Premium Essay

Case Study 1: Building an Access Control System

In:

Submitted By hollydillon1122
Words 886
Pages 4
Running head: CASE STUDY 1 BUILDING AN ACCESS CONTROL SYSTEM 1

Building an Access Control System
Case Study 1
Holly Dillon
Professor Jennifer Merritt
Systems Analysis and Development
CIS/210
April 28th, 2014

BUILDING AN ACCESS CONTROL SYSTEM 2

Building an Access Control System
Project Scope Description
As a member of the Information Security Team at a small College, I have been made the Project Manager to install an Access Control System (ACS) in a dormitory. For this small College an ACS (Access Control System) needs to be implemented to unlock the dormitory doors, to record a person as they use their identification card to unlock the door. An electronic proximity reader is needed to integrated with the existing security camera system with the camera’s being able to face and rotate at the door. The tasks to put in place are simple and easy to follow along with guidelines for each step. Rosenblatt. (2012).
The five major tasks with descriptive information that I am putting in place with a timeline for the project are as follows: Rosenblatt. (2012).

Obtain Authorization To obtain documentation authorization you on the go ahead of the project, its planning, implementation, testing, and training of the system 1 Day
Develop Plan Developing a project plan identifies the tasks and estimates the project’s completion time and costs of the project. 14 Days

Assign Tasks Assigning tasks (Scheduling) is the start to finish timeline of charts that would show the tasks, Task dependencies, and critical tasks that may delay the project. In assigning tasks, the selection and staffing of a project’s team members come together. 2 Days
Obtain

Similar Documents

Premium Essay

Case Study 1: Building an Access Control System

...Case Study 1: Building an Access Control System Building an Access Control System Marcelino P Figueroa Dr. Shah Strayer University, Woodbridge - VA ​This Project consist of a team of five specialists that will work together to successfully build an Access Control System for a College campus that has existing cameras. Pete will be leading the team of five on this project with that he will also be responsible of the projects progress, he will be in constant follow up with the senior management to deliver real time project completions and analyzing every task throughout the way. The first task is to Order all that is need to build the access control system. Pete assigned Chris, Kevin, Tonia, and Rich to review the industry leading ACS (Access Control Systems) methods in order to better fulfill the college campus’s security needs, they have two days to complete the task. Tonia has been assigned to select the components within four hours once complete she has to select the materials which needs to be complete within four hours. Chris is responsible on ordering the selected components and materials within two hours, while the ordering task is under-way, Jerry posted the maintenance signs all around the college campus to create awareness of the work that’s in the process. Once the components and materials are received in its entirety Chris, Kevin, Jerry, and Rich will team up to build and install the access control system. Once the installing task is complete,...

Words: 369 - Pages: 2

Premium Essay

Case Study 1: Building an Access Control System

...Project Scope This project scope is to install Access Control System (ACS) in the college dormitory. To identify the project’s goals, objectives, deliverables, tasks, costs, deadlines, expected leading staffing and none-staffing resources needed (Bidgoli, 2014). For a project this size, the company is limited to using current staff to complete the project. The size of the dormitory is five doors entering and exiting the building. The building has five moving cameras installed located at each doorway. The project is set for thirty days completion timetable. The current system analyst will be the project manager, and his responsibilities are as follows: • Project planning – identifying the project task estimating the completion time and cost of the project. • Project Scheduling – Creating a timetable for specific tasks. • Project monitoring – Guiding, supervising, and coordination the team's workload, and making decisions based on the team's workload and taking action to make corrections to keep the project on track. • Project reporting – This includes updates from his management, about current users and project team members on attitude and the overall effort of the team. (Rosenblatt J.H., 2014) A successful project will be completed on time, within budget and deliver a quality product that meets all requirements that were requested. A listing of the primary task and subtask are as follows: • Obtain equipment 1. Request bids from different vendors. 2. Evaluate...

Words: 326 - Pages: 2

Premium Essay

Director of Town Planning and Estates Services

...A GIS BASED MUNICIPAL INFORMATION SYSTEM FOR MANAGEMENT OF URBAN DEVELOPMENT CONTROL PROCESS (CASE STUDY OF BLANTYRE CITY ASSEMBLY, BLANTYRE, MALAWI) A GIS based Municipal Information System for Management of Urban Development Control Process (Case Study: Blantyre City Assembly, Blantyre, Malawi) Student: Costly Chanza March 2003 A GIS BASED MUNICIPAL INFORMATION SYSTEM FOR MANAGEMENT OF URBAN DEVELOPMENT CONTROL PROCESS (CASE STUDY OF BLANTYRE CITY ASSEMBLY, BLANTYRE, MALAWI) A GIS based Municipal Information System for Management of Urban Development Control Process (Case Study: Blantyre City Assembly, Blantyre, Malawi) by Costly Chanza Thesis submitted to the International Institute for Geo-information Science and Earth Observation in partial fulfillment of the requirements for the degree of Master of Science in GeoInformation Management for Urban Planning and Management. Degree Assessment Board Chairperson External Examiner First Supervisor Second Supervisor : : : : Prof. Ir. P. van der Molen Dr. F. Toppen (University of Utrecht) R.V. Sliuzas MSc Drs. S. Amer INTERNATIONAL INSTITUTE FOR GEO-INFORMATION SCIENCE AND EARTH OBSERVATION ENSCHEDE, THE NETHERLANDS A GIS BASED MUNICIPAL INFORMATION SYSTEM FOR MANAGEMENT OF URBAN DEVELOPMENT CONTROL PROCESS (CASE STUDY OF BLANTYRE CITY ASSEMBLY, BLANTYRE, MALAWI) Disclaimer This document describes work undertaken as part of a programme of study at the International Institute for Geo-information Science...

Words: 45342 - Pages: 182

Premium Essay

Access Control

...ACCESS CONTROL SYSTEM BY name SYSTEM ANALYSIS AND DESIGN – CIS210 Professor Ntinglet-Davis, Ed. D. Case Study 1 30 October, 2012 The purpose of this paper is to discuss installing an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system.  The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door. Project Title: Install Access Control System in Hall of TC CARRINGTON dormitory Project Justification: To increase the security and integrity of dormitory access at Southern Maryland Community College, one dormitory has been set up as a test site for the newly access control system (ACS). According to Germain (2011), an “access control system allows you to monitor when people enter and exit access control systems help to keep unauthorized people out, while providing flawless access to those who are authorized to be there” (para. 1). Project Scope: Install entry access system to dormitory using current security system. Project Deliverables: Scope Statement: The purpose of this project is to install an ACS in the Hall of TC CARRINGTON dormitory on the campus of Southern Maryland Community College located at 1010 Anywhere Ln, Waldorf MD, 20000. The ACS will automatically unlock the dormitory doors via an electronic proximity reader. The electronic proximity readers...

Words: 523 - Pages: 3

Premium Essay

Building an Access Control System

...CASE STUDY 1 Building an Access Control System As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door. Create a 3-4 page project plan for this project in which you: Include a one-half page project scope statement. Define five (5) major tasks, each with one to two (1-2) subtasks. Also write a brief description for each task. Create a Gantt chart illustrating the project tasks (use Microsoft Project or a similar project management program). Create a system diagram illustrating the equipment and connections required for this project (use Microsoft Visio or a similar software package). Building an Access Control System CIS210 Building an Access Control System Introduction An access control system is fundamental in reducing security issues as well as controlling the personnel allowed to access a given place. Its main objective is to ensure limited persons are granted the rights of access. This access can be granted by checking on criteria such as workplace, home or any other specified locations. The access control...

Words: 1248 - Pages: 5

Premium Essay

Security Management Case Study #1

...SMT 320 Case Study #1 Kristian Lauren R. Martin November 6, 2011 Case Study #1 Building the Foundation – Security Assessments As the security manager of a major corporation tasked with creating the initial security assessment and auditing program for the company, the first step in developing proposals for the security services would be conducting a comprehensive survey (policies, procedures and operations) of the entire facility to identify the critical factors affecting the security of the premises (Broder, 2006). The next step would be to analyze the vulnerabilities and recommend protection which is cost-effective (Broder, 2006). To start, establishing policies and procedures which define the mission of the security department should be the bare minimum in the role of the security department. These would include the following: * Protection against internal and external theft (to prevent embezzlement, fraud, burglary, robbery, industrial espionage and theft of trade secrets and proprietary information) * Developing access-control procedures (to protect the perimeter of the facility and other sensitive areas) and anti-intrusion systems * Establishing lock-and-key control procedures * Establishing a workplace violence program * Controlling the movement of people on the premises * Reviewing security personnel hiring and deploying * Establishing emergency and disaster recovery plans * Identifying the resources needed and available for the security...

Words: 802 - Pages: 4

Premium Essay

Laudon Ch5

...Management Information Systems MANAGING THE DIGITAL FIRM Kenneth C. Laudon New York University f Jane P. Laudon Azimuth Information Systems PEARSON feerttifie tall Pearson Education International Brief Contents Part One Chapter 1 Chapter 2 Chapter 3 Chapter 4 Part One Project Organizations, Management, and the Networked Enterprise 1 Information Systems in Global Business Today 2 Global E-Business: How Businesses Use Information Systems 38 Information Systems, Organizations, and Strategy 80 Ethical and Social Issues in Information Systems 124 Analyzing Business Processes for an Enterprise System 165 Part Two Chapter 5 Chapter 6 Chapter 7 Chapter 8 Part Two Project Information Technology Infrastructure 167 IT Infrastructure and Emerging Technologies 168 Foundations of Business Intelligence: Databases and Information Management 222 Telecommunications, the Internet, and Wireless Technology 260 Securing Information Systems 312 Creating a New Internet Business 351 Part Three Chapter 9 Chapter 10 Chapter 11 Chapter 12 Part Three Project Key System Applications for the Digital Age 353 Achieving Operational Excellence and Customer Intimacy: Enterprise Applications 354 E-Commerce: Digital Markets, Digital Goods 388 Managing Knowledge 428 Enhancing Decision Making 470 Designing an Enterprise Information Portal 508 Part Four Chapter 13 Chapter 14 Chapter 15 Part Four Project Building and Managing Systems 509 Building Systems 510 Project Management:...

Words: 3508 - Pages: 15

Premium Essay

Nt1310 Unit 1 Case Study

...Description:- Task 1:- a. The detailed design of a simple addressing solution (with diagram(s) and step by step workout of the calculations) that leaves room for growth is easy to administer and has the minimum wastage of available IP address space. Answer:- NAT (Network address translation) is a process by which a router can provide IP address to the computers. NAT is a process by which it allocates the IP address to a system, after remapping it with the network in a private area, so that one IP address could be allocated to one system, and the same IP address range will be used to connect all the computer system in one location. In this case study one building will have one router; the router is a networking device which provides IP address to its connected device in order to connect the...

Words: 1489 - Pages: 6

Premium Essay

Crm Development

...If there are images in this attachment, they will not be displayed. Download the original attachment Page 1 IT and Health Submitted by Lekshmi P Roll no:09810036 MBA 1 ST year Department of Management Studies Indian Institute of Technology Roorkee Page 2 Department of Management Studies,IIT Roorkee Page 2 Abstract This paper tries to present the overview of ICT and the health sector and also tries to identify the key issue and questions in this field .It also mentions the challenges facing the development of ICT implementation in health programmes and activities, and identifies the emerging trends and technologies that will shape ICT tools in the health sector. This paper also tells about the E- health standards existing and the various barriers related to establishing uniform standards. The paper also talks about the New Public Sector Management .And throughout the paper we will discuss some specific cases which will show us exactly how the ICT is changing the face of the health sector in some countries . Page 3 Department of Management Studies,IIT Roorkee Page 3 Contents 1. Introduction ........................................................................................................................................4 2. ICTs and the health-related MDGs (Millennium Development Goals)...............................................5 3. Using ICTs in the Health sector..............................................................................

Words: 5927 - Pages: 24

Premium Essay

Cemex

...Portada Management information systems managing the digital firm Part One. Organizations, Management, and the Networked Enterprise ....1 Chapter 1. Managing the Digital Firm ....2 Opening Case: DaimlerChrysler's Agile Supply Chain ....3 1.1 Why Information Systems? ....4 Why Information Systems Matter 4 • How Much Does IT Matter? 6 • Why IT Now? Digital Convergence and the Changing Business Environment ....7 1.2 Perspectives on Information Systems ....13 What Is an Information System? ....13 Windows on Organizations: Cemex: A Digital Firm in the Making ....14 Window on Technology: UPS Competes Globally with Information Technology ....17 It Isn't Just Technology: A Business Perspective on Information Systems 18 • Dimensions of Information Systems ....20 1.3 Contemporary Approaches to Information Systems ....25 Technical Approach 26 • Behavioral Approach 26 • Approach of This Text: Sociotechnical Systems ....27 1.4 Learning to Use Information Systems: New Opportunities with Technology ....27 The Challenge of Information Systems: Key Management Issues 28 • Integrating Text with Technology: New Opportunities for Learning ....30 Make IT Your Business ....31 Summary, 31 • Key Terms, 32 • Review Questions, 32 • Discussion Questions, 33 • Application Software Exercise: Database Exercise: Adding Value to Information for Management Decision Making, 33 • Dirt Bikes USA: Preparing a Management Overview of the Company, 33 • Electronic Commerce Project: Analyzing...

Words: 3823 - Pages: 16

Premium Essay

Informative

...Resources 6 Required Resources 6 Additional Resources 6 Course Management 8 Technical Requirements 8 Test Administration and Processing 8 Replacement of Learning Assignments 9 Communication and Student Support 9 Academic Integrity 10 Grading 11 Course Delivery 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 Unit Plans 15 Unit 1: Information Security Policy Management 15 Unit 2: Risk Mitigation and Business Support Processes 25 Unit 3: Policies, Standards, Procedures, and Guidelines 33 Unit 4: Information Systems Security Policy Framework 42 Unit 5: User Policies 50 Unit 6: IT Infrastructure Security Policies 58 Unit 7: Risk Management 66 Unit 8: Incident Response Team Policies 74 Unit 9: Implementing and Maintaining an IT Security Policy Framework 83 Unit 10: Automated Policy Compliance Systems 90 Unit 11: Course Review and Final Examination 97 Course Support Tools 101 Evaluation of Student Learning 102 STUDENT COPY 103 Graded Assignment Requirements 104 Unit 1 Discussion 1: Importance of Security Policies 105 Unit 1 Assignment 1: Security Policies Overcoming Business...

Words: 18421 - Pages: 74

Free Essay

Mksp India

............................................................................................... 10 1.3 Positioning ‘Women’s Empowerment as a Transformative Process.....................................13 II. The Mahila Kisan Sashaktikaran Pariyojana (MKSP)........................................................................... 16 2.1 Opportunities and Challenges in Programme Design...............................................................17 2.2 Scale and Outreach of the Programme............................................................................................ 19 III. Gender Responsive Framework for Analysis of Good Practices.................................................. 20 3.1 Building Women’s Collective...

Words: 16634 - Pages: 67

Free Essay

Essay

...Revised 12/2/2014 FIRE DEPARTMENT ● CITY OF NEW YORK STUDY MATERIAL FOR THE CERTIFICATE OF FITNESS EXAMINATION FOR F-03 INDOOR PLACE OF ASSEMBLY SAFETY PERSONNEL (Premises related) © 08/2012 New York City Fire Department - All rights reserved ® TABLE OF CONTENT NOTICE OF EXAMINATION ....................................................................................... I STUDY MATERIAL AND TEST DECRIPTION ..................................................VII INTRODUCTION ............................................................................................................ 1 Requirements........................................................................................................................ 1 Definition................................................................................................................................ 3 Disasters at public gatherings ....................................................................................... 4 Proper responses, different results ............................................................................. 7 PART I. INDOOR PLACE OF ASSEMBLY SAFETY PERSONNEL ................ 8 1. THE DUTIES OF PLACE OF ASSEMBLY SAFETY PERSONNEL........... 8 1.1 Fire safety and evacuation plan ...................................................................... 8 1.2 Pre-event inspection..........................................................................................

Words: 11241 - Pages: 45

Premium Essay

Challenges and Security Issues

...Unit 5 IP – Challenges and Security Issues American InterContinental University Abstract In this assignment, review of three different case studies will be discussed. Topics will include when an antivirus software cripples your computer, determining how secure cloud computing is, and electronic medical records systems. After the review of each case study, a set of questions will be answered to provide details on each study as to what was reviewed. Challenges and Security Issues (Case Studies) Introduction In this assignment, review of three different case studies will be discussed. Topics will include when an antivirus software cripples your computer, determining how secure cloud computing is, and electronic medical records systems. Case Study #1 When Antivirus Software Cripples Your Computers On April 21, 2010, McAfee crippled hundreds of thousands of McAfee equipped machines, by mistakenly sending an update to its users reclassifying svchost.exe as being a malicious file which was known as W32/wecorl.a virus (Humphries, 2010, para 1-2). The factors that were responsible for this software problem was that McAfee failed to send users a warning notifying them that svchost.exe was going to be either deleted or quarantined; instead they deleted the file completely. On the other hand, failure to detect this error was at the fault of McAfee’s automated quality assurance. Another reason this spread so quickly is because of the high demand for faster antivirus updates....

Words: 1227 - Pages: 5

Premium Essay

Organizational Security Survey

...such as facility security, physical security, or life safety. An expert conducts a involving a pre-determined constraint of checklist as well as an official reporting system. A security survey is a significant element of the general risk and security program (Craighead, 2009). When carrying out a security survey one must set clear goals. The goals would also be extensive from reviewing the fitness of the whole security program to more summarizing goals, such as the value and effectiveness of the physical security of the programs (Luis, 1994). SITE DESCRIPTION The Devry center building is located in downtown New York City on a four-acre piece of land. The building is a thirty story high containing 1,250 underground garage parking spaces and a rooftop garden. The building has a maximum capacity of 2000 tenants, and the tenants occupy the 27th and 30th floor of the building. SCOPE I conducted the security survey at Devry Center on December 1, 2013 to December 5, 2013. This report takes into consideration the current security and evaluates the site’s vulnerability and the associated risk factors. The information contained in this report came from the senior administrative officers in the building, parking attendants, the building management representatives, and from the tenants in Devry building. This report provides a detailed security site survey and an evaluation of...

Words: 1939 - Pages: 8