Cis 210 - Access Control System

In: Computers and Technology

Submitted By jsplisim
Words 1248
Pages 5
CASE STUDY 1
Building an Access Control System
As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door.
Create a 3-4 page project plan for this project in which you:
Include a one-half page project scope statement.
Define five (5) major tasks, each with one to two (1-2) subtasks. Also write a brief description for each task.
Create a Gantt chart illustrating the project tasks (use Microsoft Project or a similar project management program).
Create a system diagram illustrating the equipment and connections required for this project (use Microsoft Visio or a similar software package).

Building an Access Control System
CIS210

Building an Access Control System
Introduction
An access control system is fundamental in reducing security issues as well as controlling the personnel allowed to access a given place. Its main objective is to ensure limited persons are granted the rights of access. This access can be granted by checking on criteria such as workplace, home or any other specified locations. The access control system may consist of diverse components that collaborate to ensure the main objective is achieved. An effective control system would ensure privileges for the different users vary according to their access rights or levels; the system under research can monitor and record all activities of access, lock and unlock the doors, cancel privileges when a pass card is lost as well as detect usage…...

Similar Documents

Building an Access Control System

...Building an Access Control System Strayer University CIS 210 Systems Analysis and Development 4/28/13 Scope The scope of this project is to install an access control system (ACS) into a college dormitory. This ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door. To complete this project we will start with the analysis and design stage. The creation of various design documents will be performed during this stage. The next stage will be the development stage. During this stage we will either create a new database or use the school’s existing database. The 3rd stage will be the integration stage. During this stage, the physical installation of the system will occur. The 4th stage will be the testing stage. The final stage will be the maintenance phase. The maintenance phase is on-going. Major Tasks 1. Analysis and Design a) Design Documentation i. With this task, documentation is written up to describe the work that needs to be completed. This documentation is reviewed by all stake holders to ensure that the requirements are have been accurately conveyed and understood. b) Design Models i. With this task, flow charts and/or use case are created to describe the functionality.......

Words: 508 - Pages: 3

Building an Access Control System

...vulnerability analysis, focus on entry points to gather critical systems and data. By understanding the basic approach used by hackers to target organizations, you will be better equipped to take defensive measures you will be better equipped and know what you are up against. There are steps involved in scanning a network, the following points will highlight them. 1) Check for live systems, 2) Check for open ports, 3) Fingerprint the operating system, 4) Scan for vulnerabilities, 5) Probe the network. Tools that can be used to detect scanning threats and countermeasures that a company can use to deter and avoid vulnerabilities are as follows. “Spoofing user identity -use strong authentication for passwords, do not store secrets (for example, passwords) in plaintext. Do not pass credentials in plaintext over the Internet. Tampering with data –use data hashing and signing, use digital signatures, use strong authorization, use tamper-resistant protocols across communication links, secure communication links with protocols that provide message integrity”. (Microsoft.com) Port scanning is one of the most common reconnaissance techniques used by hackers to discover the vulnerabilities in the services listening at well-known ports such as the internet and DNS. “Some live system scanning tools are Angry IP Scanner a windows IP scanner that scans IPs of any range. It simply pings each IP address to check whether or not the system is alive. Nmap is used for port scanning. Nmap......

Words: 996 - Pages: 4

Access Control System

...Overview of the Project Building an Access Control System in a dormitory of small college Purpose of the Project The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system.  The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door. Work Includes A. Furnish and install all equipment and materials in accordance with these specifications and drawings to provide a complete and operating Door Access Control System. B. The scope of work for the Access Control and Security System shall include to providing the following: 1. Local control panels within the SER. 2. Card readers. 3. Magnetic door locks. 4. Exit push button. 5. PTZ camera. C. The scope of work for the software shall include to providing the following: 1. Install Software in the computer within the SER (computer, printer provide by owner) 2. Train the owner or who represent the company of how to use the software and add identification card to the system. Project process * The typical access control system consists of a control panel, PC, Software card/ pin reader, electromagnetic lock or door strike, power supply system and a push button. * The valid and authorized card user must present the card to the security system. * Upon verification by the reader, the locking system will be reenergized and the door can be pushed open. * To exit the...

Words: 512 - Pages: 3

Building an Access Control System

...Building an Access Control System As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door. Create a 3-4 page project plan for this project in which you: Include a one-half page project scope statement. Define five (5) major tasks, each with one to two (1-2) subtasks. Also write a brief description for each task. Create a Gantt chart illustrating the project tasks (use Microsoft Project or a similar project management program). Create a system diagram illustrating the equipment and connections required for this project (use Microsoft Visio or a similar software package). Building an Access Control System CIS210 Building an Access Control System Introduction An access control system is fundamental in reducing security issues as well as controlling the personnel allowed to access a given place. Its main objective is to ensure limited persons are granted the rights of access. This access can be granted by checking on criteria such as workplace, home or any other specified locations. The access control system may......

Words: 1248 - Pages: 5

Access Control System

...Case Study #1: "Access Control System" Abstract As the project manager to install an access control system (ACS) in the dormitory of the college, my team will develop a project scope statement that cover all the necessary tasks to completed, along with a timeline to complete all tasks, which the work for each task will be written out. Also, a Gantt chart will be created, that will illustrate the project tasks. Lastly, we will create a system diagram to illustrate all the equipment and connections that are required for this project. Access Control System Project Scope: Install an access control system (ACS) into this small college dormitory. The ACS will automatically unlock the dormitory doors using an electronic proximity reader that has been integrated into the existing security camera system. Conduct a review of the current setup for the camera system installed. Determine the cost/benefit to add facial recognition software to be incorporated with the current security camera system. Locate electronic proximity readers and system software that will adhere to the schools security standards and that will operate with the security camera system installed. Load and configure operating software for the ACS/ Gather all students’ information and personnel authorized building access information into the server, to include current pictures. One system is up, configure the parameters for the system will need to be set, such as:...

Words: 990 - Pages: 4

Cis 210 Input Controls

...Input Controls Input control includes the necessary measures to ensure that input data is correct, complete, and secure (Rosenblatt & Shelly, 2012). It is ultimately important that during the user interface design or input design stage to focus on input control, which will start with source documents that will promote data accuracy and quality. Therefore, the main objective of input design is that we ensure the quality, accuracy, completeness, and timeliness of input data happens during its conversion from its original source into computer data or it is entered into a computer application. Input controls could also be considered fail-safes, which ensure that data is entered into the system correctly. We must also remember the term garbage in, garbage out (GIGO), because it will not matter how much data is enter into an information system, but the quality of the data that is outputted is important, which takes us to why it is important to input controls. Although, we could discuss several to many types of input control that can be implemented during the design process, we will focus our attention on only four, which are, the standard text box, drop-down list box, validation controls, and input masks. The first of our input controls is the standard test box and its main function is to display messages or to provide a place for the user to enter data. Now, when the system requires a user to enter data such as their name, the......

Words: 1101 - Pages: 5

Cis 210 Input Controls

...Input control includes the necessary measures to ensure that input data is correct, complete, and secure (Rosenblatt & Shelly, 2012). It is ultimately important that during the user interface design or input design stage to focus on input control, which will start with source documents that will promote data accuracy and quality. Therefore, the main objective of input design is that we ensure the quality, accuracy, completeness, and timeliness of input data happens during its conversion from its original source into computer data or it is entered into a computer application. Input controls could also be considered fail-safes, which ensure that data is entered into the system correctly. We must also remember the term garbage in, garbage out (GIGO), because it will not matter how much data is enter into an information system, but the quality of the data that is outputted is important, which takes us to why it is important to input controls. Although, we could discuss several to many types of input control that can be implemented during the design process, we will focus our attention on only four, which are, the standard text box, drop-down list box, validation controls, and input masks. The first of our input controls is the standard test box and its main function is to display messages or to provide a place for the user to enter data. Now, when the system requires a user to enter data such as their name, the name of a city, zip code, or a restaurant name are......

Words: 1159 - Pages: 5

: Building an Access Control System

...Case Study 1: Building an Access Control System Due Week 3 and worth 50 points As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door. Create a 3-4 page project plan for this project in which you: 1. Include a one-half page project scope statement. 2. Define five (5) major tasks, each with one to two (1-2) subtasks. Also write a brief description for each task. 3. Create a Gantt chart illustrating the project tasks (use Microsoft Project or a similar project management program). 4. Create a system diagram illustrating the equipment and connections required for this project (use Microsoft Visio or a similar software package). Your assignment must follow these formatting requirements:  Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.  Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the......

Words: 363 - Pages: 2

Cis 210 Wk 3 Case Study 1 - Building an Access Control System

...CIS 210 WK 3 Case Study 1 - Building an Access Control System To Purchase Click Link Below: http://strtutorials.com/CIS-210-WK-3-Case-Study-1-Building-an-Access-Control-System-CIS2107.htm CIS 210 WK 3 Case Study 1 - Building an Access Control System As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door. Create a 3-4 page project plan for this project in which you: 1. Include a one-half page project scope statement. 2. Define five (5) major tasks, each with one to two (1-2) subtasks. Also write a brief description for each task. 3. Create a Gantt chart illustrating the project tasks (use Microsoft Project or a similar project management program). 4. Create a system diagram illustrating the equipment and connections required for this project (use Microsoft Visio or a similar software package). Your assignment must follow these formatting requirements: • Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. • Include a...

Words: 287 - Pages: 2

Access Control Systems

...Abstract Access control systems were examined to determine if a network based system would be more reliable and beneficial. Two major systems were determined to be very beneficial to the company. In contrast, the systems would consume a great deal of resources in order to be put into full working order at all sites worldwide. Together these findings suggest that using a network based system can ultimately serve the company better and create a more secure environment for the research and the employees. Keywords: Access control, CCURE, Locknetics, security, networking   Network Based Access Control Systems: What Are They? Personal and confidential information can easily be accessed at sites if the access to the specific areas is not updated quickly enough. To secure and protect this data, technology must adapt to mitigate the threats and risks. Applications and services are becoming mobile across multiple resources, sometimes in a dynamically allocated way, necessitating the migration of sensitive and private data. I propose a network based access control system to address the inadequacies of current technological solutions in preserving the confidentiality and privacy of data, along with the safety and security of the site. More specifically, I describe a solution for securing all Bristol-Myers Squibb sites throughout the world. Access control systems have become a basic way of life for many businesses, especially large businesses. There are many different......

Words: 2919 - Pages: 12

Cis 210 Wk 3 Case Study 1 - Building an Access Control System

...CIS 210 WK 3 Case Study 1 - Building an Access Control System To Purchase Click Link Below: http://strtutorials.com/CIS-210-WK-3-Case-Study-1-Building-an-Access-Control-System-CIS2107.htm CIS 210 WK 3 Case Study 1 - Building an Access Control System As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door. Create a 3-4 page project plan for this project in which you: 1. Include a one-half page project scope statement. 2. Define five (5) major tasks, each with one to two (1-2) subtasks. Also write a brief description for each task. 3. Create a Gantt chart illustrating the project tasks (use Microsoft Project or a similar project management program). 4. Create a system diagram illustrating the equipment and connections required for this project (use Microsoft Visio or a similar software package). Your assignment must follow these formatting requirements: • Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. • Include a...

Words: 287 - Pages: 2

Building an Access Control System

... Building an Access Control System Tirsit Adnew Srayer University Professor, Mohammad Abedin 4/20/2015 Access Control system is important matter to secure the work place specially Hospitals, School, and government office. Controlling who has access to your office space is crucial in today’s dynamic business environment, from large government agencies and multinational corporations down to a single office suite and everything in between, to building Access control system first I have to go with information security see to see what and where to put the access control system, analyze how many rooms are there and if each dormitory need an access and where they need to put, and how many people needs the key to inter the dormitory, after analyzing the place and material I need to secure the small college dormitory. I have to go back what is the market for the material I need and give them an estimate to start the work. 1. Define five (5) major tasks, each with one to two (1-2) subtasks. Also write a brief description for each task. 2. Create a Gantt chart illustrating the project tasks (use Microsoft Project or a similar project management program). 3. Create a system diagram illustrating the equipment and connections required for this project (use Microsoft Visio or a similar software package). As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory....

Words: 305 - Pages: 2

Access Control System

...INVENTORY MANAGEMENT SYSTEMS Jerry Long CIS210 Systems Analysis and Development Strayer University Dr. Wesley Phillips October 19, 2015 Inventory Management Systems My sister is opening a small clothing store named Sheila’s Formal Gowns. While attending her niece’s wedding, she mentioned the difficulties of finding unique and affordable formal gowns to weddings, formal dinners and special occasions. Her business plan is to design a one of a kind dress for each female customer to wear to formal attires. In this paper I will describe all the necessary equipment, maintenance and cost for starting her business. Sheila’s name and expert workmanship has been established for over 20 years as a prestigious theater costume designer. Necessary equipment My sister’s business plan is to purchase fabrics and materials as needed and only take a few orders at a time. Her start-up costs include a sewing machine, computer, computer design software, high end printer and an automated system inventory system, which should be keep cost reasonably low. To accomplish her goals and track business expenditures she implements an inventory management system. Inventory management technology is a mix of hardware and software designed to add reliability to inventory accounting, reduce incidents of theft and facilitate inventory audits. Individual inventory items or batches of items could be equipped with RFID tags that identify the item type, cost, price, shipment number, date......

Words: 1397 - Pages: 6

Access Control System

...Case Study 1: Access Control System Antonicia Holmes Course: CIS 210 Instructor: Bagus Adiyanto Strayer University November 5, 2015 Project Scope Statement: The scope of this project is to install an access control system in a dormitory. The ACS (Access Control System) will enable the dormitory door to unlock mechanically by the use of a proximity reader and combine with an existing security camera. The camera is programmed to spin around to point at him/her and video tape the person while he/she use their identification card to unlock the dormitory door. The Five Tasks The project can be carried out in 5 major tasks and each main task can be sub-divided into the following sub-tasks. 1.) Preparation of the Project It is the initial major task; the steps that have to be taken before the system is built. a) Creating a team to help perform with other tasks. b) Surveying the College Dormitory to study the location. c) Creating the design consisting of the dorm’s visual diagrams. d) Examine the current dormitory’s security system to integrate with ACS. e) Preparing proposals to management f) Estimating total cost. 2.) Installation It is the second task; the steps that include manually putting on the hardware required for the ACS, including its cameras and readers. a) Making the Control Panel b) Wiring c) Putting readers on the walls and doors. d) Repositioning the camera to point towards the readers on the......

Words: 449 - Pages: 2

Access Controls Systems

...accomplish this we will have proximity card readers to access the dormitory as well as card readers on the doors to the rooms. The proximity card is the most popular access device as well as inexpensive and long lasting. The holder is identified to the system by the proximity card used. The aspect of the proximity card is that it only needs to be held near the reader to work. Cards can be printed with the student’s pictures for added security. Each student of the dormitory will be issued a card that has access to the dormitory as well as access will be provided for each individual dorm room. The constraint of the project is that we must use the existing security camera system which is designed to face and rotate to record a person as they use their identification card to gain entrance to the building. The proximity card must only allow students who live in the dormitory access. The system should deny access to anyone who is not authorized to enter the dormitory. What the new proximity system could do is lower the reported theft incidents reported. The ACS will not operate in the event there is a power outage. The system must have a failsafe door in this event to allow student entry or departure. The first task is to review the current security system to identify if any additional equipment will be needed. Upon review of the system we found that closed circuit cameras work in conjunction with access systems. The cameras are designed to face and rotate to......

Words: 741 - Pages: 3

Mein Geheimnis, dein Geheimnis | Black Clover (TV) Episode 41 English Dub | Westland Survival APK Modded