Running head: Dormitory Access Control Case Study: Dormitory Access Control Elizabeth Koch CIS 210 Dr Lopez Abstract As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door. Create a 3-4 page project plan for this project in which you: Project Scope Statement The Information Security team at Small University has been given the project to install an access …show more content…
With hyperterm, the administrator has the power to add codes, delete codes, list codes and unlock doors (Ross and Goto). Primary reason for flashing LED routines is to allow codes to be added to the database by gathering data from the proximity reader. Task: Planning – the planning period is considered very critical for project development. For this reason, as a member and manager of the information security ream, I will recommend two weeks for the planning, strategizing, and analyzing the entire project. The team will have enough time to set goals, schedule task, assign individual responsibilities during this time. Ordering system – shortly after the planning period, the project then goes into phase two, which in the ordering system. As a subtask, the delivery period goes into effect on the same day the system is orders, this period should take five business days for arrival. Installation Process – depending on the day the system arrives, the installation process would be better performed on a weekend, when there are fewer students and people going in and out of the building. If performed correctly, it should last for five days, starting on Saturday and ending on Wednesday. As a subtask the work schedule for the for the system will be implemented, and that is someone working for at least twelve hours starting early Saturday and Sunday, which is getting the cameras installed and making sure there is an
II. Planning Stage - PM meets with VP of Tech to go over spec. The two collaborate to create a Project Plan including a Gant Chart or equivalent to determine team member deadlines (individual initiatives) four launch.
By sorting the timeline in months I can’t get a clear idea of how you will accomplish the project in this course. “The Timeline must be consistent with the milestone dates noted in the Project Objectives and is open to revision”.
Describe common practices to estimate the duration of project activities as well as real reasons that cause project delays.
Security shall be a high priority requirement. Since this system is intended for a wide range of users, it shall be user-friendly, requiring limited training and assistance.
Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems
The 9-Iron Country Club is trying to implement a remote access program for their employees to access their work from home. The 9-Iron Country Club provides services for more than 1,200 members and employs around 75 staff. During the winter months, outdoor operations are ceased and preparation for the upcoming seasons begins. The addition of a remote access option will give the staff the ability to securely work from home and provide continued support. The 9-Iron Country Club has hired an information consultant to prepare the network and provide recommendations for the remote access solution. The purposed solution is using Terminal Access Controller Access-Control System Plus (TACACS+) to provide a secure remote connection for all employees. This report will review TACACS+ implementation, risk involved, and data classification.
Ever since day one, people have been developing and creating all sorts of new methods and machines to help better everyday life in one way or another. Who can forget the invention of the ever-wondrous telephone? And we can’t forget how innovative and life-changing computers have been. However, while all machines have their positive uses, there can also be many negatives depending on how one uses said machines, wiretapping in on phone conversations, using spyware to quietly survey every keystroke and click one makes, and many other methods of unwanted snooping have arisen. As a result, laws have been made to make sure these negative uses are not taken advantage of by anyone. But because of how often technology changes, how can it be
As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door.
First we are task to break the information up in to two are which consist of High Thread or Low Thread. And also set up level security clearance for each employee that has access to information systems. With deal this wide rang of different kind of information we have also screen the law-enforcement area who access the system as well the average Joe.
Some of the items that will need to be made aware of and shared with executives, employee and the stakeholders of the organization is the managing and protection of Access Control and attack monitoring system, each and every member of the company will need to understand and abide by the policies that govern access control in the workplace, allowing other employees to enter a facility without each employee scanning their badges will be a breach of security. The awareness of securing network architecture and network communications components, raise awareness on security governance concepts and policies and risk and personal management. The support of the entire organization in the changes and improvement will results in an effective strategic
The concern about privacy on the Internet is increasingly becoming an issue of international dispute. ?Citizens are becoming concerned that the most intimate details of their daily lives are being monitored, searched and recorded.? (www.britannica.com) 81% of Net users are concerned about threats to their privacy while online. The greatest threat to privacy comes from the construction of e-commerce alone, and not from state agents. E-commerce is structured on the copy and trade of intimate personal information and therefore, a threat to privacy on the Internet.
Initial projections show that the current schedule will take 50 weeks to finish with a final budget estimate of $3.152 million. Although the project estimate comes in under budget, the time frame for completion extends beyond the acceptable 45 weeks. Before deciding which activities should be crashed, Bjorn and his team first need to have a clear understanding of the project’s priorities. To do this the team has first defined the project’s scope and decided to develop a project priority matrix. Defining the project scope sets the stage for developing a plan and its primary purpose is to define as clearly as possible the deliverables and to focus project plans (Gray & Larson, 2005).
Privacy laws are established because people have a right to privacy, to an extent. For many years people have argued over their privacy rights, from online videos, to people spying on them, even people stealing internet. People think that they should be completely secluded from others seeing what they’re doing, but in all reality, there’s no stopping people from seeing what you are doing. With more people using the flaws within our media and lives, we as a society must come to accept the fact that people are watching us.
All access to government servers, network devices and maintenance areas of the government agency's data center will be role-based and defined through authentication at a minimum (Amsel, 1988). Access methods will require two-party authentication and for access to server operating systems and rack-mounted servers, biometrics will also be required. One of the most critical success factors to ensuring a high level of security and stability and to guard again social engineering threats is to create and maintain authentication methods that thwart illusionary and coercive-driven access attempts (Burgess, Canright, Engø-Monsen, 2004). By having several roles requires to gain access to data,
The information is very important in order to make the project done. This phase will take about 2 weeks because this phase is to gather information and make analysis for example, the interview to the student who often uses the computer in the lab and also the lecturer. The observation also will be made in this phase to see the environment in the collage, how big the building. From this information, the main problem can be highlight as an important.