Preview

Gapless Campus Security Case Study

Good Essays
Open Document
Open Document
708 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Gapless Campus Security Case Study
- Gapless campus security: The campus is now equipped with an integrated end-to-end smart campus management system. The system’s intuitive user interface allows security personnel to monitor the campus. For example, the system immediately and actively detects any changes in gas concentration in a chemistry classroom, monitors waste liquid management or leaks, sends out warnings for any unusual activity, etc., and immediately notifies the appropriate persons.
- Immediate warning and increased incident management efficiency: Each on-campus building has been fitted with Intel Inside’s active Smart Building Gateway, which is connected to and integrated with over 4,000 environmental sensors. There is complete 24-hour monitoring of the buildings’
…show more content…
Located near Yangmingshan National Park in Taipei, it has the most diverse selection of departments among universities in Taiwan. In the interest of creating better interaction between various departments, faculty and students, Chinese Culture University opted to set up a high-quality campus environment. Part of this plan included strengthening campus security. In the past, the university relied on campus patrol officers and traditional low-resolution CCTV for security management.

In order to resolve their security management issues, Chinese Culture University deployed Intel’s End-to-End Smart Campus Solution. At the core of the solution is the smart imaging function, which is integrated with environmental monitoring, emergency call intercom, smart broadcast, access control management and smart building management. The system also features Intel’s newest processor and advanced technologies, including Intel Active Management Technology (Intel AMT) and Intel Media SDK. All of the campus’s security-related information is then gathered round the clock via the smart
…show more content…
To comply with the campus’s budget, Intel’s End-to-End Smart Campus team used a large smart IoT system, dismantling independent subsystems and listing out construction needs in order of priority.

By gradually replacing the hardware and software equipment, the team built one subsystem at a time. From there, they slowly set up, installed and integrated them together.

“Although a lot of time and money were spent in the initial stages, the resulting infrastructure was highly scalable. Later costs of setting up and installing new equipment, as well as extending and expanding them are far lower than traditional methods,” said Zhi-Zang Chen, the lead engineer on the smart campus security system project.

In addition, due to the long history of the campus, many of the on-campus structures were old. As a result, they didn’t meet current regulations or have the ability for substantial technological change. This included many old pipes that cannot be

You May Also Find These Documents Helpful

  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Physical entry controls will consist of guard’s at all perimeter doors, and into all secure areas. Also a security system on all outer doors that is monitored 24 hours a day by a security company. There will also be motion sensors at all available accessible areas. There will be barbed wire around all access to first and second floor areas around perimeter fence. There will also be badges for person ale according to security level as well as guest. Also security cameras in all accessible areas with 360 degree rotation as well as nightvision.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The core infrastructure (switches, routers, firewalls, servers and etc.) must capable of withstanding 10 – 15% growth every year for the next seven years with a three-to-four year phased technology refresh cycle.…

    • 991 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Hardware can be used to protect the network from outside threats. Intrusion detection systems (IDS) automate detection of threats and attack through traffic analysis. Cisco’s IDS “delivers a comprehensive, pervasive security solution for combating unauthorized intrusions, malicious Internet worms, along with bandwidth and e-Business application attacks” (Cisco Systems, 2007, Cisco Intrusion Detection). They take this one-step further with an intrusion prevention systems (IPS). IPS shifts the focus on the attacker, not the attack itself, by increasing the accuracy of threat prevention through global threat analysis (Cisco Systems, 2012, Intrusion Prevention System with Global Correlation). The Cisco Adaptive Security Appliances (ASA) “combines the industry 's most deployed stateful inspection firewall with…

    • 890 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Howard Sheldon Stage 4

    • 1192 Words
    • 5 Pages

    This system can be costumed designed to meet the requirements of usability, reliability/ availability, and cloud computing, which are all a high priority of the IT requirements for the system.…

    • 1192 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Request for Proposals

    • 26335 Words
    • 106 Pages

    Section C – Technical Approach Section D – Security Gap Analysis Section E – Privacy Data Section F – Security Assessment Section G – Security Assessment Report Section H – Mitigating Risks Section I – BIA, BCP, and DRP Section J – Layered Security Solution 6.4 6.5 6.6 6.7 Cost Proposal & Scoring Guide Proposal Score Summary Matrix Reference Questionnaire Supplemental Templates…

    • 26335 Words
    • 106 Pages
    Powerful Essays
  • Powerful Essays

    As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door.…

    • 1220 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 4 Introducing ISS…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Butler University’s CIO, Scott Kincaid and his IT team had evaluated their current system and concluded it is beginning to show its age. SBC Centrex and the Centigram 640 has been great for the last decade but it is beginning to be inefficient as its capabilities are being maxed out and causing complications.…

    • 321 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Week 8 Paper

    • 2205 Words
    • 6 Pages

    The purpose of this paper is to outline policies, standards, and procedures to improved NextGard’s Technologies organizational network. By implementing a successful security strategy we will give recommendations and guidance in areas of Access Control, Cryptography Methods, Malicious Virus Countermeasure, Monitoring and Analysis, Proxy Server and Internet Access Control to NextGard Technologies. All implementation outlined in this model should be used across all NextGard’s Technologies location, networks, and devices to better secure of information and protection against attacks. We will also provide NextGard with an awareness programs ensuring Nextgard’s 250,000 employees are up to date on cyber awareness. This model will improve over organization security, and protection of information NextGard provides to its customers.…

    • 2205 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    “Effective Communication is a two-way process – sending the right message, that is also being correctly received and understood by the other person/s.” (effectivecommunication, 2012) Effective communication is not something everyone possesses; this is why we must focus on learning how to effectively communicate in our health care setting/workplace. Quality personal relationships are important in our lives, not only in personal and intimate relationships, but also in our business professional and work relationships. When you can effectively communicate, get your point across, and have the other person understand correctly, and completely you have successfully and effectively communicated with that person. This makes your life, job, workplace, and attitude better, communication skills…

    • 821 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Annotated Bibliography

    • 1114 Words
    • 2 Pages

    Bibliography: 1. "2013 Annual Report of Campus Security and Fire Safety Policies and Procedures." DREXEL UNIVERSITY – CLERY ACT STATISTICS. DREXEL UNIVERSITY, 2013. Web. 11 Feb. 2014.…

    • 1114 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Security and Gap Analysis

    • 632 Words
    • 7 Pages

    IS4799 Information Systems and Cybersecurity Capstone Project Unit 3 IT Security Policy Framework Gap Analysis © ITT Educational Services, Inc. All rights reserved. Learning Objective and Key Concepts…

    • 632 Words
    • 7 Pages
    Satisfactory Essays
  • Good Essays

    Deploying the right security products – IT security today has a wide range of technologies that are aimed specifically at lowering risks and threats.…

    • 584 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Otis Elevators Case Study

    • 638 Words
    • 3 Pages

    • Technical challenge – Delivering a system to 20,000+ computers and making sure it works everywhere.…

    • 638 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Integrated physical security from perimeter to control room is to detect and prevent an intrusion to the organization. There are many aspects part of Physical security including the…

    • 730 Words
    • 3 Pages
    Good Essays