Building an access control system

Assignment Help Basic Computer Science
Reference no: EM131518235

Case Study 1: Building an Access Control System

As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door. 

  1. Create a 3-4 page project plan for this project in which you:Include a one-half page project scope statement.
  2. Define five (5) major tasks, each with one to two (1-2) subtasks. Also write a brief description for each task.
  3. Create a Gantt chart illustrating the project tasks (use Microsoft Project or a similar project management program).
  4. Create a system diagram illustrating the equipment and connections required for this project (use Microsoft Visio or a similar software package).

Your assignment must:

  • Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
  • Include a cover page containing the title of the assignment. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice. The completed diagrams/charts must be imported into the Word document before the paper is submitted.

The specific Course Learning Outcomes associated with this assignment are:

  • Distinguish between non-functional and functional requirements.
  • Use contemporary CASE tools in process and data modeling.
  • Use technology and information resources to research issues in systems analysis and development.
  • Write clearly and concisely about Systems Analysis and Development topics using proper writing mechanics and technical style conventions.

Verified Expert

The solution file is prepared in ms word which discussed about to build an access control list for small college. The report has introduction , problem statement , Gantt chart of project, system design , Major task and conclusion of the project. The project plan done it in ms project to create task and Gantt chart of the project. The report has 1300 words around and references are included as per APA format.

Reference no: EM131518235

Questions Cloud

What is phishing : (a) What is Phishing? (Focus on phishing emails and targeted attacks that include spear phishing and whaling.)
Determine the incremental rate of return : Your company needs to purchase a new track hoe and has narrowed the selection to two pieces of equipment. The first track hoe costs $100,000.
Considering splitting its stock : Elmofud, Inc. is considering splitting its stock. The stock is currently priced at $100 per share. You own 200 shares of the stock.
What is the one health concept : What is the One Health concept? How do the proponents of the One Health concept propose to achieve their goals? (Review the Mission and Vision Statements.)
Building an access control system : As a member of the Information Security team at a small college, you have been made the project manager to install an access control system.
What is the billable hours each year for company : Your company has purchased a new track hoe for $100,000. The track hoe can be billed out at $95.00 per hour, has an hourly operation cost of $33.00.
Why the no arbitrage condition must exist for call : Explain why the no arbitrage condition must exist for a call.
What is future value of sherrys account in fourteen years : At the beginning of each year for 14 years, Sherry Kardell invested $400 that earns 10% annually. What is the future value of Sherry's account in 14 years?
Certs and compliance : Describe one (1) IT position that you currently hold or would like to hold in the future. Next, explain whether or not you believe obtaining certifications.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Draw at least two query trees that can represent each

Draw the initial query tree for each of these queries, and then show how the query tree is optimized by the algorithm outlined in Section 19.7.

  Problem regarding the conch republic electronics

Conch Republic Electronics is a midsized electronics manufacturer located in Key West, Florida. The company president is Shelley Couts, who inherited the company. When it was founded over 70 years ago, the company originally repaired radios and ot..

  Discuss the legal theories used by the plaintiff to recover

products liability research paper due week 10 and worth 250 points select a company that has been the subject of a

  Explain the concept of the taguchi loss function

Explain the concept of the Taguchi loss function. Link your answer to the concepts of statistical process control. This answer must be in your own words-significant cut and paste from the text or other sources is not acceptable.

  Determine the smallest force p applied to the lever

The coefficient of static friction between the strap and wheel is µs = 0.5.

  Does this information make it easier to compute a maxflow

Does this information make it easier to compute a maxflow? Develop an algorithm that uses a given mincut to speed up ubstantially the search for maximum-capacity augmenting paths.

  Analyze the residuals from this experiment

Write down a regression model that can be used to predict crack length as a function of the significant main effects and interactions you have identified in part (b).

  Strategies unions use to organize versus the tactics

What is the difference between the strategies unions use to organize versus the tactics?

  List the three actions we could take upon receiving a signal

list three disadvantages for using signals as a means of interprocess comm.

  What sorts of things might be implemented to address this

Consider both the Session Announcement Protocol (SAP) and the possibility of utilizing third-party "mixers."

  Store the values into a hash table with 10 buckets

Store the values into a hash table with 10 buckets, each containing three slots. If a bucket is full, use the next (sequential) bucket that contains a free slot.

  Do the edges of t form a minimum spanning tree of g

Let P = {s, . . . , t} describe a shortest weighted path between vertices s and t of a weighted graph G. Construct a new graph G by adding a weight of k to every edge of G. Does P describe a shortest path from s to t in G ? Prove the statement or ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd