Premium Essay

Building an Access Control System

In:

Submitted By gkutz
Words 1248
Pages 5
CASE STUDY 1
Building an Access Control System
As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door.
Create a 3-4 page project plan for this project in which you:
Include a one-half page project scope statement.
Define five (5) major tasks, each with one to two (1-2) subtasks. Also write a brief description for each task.
Create a Gantt chart illustrating the project tasks (use Microsoft Project or a similar project management program).
Create a system diagram illustrating the equipment and connections required for this project (use Microsoft Visio or a similar software package).

Building an Access Control System
CIS210

Building an Access Control System
Introduction
An access control system is fundamental in reducing security issues as well as controlling the personnel allowed to access a given place. Its main objective is to ensure limited persons are granted the rights of access. This access can be granted by checking on criteria such as workplace, home or any other specified locations. The access control system may consist of diverse components that collaborate to ensure the main objective is achieved. An effective control system would ensure privileges for the different users vary according to their access rights or levels; the system under research can monitor and record all activities of access, lock and unlock the doors, cancel privileges when a pass card is lost as well as detect usage

Similar Documents

Premium Essay

Building an Access Control System

...Building an Access Control System Strayer University CIS 210 Systems Analysis and Development 4/28/13 Scope The scope of this project is to install an access control system (ACS) into a college dormitory. This ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door. To complete this project we will start with the analysis and design stage. The creation of various design documents will be performed during this stage. The next stage will be the development stage. During this stage we will either create a new database or use the school’s existing database. The 3rd stage will be the integration stage. During this stage, the physical installation of the system will occur. The 4th stage will be the testing stage. The final stage will be the maintenance phase. The maintenance phase is on-going. Major Tasks 1. Analysis and Design a) Design Documentation i. With this task, documentation is written up to describe the work that needs to be completed. This documentation is reviewed by all stake holders to ensure that the requirements are have been accurately conveyed and understood. b) Design Models i. With this task, flow charts and/or use case are created to describe the functionality. These...

Words: 508 - Pages: 3

Free Essay

Building an Access Control System

...how a hacker thinks and then utilize the tools a hacker would use. Today, every company is becoming completely networked, through the exchanging of information on desktops, laptops, tablets and smart phones. Thinking like a hacker and understanding a hacker’s tactics and scams could make you aware and become more effective when applying countermeasures. There are several methods for carrying out ethical hacking, the most common are limited vulnerability and penetration testing. Limited vulnerability analysis, focus on entry points to gather critical systems and data. By understanding the basic approach used by hackers to target organizations, you will be better equipped to take defensive measures you will be better equipped and know what you are up against. There are steps involved in scanning a network, the following points will highlight them. 1) Check for live systems, 2) Check for open ports, 3) Fingerprint the operating system, 4) Scan for vulnerabilities, 5) Probe the network. Tools that can be used to detect scanning threats and countermeasures that a company can use to deter and avoid vulnerabilities are as follows. “Spoofing user identity -use strong authentication for passwords, do not store secrets (for example, passwords) in plaintext. Do not pass credentials in plaintext over the Internet. Tampering with data –use data hashing and signing, use digital signatures, use strong authorization, use tamper-resistant protocols across communication links, secure communication...

Words: 996 - Pages: 4

Premium Essay

Building an Access Control System

...Your proposal may include, but you are not limited to the following item listing. Before each class meeting, please provide a paragraph or more on each item on the list. Your group should send this information to me via email at billbaig@gmail.com in addition to your team leader approved status report and time cards. These assignments will count as individual skills assessment grade, which is 15% of your overall grade in this class. Feel free to make additions or edits as needed, but make sure if you omit anything of this list, you are able to provide proper justification for it. Do not just provide list of hardware or software directly from the web. Be sure to thoroughly research and make appropriate recommendation based on your studies of various hardware/software. In addition, a diagram for each list item is recommend, illustrating precisely your recommendations for the provided case study. All information presented in your proposal MUST have in-text citations and a work cited section for the references used in your proposals. EVERYTHING SUBMITTED SHOULD DIRECTLY RELATE TO THE PRESENTED CASE STUDY AND NO COPYRIGHT MATERIAL! The recommended order to accomplish this proposal is as follows: Week 2 • LAN and WAN requirements – explain the LAN and WAN infrastructure of the doctor’s office network • Wiring – type of wire, length, cost, outside contractor, etc • Network Diagrams – current network infrastructure and proposed network • Network Hardware – routers, switches...

Words: 1078 - Pages: 5

Premium Essay

Case Study 1: Building an Access Control System

...Project Scope This project scope is to install Access Control System (ACS) in the college dormitory. To identify the project’s goals, objectives, deliverables, tasks, costs, deadlines, expected leading staffing and none-staffing resources needed (Bidgoli, 2014). For a project this size, the company is limited to using current staff to complete the project. The size of the dormitory is five doors entering and exiting the building. The building has five moving cameras installed located at each doorway. The project is set for thirty days completion timetable. The current system analyst will be the project manager, and his responsibilities are as follows: • Project planning – identifying the project task estimating the completion time and cost of the project. • Project Scheduling – Creating a timetable for specific tasks. • Project monitoring – Guiding, supervising, and coordination the team's workload, and making decisions based on the team's workload and taking action to make corrections to keep the project on track. • Project reporting – This includes updates from his management, about current users and project team members on attitude and the overall effort of the team. (Rosenblatt J.H., 2014) A successful project will be completed on time, within budget and deliver a quality product that meets all requirements that were requested. A listing of the primary task and subtask are as follows: • Obtain equipment 1. Request bids from different vendors. 2. Evaluate...

Words: 326 - Pages: 2

Premium Essay

Case Study 1: Building an Access Control System

...Running head: CASE STUDY 1 BUILDING AN ACCESS CONTROL SYSTEM 1 Building an Access Control System Case Study 1 Holly Dillon Professor Jennifer Merritt Systems Analysis and Development CIS/210 April 28th, 2014 BUILDING AN ACCESS CONTROL SYSTEM 2 Building an Access Control System Project Scope Description As a member of the Information Security Team at a small College, I have been made the Project Manager to install an Access Control System (ACS) in a dormitory. For this small College an ACS (Access Control System) needs to be implemented to unlock the dormitory doors, to record a person as they use their identification card to unlock the door. An electronic proximity reader is needed to integrated with the existing security camera system with the camera’s being able to face and rotate at the door. The tasks to put in place are simple and easy to follow along with guidelines for each step. Rosenblatt. (2012). The five major tasks with descriptive information that I am putting in place with a timeline for the project are as follows: Rosenblatt. (2012). Obtain Authorization To obtain documentation authorization you on the go ahead of the project, its planning, implementation, testing, and training of the system 1 Day Develop Plan Developing a project...

Words: 886 - Pages: 4

Premium Essay

Case Study 1: Building an Access Control System

...Case Study 1: Building an Access Control System Building an Access Control System Marcelino P Figueroa Dr. Shah Strayer University, Woodbridge - VA ​This Project consist of a team of five specialists that will work together to successfully build an Access Control System for a College campus that has existing cameras. Pete will be leading the team of five on this project with that he will also be responsible of the projects progress, he will be in constant follow up with the senior management to deliver real time project completions and analyzing every task throughout the way. The first task is to Order all that is need to build the access control system. Pete assigned Chris, Kevin, Tonia, and Rich to review the industry leading ACS (Access Control Systems) methods in order to better fulfill the college campus’s security needs, they have two days to complete the task. Tonia has been assigned to select the components within four hours once complete she has to select the materials which needs to be complete within four hours. Chris is responsible on ordering the selected components and materials within two hours, while the ordering task is under-way, Jerry posted the maintenance signs all around the college campus to create awareness of the work that’s in the process. Once the components and materials are received in its entirety Chris, Kevin, Jerry, and Rich will team up to build and install the access control system. Once the installing task is complete,...

Words: 369 - Pages: 2

Premium Essay

Information Security Policy

...Key elements of the Disaster Recovery Plan 1 3.2. Disaster Recovery Test Plan 1 4. Physical Security Policy 1 4.1. Security of the facilities 1 4.1.1. Physical entry controls 1 4.1.2. Security offices, rooms and facilities 1 4.1.3. Isolated delivery and loading areas 2 4.2. Security of the information systems 2 4.2.1. Workplace protection 2 4.2.2. Unused ports and cabling 2 4.2.3. Network/server equipment 2 4.2.4. Equipment maintenance 2 4.2.5. Security of laptops/roaming equipment 2 5. Access Control Policy 2 6. Network Security Policy 3 7. References 3 Executive Summary Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario. With advancements in technology there is a need to constantly protect one’s investments and assets. This is true for any aspect of life. Bloom Design is growing and with that growth we must always be sure to stay on top of protecting ourselves with proper security. For Bloom Design the measurable goals and objectives are website traffic and building security throughout our various buildings. This means we’ll have to implement certain security features to protect Bloom Design and our customers. What we’re trying to protect is both data and material. By this I mean...

Words: 4226 - Pages: 17

Free Essay

Access Control Systems

...Abstract Access control systems were examined to determine if a network based system would be more reliable and beneficial. Two major systems were determined to be very beneficial to the company. In contrast, the systems would consume a great deal of resources in order to be put into full working order at all sites worldwide. Together these findings suggest that using a network based system can ultimately serve the company better and create a more secure environment for the research and the employees. Keywords: Access control, CCURE, Locknetics, security, networking   Network Based Access Control Systems: What Are They? Personal and confidential information can easily be accessed at sites if the access to the specific areas is not updated quickly enough. To secure and protect this data, technology must adapt to mitigate the threats and risks. Applications and services are becoming mobile across multiple resources, sometimes in a dynamically allocated way, necessitating the migration of sensitive and private data. I propose a network based access control system to address the inadequacies of current technological solutions in preserving the confidentiality and privacy of data, along with the safety and security of the site. More specifically, I describe a solution for securing all Bristol-Myers Squibb sites throughout the world. Access control systems have become a basic way of life for many businesses, especially large businesses. There are many different variations...

Words: 2919 - Pages: 12

Free Essay

Ris Management

...Assessment Methodology: Key Principles of External Building Security Presented By Name Institution Instructor Course Title Date of Submission Abstract External building security is a critical part in the building design process in order to construct a building that provide conducive social, intellectual, creative, and physical activities of its shareholders. There are numerous key principles of external building security with ability to withstand various attack types. This paper lists, describes and assesses these principles. Security is a fundamental part of the building design process and should be considered as an issue that provide clear guidance regarding the design, methods and materials of building that enhance effective, acceptable and affordable security to all building stakeholders. Planning of a building should be conducive to all intellectual, physical, social, and creative activities of the stakeholders. Buildings should be secure enough to provide lively as well as welcoming operational environment that does not over-power, impersonate or institute personal hazards while accommodating range of activities. External building security, right from the preliminary stage to final building construction, focuses on the built environment, threatened internally and externally by vandalism that includes graffiti and glass breakage, theft, arson, and burglary. It addresses actions taken to protect buildings, property and assets against intruders. ...

Words: 1514 - Pages: 7

Premium Essay

Nt1310 Unit 1 Case Study

...Description:- Task 1:- a. The detailed design of a simple addressing solution (with diagram(s) and step by step workout of the calculations) that leaves room for growth is easy to administer and has the minimum wastage of available IP address space. Answer:- NAT (Network address translation) is a process by which a router can provide IP address to the computers. NAT is a process by which it allocates the IP address to a system, after remapping it with the network in a private area, so that one IP address could be allocated to one system, and the same IP address range will be used to connect all the computer system in one location. In this case study one building will have one router; the router is a networking device which provides IP address to its connected device in order to connect the...

Words: 1489 - Pages: 6

Premium Essay

Ccsecurity Mp Outlin

...independent document incorporated by reference into the TBP Architecture District Master Plan for the Chabot College campus new construction and building improvements. To develop the Security Master Plan, CATALYST has first performed numerous site surveys and interviews, analyzed crime index data, reviewed the relevant technologies, and assessed the campus physical environment to define the risks and vulnerabilities that need to be addressed for a long-term vision of campus security. From this goal set, CATALYST has developed the guidelines and recommendations for the District to standardize the approach and cost of physical security on their campuses. The Security Master Plan will include the topic sections listed in the outline following. The primary intent of the Security Master Plan is to define security mitigation standards that integrate efficiently with new building construction and building improvements, saving upgrade costs today by planning for the campus of tomorrow. By first prioritizing the identified campus risks, and then using a multi-faceted approach from the key areas of physical environment, security staffing, and feasible technology, CATALYST will present a clear security philosophy to guide the selection and implementation of campus security upgrades. The Security Master Plan will be developed to address long-term system compatibility, communication...

Words: 1345 - Pages: 6

Premium Essay

Access Controls Systems

...accomplish this we will have proximity card readers to access the dormitory as well as card readers on the doors to the rooms. The proximity card is the most popular access device as well as inexpensive and long lasting. The holder is identified to the system by the proximity card used. The aspect of the proximity card is that it only needs to be held near the reader to work. Cards can be printed with the student’s pictures for added security. Each student of the dormitory will be issued a card that has access to the dormitory as well as access will be provided for each individual dorm room. The constraint of the project is that we must use the existing security camera system which is designed to face and rotate to record a person as they use their identification card to gain entrance to the building. The proximity card must only allow students who live in the dormitory access. The system should deny access to anyone who is not authorized to enter the dormitory. What the new proximity system could do is lower the reported theft incidents reported. The ACS will not operate in the event there is a power outage. The system must have a failsafe door in this event to allow student entry or departure. The first task is to review the current security system to identify if any additional equipment will be needed. Upon review of the system we found that closed circuit cameras work in conjunction with access systems. The cameras are designed to face and rotate to record...

Words: 741 - Pages: 3

Premium Essay

Information Security Policy

...Disaster Recovery Plan 1 3.2. Disaster Recovery Test Plan 1 4. Physical Security Policy 1 4.1. Security of the facilities 1 4.1.1. Physical entry controls 1 4.1.2. Security offices, rooms and facilities 1 4.1.3. Isolated delivery and loading areas 2 4.2. Security of the information systems 2 4.2.1. Workplace protection 2 4.2.2. Unused ports and cabling 2 4.2.3. Network/server equipment 2 4.2.4. Equipment maintenance 2 4.2.5. Security of laptops/roaming equipment 2 5. Access Control Policy 2 6. Network Security Policy 3 7. References 3 Executive Summary Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario. This new strategy guide for Bloom Design Group provides a comprehensive strategy for providing a safe and secure work environment. Several new policies and procedures will be implemented as a result of these new ideas. Bloom Design Group will have little trouble in adhering to the promised plan based on the their assets and experienced personnel. The goals implemented will include new user accounts and access policies and controls. These goals will allow for monitoring for all persons using the network and view all...

Words: 3916 - Pages: 16

Premium Essay

Nt1310 Unit 1 Information And Communication Technology

...1.2 SYSTEMS Systems and some of the subsystems that Telematics provides are as follows. 1.2.1 INFORMATION & COMMUNICATION TECHNOLOGY SYSTEMS Information & Communication Technology (ICT) refers to all technologies used to handle and provide access to information through telecommunications. It mainly focuses on communication technologies. This includes the Internet, wireless networks, cell phones, and other communication mediums. 1.2.1.1 STRUCTURED CABLING SYSTEMS A structured cabling is the wiring network of a building or group of building’s telecommunications cabling infrastructure that carries all the data, voice, security, Voice over Internet Protocol, Power over Ethernet, and even wireless connections. It includes cabling, connecting...

Words: 2555 - Pages: 11

Premium Essay

Physical Security Operations

...perimeter, and the interior. OUTER PERIMETER Your actual property line defines the outer perimeter. In controlling the outer you must control who can drive/walk onto your property. You can use barbed wire fence, a guard shack. You need to weigh the risk of an intruder entering your property and the cost of the available physical security measure. There are two concepts involved in perimeter security, which is Natural Access Control and Territorial Reinforcement. Natural Access Control is the use of building and landscaping features to guide the people as they and enter/exit a space. You all also want to discourage intruders to close any and all potential exits. potential (1) Clearly defined entrances the first thing to the access control is the approach to your area. That is can a car drive onto your property without it being notice? If this does happen that means you need to consider of using curbs, barriers, gates to direct the traffic to a single control area. A guard shack would be a good deterrent to any intruder. Now there is the foot traffic to consider now. Can an unauthorized person walk into your building without being noticed? There should be at least one entrance to the building and the foot traffic should be direct to a receptionist or guard shack. Roof access is another problem are for the building. The only ones that should direct access to the roof is the...

Words: 717 - Pages: 3