Building an Access Control System
As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door.
Create a 3-4 page project plan for this project in which you:
Include a one-half page project scope statement.
Define five (5) major tasks, each with one to two (1-2) subtasks. Also write a brief description for each task.
Create a Gantt chart illustrating the project tasks (use Microsoft Project or a similar project management program).
Create a system diagram illustrating the equipment and connections required for this project (use Microsoft Visio or a similar software package).
Building an Access Control System
CIS210
Building an Access Control System
Introduction
An access control system is fundamental in reducing security issues as well as controlling the personnel allowed to access a given place. Its main objective is to ensure limited persons are granted the rights of access. This access can be granted by checking on criteria such as workplace, home or any other specified locations. The access control system may consist of diverse components that collaborate to ensure the main objective is achieved. An effective control system would ensure privileges for the different users vary according to their access rights or levels; the system under research can monitor and record all activities of access, lock and unlock the doors, cancel privileges when a pass card is lost as well as detect usage of canceled cards (Benantar, 2006).
Scope Statement
Due to insecurity within the
References: Benantar, M. (2006). Acess control systems: Security, identity management and trust models. Chicago: Springer. Ramachandran, J. (2002). Designing security architecture solutions. NY: John Wiley & Sons. Sandhu, R., & Munawer, Q. (2002). Configuring role based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security, Vol. 3, No. 2.