Nobody downloaded yet

Building an Access Control System - Case Study Example

Comments (0) Cite this document
Summary
The project scope will focus on the building of an Access Control System for the dormitories for a small college. The operations of an Access Control System are aimed at being selective. This feature is meant to restrict access to a place or a particular resource within an institution…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER99% of users find it useful
Building an Access Control System
Read TextPreview

Extract of sample "Building an Access Control System"

Download file to see previous pages Card readers will be utilized in decoding personal information and data when using the system.  The use of smart cards will be implemented in this case scenario. Card readers will be utilized in decoding personal information and data when using the system. The microelectronic access control system allows access based on the permit presented on the cards.
When access is allowed, the door is unlocked for a programmed time frame and the operation is recorded on a database located in another location on a computer. When access is not granted, then the door remains locked and the attempted entrance is recorded onto the system to assist in future auditing. The system is also expected to monitor the door and provides an alarm sound notification in case the door remains open for long after being unlocked or in the event the door is forcefully opened.
The term access control denotes the exercise of limiting access to a building, a property, or a room to accredited persons. Thus, for an access control system, there are a set of policies that are mandatory for configuration onto the system with an expertise and high level trusted the programmer to administrate the system.
This event is expected to involve a read operation on the smart card to acquire entity information. A write operation can be involved after authentication of the read operation on the card to verify the credentials of a given user who wants to access the system at a given time.
This process entails the authentication of cards information and its linkage to a particular user registered on the system. Credentials are essential to be able to trace back transaction and document them on the data storage units allied to the system databases.
The identification process is aimed at verifying that the entities involved with the system are allowed and their identities are bound to them. This can be a PIN number or serial number assigned to them by a system administrator. In this case scenario, the use of smart cards will have barcodes or magnetic codes which aid in information storage about a single user. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Building an Access Control System Case Study Example | Topics and Well Written Essays - 1000 words”, n.d.)
Building an Access Control System Case Study Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/information-technology/1673697-week-3-cis210-case-study-1-building-an-access-control-system
(Building an Access Control System Case Study Example | Topics and Well Written Essays - 1000 Words)
Building an Access Control System Case Study Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/information-technology/1673697-week-3-cis210-case-study-1-building-an-access-control-system.
“Building an Access Control System Case Study Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1673697-week-3-cis210-case-study-1-building-an-access-control-system.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Building an Access Control System

Project Plan For Access Control System In a Dormitory

...? Project Plan for Access Control System (ACM) in Dormitory Your The The Scope of the Project The project aims to install Access Control Systems (ACS) in the dormitories of a small college named Army Public College. It would provide facility for managing the access of students and prevent un-authorized access to the dormitories. The new system would provide greater security and reliability. There are one hundred (100) dormitories in the hostel located near the college. The ACS would be completely functional if electronic locking that automatically unlocks the dormitory doors through an...
3 Pages(750 words)Case Study

The Future of Access Control

...Running head: Future of Access Control Future of Access Control Introduction Access control systems are an integral partof the design of today's facilities. A variety of factors determine the nature of access control to be provided. With the advent of technology, the design and the capabilities of access control systems have undergone a major change (Honey, Gerard 2005). The integration of Information Technology and the physical access control systems have created a vibrant and a dynamic...
10 Pages(2500 words)Essay

Building Engineering services

...sensors in the designated areas of a building viz conference rooms, passages, meeting rooms, closed cabins etc. A sophisticated system can also sense the lux level in the area, then vary the intensity of the light. This kind of systems can remember the scene set previously with certain light fixtures off, a few on and a few at different intensity levels and can be recalled in future saving time and energy. Another way of gaining energy savings from lighting system is to integrate it with Access Control System where in the person entering his designated work space through an authorized access card will...
11 Pages(2750 words)Essay

Building an Access Control System

...BUILDING AN ACCESS CONTROL SYSTEM COLLEGE COLLEGE According to Ross Anderson, the definition of Access Control System is defined as “where security engineering meets computer science. Its function is to control which principles (persons, processes, Machine, …..) have access to which resources in the system. Pg 93. Access control systems limit who can enter a building, screening systems limit what can enter a building; and monitoring systems observe the...
3 Pages(750 words)Essay

Access Control and Policies

... of the access controls One advantage of the Access Control Lists (ACLs) is the protection it offers users of a system. The Mandatory Access Control (MAC), for example, is a policy that is mandatory in every system present. It requires that users are offered access based on mandated guidelines. The Role Based Access Control (RBAC) controls access depending on the role played by system users (Kuhn, 2003). The advantage brought on by such access controls helps determine who is to access data, regulate what they might, or might not do. The ACLs provide an exceptional method of accessing data and resources. Disadvantages brought on by the use of ACLs are immense. One of them includes the difficulty involved in maintaining the ACLs... , such as...
2 Pages(500 words)Assignment

Information Security Access Control Methods

...Information Security Access Control Methods of Information Security Access Control Methods Access controls: Are the methods that applied to control the ways of communication of users and the systems with other systems and resources. These access control mechanisms protect these systems and resources from an illegal access and can be a part that takes part in evaluating the authorization level after an authentication process has effectively completed. The three important security principles are also relate to...
1 Pages(250 words)Assignment

Database security: Authorization and access control

... ization and Access Control ization and Access Control Introduction Security in Windows Server gets control over systems and networks through mechanisms of Authentication and Authorization. Windows operating system implements the process of authorization and access control that can be applied to handle resources and to determine whether the authenticated user has used the correct resources. Authorization and Authorization Authorization and Authorization are the processes by which the network resources allow or deny access to the data. Most of the computer security based systems can be implemented using two types of processes (Mark, 2008). First is Authentication and the second is Authorization. Authentication is a process through... which...
9 Pages(2250 words)Research Paper

Access to health care system

...of the population are covered systematically. The French healthcare system has been effective in providing the necessary healthcare for most of its citizens but the system needs review and limitations so that the costs could be covered by government funds. The French sickness prevention scheme is unique as it advocates “retirement, family allowances, and sickness”. The system is generous but it is losing funds the reason why there has been a quest for review from the government. While the Canadian system is characterized by the principles of comprehensiveness, universality, portability, accessibility, and administration, the provinces and territories...
6 Pages(1500 words)Essay

Building Services system

.... These will be controlled at common points referred to as substations. The distribution system will also function just as the transmitting system only that this will be specific to various units in the rooms for instance the light bulbs, sockets, showers etc. Just like any other power system the major objective of this power system is to provide power supply to the entire building (James, 2013). This implies that the power supplied is reliable, adequate, and safe and serves the needs of every user within the building. The electrical distribution room will appear as shown below: The...
12 Pages(3000 words)Essay

System Access

...System Access System Access The retention of a social website on an agency’s server may have implications for the accessibility of the site by the end users. The company providing the hosting services may be hesitant to give SSH access due to their reasons. For instance, if they are supporting a configuration it could be preferable to make adjustments than let their clients try to do it themselves. This can negatively affect the accessibility of the end user of the website. To guarantee access to the end users, the project manager needs to take certain precautions. First, he should request the agency...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic Building an Access Control System for FREE!

Contact Us