Total Pageviews

Friday, 26 October 2012

WEEK 13


CONCLUSION

The structure of the code and wireless systems itself mainly depends on the design requirements. This project has utilized the process design and simulation over simulation. A vast research on security methods had been done for ideas on design. This gave a lot of useful information not only on the study, but also on information gathering.

The project had been carried out from software to hardware which depicts the real circuit easily. Although there are some disadvantages using the board, due to unfamiliarity with the board, it had somehow an effective way to apply theoretical knowledge into reality, using the simplest method.

A complete version of the auto keyless entry system has been designed. It is
proven that it meets the earlier determined requirements, in terms of entry method,security level, and ease of use for end users. The hardware simulation runs properly,which depicts the real circuit is going to be ready for further expand or upgrades.


REFERENCES


Systems Security Management
NERC Reliability Standards CIP-002 through CIP-009
NERC Implementation Plan for Cyber Security Standards

No comments:

Post a Comment