Verified Document

Case Study Building An Access Control System Case Study

¶ … member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door. Project Scope Statement

The Information Security team at Small University has been given the project to install an access control system (ACS) from Dynamics Security in a dormitory. The ACS will automatically unlock the doors via an electronic proximity reader and integrate with an existing security camera system. The existing cameras are designed to face and rotate to record a person as they use their identification card to unlock the doors.

For this reason, the system will be designed in a way that the user will have three chances to unlock the door, if the user fails to unlock the door...

The ACS will also be designed to allow the security administrator to make changed for the ACS operations. These changes will be the camera positions, setting the alarm time, and setting the time the dormitory doors will lock. The device uses an antenna coil to power the RFID tag embedded in the student ID card which reads the induce response from the card. The response is then filtered and manipulated into useful data and interpreted by Atmel mege32 microcontroller which runs the security program (Ross and Goto). This process alerts the administrator computer via serial line and hyperterm. If the card is read, and it is not in the code database, a red LED flashes for 3 seconds. On the other hand, if the code is found in the database, a green LED flashes for 3 seconds. With hyperterm, the administrator has the power to add codes, delete codes, list codes and unlock doors (Ross and Goto). Primary reason for flashing LED routines is to allow codes to be added to the database by gathering data…

Sources used in this document:
References

* Stanley Security Solution, i. (2004, 01-14). bestaccess. Retrieved 04-27, 2013, from bestaccess.com: http://www.bestaccess.com/servicedocuments/B.A.S.I.S.%20Offline%20Setup%20Guide.pdf

* Access Control - What is it and Why we Need It, written by: Steven Bowcut, CPP • edited by: Bill Bunter • updated: 4/7/2013, http://www.brighthub.com/computing/smb-security/articles/11083.aspx

* Ross and Goto; Proximity Security System; Retrieved from: https://courses.cit.cornell.edu/ee476/finalprojects/s2006/cjr/website/index.htm#citations
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now