Cis 210 Case Study 21-1

Similar Documents

Building an Access Control System

...Building an Access Control System Strayer University CIS 210 Systems Analysis and Development 4/28/13 Scope The scope of this project is to install an access control system (ACS) into a college dormitory. This ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door. To complete this project we will start with the analysis and design stage. The creation of various design documents will be performed during this stage. The next stage will be the development stage. During this stage we will either create a new database or use the school’s existing database. The 3rd stage will be the integration stage. During this stage, the physical installation of the system will occur. The 4th stage will be the testing stage. The final stage will be the maintenance phase. The maintenance phase is on-going. Major Tasks 1. Analysis and Design a) Design Documentation i. With this task, documentation is written up to describe the work that needs to be completed. This documentation is reviewed by all stake holders to ensure that the requirements are have been accurately conveyed and understood. b) Design Models i. With this task, flow charts and/or use case are created to describe the functionality.......

Words: 508 - Pages: 3

Building an Access Control System

...Assignment 1: Attack Methodology and Countermeasures Terrance Moore Professor Siplin Perimeter Defense 10/31/2013 When you are utilizing security features in an application, consideration should be given to the design, implementation, and deployment. It would helpful if you understand how a hacker thinks and then utilize the tools a hacker would use. Today, every company is becoming completely networked, through the exchanging of information on desktops, laptops, tablets and smart phones. Thinking like a hacker and understanding a hacker’s tactics and scams could make you aware and become more effective when applying countermeasures. There are several methods for carrying out ethical hacking, the most common are limited vulnerability and penetration testing. Limited vulnerability analysis, focus on entry points to gather critical systems and data. By understanding the basic approach used by hackers to target organizations, you will be better equipped to take defensive measures you will be better equipped and know what you are up against. There are steps involved in scanning a network, the following points will highlight them. 1) Check for live systems, 2) Check for open ports, 3) Fingerprint the operating system, 4) Scan for vulnerabilities, 5) Probe the network. Tools that can be used to detect scanning threats and countermeasures that a company can use to deter and avoid vulnerabilities are as follows. “Spoofing user identity -use strong authentication for......

Words: 996 - Pages: 4

Building an Access Control System

...CASE STUDY 1 Building an Access Control System As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door. Create a 3-4 page project plan for this project in which you: Include a one-half page project scope statement. Define five (5) major tasks, each with one to two (1-2) subtasks. Also write a brief description for each task. Create a Gantt chart illustrating the project tasks (use Microsoft Project or a similar project management program). Create a system diagram illustrating the equipment and connections required for this project (use Microsoft Visio or a similar software package). Building an Access Control System CIS210 Building an Access Control System Introduction An access control system is fundamental in reducing security issues as well as controlling the personnel allowed to access a given place. Its main objective is to ensure limited persons are granted the rights of access. This access can be granted by checking on criteria such as workplace, home or any other specified locations. The access......

Words: 1248 - Pages: 5

Access Control System

...Case Study #1: "Access Control System" Abstract As the project manager to install an access control system (ACS) in the dormitory of the college, my team will develop a project scope statement that cover all the necessary tasks to completed, along with a timeline to complete all tasks, which the work for each task will be written out. Also, a Gantt chart will be created, that will illustrate the project tasks. Lastly, we will create a system diagram to illustrate all the equipment and connections that are required for this project. Access Control System Project Scope: Install an access control system (ACS) into this small college dormitory. The ACS will automatically unlock the dormitory doors using an electronic proximity reader that has been integrated into the existing security camera system. Conduct a review of the current setup for the camera system installed. Determine the cost/benefit to add facial recognition software to be incorporated with the current security camera system. Locate electronic proximity readers and system software that will adhere to the schools security standards and that will operate with the security camera system installed. Load and configure operating software for the ACS/ Gather all students’ information and personnel authorized building access information into the server, to include current pictures. One system is up, configure the parameters for the system will need to be set, such as:...

Words: 990 - Pages: 4

Case Study 1: Building an Access Control System

...Running head: CASE STUDY 1 BUILDING AN ACCESS CONTROL SYSTEM 1 Building an Access Control System Case Study 1 Holly Dillon Professor Jennifer Merritt Systems Analysis and Development CIS/210 April 28th, 2014 BUILDING AN ACCESS CONTROL SYSTEM 2 Building an Access Control System Project Scope Description As a member of the Information Security Team at a small College, I have been made the Project Manager to install an Access Control System (ACS) in a dormitory. For this small College an ACS (Access Control System) needs to be implemented to unlock the dormitory doors, to record a person as they use their identification card to unlock the door. An electronic proximity reader is needed to integrated with the existing security camera system with the camera’s being able to face and rotate at the door. The tasks to put in place are simple and easy to follow along with guidelines for each step. Rosenblatt. (2012). The five major tasks with descriptive information that I am putting in place with a timeline for the project are as follows: Rosenblatt. (2012). Obtain Authorization To obtain documentation authorization you on the go ahead of the project, its planning, implementation, testing, and training of the system 1 Day Develop Plan Developing a......

Words: 886 - Pages: 4

: Building an Access Control System

...Case Study 1: Building an Access Control System Due Week 3 and worth 50 points As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door. Create a 3-4 page project plan for this project in which you: 1. Include a one-half page project scope statement. 2. Define five (5) major tasks, each with one to two (1-2) subtasks. Also write a brief description for each task. 3. Create a Gantt chart illustrating the project tasks (use Microsoft Project or a similar project management program). 4. Create a system diagram illustrating the equipment and connections required for this project (use Microsoft Visio or a similar software package). Your assignment must follow these formatting requirements:  Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.  Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the......

Words: 363 - Pages: 2

Cis 210 Wk 3 Case Study 1 - Building an Access Control System

...CIS 210 WK 3 Case Study 1 - Building an Access Control System To Purchase Click Link Below: http://strtutorials.com/CIS-210-WK-3-Case-Study-1-Building-an-Access-Control-System-CIS2107.htm CIS 210 WK 3 Case Study 1 - Building an Access Control System As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door. Create a 3-4 page project plan for this project in which you: 1. Include a one-half page project scope statement. 2. Define five (5) major tasks, each with one to two (1-2) subtasks. Also write a brief description for each task. 3. Create a Gantt chart illustrating the project tasks (use Microsoft Project or a similar project management program). 4. Create a system diagram illustrating the equipment and connections required for this project (use Microsoft Visio or a similar software package). Your assignment must follow these formatting requirements: • Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. • Include a...

Words: 287 - Pages: 2

Building an Access Control System

...this list, you are able to provide proper justification for it. Do not just provide list of hardware or software directly from the web. Be sure to thoroughly research and make appropriate recommendation based on your studies of various hardware/software. In addition, a diagram for each list item is recommend, illustrating precisely your recommendations for the provided case study. All information presented in your proposal MUST have in-text citations and a work cited section for the references used in your proposals. EVERYTHING SUBMITTED SHOULD DIRECTLY RELATE TO THE PRESENTED CASE STUDY AND NO COPYRIGHT MATERIAL! The recommended order to accomplish this proposal is as follows: Week 2 • LAN and WAN requirements – explain the LAN and WAN infrastructure of the doctor’s office network • Wiring – type of wire, length, cost, outside contractor, etc • Network Diagrams – current network infrastructure and proposed network • Network Hardware – routers, switches, racks, PC, etc. This is initial compiled list • Connectivity LAN-to-LAN – How each LAN is connected to other LANs • Network Services – DNS, DHCP, WINS, VPN, etc. All Microsoft network services. • Replications – Active Directory Replication, DNS Replication, etc. • Section 1 of business case Provide a breakdown of all hardware, software and communication equipment needed for the implementation of your network design. Include a list of sources used to create this section of the proposal. Be sure you use......

Words: 1078 - Pages: 5

Cis 210 Wk 3 Case Study 1 - Building an Access Control System

...CIS 210 WK 3 Case Study 1 - Building an Access Control System To Purchase Click Link Below: http://strtutorials.com/CIS-210-WK-3-Case-Study-1-Building-an-Access-Control-System-CIS2107.htm CIS 210 WK 3 Case Study 1 - Building an Access Control System As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door. Create a 3-4 page project plan for this project in which you: 1. Include a one-half page project scope statement. 2. Define five (5) major tasks, each with one to two (1-2) subtasks. Also write a brief description for each task. 3. Create a Gantt chart illustrating the project tasks (use Microsoft Project or a similar project management program). 4. Create a system diagram illustrating the equipment and connections required for this project (use Microsoft Visio or a similar software package). Your assignment must follow these formatting requirements: • Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. • Include a...

Words: 287 - Pages: 2

Building an Access Control System

... Building an Access Control System Tirsit Adnew Srayer University Professor, Mohammad Abedin 4/20/2015 Access Control system is important matter to secure the work place specially Hospitals, School, and government office. Controlling who has access to your office space is crucial in today’s dynamic business environment, from large government agencies and multinational corporations down to a single office suite and everything in between, to building Access control system first I have to go with information security see to see what and where to put the access control system, analyze how many rooms are there and if each dormitory need an access and where they need to put, and how many people needs the key to inter the dormitory, after analyzing the place and material I need to secure the small college dormitory. I have to go back what is the market for the material I need and give them an estimate to start the work. 1. Define five (5) major tasks, each with one to two (1-2) subtasks. Also write a brief description for each task. 2. Create a Gantt chart illustrating the project tasks (use Microsoft Project or a similar project management program). 3. Create a system diagram illustrating the equipment and connections required for this project (use Microsoft Visio or a similar software package). As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory....

Words: 305 - Pages: 2

Case Study Management Control System

...Case 1-1 and case 3-2 | | NUCOR CORPORATION (A & B) As of 1999, Nucor Corporation( had been the most innovative and fastest-growing steel company of the last three decades. As an example of how a knowledge machine works, we see Nucor as a far more interesting company than, say, Andersen Consulting or McKinsey, because unlike professional service firms whose only output is knowledge, Nucor’s end product is steel, a tangible non-differentiable commodity. Yet, as we describe below, for much of the three decades from 1970 onward, Nucor had been a knowledge machine par excellence. Since the late 1960s the U. S. steel industry has faced numerous problems, such as substitution from other materials, foreign competition, slowing of steel demand, and strained labor relations and has reported one of the poorest profitability and growth records in the American economy. Yet, despite operating in a fundamentally troubled industry, during this time period, Nucor enjoyed an annual compounded sales growth rate of 17%, all generated organically. Furthermore, the company’s profit margins were consistently well above industry medians, and average annual return to shareholders exceeded 20% (see Box 1 for a business profile of Nucor Corporation). Nucor achieved this phenomenal and sustained success by excelling at a single task: creating and mobilizing......

Words: 6458 - Pages: 26

Management Control System Case Study

...| Group Assignment | Management Control System | in a Fashion Company | | | | | | | | | University of Techonlogy, Sydney | Xiuhong Xu 11775297 | Management Planning & Control 22705 | Hai Dang Nguyen 11880919 | Spring 2015, class: Monday 18:00 – 21:00 | Lizhe Liu 11828579 | Lecturer: Dr. James Wakefield | Liang Zhu 11576028 | Introduction Company A is a fast-fashion wholesale company located in Sydney, with eight brands sold in three wholesale shops in Sydney, two shops in Melbourne and two in Brisbane. Driven by over 50 employees, the company is growing fast, generating annual revenue of over 2 million dollars. This report evaluates the management control system in Company A, with a comprehensive discussion of the practice of action control, result control and people control in core departments of company A, which includes design division, production division and sales division. The existing and potential control problems are observed and analysed through the lenses of management control system theory. Suggestions and recommendations are provided in this paper as alternative solutions to improve current control system. Organizational strategy and business model Facing keen competition in the low-end fast-fashion market in Australia, Company A has obtained stable marketing share by providing trendy, up-to-the-minute stylish products in budget price in the nine years since its establishment. Its customers include boutique......

Words: 2961 - Pages: 12

Case Study 1: Building an Access Control System

...Project Scope This project scope is to install Access Control System (ACS) in the college dormitory. To identify the project’s goals, objectives, deliverables, tasks, costs, deadlines, expected leading staffing and none-staffing resources needed (Bidgoli, 2014). For a project this size, the company is limited to using current staff to complete the project. The size of the dormitory is five doors entering and exiting the building. The building has five moving cameras installed located at each doorway. The project is set for thirty days completion timetable. The current system analyst will be the project manager, and his responsibilities are as follows: • Project planning – identifying the project task estimating the completion time and cost of the project. • Project Scheduling – Creating a timetable for specific tasks. • Project monitoring – Guiding, supervising, and coordination the team's workload, and making decisions based on the team's workload and taking action to make corrections to keep the project on track. • Project reporting – This includes updates from his management, about current users and project team members on attitude and the overall effort of the team. (Rosenblatt J.H., 2014) A successful project will be completed on time, within budget and deliver a quality product that meets all requirements that were requested. A listing of the primary task and subtask are as follows: • Obtain equipment 1. Request bids from different vendors. 2. Evaluate...

Words: 326 - Pages: 2

Case Study: Access Control System

...Case Study 1: Access Control System Project Scope: As a member of Information Security team, I have been assigned to install a card sweep access control system for the dormitory with the help of a team. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door. Major Tasks: Five major tasks to accomplish the goal of this project include: * Planning * Setup * Limitations * Monitoring * Completion Objective: The goal of this project is to prevent unauthorized personnel from accessing dormitory. The existing camera system will enable to keep an eye on the student activities. Planning: It is essential to have proper planning before start the task. Planning is the important thing for any project to be successful. There will have planning about integration of the system, software, equipment, power supply, and camera integration requirements. This task also involves conducting a review of current setup of security camera system. Determining the cost is also necessary before starting the project. Setup: This is an important for any type of system. It is vital to configure the required parameters for the system for example, users who are authorized, hours the students have access or logs etc.  Hardware Setup: Electronic proximity reader need to be...

Words: 604 - Pages: 3

Case Study 1: Building an Access Control System

...Case Study 1: Building an Access Control System Building an Access Control System Marcelino P Figueroa Dr. Shah Strayer University, Woodbridge - VA ​This Project consist of a team of five specialists that will work together to successfully build an Access Control System for a College campus that has existing cameras. Pete will be leading the team of five on this project with that he will also be responsible of the projects progress, he will be in constant follow up with the senior management to deliver real time project completions and analyzing every task throughout the way. The first task is to Order all that is need to build the access control system. Pete assigned Chris, Kevin, Tonia, and Rich to review the industry leading ACS (Access Control Systems) methods in order to better fulfill the college campus’s security needs, they have two days to complete the task. Tonia has been assigned to select the components within four hours once complete she has to select the materials which needs to be complete within four hours. Chris is responsible on ordering the selected components and materials within two hours, while the ordering task is under-way, Jerry posted the maintenance signs all around the college campus to create awareness of the work that’s in the process. Once the components and materials are received in its entirety Chris, Kevin, Jerry, and Rich will team up to build and install the access control system. Once the installing task is complete,...

Words: 369 - Pages: 2

Case-Study (Payroll Program)

703 WordsMar 4th, 20133 Pages

Case Study (Payroll Program)
Ian Strayer
Strayer University
Professor Farzan Soroushi
Cis 210
February21st, 2013

Abstract
Building a payroll program for a large organization with offices spread across the United States has many changelings and most be done in a particular way. Thus having the right application architecture is important where the design is concerned, because the company has one large data center that each office connects to via a wide area network (WAN). Hence the appropriate architecture for this situation would have to consist of a WAN diagram to be used in management of this project, along with system documentation, and information technology architecture documents to provide a visual representation of the…show more content…

Cost estimates should also not be overlooked when final decisions are being made.There should also be consideration for scalability in reference to the new system ability to expand, change or downsize easily to meet the changing need of a business enterprise, if the need call for it in the future. Besides all of this it would be important in implementing systems that are volume-rated, such as transaction processing systems, that could have more than what it was supposed to take on. Below is a diagramrepresenting the basic layout of what the different parts of the architecture would look like and the different technology parts and equipment minus the software?

Some software applications will include procedures for web integration, which would require an information system with applications. Thus a Web-centric architecture would avoid many of the connectivity and compatibility problems that typically arise when it comes online and users (Employees) start accessing it through the web.With the new system being put into place other legacy systems may need to be integrated with the new applications. Thus the interfacing of both would have to be consistent with the requirements to analyze different types of data formats and compatibility. Those implementing the new payroll system should know if the

Show More

Categories: 1

0 Replies to “Cis 210 Case Study 21-1”

Leave a comment

L'indirizzo email non verrà pubblicato. I campi obbligatori sono contrassegnati *