Preview

CIS 210 - Access Control System

Powerful Essays
Open Document
Open Document
1220 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
CIS 210 - Access Control System
CASE STUDY 1
Building an Access Control System
As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door.
Create a 3-4 page project plan for this project in which you:
Include a one-half page project scope statement.
Define five (5) major tasks, each with one to two (1-2) subtasks. Also write a brief description for each task.
Create a Gantt chart illustrating the project tasks (use Microsoft Project or a similar project management program).
Create a system diagram illustrating the equipment and connections required for this project (use Microsoft Visio or a similar software package).

Building an Access Control System
CIS210

Building an Access Control System
Introduction
An access control system is fundamental in reducing security issues as well as controlling the personnel allowed to access a given place. Its main objective is to ensure limited persons are granted the rights of access. This access can be granted by checking on criteria such as workplace, home or any other specified locations. The access control system may consist of diverse components that collaborate to ensure the main objective is achieved. An effective control system would ensure privileges for the different users vary according to their access rights or levels; the system under research can monitor and record all activities of access, lock and unlock the doors, cancel privileges when a pass card is lost as well as detect usage of canceled cards (Benantar, 2006).
Scope Statement
Due to insecurity within the



References: Benantar, M. (2006). Acess control systems: Security, identity management and trust models. Chicago: Springer. Ramachandran, J. (2002). Designing security architecture solutions. NY: John Wiley & Sons. Sandhu, R., & Munawer, Q. (2002). Configuring role based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security, Vol. 3, No. 2.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Finally, the system/application domain would require virtual testing of everything before any implementation, hardening of all servers, and keeping up with patches and updates regularly after testing has been completed. Some of the more efficient ways to implement better access controls in a company would start with the proper level of authorization policies including physical controls for facilities. The authorization policy would appropriate entry system access controls that specify what areas are to be locked at all times and what type of locking mechanism should be implemented. It would also include the implementation of secondary locks on specific equipment and storage cabinets…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Prepare a 5 to 10 minute PowerPoint assisted presentation on important access control infrastructure, and management aspects from each location.…

    • 991 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Cis 210 Research Paper

    • 1323 Words
    • 6 Pages

    * The chart should include a minimum of five (5) tasks, each with three (3) sub-tasks.…

    • 1323 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    McBride Financial Services in its effort to control data access must emphasize on the need for all networking administrators to carefully restrict employee’s data access privilege, based on the role each employee is assigned within the organization. It is essential for the company to outline in its Business Requirement Document (BRD) the need for each employee to be assigned specific separating duties, and that a Networking Requirements Document (NRD) is used to capture and define the names, department, privileges and roles to be assigned to each employee (user).…

    • 1172 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Week 8 Paper

    • 2205 Words
    • 6 Pages

    Limiting access control to NextGard’’s operating systems should be top priority. Attackers need a means to connect to a network to gain access to information, if their means to access the network it block then NextGard’s information and data is greater secured. Implementing a Access Control List is a set of specifies entries given to a trustee that tells an operating system which access rights each user has to a particular network system object such as a directory. The access control list is a secure measure used to limit the user’s ability to read, write, and make changes to files, and documents.…

    • 2205 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Cis 105 Security Systems

    • 465 Words
    • 2 Pages

    With the variety of threats to worry about in regards to protecting one’s computer system, whether it is for a personal or business computer, it is very important to get some type of security protection. There are a lot of options out there in terms of what brand and what level of security an individual is looking for. The best option to protect a computer system from various threats is an all-in-one computer security system, such as Norton 360 and McAfee Total Protection. One problem an individual needs to worry about is identity theft. Identity theft problems can range from a stealing a person’s name, email address, physical address, credit card information, account numbers, documents, and even passwords. Other threats or annoyances to worry about are spyware, adware, pop-ups, spam, viruses, and worms. Keeping the computer system and the data contained protected within the computer is important.…

    • 465 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Prioritise activities that need to be achieved and categorise them under primary activities, secondary activities and urgent activities.…

    • 212 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    § § § § § § § Defining the task Setting objectives Making a plan Allocating work and resources Controlling quality and tempo of the work Checking performance against plan Adjusting the plan…

    • 2190 Words
    • 9 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Building Security

    • 661 Words
    • 3 Pages

    Security is a vital issue in all aspects of running our business effectively. Our Security System is one way in which we try to control and secure our environment. For the safety of our employees and the protection of our equipment, we utilize numerous security devices and procedures to accomplish this goal. However, the security system is only as efficient as the way in which we support it.…

    • 661 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Implement strong authentication / access control for control systems and related information systems where possible…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Dr. Mohamed Khairy Shahin

    • 5649 Words
    • 23 Pages

    Personal verification has become an important and highdemand technique for security access systems in the last…

    • 5649 Words
    • 23 Pages
    Powerful Essays
  • Powerful Essays

    Kharagpur,is a record of bona fide researchwork under my supervision and I consider it worthy of considerationfor the…

    • 31424 Words
    • 126 Pages
    Powerful Essays
  • Good Essays

    Intelligent System

    • 1539 Words
    • 7 Pages

    3. For each of the following activities, give a PEAS description of the task environment…

    • 1539 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Assignment 1

    • 438 Words
    • 2 Pages

    3-A clear time table: Organize all the tasks with their planned time for them to be completed.__________________________________________________________________________________…

    • 438 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Rfid Secure Access

    • 6940 Words
    • 28 Pages

    RFID based Secured access system implemented on 8051 microcontroller . This is a very useful application of RFID (Radio-frequency identification) and is very commonly used in institutes, offices, homes and so on. An RFID system consists of a reader device and a transponder. A transponder or tag has a unique serial number which is identified by the reader. Here RFID has been interfaced with AT89C51 to provide secured access. The relevant messages are also displayed on a 16x2 LCD. RFID automated access for door controls to buildings, departments, rooms, secured closets (wiring, PBX, etc.) and cabinets is very cost effective and secure to use. Many people do not realize how easy it is to implement card access systems such as card access door or doors using RFID readers and RFID Cards or Keyfobs for Secured Access Control Management. You can even use smart readers for computer rooms and securing individual computers. In fact access based entrance and exits using access smart technology is rapidly becoming the way of the future for many businesses, government buildings, hospitals, museums and other establishments requiring secured but easy to control access solutions. Access based systems use either 125 kHz RFID or 13.56 MHz RFID readers, cards and keyfobs.…

    • 6940 Words
    • 28 Pages
    Powerful Essays

Related Topics