Project scope
The scope of the project is to develop a security system that will be used by the school to control the access to the dormitory. The project will start with dormitory as a pilot project. The project will entail getting the survey of the dormitory and assessing the areas where the card reader will be installed. There will also be the need to integrate the system with the camera system which is already in place. The project will also include having a records system which will include the details of all the people who are authorized to access the dormitory (Liu, & Silverman, 2001). This will mean that there is a server which contains all the details of the students and staff members who are able to gain access to the building. The system will then be connected to the camera system so that there will be the possibility to have a biometric system. The biometric system will make use of the face of the person so that they will be able to get the required information (Kerzner, 2013). The cards will have to be integrated with the information that will be required to give access to the card-owner.
Tasks
- Undertake feasibility study of the dormitory. This is where the dormitory is assessing to check where the system will be installed and how the camera system will be connected to the access control system.
- Assess the physical access and how it has been designed. This is where the access to the dormitories is checked so that it will be clear where the doors and windows have been placed. This will help to design a new access system
- Assess the possibilities of interconnecting the two systems. There is a camera system where there is a recording which is being done every day. The camera system has compact disks that they use to record all the captured information. This information is stored in some location of the building. This should have been known in the first stage of feasibility assessment of the two systems.
- Procure the equipment to be used. This is where the equipment that will be used in the project will be procured.
2.1 There will be the listing of the equipment that will be used. This list should be exhaustive so that all the equipment is included in the process. The listing of the equipment that will be used should be done by all the security staff who will take part in the implementation of the project. This is so that it enables the system to be as exhaustive as much as possible (Weingart et al., 1990).
2.2 The procurement process is started in the school. The list is then given to the procurement staff. In the listing process, the approximate prices of the equipment are given. The procurement staff will get the quotes from the suppliers and give their prices.
2.3 The bidding and choosing of the best bidder is done. This is based on the experience in the field and the prices that they give. The procurement prices will be complete when the supplier will have been chosen.
- Implementation stage. This is where the project is implemented. At this time, there will be the plan that will be used to install the system after successful assessment and feasibility study.
3.1 Install the door locking system to the doors that will be automatically opened. The old doors will be used. The system will be installed on the door lock.
3.2 Make the connections so that it is possible to have a working system. The two systems are then connected together.
- Integrate with the camera system and test
4.1 Integrate the two systems. The camera and door lock systems are integrated together so that they share the same data and information regarding the people accessing the system.
4.2 The system is then tested. After successful integration of the two systems, the system is then tested to check if there are errors. The records of the students and custodians of the dormitory are checked by checking the process.
- Deploy the system. The system is then deployed in the dormitory. This is where the system is deployed for use.
5.1 Have the cards that will be used to access the dormitory. The cards will be loaded with the information that will be used to give access. The students and staff members who have the right of access will get the cards. The cards that will be given to the users will have information of the users. This is an important process in this development stage.
5.2 Have the system fully functional. The system will then be deployed if there are no issues. The system will then be declared a new way of getting access to the dormitory. The system will be launched and the users will be trained on how to use the system. After the training has been done, the system will then be officially used and deployed to be used in the school.
Gannt Chart
References
Kerzner, H. R. (2013). Project management: a systems approach to planning, scheduling, and controlling. Wiley.
Liu, S., & Silverman, M. (2001). A practical guide to biometric security technology. IT Professional, 3(1), 27-32.
Weingart, S. H., White, S. R., Arnold, W. C., & Double, G. P. (1990, December). An evaluation system for the physical security of computing systems. In Computer Security Applications Conference, 1990., Proceedings of the Sixth Annual (pp. 232-243). IEEE.