Premium Essay

Assignment 1 Access Control System Analysis

Submitted By
Words 722
Pages 3
Assignment 1: Access Control System

Assignment 2: Access Control System
Marshall Crippen
May 1, 2017
CIS210: Systems Analysis and Development
Professor Bunch

PROJECT OBJECTIVE Install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door.
TECHNICAL REQUIREMENTS
1. The access control system must meet building standards
2. All external access doors must use the ACS. 3. Cameras must be capable of rotating to see the student and record his entrance to the building. …show more content…
Purchase the products and other components necessary to complete the project.
4. Assemble the readers and connect them to the university network for the identification database access.
5. Complete testing and operation of the ACS. The first task of the informational meeting is to discuss and come to a general consensus of the project. Once a consensus has been reached, the second step is to dig into this project and to come up with a plan to follow. With this plan the project can move along to product selection task. The next task to approach is the product definition. This has a couple of steps involved in it.
The first step is to research what products are available and are they compatible with the existing cameras and database system. Once this has been completed, the data for the equipment should be compared and analyzed for best price performance cost. The third step is to research the specified equipment for the best vendor and price. I, as the PM, would prefer a one stop solution for procurement. This will keep the costs better managed and minimize shipping costs. Once the vendor/vendors have been selected, the next step would be to go ahead and place the order for the equipment

Similar Documents

Premium Essay

It 244 Week 1

...Associate Level Material Appendix A Final Project Overview and Timeline Final Project Overview In completing each assignment, you build the sections of an Information Security Policy. Final Project Timeline You should budget your time wisely and work on your project throughout the course. As outlined below, the assignments in the course are designed to assist you in creating your final project Information Security Policy. If you complete your course activities and use the feedback provided by the instructor, you will be on the right track to successfully complete your final project of creating an Information Security Policy. □ Week One: Introduction Review the two company profiles provided in your syllabus and select the one you will use for your final project company. You design the Information Security Policy for this company throughout the course. Once you have decided which company you are using, it may not be changed; therefore, considerable thought should be put into this decision. Next, decide which type of information security policy—program-level, program-framework, issue-specific, or system-specific—is appropriate for your final project company. Assignment: Final Project Information Security Policy: Introduction Complete and submit Appendix C. Note. Section 1 Introduction of Appendix C corresponds to Section 2 of Appendix B in the final compilation due in Week Nine. In completing Appendix C, provide an overview...

Words: 899 - Pages: 4

Premium Essay

Test

...Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110  NT1210 Structure and Introduction to  ComputerLogic Networking    IS3120 IS3110 NT1210 Network  Risk Management in Introduction to General Education / General Studies NT2580 NT2799...

Words: 2305 - Pages: 10

Premium Essay

Mark1012

...Assignment B Zoe Suet Yee Wan, Jason Lau, Yaoyu Su OutThere Pty Ltd Z3416862 Zoe Suet Yee Wan Z3416733 Jason Lau Z3353653 Yaoyu Su Tutorial: Friday 9-11am Tutor: Jason Simpson Date Submitted: 12/10/2012 Word Count (excluding appendix and overview) : 3113 Word Count for Overview: 301 1 Assignment B Zoe Suet Yee Wan, Jason Lau, Yaoyu Su Executive Summary This following report focuses on providing recommendations and appropriate suggestions to OutThere Pty Ltd regarding the success for FillUp and QuickStop brands. Although FillUp has been growing steadily for the past five years, constant evaluation of efficiency and productivity is necessary for its continual success. On the other hand, standalone QuickStop shops has not been as successful as compared to FillUp as most newly established stores are located in remote areas which may be a contributing factor as to why new tools and strategies are essential to sustain profitability in the long run. Regarding the Chief Information Officer’s priorities to improve purchasing power and distribution efficiency, store layout and product mix, detect fraudulent activities and offer personalised promotion, different types of Business Intelligence Tools will be recommended specifically with the aim to achieve these priorities. 2 Assignment B Zoe Suet Yee Wan, Jason Lau, Yaoyu Su Table of Contents Executive Summary ...........................................................................................

Words: 4553 - Pages: 19

Premium Essay

Adms

...School of Administrative Studies Faculty of Liberal Arts and Professional Studies York University Fall 2013 Course Outline AP/ADMS 4552 3.0 Section A and B Information Systems Audit Term: Fall 2013 COURSE: AP/ADMS 4552 3.0 Sections A and B Information Systems Audit Schedule First day of class: Section A: Wednesday, September 11, 2013 11:30 AM – 2:30 PM, Location: HNE 030 Section B: Thursday, September 12, 2013 7:00 PM – 10:00 PM, Location: HNE 032 REQUIRED COURSE TEXT/READINGS: • Hall, James A., (2011), Information Technology Auditing, 3e, Mason: South-Western Cengage Learning (Referred to as “IT Audit Text” in the Readings List for each class) • Additional material as listed in the course outline. This includes articles referenced by links, readings from books that were required for prerequisite courses, cases and assignment details posted on our web site. • CICA Assurance Handbook, as available online from York University library, (referred to as “Handbook” in the Readings List for each class). Selected readings are from: [Note this book is available on reserve at the business library in the Schulich building if you do not have a copy.] • Arens, A., R. J. Elder, M. S. Beasley and I. B. Splettstoesser-Hogeterp. 2011. Auditing: The Art and Science of Assurance Engagements, Canadian 11th Edition, Pearson Prentice Hall: Toronto. (Referred to as “Audit Text” in the Readings List) References for the 12th Canadian...

Words: 3433 - Pages: 14

Premium Essay

It255

...ITT Technical Institute IT255 Introduction to Information Systems Security Onsite Course SYLLABUS Credit hours: 4 Contact/Instructional hours: 50 (30 Theory Hours, 20 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications ...

Words: 4114 - Pages: 17

Premium Essay

It Project Management

...SCHOOL OF ENGINEERING AND BUILT ENVIRONMENT Department of Computer, Communications and Interactive Systems BSc/BSc (Hons) Computing (Information Systems Development) • (Web Systems Development) BSc/BSc (Hons) Information Technology Management for Business BSc (Hons) Computer Games (Design) BSc/BSc (Hons) Cyber Security and Networks BSc/BSc (Hons) Networked Systems Engineering IT PROJECT MANAGEMENT 1 module code M3G405252 MODULE HANDBOOK – TRIMESTER A SESSION 2015/2016 Module Code: M3G405252 Module Title: IT PROJECT MANAGEMENT 1 Standard Module Abbreviation: ITPM1 Module Level: 3 Credit Points: 20 Module Leader: Edwin Gray, Office: M609, email:e.gray@gcu.ac.uk September 2015 Issue 1 01/09/2015 Edwin M Gray, BA, MSc, MBCS, CITP, CPSSADM Contents Page 1 Introduction 3 2 Module Overview 3 3 Module Descriptor 4 4 Module Assessment 7 5 Feedback 10 6 Indicative Reading 10 7 The Library, Saltire Centre 11 8 Learning Material Supplied By Module Leader 12 9 Module Delivery Structure 12 10 Learning and Teaching Plan 14 M3G405252 IT PROJECT MANAGEMENT 1 INTRODUCTION This handbook gives details of the module content, teaching schedule, recommended reading, assessment and feedback strategies used for students undertaking the module IT Project Management 1 (M3G405252 (old code: COMU350) Module Leader contact details: Eddie Gray, M609, (e.gray@gcu.ac...

Words: 3307 - Pages: 14

Premium Essay

Seeking Help

...to Information Systems Security [Onsite] Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security 400 Level Capstone Project IS418 IS404 Access Control, Authentication & KPI IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications Securing Linux Platforms & Applications 300 Level IS305 Managing Risk in Information Systems IS308 Security...

Words: 4296 - Pages: 18

Premium Essay

Biography

...Systems Design What is a System? Give examples. A set of components working together for a common objective Information Systems (Web-based) H/w, S/W, people, Data, Procedures, Web-portals What is SDLC? Systems Planning, Systems analysis, systems design, systems development, implementation, maintenance IS alignment IS Success IS usage User satisfaction Information waste IS enabled Competitive advantage Orgl change Orgl learning TAM Easy to use Perceived personal usefulness Web-based Information System Banner – Assess the levels of Flexibility Stakeholders What is Systems Design? Input design Output Design Interface design Database Technology – Network architecture, Communications Technology Flexible Systems Design for Web-based IS? Examples: Banner, Amazon.com, Dell.com – Identify the systems design elements Flexible Systems Design for Web based Information Systems (Research) BOM changes affect MRP In the Banner system, what are the changes that could occur? How do we respond to these changes? Interviews them Users – Students, Registrar (Shannon), Dean, etc. Designers / Planners – Gary Administration - Explore the dimensions – Extent, Options, cost, easy, Range, etc. Gain more insight by getting more examples. • Application architecture Design • Interface design (User/ System) • Database • Network • Prototype • Systems controls Case...

Words: 1598 - Pages: 7

Premium Essay

Informative

...Table of Contents Course Overview 5 Course Summary 5 Critical Considerations 5 Instructional Resources 6 Required Resources 6 Additional Resources 6 Course Management 8 Technical Requirements 8 Test Administration and Processing 8 Replacement of Learning Assignments 9 Communication and Student Support 9 Academic Integrity 10 Grading 11 Course Delivery 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 Unit Plans 15 Unit 1: Information Security Policy Management 15 Unit 2: Risk Mitigation and Business Support Processes 25 Unit 3: Policies, Standards, Procedures, and Guidelines 33 Unit 4: Information Systems Security Policy Framework 42 Unit 5: User Policies 50 Unit 6: IT Infrastructure Security Policies 58 Unit 7: Risk Management 66 Unit 8: Incident Response Team Policies 74 Unit 9: Implementing and Maintaining an IT Security Policy Framework 83 Unit 10: Automated Policy Compliance Systems 90 Unit 11: Course Review and Final Examination 97 Course Support Tools 101 Evaluation of Student Learning 102 STUDENT COPY 103 Graded Assignment Requirements 104 Unit 1 Discussion 1: Importance of Security Policies 105 Unit 1 Assignment 1: Security Policies Overcoming Business...

Words: 18421 - Pages: 74

Free Essay

Guideline for Optim

...WCDMA : KPI ANALYSIS & OPTIMIZATION Network planning& Optimization Illustration on RAN KPI-RU20 SRNC Relocation RNC Accessibility: RRC Setup & Access Rate RAB Setup & Access Rate Call Setup Success Rate PS setup success rate (NRT,HSDPA, HSUPA) SRNC UE BTS1 X Retainability: RRC Drop Rate RAB Drop Rate PS success rate (NRT, HSDPA, HSUPA) RNC Usage: Cell Availability Ave. Uplink Load Ave. Downlink Load HSDPA Throughput Cell Throughput Mobility: SHO/ISHO Success Rate SHO Overhead HDSPA/HSUPA SCC success / Date Presentation / Author rate BTS2 X Preemption Genuine Call Setup Failure Scenarios – RF issue • Interference / Dominance / Coverage • Missing neighbour – System Issue - BTS • No response to “RRC Connection Request” • “RRC Connection Reject” to “RRC Connection Request” – System issue - RNC • “CC Disconnect” after “Call Proceeding” due to “DL RRC Connection Release” – Core NW • “CM Service Abort” after “CM Service Request” – System issue (test number) • “CC Disconnect” after “CC Progress” Genuine Drop Call scenarios RF issue – Interference / Dominance / Coverage – Missing Neighbours System issue BTS – Sudden “CC Disconnect” due to “DL RRC Connection Release” – Sudden drop to idle, no disconnect messaging System issue RNC – Sudden “CC Disconnect” due to “DL RRC Connection Release” KPI Definitions The KPIs to be monitored from the RAN could be: – Cell availability – Call Setup Success Rate (CSSR) – Call Drop rate – SHO/ISHO/HSPA SCC success rate – Packet...

Words: 5805 - Pages: 24

Premium Essay

Ifrs Paper

...view the required and recommended materials to be purchased and to access ordering information. Course Description (Students should be cautious about enrolling in ACCT 310 or ACCT 311. These are professional courses requiring intensive study and analysis and are not to be undertaken casually. Students who have not taken ACCT 221 within the last two years may have difficulty.) Prerequisites: BMGT 110 (or at least two years of business or management experience) and ACCT 221. A comprehensive analysis of financial accounting topics involved in preparing financial statements and in external reporting. Students may receive credit for only one of the following courses: ACCT 310 or BMGT 310. Course Goals/Objectives This course should help you develop the ability to apply GAAP to a variety of complex accounting and financial reporting situations. The specific goals of this course are to: • provide a more extensive understanding of financial accounting principles and procedures and their role in the managerial decision-making process, through (a) the textbook and other written materials, (b) discussion of accounting topics via Web conferencing and online case study assignments, (c) research on the World Wide Web, and (d) FARS / Financial Accounting Research System • present financial accounting processes, procedures, terminology, concepts, and case studies • provide a higher level of problem-analysis and problem-solving ability through the use of CPA-level professional...

Words: 1838 - Pages: 8

Premium Essay

Hca 225 Complete Course (All Discussions and Assignments)

...HCA 225 Complete Course (All Discussions and Assignments) IF You Want To Purchase A+ Work Then Click The Link Below , Instant Download http://acehomework.com/HCA-225-Complete-Course-All-Discussions-and-Assignments-4563745.htm If You Face Any Problem E- Mail Us At JohnMate1122@gmail.com Week 1 Discussion Your state legislature is considering the following health policy proposal: Mandating that all female students entering the 6thgrade obtain the cervical cancer vaccine. Discuss the policy and economic questions associated with this proposal. Interest groups do not have the power to pass laws; however, they can and do influence policy decisions. Provide examples and discuss how interest groups have influenced health policy decisions. For example, motorcycle helmet laws – if we know that the use of a safety helmet can protect individuals from severe head and neck injuries in an accident, why do some states not have full helmet laws for all motorcycle riders? Week 2 Discussion Health policy is profoundly influenced by value-driven issues that cut across the entire U.S. policy landscape. Describe both positions (i.e., for and against) a current debate regarding a value-driven health policy issue. What interests in health policy do you bring to this class? McLaughlin’s Table 1-1 specifies the knowledge and skills called for in a policy analyst. Discuss for which of these areas do you currently feel prepared, and in which ones do you want to gain competence...

Words: 1319 - Pages: 6

Premium Essay

Competive Markets

...------------------------------------------------- Course Syllabus MGT/449 Quality Management and Productivity Course Start Date: 1/17/2012 Course End Date: 2/20/2012                   Please print a copy of this syllabus for handy reference. Whenever there is a question about what assignments are due, please remember this syllabus is considered the ruling document. Copyright Copyright ©2010 by University of Phoenix. All rights reserved. University of Phoenix© is a registered trademark of Apollo Group, Inc. in the United States and/or other countries. Microsoft©, Windows©, and Windows NT© are registered trademarks of Microsoft Corporation in the United States and/or other countries. All other company and product names are trademarks or registered trademarks of their respective companies. Use of these marks is not intended to imply endorsement, sponsorship, or affiliation. Edited in accordance with University of Phoenix© editorial standards and practices. Facilitator Information                                                                                                       Patti Moser patriciam00@phoenix.edu (University of Phoenix) pattimoser@cox.net (Personal) 480-836-6835 (MST) Facilitator Availability I am available from 9 a.m.-9 p.m. Mountain Standard Time on most days. During the week, I am online most of the time during the 6pm-9pm time frame and can be reached through my UOP email or my personal email. I provide you...

Words: 4316 - Pages: 18

Free Essay

With the Development of Technology, More and More Robots Are Used in Various Fields,

...Evaluation Third Year -Semester VI Scheme of Instructions Sr. Subjects Lect/ No 1 Information and Network Security Middleware and Enterprise Integration Technologies Software Engineering Data Base Technologies Programming for Mobile and Remote Computers Information Technology for Management of Enterprise TOTAL Week 4 Scheme of Examinations Theory T/W Practical Oral Total Hours Marks Marks Marks Marks Marks 3 100 25 -25 150 Pract/ Week 2 Tut/ Week -- 2 4 2 -- 3 100 25 -- 25 150 3 4 5 4 4 4 2 2 2 ---- 3 3 3 100 100 100 25 25 25 --25 25 25 -- 150 150 150 6 4 24 10 1 1 3 -- 100 600 25 150 -25 25 125 150 900 INFORMATION AND NETWORK SECURITY CLASS T.E. ( INFORMATION TECHNOLOGY) HOURS PER LECTURES : WEEK TUTORIALS : PRACTICALS EVALUATION SYSTEM: THEORY PRACTICAL ORAL TERM WORK : SEMESTER VI 04 -02 HOURS 3 ---- MARKS 100 25 25 1. Introduction What is Information Security? Security Goals. 2. Cryptography Crypto Basic, Classic Cryptography, Symmetric Key Cryptography: Stream Ciphers, A5/1, RC4, Block Ciphers, Feistel Cipher, DES, Triple DES, AES, Public Key Cryptography: Kanpsack, RSA, Defiie-Hellman, use of public key crypto- Signature and Non-repudiation, Confidentiality and Non-repudiation, Public Key Infrastructure, Hash Function: The Birthday Problem, MD5, SHA-1, Tiger Hash, Use of Hash Function. 3. Access control - Authentication and Authorization Authentication Methods, Passwords, Biometric...

Words: 3868 - Pages: 16

Premium Essay

Au2 Assignment2

...Assignment 2 — Session 3 (Spring) ------------------------------------------------- Top of Form Bottom of Form If this is your first time using the Online Learning Environment, check out the Course Orientation and the quick tutorials in the Support Centre. General assignment FAQs can be found in your Assignment Submission/Group Work area. Prepare your answers to these assignment questions in Word and save them as one Word document on your hard drive. For the recommended format and filename, see the Assignment Submission/Group Work/FAQ area. If this assignment Word file requires you to paste Excel.xls sections or other files, you are strongly advised to refer to the pages How To/Use Software/Excel, Word, or both, to ensure you successfully submit your complete assignment. When your file is complete and you are ready to submit it for marking, select your Assignment Submission/Group Work area. For help, refer to the quick tutorial, “Submit assignments”. Question 1 (5 marks) (Multiple choice)(1 mark each) Note: For multiple-choice questions, select the best answer. Answer each item by giving the number of your choice. Incorrect answers will be marked as zero. Multiple-choice questions must be completed in your Assignment Submission section. This portion of the assignment will be automatically graded. Do not include your answers in your Word document as they will not be graded. a. Which of the following situations would lead to an auditor increasing auditor business risk...

Words: 4505 - Pages: 19