. Smart cards may also be physically
disassembled in order to gain access to the onboard microchip.
15
Examples of smart cards
Payment cards, including debit and credit cards issued by commercial credit
card companies and banks, are used for financial transactions.
Transit cards let local and regional transit systems process payments, as well
as give riders points on their purchases.
Smart health cards help medical facilities securely store patient medical
records.
SIM cards, used inside of digital cameras and smartphones, store media and
other data.
16
CONCLUSION
The term "Data Warehouse" was first coined by Bill Inmon in 1990. According to Inmon,
a data warehouse is a subject oriented, integrated, time-variant, and non-volatile
collection of data. This data helps analysts to take informed decisions in an organization
REFERENCE
www.google.com
17
18