Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

Case Study 1: Building an Access Control System

As the member of Information Security team at the small college, you have been made project manager to install the access control system (ACS) in dormitory. The ACS would automatically unlock dormitory doors via electronic proximity reader and integrate with the existing security camera system.

Cameras are designed to face and rotate to record a person as they use their identification card to unlock door.

Prepare a 3-4 page project plan for this project in which you:

1. Include one-half page project scope statement.

2. Define five (5) main tasks, each with one to two (1-2) subtasks. Also prepare a short description for each task.

3. Prepare a Gantt chart demonstrating the project tasks (use Microsoft Project or a similar project management program).

4. Create system diagram demonstrating equipment and connections required for this project (use Microsoft Visio or a similar software package).

Your assignment should follow these formatting requirements:

• Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.

• Include cover page containing title of the assignment, student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

• Include charts or diagrams created in Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice. The completed diagrams/charts must be imported into the Word document before the paper is submitted.
The specific Course Learning Outcomes associated with this assignment are:

• Differentiate between non-functional and functional requirements.

• Use contemporary CASE tools in process and data modelling.

• Use technology and information resources to research issues in systems analysis and development.

• prepare clearly and concisely about Systems Analysis and Development topics using proper writing mechanics and technical style conventions.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92916

Have any Question? 


Related Questions in Computer Engineering

Design a security service that provides data integrity data

Design a security service that provides data integrity, data confidentiality and nonrepudiation using public-key cryptography in a two-party communication system over an insecure channel. Give a rationale that data integ ...

1 overviewin this assignment you will learn how to

1 Overview In this assignment, you will learn how to implement a priority-based scheduler forxv6. To get started, download a new copy of the xv6 source code fromhere. Do NOT use the source code of project 1. You'll do tw ...

Using english text and patterns determine the average

Using English text and patterns determine the average behavior of the pattern searching algorithm in (Implement a version of the current pattern searching algorithm that counts the number of times a given pattern occurs ...

1 a source socket address is a combination of an ip address

1. A source socket address is a combination of an IP address and a port number. Explain what each section identifies. 2. Explain how a client process finds the IP address and the port number to be inserted in a remote so ...

1 design and implement a simulation of some other racquet

1. Design and implement a simulation of some other racquet sport (e.g., tennis or table tennis). 2. Craps is a dice game played at many casinos. A player rolls a pair of normal six-sided dice. If the initial roll is 2, 3 ...

The knights tour problem is another chessboard puzzle in

The Knight's tour problem is another chessboard puzzle in which the objective is to find a sequence of moves by the knight in which it visits every square on the board exactly once. The legal moves of a knight are shown ...

1 list the possible values of c and d for an implementation

1. List the possible values of C and D for an implementation that ensures both consistency assumptions on page 470. 2. List at least one more possible pair of values for C and D if such assumptions are not maintained. 3. ...

Keeping the iv secret in ofb mode does not make an

Keeping the IV secret in OFB mode does not make an exhaustive key search more complex. Describe how we can perform a brute-force attack with unknown IV. What are the requirements regarding plaintext and ciphertext  Descr ...

1 a bss id bssid is a 48-bit address assigned to a bss in

1. A BSS ID (BSSID) is a 48-bit address assigned to a BSS in an 802.11 network. Do some research and find what the use of the BSSID is and how BSSIDs are assigned in ad hoc and infrastructure networks. 2. Do some researc ...

As we learned in this chapter modular arithmetic is the

As we learned in this chapter, modular arithmetic is the basis of many cryptosystems. As a consequence, we will address this topic with several problems in this and upcoming chapters. Let's start with an easy one: Comput ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro