Running head: CASE STUDY 1 BUILDING AN ACCESS CONTROL SYSTEM 1
Building an Access Control System
Case Study 1
Holly Dillon
Professor Jennifer Merritt
Systems Analysis and Development
CIS/210
April 28th, 2014
BUILDING AN ACCESS CONTROL SYSTEM 2
Building an Access Control System
Project Scope Description
As a member of the Information Security Team at a small College, I have been made the Project Manager to install an Access Control System (ACS) in a dormitory. For this small College an ACS (Access Control System)
…show more content…
Install Hardware/Software To implement the installation process of the prototype system designed for the project
Program Tests To Test the prototype system that was designed for the project.
Write User Manual Writing a how to functional user manual for the use, troubleshoot, and set up of the designed system of the project.
Convert Files Moving existing files of the current security system and all other system configurations that are in place
System Test Testing the already processed protocol in real-time, to eliminate execution errors, and any abnormalities that may have been missed at the program test level.
User Training To show users how the system can help them perform their roles
User Test After the user has been trained on how to implement the system, they are now ready to test the system themselves. With the success of program test, system and user tests the system is now ready to launch. Gantt chart example
Equipment and materials are to be new and unused, because you want to get your warrantee on any equipment purchased. There are requirements that have to be followed by the National electrical code and all state and local building codes including fire codes. Using a security vendor is highly recommended because they will be responsible for all costs associated with the installation of the equipment, once the contract commences. Securitas
understanding as to how you will initially do any kind of testing alongside design a program for the
• Prepare a 5 to 10 minute PowerPoint assisted presentation on important access control infrastructure, and
There are several techniques used in the documentation process. As a system analyst I would propose to the members of this group a straightforward standardized approach. A reasonable suggestion for this project would be to use the Procedure Manual technique for documenting this system. The Procedure Manuals will provide instructions on how to operate and understand how the system works. These manuals are also used as a guide that can be updated at different intervals for future users. Procedure Manuals are also made available to users via the Web. This new approach has made it convenient for users to seek support in a much faster way by offering a FAQ page, and online chat (Kendall & Kendall, 2011). In
Testing of the entire system will be performed to verify that all parts and counterparts are functional. This is the testing that is made prior to release. Tests performed in this stage verify for the following:
Test Plan: The software is tested using two levels of testing viz. black box testing and white box testing. White box testing could be carried out in three different phases viz. unit testing system/integration testing and validation testing. • Unit Testing: Unit testing, also known as Module Testing, focuses verification efforts on the module. The module is tested separately and this is carried out at the programming stage itself.Unit Test comprises of the set of tests performed by an individual programmer before integration of the unit into the system. Unit test focuses on the smallest unit of software design- the software component or module. Using component level design, important control paths are tested to uncover errors within the boundary of the module. Unit test is white box oriented and the step can be conducted in parallel for
This chapter focuses on conducting the test case on each software unit and showing the obtained results in the form of snapshots taken where each snap describes the process being done.
The analysis of the problem should take a day. At the analysis stage we determine the solution. The solution has been identified as the installation of the access control system. At this stage the system parts are identified; they include input, output, communication devices, power supplies, detection devices, intelligent panels, card readers, lock hardware, the actions and the response of the system in case of violation of the input requirements or failure of the system.
Role-based access controls meet the HIPAA Privacy Rule Minimum Necessary standard because it provides security access to individuals accessing a computer or its network by establishing access control requirements. Additionally, role-based access controls meet the minimum necessary standards because they focus on providing access to individuals based on their job role/job function within the facility. Moreover, according to (Amatayakul M. , 2008), the role-based access control, also control how covered entities (facilities) use the patient’s personal health information. Additionally, the role-based access controls also meet the HIPAA Privacy Rule Minimum Necessary standards because much like the Privacy Rule that focuses on setting limits on
Testing is the next phase of the implementation phase. A comprehensive testing program includes a stepwise process starting with unit testing, followed by testing of group components called integration testing and concluded with entire systems test (Satzinger et al., 2004, p. 640). Individual units or modules are tested prior to integration with more advanced modules, using driver modules. Once a set of modules are put together, integration testing can take place. These test include checking for interface compatibility, run-time exceptions, parameter values and unexpected state interactions (Satzinger et al., p. 644-645). Jeff Theobald suggests that an effort should be made to concentrate not on just errors in a single application or module, but also the system as a whole and between systems (Theobald, 2007). After these tests are completed, the project goes on to system testing. System testing often involves daily “build and smoke” tests, where the system is set to run and is observed for “smoke” or errors (McConnell, 1996). The TPI credentialing system was tested in this manner. The project made it through the first two testing
Access control system is a system designed to control entry to prevent intruders into selected areas and manage movement of people/vehicles within. Its purpose is to increase security by determining who, when and where are they allowed to enter or exit.
An access control example in my community is doors. Having a lock door, will cover access to your home, which is one of the first steps in securing your home. A properly set up fence, will make it even more difficult for someone to roam in your yard. If someone you do not know is inside your fence, it can easily alert you that a potential problem is arriving. Shrubs are another factor in access control. Shrubs can make it very difficult for someone to view inside your home. There are shrubs that can grow up to 15 to 20 feet height. Having many shrubs in your yard can make access to your home feel more of a challenge, which is how a lot of homes in my community are set up.
Secure Access Services, LLC is a security system supplier that is located in Raleigh, North Carolina. They also have an office in Wilmington, North Carolina. Secure Access Services, LLC was established in 1999. They specialize in safety, security, control devices, and security gates. They are commercial gate openers, residential gate operators, and self-storage gate operators. Secure Access Services, LLC offers free
In cutting edge business situations that depend vigorously on data innovation, the system security review or evaluation is a crucial part of system support and repair. A system security advisor will regularly play out a review as the primary stage in giving counseling administrations to a business. Notwithstanding, these establishment building reviews, organizations should likewise perform system security reviews or appraisals all the time to guarantee ideal execution.
Role based access control is an ideology through which access to systems is restricted based on authority given. It is used by organizations with a relatively large number of employees ranging from five hundred to one thousand and above (Sieunarine & University of Oxford, 2011). This is implemented through the mandatory access control or through the discretionary access control. These are the only two ways through which role based access control can be implemented.
➢ Diagrams the functions of the existing system necessary for the development of the new system.