Ask Question, Ask an Expert


Ask Computer Engineering Expert

Case Study 1: Building an Access Control System

As the member of Information Security team at the small college, you have been made project manager to install the access control system (ACS) in dormitory. The ACS would automatically unlock dormitory doors via electronic proximity reader and integrate with the existing security camera system.

Cameras are designed to face and rotate to record a person as they use their identification card to unlock door.

Prepare a 3-4 page project plan for this project in which you:

1. Include one-half page project scope statement.

2. Define five (5) main tasks, each with one to two (1-2) subtasks. Also prepare a short description for each task.

3. Prepare a Gantt chart demonstrating the project tasks (use Microsoft Project or a similar project management program).

4. Create system diagram demonstrating equipment and connections required for this project (use Microsoft Visio or a similar software package).

Your assignment should follow these formatting requirements:

• Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.

• Include cover page containing title of the assignment, student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

• Include charts or diagrams created in Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice. The completed diagrams/charts must be imported into the Word document before the paper is submitted.
The specific Course Learning Outcomes associated with this assignment are:

• Differentiate between non-functional and functional requirements.

• Use contemporary CASE tools in process and data modelling.

• Use technology and information resources to research issues in systems analysis and development.

• prepare clearly and concisely about Systems Analysis and Development topics using proper writing mechanics and technical style conventions.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92916

Have any Question? 

Related Questions in Computer Engineering

Design an algorithm for solving the towers of hanoi problem

Design an algorithm for solving the Towers of Hanoi problem that does not employ recursion ([This algorithm does not in itself have practical application other than perhaps measuring the life of the universe. It does, ho ...

1 what does it mean to say that a product is cc or tcsec

1. What does it mean to say that a product is CC or TCSEC compliant? 2. Research and find out if there are any widely used computer product security evaluation criteria. 3. Using the product evaluation list for computer ...

Consider the following problem descriptionemployees receive

Consider the following problem description: Employees receive their biweekly paychecks. They are paid their hourly rates for each hour worked; however, if they worked more than 40 hours per week, they are paid at 150 per ...

Design a security service that provides data integrity data

Design a security service that provides data integrity, data confidentiality and nonrepudiation using public-key cryptography in a two-party communication system over an insecure channel. Give a rationale that data integ ...

1 explain the basic technology that makes residentialsoho

1. Explain the basic technology that makes residential/SOHO firewall appliances effective in protecting a local network. Why is this usually adequate for protection? 2. What key features point up the superiority of resid ...

1 you think that a computer with the domain name

1. You think that a computer with the domain name "" has severalIP addresses. Write a statement in Java to create an array of InetAddress objects associated with this host. 2. You think that a computer with t ...

Suppose a user has physical access to computer hardware

Suppose a user has physical access to computer hardware (specifically, the box containing the CPU and a hard drive). The user does not have an account on the computer. How can the user force the computer to shut down? To ...

1 distinguish between multicasting and multiple unicasting2

1. Distinguish between multicasting and multiple unicasting. 2. When we send an e-mail to multiple recipients, are we are using multicasting or multiple unicasting? Give the reason for your answer. 3. Define which of the ...

Develop a flash share movieoverviewyour final project in

Develop a Flash share movie OVERVIEW Your final project in this class is required to be more extensive than the weekly lab projects. Your project should demonstrate a significant application of technical elements and als ...

Assignmentdefineupdate the security objectives for

Assignment Define/update the "security objectives" for confidentiality, integrity, and availability of information resources, describing the potential harm/security impact that failure to achieve security objectives woul ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro