Building an access control system

Assignment Help Basic Computer Science
Reference no: EM131518235

Case Study 1: Building an Access Control System

As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door. 

  1. Create a 3-4 page project plan for this project in which you:Include a one-half page project scope statement.
  2. Define five (5) major tasks, each with one to two (1-2) subtasks. Also write a brief description for each task.
  3. Create a Gantt chart illustrating the project tasks (use Microsoft Project or a similar project management program).
  4. Create a system diagram illustrating the equipment and connections required for this project (use Microsoft Visio or a similar software package).

Your assignment must:

  • Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
  • Include a cover page containing the title of the assignment. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice. The completed diagrams/charts must be imported into the Word document before the paper is submitted.

The specific Course Learning Outcomes associated with this assignment are:

  • Distinguish between non-functional and functional requirements.
  • Use contemporary CASE tools in process and data modeling.
  • Use technology and information resources to research issues in systems analysis and development.
  • Write clearly and concisely about Systems Analysis and Development topics using proper writing mechanics and technical style conventions.

Verified Expert

The solution file is prepared in ms word which discussed about to build an access control list for small college. The report has introduction , problem statement , Gantt chart of project, system design , Major task and conclusion of the project. The project plan done it in ms project to create task and Gantt chart of the project. The report has 1300 words around and references are included as per APA format.

Reference no: EM131518235

Questions Cloud

What is phishing : (a) What is Phishing? (Focus on phishing emails and targeted attacks that include spear phishing and whaling.)
Determine the incremental rate of return : Your company needs to purchase a new track hoe and has narrowed the selection to two pieces of equipment. The first track hoe costs $100,000.
Considering splitting its stock : Elmofud, Inc. is considering splitting its stock. The stock is currently priced at $100 per share. You own 200 shares of the stock.
What is the one health concept : What is the One Health concept? How do the proponents of the One Health concept propose to achieve their goals? (Review the Mission and Vision Statements.)
Building an access control system : As a member of the Information Security team at a small college, you have been made the project manager to install an access control system.
What is the billable hours each year for company : Your company has purchased a new track hoe for $100,000. The track hoe can be billed out at $95.00 per hour, has an hourly operation cost of $33.00.
Why the no arbitrage condition must exist for call : Explain why the no arbitrage condition must exist for a call.
What is future value of sherrys account in fourteen years : At the beginning of each year for 14 years, Sherry Kardell invested $400 that earns 10% annually. What is the future value of Sherry's account in 14 years?
Certs and compliance : Describe one (1) IT position that you currently hold or would like to hold in the future. Next, explain whether or not you believe obtaining certifications.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd