Preview

Building an Access Control System

Good Essays
Open Document
Open Document
366 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Building an Access Control System
Building an Access Control System As a member of the Information Security team for a small community college I have been tasked with providing an access control system which will monitor the access of students in and out of the college dormitory. This access control system is needed to provide increased security to the students and decrease the access of unauthorized students to their respective dormitories. The scope of this project is to develop an access control system on or before 31 December 2012, which is the final date for installation and testing of all components. The project shall include services and parts pertaining to design, installation, operation, maintenance, repair and support of a complete access control system. The general scope of work comprises three essential elements: 1) IDS and HSPD-12 PACS; 2) Project Management (PM), and 3) Operations and Maintenance (O&M).
The Mid-Continent Ecology Division (MED) facilities are located on a thirteen acre site and consist of a main building and several support buildings. Currently, 175 EPA employees occupy the MED. The EPA MED requires a new HSPD-12 compliant Physical Access Control Systems (PACS). The new PACS will replace in its entirety the existing legacy Northern Computers access control system. The MED also requires a new IDS to completely replace the existing IDS. This project will allow the EPA to meet their scheduled Office of Management and Budget milestone commitments. The EPA‟s PACS will be installed to accommodate their requirements in meeting HSPD-12‟s requirement to use the new Personal Identity Verification (PIV) card for physical access. This will include the use of EPA‟s currently issued PIV Credential (i.e. EPASS badge) to ingress and egress their facilities. The installed PACS and IDS will be owned and operated by the EPA in Each facility member and student will be issued an ID card that is encoded to open only what he/she been granted access to. This



References: Shelly, Rosenblatt. (2012). Systems Analysis and Design (9th ed.). Boston: Thomson Course Technology. http://www.epa.gov/oamhpod1/admin_placement/11jg005/SOW.pdf

You May Also Find These Documents Helpful

  • Powerful Essays

    Main Security Concerns: As a rapidly growing business that primarily utilizes IT resources for intranet company communications between and among a single home office and three satellite offices; internal network access controls and remote employee user’s access controls seem to be of primary importance. Priority number one should be hardening and the safeguarding of access and data integrity of the Oracle database servers housed as the main office in Reston, VA. And separately at the San Diego satellite office A comprehensive security policy will be developed and approved by management that will detail the specific guidelines administrators must follow when allowed admin access to company IT resources and services, and when and how those permissions should be denied or allowed. Additionally, auditing and logging of critical events should be implemented utilizing a reliable SEIM (Security Information and Event Management) system. Moreover, control of user access from remote sites via the company intranet via VPN’s and remote access via RADIUS should be strengthened and monitored for both qualitative and quantitate analysis and measuring. Cryptographic techniques will be enhanced and login and password requirements will be strengthened. Of significant importance is the company web presence and corporate access to its knowledge base portal within the company intranet. The company web presence is of vital importance to allow customers to access information concerning the company’s products and services. The knowledge portal is vital for company employees to have access to propriety information while protecting their confidentiality, integrity, and availability of the data. We will separate and hardened both the web server and the knowledge portal via…

    • 2606 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    within the facility, and training goals on the recognition and prevention of social engineering attacks. Authorization policies will also include access controls for data by specifying which data should be encrypted, they would…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Implementing remote access will allow employees to telecommute which can bring down overhead costs and allow users the flexibility of accessing data outside of the office. In order to protect the data as well as users, audits and access control lists are to be implemented. Access Control allows the identity of the user to determine whether or not they are able to access certain file systems. In order for access control to work properly every user attempting to access the data will need to be entered into the system. Placing passwords on individual files will also provide an added layer of protection.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Access Control Simulation

    • 698 Words
    • 3 Pages

    Upon entry the door was locked and a key card was required for this single point of entry. There were security cameras outside of the building. There was a dumpster outside that was not secured, which could allow anyone access to sensitive information. Locking the dumpster or placing it in a secured location would mitigate this risk. The receptionist did not ask me to verify my identity. The receptionist should be required to verify the identity of everyone entering building to prevent a person from entering the building that isn’t authorized. There was a security room with security personnel viewing the monitors. Office 1-1 had a post it note taped to computer monitor with names that could be passwords. Increased password security should be implemented to reduce the risk of someone hacking into a system. Both office 1-1 and 1-2 had fingerprint scanners, which increases access control. In office 1-2 there was an unattended paper shredder, which should be secured due to sensitive information. In the hallway there was a security camera and a utility box but the wire cabinet was not locked. As such, anyone can access the hardware inside. A lock should be installed to prevent unauthorized access to the hardware. Also in the hallway there was an Ethernet jack which allowed access to the internet. Controls should be put in place to require security access to logon to the network.…

    • 698 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Date: The purpose of this proposal is to outline my plans for a recommendation report. I will be comparing two different security measure tools, besides smartcards and security cameras to protect Penn State Harrisburg classrooms, severed rooms, main entrances and student dorm for Penn State Harrisburg. I will briefly describe the situation, including what they are using now. Next I will list the two security tools that would help as well as relevant qualities of each one, elaborating and describing as necessary.…

    • 1156 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    These systems would include cameras and shatterproof glass. They would identify visitors and force them to be entered by a staff member. This would improve the amount of security there is on schools and potentially make them safer and prevent any intruders from entering.…

    • 1543 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Access Control

    • 648 Words
    • 3 Pages

    The need for stronger authentication methods on line has never been in more demand than at present. There are many services that provide security and authentication while on line or to verify who is the end user. With the rise of identity theft among other cyber crimes, the need for stronger authentication is greatly needed. This written assignment will define, describe and explain OATH (Open Authorization) as a preferred choice for authentication method and the benefits of OATH.…

    • 648 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    As Educare Services has almost 500 employees, it is hard to identify between the employees and outsiders. A new security system, comprises of key pass must be introduce and all employees need to have the key pass with them at all times for easy identification.…

    • 1861 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Jad Session

    • 369 Words
    • 2 Pages

    Control: The system must operate with existing employee ID's and apply the principle of least privilege security.…

    • 369 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Access Control - 1

    • 450 Words
    • 2 Pages

    A virus is a computer program written for entering your computer without your permission. Some viruses just reproduce itself and spread through your system. However, some may cause damage or effect program or system performance. When this happens, it is referred to as your computer being infected. In today’s world of communication, with the internet, computers, cell phones, and having such easy access, viruses are a real threat to your computer system. Mark Ciampa, author of Security +, Guide to Network Security Fundamentals, wrote, “A biological virus is an agent hat reproduces itself”. (Page 43) He goes on to write, “A computer virus is a malicious computer code that, like its biological counterpart, reproduces itself on the same computer”. (Page 44) There are many different kinds of known computer viruses, and there are new ones being created every day. That is why computer and network security is so important. Some use these programs for scams or internet crime. This ranges from just breaking into computer system for fun, to stealing money, identity theft, company secrets, to child pornography. There is even a virus that is an email Trojan horse that could blow up your computer. Therefore, we need to be careful what emails we open and what we download to our computers. We need to be careful how we choose our also. There are people ready to get into your computer for any information they can retrieve. These bad people are called hackers, which Mark Ciampa describes in his Security + book on page20 of the first chapter. For example, South Carolina had a security breach that put 3.6 million taxpayers at risk for identity theft. The email entitled “CCIT advice on state security information breach” informed Clemson students on October 27th that personal…

    • 450 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Micr

    • 587 Words
    • 3 Pages

    In real world , security is a major concern in our day-today life. Everyone wants to be as much secure as possible. An access control for doors forms a vital link in a security chain. The microcontroller based digital lock for doors is an access control system that allows only authorized persons to access a restricted area. The system is fully controlled by the 8 bit microcontroller AT89C2051 which has a 2Kbytes of ROM for the program memory. The password is stored in the EPROM so that we can change it at any time. The system has a Keypad by which the password can be entered through it. When the entered password equals with the password stored in the memory then the relay gets on and so that the door is opened. If we entered a wrong password for more than three times then the Alarm is switched on.…

    • 587 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Securities in the gate will check whether the student got permission from HOD or not from his system that provided to their checking purpose. Here also the checking reader used to read the roll no from the ID card. Securities system is connected to the server machine using LAN technology. If permission has been provided means security will allow that student to cross the gate or otherwise student would lock in the gate and information would be passed to corresponding HOD.…

    • 8295 Words
    • 34 Pages
    Powerful Essays
  • Powerful Essays

    The student and teacher who are not on the school are not allowed to access the system because there is a camera that will monitor each person who will be using the system. Also, a student must be register first by the registrar to be able to access the system. In addition, the system must be used in range from Windows 7 to Windows 10 Operating System only and it cannot recognize scratched and damaged QR codes. The system is only for logging in of the students and is unsure if the student really went straight to the class after using the system. Also, the study will not cover the creating of identification cards of the students and notifications will not be sent to the parent or guardian in case of a problem with the service…

    • 1332 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    ID System

    • 1717 Words
    • 7 Pages

    We choose this kind of system because we observed that the students, instructors and staffs are encountering problems in their transactions on the existing system of ACC. We also want to improve the accessibility of information and security of everyone especially students.…

    • 1717 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Student Monitoring

    • 815 Words
    • 4 Pages

    The computerized Students monitoring system that we developed is specifically for ID and Student’s verification only. The main objective of our system is to check wether the student have an authorized ID or a falsificated one and to verify whether the student is officially enrolled in the school.…

    • 815 Words
    • 4 Pages
    Good Essays

Related Topics