Free Essay

Access Control Systems

In:

Submitted By tabroyles
Words 2919
Pages 12
Abstract
Access control systems were examined to determine if a network based system would be more reliable and beneficial. Two major systems were determined to be very beneficial to the company. In contrast, the systems would consume a great deal of resources in order to be put into full working order at all sites worldwide. Together these findings suggest that using a network based system can ultimately serve the company better and create a more secure environment for the research and the employees.

Keywords: Access control, CCURE, Locknetics, security, networking
Network Based Access Control Systems: What Are They?
Personal and confidential information can easily be accessed at sites if the access to the specific areas is not updated quickly enough. To secure and protect this data, technology must adapt to mitigate the threats and risks. Applications and services are becoming mobile across multiple resources, sometimes in a dynamically allocated way, necessitating the migration of sensitive and private data. I propose a network based access control system to address the inadequacies of current technological solutions in preserving the confidentiality and privacy of data, along with the safety and security of the site. More specifically, I describe a solution for securing all Bristol-Myers Squibb sites throughout the world.
Access control systems have become a basic way of life for many businesses, especially large businesses. There are many different variations of these systems that control a wide variety of features, depending on what the needs of the business are. An access control system can be defined as an electronic system that allows, restricts and tracks the movement of people through entry/exit points in a site through programmable electronic cards and various other devices. (Brownwood) As stated in K.C. Laudon and J.P. Laudon’s book Managerial Information Systems: Managing the Digital Firm, access control consists of “all the policies and procedures a company uses to prevent improper access to systems by unauthorized insiders and outsiders.” (Laudon, & Laudon, 2010) Some devices that would be considered in the access control system family are passwords, tokens, smart cards, biometrics, firewalls, intrusion detections systems, and keypads. As most of you know we already utilize a great deal of these systems at Bristol-Myers Squibb. However, there is much more we can do to better protect ourselves and utilize these systems to the best of their ability.
Brief Background
Bristol-Myers Squibb is a Fortune 500, New Jersey based company with many sites worldwide. Often known as BMS, the company took on the name in 1989 after the merger of two world renown pharmaceutical and overall health companies, E.R. Squibb and Bristol-Myers. Up until late 2009 BMS produced such common products as the Burt’s Bees line, Clairol, and Enfamil. (Bristol-Myers Squibb, 2011) On December 23, 2009 BMS sold all of their shares of Mead Johnson (the producer of Enfamil, Burt’s Bees, and Clariol) to redirect its focus to strictly biopharmaceuticals. BMS’s new mission is to “discover, develop and deliver innovative medicines that help patients prevail over serious diseases.” (Bristol-Myers Squibb, 2011) BMS announced “Project Focus” to their employees in 2009 and has since completed the first stage of it. The first phase of project focus is reorganizing BMS to free up as many funds and positions as possible that do not focus on research and development, thus contracting out many positions that were once filled by BMS employees. Johnson Controls Inc. won the contract for majority of Facilities; this includes security, building maintenance and operations for the Americas. While Veolia won the contract for Europe and Asia.
This is where access control systems come into play. Since there is a constant movement of people it is a necessity to keep the sites secure to the best of our abilities. BMS is filtering many new employees in and old employees out which becomes a problem with manual programming. Because of BMS’s large size and many research and development sites with critical areas it would be extremely advantageous to use a universal network based access control system. BMS currently uses many variations of access control systems, such as, HID card readers, biometrics, firewalls, VPN, CCURE 800 and Locknetics. The largest problems with BMS’s current setup are the many vendors that are used to implement these systems, the different variations of systems are used, and that some of the systems require manual programming. Many of the systems are not universally networked causing many man hours to be spent programming each system individually.
By using different vendors it allows many companies to know the inner workings of BMS and gives these outside company’s access to what we want everyone not to see. For instance, the companies Access Systems Integration (ASI) and Deterrent Technologies installed the majority of the access systems for the Hopewell, New Jersey site but not for the New Brunswick, New Jersey site and certainly not for the Wallingford, Connecticut site. Since contracting out the majority of Facilities and eliminating the site Security Operations Administrator positions it has left BMS’s infrastructure vulnerable. There is very little documentation as to what has been done in prior years and can take an extremely long period of time to decipher all that has been done. The past inconsistencies with product usage are now greatly affecting today’s system.
Proposed Devices
I propose a brand new integration with security systems that are network based, thus, creating something that can be over scene by Johnson Controls, Veolia and BMS from inception. Each site will use the same system creating uniformity between sites. CCURE 9000 Enterprise will be the main monitoring system, badging system, and control system. As stated on the CCURE 9000 Enterprise site. CCURE 9000 Enterprise “provides an advanced distributed architecture for enterprise scalability. Whether your organization consists of a few facilities that are locally dispersed or many that span the globe, this solution grows as your company grows. C•CURE 9000 Enterprise gives corporate security personnel and IT managers central control over the entire system, while each local facility maintains independent control of its individual operation. Its power gives system administrators at the main facility the ability to configure and monitor all locations from that single site. It also allows them to simultaneously monitor alarms from multiple facilities from one convenient workstation.” (Tyco, 2010) Because most sites are already using CCURE 800 I believe that upgrading to CCURE 9000 Enterprise will be an easy switch for users. CCURE 9000 Enterprise will allow for easy monitoring of any site from anywhere around the world. The system uses the intranet to connect all of the BMS sites, worldwide. By implementing 9000 Enterprise, we can discontinue use of VistitorWatch, the current visitor badging and registration system. CCURE9000 Enterprise offers their own visitor system which would be easier to manage with the “push install” feature 9000 offers. (Tyco, 2010) With the “push install” feature an upgrade of all systems can be done with a push of a button from one of the main stations. (Tyco, 2010) This concept completely discontinues the possibility of any station not being updated properly or in the same time period as all the others.
Secondly, I would like to add Locknetics devices to all the sites. The Locknetics device is produced by Ingersoll Rand and Schlage. A Locknetics device is a keyless entry keypad system that can be utilized by all employees for access into their offices, labs, and other secure areas. We have been using these devices at the Hopewell and Lawrenceville sites for a number of years now. The benefit of using a keyless entry system such as this is instead of issuing keys which are easily lost and are not guaranteed to be returned after termination a locknetics code can be given to the employee and easily tracked. Each code will be specific to the employee and they can carry it with them during their tenure at BMS. The code can be programmed in one device and taken out of another if a move should occur. If someone finds their office in disarray or something missing, a simple lock audit will list all of the persons that accessed the area. With the lock being on a network the information can be obtained instantaneously. If a termination occurs it is quick and easy to remove the person’s access creating security throughout the site.
I would like to install two types of Locknetics, an AD300 and AD400. The AD300 is a Locknetics devise that gains its power from wires that are run to it through the walls and door frames. (Rand, 2011) It is the ideal lock for an area that is easily accessible to hard wiring which also saves money in the long run by not having to replace batteries. The AD400 is essentially the same as the 300 but allows for battery power. The battery powered device makes it easy to install nearly anywhere. Both of these devices can easily be programmed using a wireless network. Currently, all of the Locknetics devices at the Hopewell site can only be programmed manually. This causes a delay in security of the area, a delay in customer service and occupies many hours of manpower. Ingersoll Rand explains how the lock connects with the computer for programming. “For reliable wireless communications, Schlage utilizes the 900MHz band to enable longer transmission ranges and simplify system design. Signal propagation with longer wavelengths travel a greater distance and penetrate through and around typical building construction better than signals with shorter wavelengths. Each RF transmission is encrypted with AES-128 bit keys to provide virtually uncompromisable security.” (Rand, 2011) Since some of the sites are so large there may be a need for additional transmitters in some areas to effectively program all of the devices. By implementing these devices it takes out the middleman. One person can be responsible for programming from the comfort of their desk. This also means that the system can easily be updated if changes should occur, new software comes out, and there will be no need to worry about palm pilots becoming out dated.
With using CCURE9000 Enterprise and Locknetics devices AD300 and AD400 the BMS sites can be secured, easier to manage and universally the same throughout the world. Despite all of the perks to these systems there are some downfalls as well. The biggest downfall and concern I’m sure is the price of the integration. Since all of the BMS sites are already running off of CCURE800, updating to 9000 Enterprise should not cost as much as it would if it was a brand new integration. Although I do not have exact figures on the total cost of the upgrade I will be happy to supply it when it becomes available. The second issue I see with implementing CCURE 9000 Enterprise is that some of the features are not available yet. A few of these features we do utilize on CCURE 800. I have attached the schedule of the proposed updates which will include some of these features so you have a general idea of when they will become available.
Although the AD locks are easy to install and straight forward to use a large cost will be associated with obtaining the devices themselves. Each lock cost approximately $1500. The Hopewell site alone will need over 1000 locks. Granted the cost will be heavy in the beginning but the maintenance that these devices will need over time will be minimal. The current Locknetics devices at the Hopewell site are becoming obsolete and more difficult to fix. With this point alone we will need to remedy this problem soon. Since these devices can easily be changed, upgraded and the software is compatible with what is currently being used it would make for the best solution to the current problem. There will be no need to reissue Locknetics codes and programming can all be done by the Site Security Coordinator.
The Three Year Proposal
Of course the integration of all this cannot take place overnight. I propose a three year plan for full implementation. Year one, we will use a test site to begin implementing both systems. Since Hopewell has been used as the test site in the past we will continue will the tradition. Hopewell will give us the best view of any problems that we may come across at the other sites. Since Hopewell is so large, has the most offices, is remote and is the home of the Regional Security Monitoring Center it is a prime location for testing. We will begin by implementing the new Locknetics devices since the need for them is growing by the day. By buying Locknetics on a site by site basis we can allocate funds as needed.
The first Locknetics will be places in two buildings, Building 16 and Building 27, these buildings will be the starting points. Building 16 is where the programming station is housed, where the Security office is and where all of Facilities is making it an ideal starting point. Building 27 will be used because it is the furthest building away from the hub and will need very few devices because the size of the building. If we can send a successful signal across the site to Building 27 we will be able to transmit one to any other building on campus. Being that all the other sites are smaller than Hopewell it will make it easy to determine whether or not this system can work effectively at the other BMS sites. Providing that the system works properly without any major issues we will begin to install the new devices in the other buildings. By the six month mark I would like to have Hopewell fully installed and begin working on the Plainsboro and Lawrenceville sites. Slowly each site will begin their transition. Having all the sites around the world fully converted to Locknetics by the end of year two.
Year two, will be the beginning phase of implementing CCURE 9000 Enterprise at the Hopewell site. The Security Coordinator will be the first point of contact for this system again. Since this system is only an upgrade from the 800 that is currently being used at the Hopewell site it should be a quick transition. We will contract out an expert in the 9000 Enterprise system to help with the transition. The expert will work closely with the Regional Security Technician, site Security Coordinator, Senior Communications Specialist and the Site Captain to implement the system. All four people will gain as much knowledge as possible during the startup so the information can be passed along to the other sites during their implementation. Each of the other Central New Jersey sites will be programmed by the Regional Security Technician saving funds for the company. As the New Jersey sites are up and running the rest of America will begin their transition. A dollar amount will need to be allocated for the Americas in order for this process to begin. As all of the Americas are online the Regional Security Monitoring Center will continue monitoring the Central New Jersey sites, Devin, Massachusetts, Wallingford, Connecticut, California, and Canada. This will allow for the monitoring center to soon monitor all of the Americas.
Year three, as the third and final year begins all of the Americas should be up and running properly. Europe and Asia will be the next group of sites to begin their transition. Again a cost amount will have to be allocated for this project. An expert will once again be hired to start the Asian market basing him/her out of Tokyo, Japan. The expert will be able to get the three sites in Japan and China running within three months. After the initial phase of the Asia’s begins the first phase of Europe will begin. An expert will be hired and based out of France. We will use France since it has a greater number of BMS sites than any other country in Europe. France will also be the best choice because it can easily communicate with the Canadian sites. By the end of the year all eight sites in Europe should be running.
Conclusion
Providing all systems adapt properly all of BMS can be network based within three years. Creating these network based sites will allow us to remove the middle man freeing up funds for research based uses. These systems also connect us to or fellow workers throughout the world. I believe that these systems will make BMS a state of the art company, providing the best service and security in the industry. These systems allow employees to be processed at faster speeds thus allowing more time for research. In the company’s mission statement it talks about discovery, developing, and delivery, each one of these things cannot be possible without the proper protection of the BMS facilities.

References
Bristol-Myers Squibb, s. (2011). Bristol-myers squibb: together we prevail. Retrieved from http://www.bms.com/ourcompany/Pages/history.aspx#

Brownwood Computer Innovations, Inc.,Glossary of common digital video surveillance terms. Retrieved from http://www.bci1.com/cctv_terms.htm

Laudon, K.C., & Laudon, J.P. (2010). Management information systems: managing the digital firm. Upper Saddle River, NJ, USA: Prentice
Hall.

Rand, Ingersoll. (2011) Ad-400 networked wireless lock. Retrieved from http://w3.securitytechnologies.com/products/electronic_locks/ad_ser ies/networked_options/Pages/details.aspx?InfoID=11

Tyco, . (2010). C•cure 9000 enterprise. Retrieved from
http://www.swhouse.com/products/software_CCURE9000_Enterprise.aspx

Similar Documents

Premium Essay

Access Control System

...Overview of the Project Building an Access Control System in a dormitory of small college Purpose of the Project The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system.  The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door. Work Includes A. Furnish and install all equipment and materials in accordance with these specifications and drawings to provide a complete and operating Door Access Control System. B. The scope of work for the Access Control and Security System shall include to providing the following: 1. Local control panels within the SER. 2. Card readers. 3. Magnetic door locks. 4. Exit push button. 5. PTZ camera. C. The scope of work for the software shall include to providing the following: 1. Install Software in the computer within the SER (computer, printer provide by owner) 2. Train the owner or who represent the company of how to use the software and add identification card to the system. Project process * The typical access control system consists of a control panel, PC, Software card/ pin reader, electromagnetic lock or door strike, power supply system and a push button. * The valid and authorized card user must present the card to the security system. * Upon verification by the reader, the locking system will be reenergized and the door can be pushed open. * To exit the...

Words: 512 - Pages: 3

Premium Essay

Access Controls Systems

...accomplish this we will have proximity card readers to access the dormitory as well as card readers on the doors to the rooms. The proximity card is the most popular access device as well as inexpensive and long lasting. The holder is identified to the system by the proximity card used. The aspect of the proximity card is that it only needs to be held near the reader to work. Cards can be printed with the student’s pictures for added security. Each student of the dormitory will be issued a card that has access to the dormitory as well as access will be provided for each individual dorm room. The constraint of the project is that we must use the existing security camera system which is designed to face and rotate to record a person as they use their identification card to gain entrance to the building. The proximity card must only allow students who live in the dormitory access. The system should deny access to anyone who is not authorized to enter the dormitory. What the new proximity system could do is lower the reported theft incidents reported. The ACS will not operate in the event there is a power outage. The system must have a failsafe door in this event to allow student entry or departure. The first task is to review the current security system to identify if any additional equipment will be needed. Upon review of the system we found that closed circuit cameras work in conjunction with access systems. The cameras are designed to face and rotate to record...

Words: 741 - Pages: 3

Free Essay

Access Control System

...Case Study 1: Access Control System Antonicia Holmes Course: CIS 210 Instructor: Bagus Adiyanto Strayer University November 5, 2015 Project Scope Statement: The scope of this project is to install an access control system in a dormitory. The ACS (Access Control System) will enable the dormitory door to unlock mechanically by the use of a proximity reader and combine with an existing security camera. The camera is programmed to spin around to point at him/her and video tape the person while he/she use their identification card to unlock the dormitory door. The Five Tasks The project can be carried out in 5 major tasks and each main task can be sub-divided into the following sub-tasks. 1.) Preparation of the Project It is the initial major task; the steps that have to be taken before the system is built. a) Creating a team to help perform with other tasks. b) Surveying the College Dormitory to study the location. c) Creating the design consisting of the dorm’s visual diagrams. d) Examine the current dormitory’s security system to integrate with ACS. e) Preparing proposals to management f) Estimating total cost. 2.) Installation It is the second task; the steps that include manually putting on the hardware required for the ACS, including its cameras and readers. a) Making the Control Panel b) Wiring c) Putting readers on the walls and doors. d) Repositioning the camera to point towards the readers on the external...

Words: 449 - Pages: 2

Premium Essay

Building an Access Control System

...Building an Access Control System Strayer University CIS 210 Systems Analysis and Development 4/28/13 Scope The scope of this project is to install an access control system (ACS) into a college dormitory. This ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door. To complete this project we will start with the analysis and design stage. The creation of various design documents will be performed during this stage. The next stage will be the development stage. During this stage we will either create a new database or use the school’s existing database. The 3rd stage will be the integration stage. During this stage, the physical installation of the system will occur. The 4th stage will be the testing stage. The final stage will be the maintenance phase. The maintenance phase is on-going. Major Tasks 1. Analysis and Design a) Design Documentation i. With this task, documentation is written up to describe the work that needs to be completed. This documentation is reviewed by all stake holders to ensure that the requirements are have been accurately conveyed and understood. b) Design Models i. With this task, flow charts and/or use case are created to describe the functionality. These...

Words: 508 - Pages: 3

Premium Essay

Building an Access Control System

...Building an Access Control System As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door. Create a 3-4 page project plan for this project in which you: Include a one-half page project scope statement. Define five (5) major tasks, each with one to two (1-2) subtasks. Also write a brief description for each task. Create a Gantt chart illustrating the project tasks (use Microsoft Project or a similar project management program). Create a system diagram illustrating the equipment and connections required for this project (use Microsoft Visio or a similar software package). Building an Access Control System CIS210 Building an Access Control System Introduction An access control system is fundamental in reducing security issues as well as controlling the personnel allowed to access a given place. Its main objective is to ensure limited persons are granted the rights of access. This access can be granted by checking on criteria such as workplace, home or any other specified locations. The access control system may consist...

Words: 1248 - Pages: 5

Free Essay

Building an Access Control System

...how a hacker thinks and then utilize the tools a hacker would use. Today, every company is becoming completely networked, through the exchanging of information on desktops, laptops, tablets and smart phones. Thinking like a hacker and understanding a hacker’s tactics and scams could make you aware and become more effective when applying countermeasures. There are several methods for carrying out ethical hacking, the most common are limited vulnerability and penetration testing. Limited vulnerability analysis, focus on entry points to gather critical systems and data. By understanding the basic approach used by hackers to target organizations, you will be better equipped to take defensive measures you will be better equipped and know what you are up against. There are steps involved in scanning a network, the following points will highlight them. 1) Check for live systems, 2) Check for open ports, 3) Fingerprint the operating system, 4) Scan for vulnerabilities, 5) Probe the network. Tools that can be used to detect scanning threats and countermeasures that a company can use to deter and avoid vulnerabilities are as follows. “Spoofing user identity -use strong authentication for passwords, do not store secrets (for example, passwords) in plaintext. Do not pass credentials in plaintext over the Internet. Tampering with data –use data hashing and signing, use digital signatures, use strong authorization, use tamper-resistant protocols across communication links, secure communication...

Words: 996 - Pages: 4

Premium Essay

Case Study: Access Control System

...Case Study 1: Access Control System Project Scope: As a member of Information Security team, I have been assigned to install a card sweep access control system for the dormitory with the help of a team. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door. Major Tasks: Five major tasks to accomplish the goal of this project include: * Planning * Setup * Limitations * Monitoring * Completion Objective: The goal of this project is to prevent unauthorized personnel from accessing dormitory. The existing camera system will enable to keep an eye on the student activities. Planning: It is essential to have proper planning before start the task. Planning is the important thing for any project to be successful. There will have planning about integration of the system, software, equipment, power supply, and camera integration requirements. This task also involves conducting a review of current setup of security camera system. Determining the cost is also necessary before starting the project. Setup: This is an important for any type of system. It is vital to configure the required parameters for the system for example, users who are authorized, hours the students have access or logs etc.  Hardware Setup: Electronic proximity reader need to be...

Words: 604 - Pages: 3

Free Essay

Access Control Systems & Technology Paper

...Access Control Systems & Technology Paper SEC/420 Alarm Systems Bells and whistles usually signify celebration and late night partying for the everyday hardworking, fun loving person. However, for the security professional those bells and whistles denote trouble, threats, and breaches. Alarms serve as a tool to alert security professionals and others who aim to protected assets, property and people. Alarms are devises installed in places such as schools, banks, homes, businesses, cars, and even on machines such as boilers and machines. Alarms come in many forms and designs all with the objective to identify an intrusion or malfunction and alert someone of the issue. The alarm system uses are determined by the assets, people, or property they are meant to protect. Other factors include budget, level of threat, and risk levels. Types of Alarms There are several types of electronic alarm systems. There are the movement detectors, magnetic reed switches, and distress or panic alarm systems. These systems are effective measures to detect intruders and alert security professionals of danger, intrusions, and emergency situations silently and audibly. Movement Detectors Movement detector alarm systems are devices that are connecting the detector to the alarm and activate the alarm when a breach occurs. The movement detector is installed on walls, at strategic locations throughout a building or facility. A movement detector system recognizes movement or heat and...

Words: 936 - Pages: 4

Premium Essay

Case Study 1: Building an Access Control System

...Project Scope This project scope is to install Access Control System (ACS) in the college dormitory. To identify the project’s goals, objectives, deliverables, tasks, costs, deadlines, expected leading staffing and none-staffing resources needed (Bidgoli, 2014). For a project this size, the company is limited to using current staff to complete the project. The size of the dormitory is five doors entering and exiting the building. The building has five moving cameras installed located at each doorway. The project is set for thirty days completion timetable. The current system analyst will be the project manager, and his responsibilities are as follows: • Project planning – identifying the project task estimating the completion time and cost of the project. • Project Scheduling – Creating a timetable for specific tasks. • Project monitoring – Guiding, supervising, and coordination the team's workload, and making decisions based on the team's workload and taking action to make corrections to keep the project on track. • Project reporting – This includes updates from his management, about current users and project team members on attitude and the overall effort of the team. (Rosenblatt J.H., 2014) A successful project will be completed on time, within budget and deliver a quality product that meets all requirements that were requested. A listing of the primary task and subtask are as follows: • Obtain equipment 1. Request bids from different vendors. 2. Evaluate...

Words: 326 - Pages: 2

Premium Essay

Case Study 1: Building an Access Control System

...Case Study 1: Building an Access Control System Building an Access Control System Marcelino P Figueroa Dr. Shah Strayer University, Woodbridge - VA ​This Project consist of a team of five specialists that will work together to successfully build an Access Control System for a College campus that has existing cameras. Pete will be leading the team of five on this project with that he will also be responsible of the projects progress, he will be in constant follow up with the senior management to deliver real time project completions and analyzing every task throughout the way. The first task is to Order all that is need to build the access control system. Pete assigned Chris, Kevin, Tonia, and Rich to review the industry leading ACS (Access Control Systems) methods in order to better fulfill the college campus’s security needs, they have two days to complete the task. Tonia has been assigned to select the components within four hours once complete she has to select the materials which needs to be complete within four hours. Chris is responsible on ordering the selected components and materials within two hours, while the ordering task is under-way, Jerry posted the maintenance signs all around the college campus to create awareness of the work that’s in the process. Once the components and materials are received in its entirety Chris, Kevin, Jerry, and Rich will team up to build and install the access control system. Once the installing task is complete,...

Words: 369 - Pages: 2

Premium Essay

Case Study 1: Building an Access Control System

...Running head: CASE STUDY 1 BUILDING AN ACCESS CONTROL SYSTEM 1 Building an Access Control System Case Study 1 Holly Dillon Professor Jennifer Merritt Systems Analysis and Development CIS/210 April 28th, 2014 BUILDING AN ACCESS CONTROL SYSTEM 2 Building an Access Control System Project Scope Description As a member of the Information Security Team at a small College, I have been made the Project Manager to install an Access Control System (ACS) in a dormitory. For this small College an ACS (Access Control System) needs to be implemented to unlock the dormitory doors, to record a person as they use their identification card to unlock the door. An electronic proximity reader is needed to integrated with the existing security camera system with the camera’s being able to face and rotate at the door. The tasks to put in place are simple and easy to follow along with guidelines for each step. Rosenblatt. (2012). The five major tasks with descriptive information that I am putting in place with a timeline for the project are as follows: Rosenblatt. (2012). Obtain Authorization To obtain documentation authorization you on the go ahead of the project, its planning, implementation, testing, and training of the system 1 Day Develop Plan Developing a project...

Words: 886 - Pages: 4

Free Essay

How the Unix Permission System Implements Access Control

...how the UNIX permission system implements access control. Describe an extension of this system that permits finer control. Access Control in Unix UNIX has an implementation of access control lists for providing the features of security to its users. Every user has a right to log into the system with his/her credentials (username and password) and initiate a process which can further make system requests. Every process is assigned a unique identifying number called the process “uid”. This number can be obtained from the /etc/password file. A sample record from this file looks like below: “uid” essentially is the user id of the user who started the process. Every process may also carry an “effective uid”, which may or may not be different from its uid. Access control lists are also categorized with the use of group ids or group names. Every process has a list of groups, it is associated with. This is the basic level of authentication implemented in Unix. Since Unix understands everything as a file, it is important to see how security is ensured for files in Unix. There are 12 mode bits which are used to encode the privileges related to protection. Out of these 12 bits, first 9 bits are divided into 3 groups. Each group contains 3 bits describing the permissions related to user (u), group (g) and others (o). If a bit is set to “ON”, the corresponding privilege is enabled (r – read, w – write, x – execute). Extension of Unix security system A finer security mechanism...

Words: 440 - Pages: 2

Premium Essay

Access Control System

...Case Study #1: "Access Control System" Abstract As the project manager to install an access control system (ACS) in the dormitory of the college, my team will develop a project scope statement that cover all the necessary tasks to completed, along with a timeline to complete all tasks, which the work for each task will be written out. Also, a Gantt chart will be created, that will illustrate the project tasks. Lastly, we will create a system diagram to illustrate all the equipment and connections that are required for this project. Access Control System Project Scope: Install an access control system (ACS) into this small college dormitory. The ACS will automatically unlock the dormitory doors using an electronic proximity reader that has been integrated into the existing security camera system. Conduct a review of the current setup for the camera system installed. Determine the cost/benefit to add facial recognition software to be incorporated with the current security camera system. Locate electronic proximity readers and system software that will adhere to the schools security standards and that will operate with the security camera system installed. Load and configure operating software for the ACS/ Gather all students’ information and personnel authorized building access information into the server, to include current pictures. One system is up, configure the parameters for the system will need to be set, such as:...

Words: 990 - Pages: 4

Free Essay

Access Control System

...INVENTORY MANAGEMENT SYSTEMS Jerry Long CIS210 Systems Analysis and Development Strayer University Dr. Wesley Phillips October 19, 2015 Inventory Management Systems My sister is opening a small clothing store named Sheila’s Formal Gowns. While attending her niece’s wedding, she mentioned the difficulties of finding unique and affordable formal gowns to weddings, formal dinners and special occasions. Her business plan is to design a one of a kind dress for each female customer to wear to formal attires. In this paper I will describe all the necessary equipment, maintenance and cost for starting her business. Sheila’s name and expert workmanship has been established for over 20 years as a prestigious theater costume designer. Necessary equipment My sister’s business plan is to purchase fabrics and materials as needed and only take a few orders at a time. Her start-up costs include a sewing machine, computer, computer design software, high end printer and an automated system inventory system, which should be keep cost reasonably low. To accomplish her goals and track business expenditures she implements an inventory management system. Inventory management technology is a mix of hardware and software designed to add reliability to inventory accounting, reduce incidents of theft and facilitate inventory audits. Individual inventory items or batches of items could be equipped with RFID tags that identify the item type, cost, price, shipment number, date of...

Words: 1397 - Pages: 6

Premium Essay

Building an Access Control System

...Your proposal may include, but you are not limited to the following item listing. Before each class meeting, please provide a paragraph or more on each item on the list. Your group should send this information to me via email at billbaig@gmail.com in addition to your team leader approved status report and time cards. These assignments will count as individual skills assessment grade, which is 15% of your overall grade in this class. Feel free to make additions or edits as needed, but make sure if you omit anything of this list, you are able to provide proper justification for it. Do not just provide list of hardware or software directly from the web. Be sure to thoroughly research and make appropriate recommendation based on your studies of various hardware/software. In addition, a diagram for each list item is recommend, illustrating precisely your recommendations for the provided case study. All information presented in your proposal MUST have in-text citations and a work cited section for the references used in your proposals. EVERYTHING SUBMITTED SHOULD DIRECTLY RELATE TO THE PRESENTED CASE STUDY AND NO COPYRIGHT MATERIAL! The recommended order to accomplish this proposal is as follows: Week 2 • LAN and WAN requirements – explain the LAN and WAN infrastructure of the doctor’s office network • Wiring – type of wire, length, cost, outside contractor, etc • Network Diagrams – current network infrastructure and proposed network • Network Hardware – routers, switches...

Words: 1078 - Pages: 5