Case Study Building An Access Control System Case Study

¶ … member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door. Project Scope Statement

The Information Security team at Small University has been given the project to install an access control system (ACS) from Dynamics Security in a dormitory. The ACS will automatically unlock the doors via an electronic proximity reader and integrate with an existing security camera system. The existing cameras are designed to face and rotate to record a person as they use their identification card to unlock the doors.

For this reason, the system will be designed in a way that the user will have three chances to unlock the door, if the user fails to unlock the door...

...

The ACS will also be designed to allow the security administrator to make changed for the ACS operations. These changes will be the camera positions, setting the alarm time, and setting the time the dormitory doors will lock. The device uses an antenna coil to power the RFID tag embedded in the student ID card which reads the induce response from the card. The response is then filtered and manipulated into useful data and interpreted by Atmel mege32 microcontroller which runs the security program (Ross and Goto). This process alerts the administrator computer via serial line and hyperterm. If the card is read, and it is not in the code database, a red LED flashes for 3 seconds. On the other hand, if the code is found in the database, a green LED flashes for 3 seconds. With hyperterm, the administrator has the power to add codes, delete codes, list codes and unlock doors (Ross and Goto). Primary reason for flashing LED routines is to allow codes to be added to the database by gathering data…

Sources Used in Documents:

References

* Stanley Security Solution, i. (2004, 01-14). bestaccess. Retrieved 04-27, 2013, from bestaccess.com: http://www.bestaccess.com/servicedocuments/B.A.S.I.S.%20Offline%20Setup%20Guide.pdf

* Access Control - What is it and Why we Need It, written by: Steven Bowcut, CPP • edited by: Bill Bunter • updated: 4/7/2013, http://www.brighthub.com/computing/smb-security/articles/11083.aspx

* Ross and Goto; Proximity Security System; Retrieved from: https://courses.cit.cornell.edu/ee476/finalprojects/s2006/cjr/website/index.htm#citations


Cite this Document:

"Case Study Building An Access Control System" (2013, April 28) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/case-study-building-an-access-control-system-100436

"Case Study Building An Access Control System" 28 April 2013. Web.25 April. 2024. <
https://www.paperdue.com/essay/case-study-building-an-access-control-system-100436>

"Case Study Building An Access Control System", 28 April 2013, Accessed.25 April. 2024,
https://www.paperdue.com/essay/case-study-building-an-access-control-system-100436

Related Documents

Building Shared Services at RR Case Study An analysis of the Building Shared Services at RR reveals that various challenges facing the company require immediate response. This will ensure that the company does not lose its customers and face closure at worse. This is the case because many customers have raised their concerns regarding these issues (McKeen & Smith, 2012). One of the pertinent issues is based on the decentralization of

Searching and Understanding a Case Study Building Information Modeling (BIM) signifies the entire process of creation and usage of the computer produced design to imitate the planning, layout, building as well as functioning of the facility as displayed in Figure 1. The ensuing unit, a Building Information Model, is really a data-powered, object-oriented, smart as well as parametric electronic portrayal involving the premises, from where ideas and information suitable to numerous

Change Management -- a Case Study of British Telecom About CRM Theoretical Perspectives, Concepts and Practices Involved in Implementing a CRM Change Management About British Telecom British Telecom -- Implementing CRM CRM Systems -- Data Quality and systems Integration British Telecom -- A Case Study BT's Solution Analyzing BT's CRM from an Academic Perspective An Example of Systems Integration British Telecom -- Building Customer Relationships Problems with Implementing a CRM System Change Management -- A Case Study of British Telecom Today, when one thinks

Case Study of Facebook
PAGES 3 WORDS 895

Leadership Ethics on Facebook The milestone in the history of social networking world was created with the advent of Facebook. It was initially created by Mark Zukerberg for the students of Harvard as a platform for social networking. The innovation, creativity and most importantly strong leadership has made this social networking portal an internationally recognized social networking site translated in almost 70 languages. In today's era where the definition of

CITEC- Driving Towards No Limits CITEC IS an organization formerly known as the Centre for Information Technology and Communications, and the primary function of this organization is geared towards the provision of information technology services. In 1988, it is known as a government entity, because most of its projects and activities concern the implementation of electronic communication and data program of government agencies. However, the company's early history dates back

BabyCenter was facing several strategic issues and choices it had to sort out. The first referred to its presence on the American e-market and to the many online competitors that had appeared lately. The second strategic issues regarded an international expansion. Finally, the third issues that BabyCenter needed to refer to was the opportunity of joining forces with eToys and the offer that this company had made. Let's have