Reference no: EM131273743
Case Study 1: Building an Access Control System
As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door.
Create a 3-4 page project plan for this project in which you:
1. Include a one-half page project scope statement.
2. Define five (5) major tasks, each with one to two (1-2) subtasks. Also write a brief description for each task.
3. Create a Gantt chart illustrating the project tasks (use Microsoft Project or a similar project management program).
4. Create a system diagram illustrating the equipment and connections required for this project (use Microsoft Visio or a similar software package).
Your assignment must:
• Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
• Include charts or diagrams created in Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice. The completed diagrams/charts must be imported into the Word document before the paper is submitted.
The specific Course Learning Outcomes associated with this assignment are:
• Distinguish between non-functional and functional requirements.
• Use contemporary CASE tools in process and data modeling.
• Use technology and information resources to research issues in systems analysis and development.
• Write clearly and concisely about Systems Analysis and Development topics using proper writing mechanics and technical style conventions.
What if it were just coffee at a convenience store
: Your partner orders steak, potatoes, and all the trimmings. What are you going to do? What if itwere just coffee at a convenience store? What if the owner refused to take your money atthe cash register?
|
Expects customers to arrive at drive-up window according
: The daughter of the owner of a local hamburger restaurant is preparing to open a new fast-food restaurant called Hasty Burgers. Based on the arrival rates at her father's outlets, she expects customers to arrive at the drive-up window according to a ..
|
Evaluate corporations international business-level strategy
: For the corporation that operates internationally, briefly evaluate its international business-level strategy and international corporate-level strategy and make recommendations for improvement.
|
Predictions of two models of international trade
: Critically compare predictions of two models of international trade: the Heckscher-Ohlin model and Specific factors model. which model is more realistic in real trade world.
|
Create a gantt chart illustrating the project tasks
: Define five (5) major tasks, each with one to two (1-2) subtasks. Also write a brief description for each task.3. Create a Gantt chart illustrating the project tasks (use Microsoft Project or a similar project management program).
|
Break-even point analysis
: An electric item manufacturing company produces extension cords, has a variable cost of production $2.50 per unit and a selling price of $5.00 per unit. Fixed costs are $15,000. Current sales volume is 10,000 units. ariable cost would increase to $...
|
How do they use supply chain management
: Evaluate REI in this discussion. Outline their current channel and methods of distribution. How do they use Supply Chain Management? Does it work well? Any suggestions for improvement?
|
In deciding which channel to use in a specific communication
: In deciding which channel to use in a specific communication situation, list at least four factors that should be considered and briefly explain why each is important
|
Describe three of the cobit p09 control objectives
: For each of the threats and vulnerabilities from the Identifying Threats and Vulnerabilities in an IT Infrastructure lab in this lab manual (list at least three and no more than five) that you have remediated, what must you assess as part of your ..
|