Cis 210 Access Control System

1264 words - 6 pages

Building an Access Control System
As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door.
Create a 3-4 page project plan for this project in which you:
Include a one-half page project scope statement.
Define five (5) major tasks, each with one to two (1-2) subtasks. Also write a brief description for each ...view middle of the document...

Scope Statement
Due to insecurity within the dormitory, it is essential that the security system be improved to detect the visitors during entry, and to only allow the required personnel into the system. Hence, our objective is to create an access control system that unlocks the door automatically via an electronic proximity reader. The system should be integrated with the existing security camera system to enhance its effectiveness.
The access control system would require all visitors to swipe their cards through the proximal card reader. The system would check existence of the details on the card with the ones in the database; then, if a match is found, the door would open (Sandhu & Munawer, 2002). The action would trigger the rotation of the camera view towards the door to record or take view of a guest who enters the dormitory. The system would keep records of all entries and the timestamp for each access and corresponding video or picture taken by the camera.
An access control system is considered effective if it is capable of determining the owners of the cards used, record the timestamp as well as allow for retrievals of past access records (Benantar, 2006). Inclusivity is also the camera’s capability to rotate towards the door and record when triggered by allowed access (Ramachandran, 2002).
The college is responsible for purchase of the required materials as to be ascertained. The installation is expected to take, and not limited to, ten days. Maintenance of the system is to be accounted for when required after approval of the system’s effectiveness.
There are two main distinctions of requirements: functional and non-functional requirements. Functional requirements are the most essential ones as they ensure the main objectives are achieved. On the other hand, non-functional requirements are the values or attributes of the system that would ensure smooth running of the system.
The functional requirements that will form the system include the control panels, access cards, card readers, power booster, and conduit and raceway systems (Sandhu & Munawer, 2002). These requirements are essential during installation to ensure effectiveness of the system.
The non-functional requirements are the attributes of the system; these include: reliability, performance, cost, system quality attributes, and the challenges encountered during installation.
Steps of Implementing the Project
To complete the installation, the following steps would be accomplished to successfully install the access control system.

The analysis of the problem should take a day. At the analysis stage we determine the solution. The solution has been identified as the installation of the access control system. At this stage the system parts are identified; they include input, output, communication devices, power supplies, detection devices, intelligent panels, card readers, lock hardware, the actions...

Other Papers Like Cis 210 - Access Control System

Term Paper

601 words - 3 pages one can begin to take countermeasures to eliminate or limit the number of vulnerabilities that a computer system has making it harder for potential threats and malicious attacks to damage it. Counter measures such as risk management plans, firewalls, computer monitoring programs, strict access control to computer networks and systems, anti-virus software, user training can aid in the protection your computer network or system against potential

Operating Systems Essay

1257 words - 6 pages this layer service routines are performed by user request. Such services might include file/disk access, input/output control, termination, and process creation. The User layer or the process layer is the UNIX operating system assigns resources to users and programs by the way of process. Every process has a number called an identification number. With every number there is a set of resources associated with it. Each number is carried out in a

Input Controls

709 words - 3 pages Input Controls Assignment 3 Roseana Clark | CIS 210 Professor Nancy Romero | 11/15/2014 Application controls are used to refer to transactions and any data that relates to the computer based application system. They should be kept specific to each application. Application controls may be manual or programmed, but are necessary in the support of record accuracy as well as data validity. These controls are used in processing, output and

Four Core IT Applications Paper

1396 words - 6 pages electronic prescriptions. According to Marie Reed, many physicians still lack access to clinical information technology in their practices despite the substantial growth rate. Barriers to physicians adopting clinical IT include: Start-up and maintenance costs and significant effort and costs of changing workflow to use IT effectively. According to the Center for Studying Health System Change, promoting digital health data may encourage more doctors

Vtb Bank Group

1450 words - 6 pages VTB Bank (Russian: ОАО Банк ВТБ, former Vneshtorgbank) is one of the leading universal banks of Russia. VTB Bank and its subsidiaries form a leading Russian financial group – VTB Group, offering a wide range of banking services and products in Russia, CIS, Europe, Asia, Africa, and the U.S. The Group’s largest subsidiaries in Russia are VTB24, Bank of Moscow, and TransCreditBank. Type | Public company | Traded as | MCX: VTBR LSE: VTBR

New System Proposal

1196 words - 5 pages New System Proposal Team A CIS/207 February 23rd 2014 Riordan Manufacturing requires an innovative information system proficient in the organization of product sales, which allows management of data by employees from computers and mobile devices. This new system would contain customer records and be password protected for sales agent’s individual accounts and further promote confidentiality of client and corporate data. Information

Russia and the Frozen Conflicts in Post-Soviet States

3542 words - 15 pages structure : the CIS was perfect for it and 11/15 States created the CIS at Almaty the 21/12/1991. But the aim and the ambition of the CIS have never been determined clearly : is it a structure in order to prepare a safe divorce from Russia or an organization under Moscowʼs control ? Russiaʼs first interest was to leave a political union with his former Empire in order to treat in priority her own problems- and they were not few. Moscow spent

Cis 517 Week 10 Assignment 5 Term Paper Final Project

806 words - 4 pages CIS 517 Week 10 Assignment 5 Term Paper Final Project This assignment consists of two (2) sections: a written paper and a Work Breakdown Structure (WBS). You must submit the two (2) sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for.   The final term project for this course is based off the background that follows below. Your submission will

Cis 210 – Systems Analysis and Development Website Migration Term Paper

3905 words - 16 pages Website Migration Project Chinnasut Nhurod CIS 210 – Systems Analysis and Development Dr. Wesley E. Phillips Strayer University September 15, 2013 Website Migration Project for Tony’s Chips Building the Web Architecture In order to build the web architecture, the system analyst would be required to analyse the business requirements of the organization and then develop a clear statement of goals of the organization. Since, the old

Cis 511 Week 8 Assignment 3, Integrated Case Study Bandon Group In

1238 words - 5 pages : Determine feasibility of an ERP system An ERP system facilitates database control in a company, which allows the data transfer process to be uniform and united throughout the various divisions and departments. The foremost advantage of an ERP system is bringing down the costs and saving the valuable time which would have otherwise been wasted in procedural maneuvers and unwanted delays (Info Entrepreneurs, 2009). ERP is a merger of three important

Fasb Codification Week 3 Homework

1142 words - 5 pages primary goals when creating the codification: 1. Simplify user access by codifying all authoritative US GAAP in one spot. 2. Ensure that the codified content accurately represented authoritative US GAAP as of July 1, 2009. 3. Create a codification research system that is up to date for the released results of standard-setting activity. c. What authoritative literature does the codification supersede? The codification in Statement No. 168

Related Essays

Building An Access Control System Essay

996 words - 4 pages attacker has gained access, the goal of the attack fails is they are unable to maintain control. Covering tracks once an attacker has violated a system will destroy all evidence of his or her attacks. You could eliminate Trojans, viruses, and worms to your devices before catastrophic damage to your computer systems make it impossible to fix. Theses malicious bugs use different entry points as mentioned earlier. Trojans are able to enter through

It Global Essay

5924 words - 24 pages because the government plays a much smaller role in observing the content that is published because of the fact that Internet access is few and far between for the general population to make enough of a political or social influence. As far as general use of the Internet in the CIS, there has been a steady growth of internet usage over the past several years; however, the rate at which the internet is used is still considered to be low when taking

Input Controls Essay

1142 words - 5 pages . In a server-based system, all of the data storage, access and application programs are located on the mainframe. The following is to ensure Data processing control: 1) Documentation should exist explaining the workflow through the application. Examples would be narratives on the application processes, flowcharts, and an explanation of system or error messages. 2) If batch processes are “run” on a regular schedule, there should be documented

Systems Analysis And Design

1244 words - 5 pages Case Study 2: Application Architecture Dwayne D. Jones Sr. Dr Robert Joseph Systems Analysis and Design CIS 210 28 May 2012 Architecture used The type of architecture used in the payroll system is explained as following: Users The PAYROLL system should support multiple concurrent user activities. The users from different locations will remain connected to the server via network throughout the day. Scalability The system must be