Preview

Access Control Systems: A New Way to Open Doors

Best Essays
Open Document
Open Document
1213 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Access Control Systems: A New Way to Open Doors
A New Way to Open Doors

Table of Contents
Table of Contents 2
Appendix 8

Abstract

Due to recent university campus violence it has become necessary for the before mention organization to develop a access control systems (ACS) to ensure student safety. As a member the security team I‘m the project manager project manager for the ACS .This essay will look at the five phases and applicable subsets in the building of the ACS for resident facilities. There are five phases that this essay will be addressing: Planning or identification of the scope of the project. , Analysis- also known as whom, what, where and when. Design-step by step, Implementation-installation and last but not leased Maintenance-monitoring of the system. The current system of cameras the photograph those who are entering and leaving the dorm will be integrated into the new ACS. A Gantt chart and diagram will accompany this essay.
.

A NEW WAY TO OPEN DOORS Due to recent university campus violence it has become necessary for the before mention organization to develop an access control systems (ACS) to ensure student safety. As a member the security team I‘m the project manager for the ACS. This essay will look at the five phases and applicable subsets in the building of the ACS for resident facilities. The five phases that this essay will be addressing: Planning or identification of the scope of the project, Analysis- also known as whom, what, where and when, Design- also known as step by step, Implementation-installation and finally, Maintenance-monitoring of the system. The current system of cameras the photograph those who are entering and leaving the dorm will be integrated into the new ACS. A Gantt chart and diagram will accompany this essay. Because this university has not had an ACS before all the stakeholders will need to understand the process of selecting, installing, and maintaining the new system. This will be



References: Princeton Press. (2013). Campus Access Control System. Retrieved from http://www.princeton.edu/facilities/info/services/access/install/phase5/ Accessed 5/20/2014 Rosenblatt, H

You May Also Find These Documents Helpful

  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Physical entry controls will consist of guard’s at all perimeter doors, and into all secure areas. Also a security system on all outer doors that is monitored 24 hours a day by a security company. There will also be motion sensors at all available accessible areas. There will be barbed wire around all access to first and second floor areas around perimeter fence. There will also be badges for person ale according to security level as well as guest. Also security cameras in all accessible areas with 360 degree rotation as well as nightvision.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    a) Physical Security - Is intended to detect and deter unauthorized personnel from gaining access.…

    • 1152 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Cjs/250 Appendix D

    • 574 Words
    • 3 Pages

    The interior of the office building is segmented into two major areas. The first area is the employee workstation; only employees can access this area. Visitor and employees can access the second area. Both the first and second areas are monitored by active video surveillance.…

    • 574 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Psy/250 Appendix G

    • 398 Words
    • 2 Pages

    | Metal detectors at all entrances, have armed guards and unarmed guards, security cameras and CCTV installed.…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Access Control Lists

    • 3039 Words
    • 13 Pages

    This report will look at various access control methods used by Operating Systems (OS) to control user access to files on a computer and what they can do once they have gained access. In this first section I will look at methods such as Access Control Lists(ACL’s), Capabilities and Encrypting file systems(EFS) and which Operating Systems use these as well as the advantages and disadvantages they have over each other. The second part of my report will focus on one OS and explain in detail the methods it uses to control file access and how it works.…

    • 3039 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    Capstone Checkpoint

    • 270 Words
    • 2 Pages

    I believe that it is essential for security professionals to be well familiar with their surroundings and have great knowledge of their primary targets, while roaming their environment. It is critical that all security professionals must maintain full control of the environment they are assigned to, and are aware of not leaving a vulnerable gap to the criminals. These security professionals must be ready to notice the slight changes of the environment, and must keep in mind that all areas are different. Therefore, they must plot a defense mechanism based on the type of environment they are assigned to.…

    • 270 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Security on Campus

    • 1872 Words
    • 8 Pages

    To address Security on Campus, our initial purpose was to compare the security information for Briarcliffe with the security information for Molloy College and Five Towns College. The first part of our research was done using each college’s website. We wanted to know, first of all, if the information was easy to find using the websites. The information needed in order to begin the research was the following; requirements to be part of the security staff, number of security men on duty and an on campus incident report.…

    • 1872 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Aviation Security - Essay

    • 933 Words
    • 3 Pages

    References: James, M. (2009, April 24). Airport Security Systems. Retrieved May 18, 2010, from http://ezinearticles.com/?Airport-Security-Systems&id=2263141…

    • 933 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    * The current security system seems to be working efficiently with two cameras at adjacent sides in the public rooms such as Lounge, Foyer, Patio, Pool area and Reception area. The head of security is able to simultanouesly monitor all these cameras using the Wi-Fi system the lodge has in place.…

    • 1761 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Cloud Computing

    • 1194 Words
    • 5 Pages

    Network security architecture is the design and planning of the campus network that are aimed at reducing security risks in accordance with the institution’s risk and analysis policies. The traditional network design focused on creating a secure network perimeter and strategically places a firewall at the point where the network is connected to the internet. However, the traditional design is problematic and there is concern about security threats from inside the perimeter that is protected by the firewall.…

    • 1194 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Ultrasonic Range Meter

    • 10472 Words
    • 42 Pages

    Security is primary concern for every one. This Project describes a design of effective security alarm system that can monitor the house with eight different sensors. Unauthorized access, Fire accident, wall braking, IR detection, and fire detection can be monitored by the status of each individual sensor and is indicated with an LED.…

    • 10472 Words
    • 42 Pages
    Powerful Essays
  • Powerful Essays

    Closed-circuit television (CCTV) is a camera which is used to produce images or recordings for surveillance purposes. CCTV can be either video cameras, or digital stills cameras. Video cameras are either analogue or digital, which means that they work on the basis of sending analogue or digital signals to a storage device such as a video tape recorder or desktop computer or laptop computer wherelse digital stills cameras can take excellent pictures in most situations and can be plugged into the USB port of any computer and pictures can be taken of any camera scene. The name of the CCTV camera’s inventor is Marie Van Brittan Brown. CCTV is usually installed in areas that may need monitoring such as banks, casinos, airports, military installations, and convenience stores. In this days and age, it is critical to take security seriously. Some people think that only businesses and commercial properties need good security, but it is not only that our homes need good security too. With the rapid increase of crime rates and breaking and entering, it is very important to mull over the available security options and choose one that is the best fit for us. Therefore using CCTV cameras and equipment is one of the most popular and cost effective ways of providing security in the home and place of work. The reason why CCTV cameras is used because it can act as a very successful deterrent to thieves and burglars, certainly making them think twice at the very least. The technology these days have made our work much easier. For example, it is even possible to hook the cameras up to an ordinary television or computer to watch the footage. In this report we are going to discuss on the pros and corns of a CCTV camera system.…

    • 2059 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    E-Ticket Reservation

    • 1826 Words
    • 8 Pages

    At the same time, our report includes the innovation of security system that gives easier way to control the entering to the cinema. The system of observation was also involved to the security service. In order to this innovation, conflicts and misunderstandings between administration and customers can be escaped.…

    • 1826 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    The purpose of this report is to present students´ proposals to improve security in the college.…

    • 355 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Automated ID system

    • 3009 Words
    • 13 Pages

    There are some instances that due to a lot of visitors entering the school premises, it takes time in issuing a visitor’s pass. Also, the security personnel was not able to monitor if all the visitors have surrendered an ID and they were given the right visitor’s pass for a specific destination. There were also some cases of misplacement of visitor’s ID which is due to lack of systematic way of organizing the surrendered IDs. Whenever the security personnel will demand some information about the visitor, the records on their logbooks will be browse carefully and look into every detail starting…

    • 3009 Words
    • 13 Pages
    Powerful Essays