Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

As a member of the Information Security team at a small college, you have been m

ID: 665860 • Letter: A

Question

As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door.
Create a 3-4 page project plan for this project in which you:

Include a one-half page project scope statement.

Define five (5) major tasks, each with one to two (1-2) subtasks. Also write a brief description for each task.

Create a Gantt chart illustrating the project tasks (use Microsoft Project or a similar project management program).

Create a system diagram illustrating the equipment and connections required for this project (use Microsoft Visio or a similar software package).

Explanation / Answer

As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory.
In order to increase the security in the college dormitory, the current method of security needs to be enhanced. The goal is to create an access system that uses a modified student identification badge with a magnetic swipe to give access through a card reader. The student will need to first swipe the badge and then add the last four digits of their social security number in order to gain access. We also keep stationary security cameras at each entrance; this will ensure that we can confirm the identity of the student as needed after the fact. An emergency override system will be installed (key based) in the event of system failure – the security staff of the college will have access to the keys.
Once the card is swiped, the system will cross-reference a student database to confirm access. If the card is active, the system will then prompt the user to enter the last four digits of their social security number within 10 seconds to gain access. Once the numbers are entered, the database would confirm that the numbers match, activating the security camera and allowing the student access to the doors for ten seconds. The system would then keep a record with the time, date, card information and video file for later review as needed. The budget will need to include sufficient funds in order to purchase the equipment needed; enhanced Identification cards for each student, magnetic readers, security cameras and reinforced doors.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote