Building an access control system

Assignment Help Basic Computer Science
Reference no: EM131521489

Case Study 1: Building an Access Control System

As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door. 

  1. Create a 3-4 page project plan for this project in which you:Include a one-half page project scope statement.
  2. Define five (5) major tasks, each with one to two (1-2) subtasks. Also write a brief description for each task.
  3. Create a Gantt chart illustrating the project tasks (use Microsoft Project or a similar project management program).
  4. Create a system diagram illustrating the equipment and connections required for this project (use Microsoft Visio or a similar software package).

Your assignment must:

  • Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
  • Include a cover page containing the title of the assignment. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice. The completed diagrams/charts must be imported into the Word document before the paper is submitted.

The specific Course Learning Outcomes associated with this assignment are:

  • Distinguish between non-functional and functional requirements.
  • Use contemporary CASE tools in process and data modeling.
  • Use technology and information resources to research issues in systems analysis and development.
  • Write clearly and concisely about Systems Analysis and Development topics using proper writing mechanics and technical style conventions.

Verified Expert

The solution file is prepared in ms word which discussed about to build an access control list for small college. The report has introduction , problem statement , Gantt chart of project, system design , Major task and conclusion of the project. The project plan done it in ms project to create task and Gantt chart of the project. The report has 1300 words around and references are included as per APA format.

Reference no: EM131521489

Questions Cloud

Why is a good understanding of the various ratios used : Why is a good understanding of the various ratios used by accountants and managers important to the controlling function? Give specific examples.
Discuss its mobile technologies : Determine its mission, vision, and goals.Describe its databases, data warehouse, and data mining.Discuss its IT architecture.
What additional amount will the employer need to contribute : Mike Samson is a college football coach making a base salary of $640,800 a year ($53,400 per month). Employers are required to withhold a 6.2% Social Security.
Analyze how hr function relate to organizational development : Write a 175- to 350-word short paper that analyze how Human Resource functions relate to organizational development.
Building an access control system : As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory
Why hids would be appropriate to use as security measure : Please find an example of a system (or type of system) that you would recommend protecting with host-based IDS.
What journal entries should intel record : On December 18, Intel receives $250,000 from a customer toward a cash sale of $2.5 million for computer chips to be completed on January 23.
Conduct an online job search : Online Job Search - Conduct an online job search and identify a position you might be interested in applying for
Concepts or constructs defined : 1. What was the theoretical (concept or construct) focus or topic, and how were the concepts or constructs defined?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd