Abstract
This paper documents the tasks involved in the implementation of Access Control System (ACS) in a college dormitory. ACS assures of a protected and convenient college life for students, faculties and staffs. ACS concentrates on controlling physical access to buildings and events at a minimal operational cost. This system helps to respond quickly to a critical situation by tracking the location of the suspicious person. ACS can assure students’ parents of providing a harmless and tenable campus for their child.
Access Control Systems in general concentrates on controlling physical access to campuses and building as well as logical access to sensitive information across network. Along with access control, they maintain a history of system activity that can be used to generate management reports.
The scope of this ACS is to automatically unlock the dormitory doors with an electronic proximity reader and integrate with the prevailing safety system. The cameras are premeditated to rotate to witness a person as they make use of their identification card to unlock the door. This project will give the College/University the ability to control, manage and monitor the access of students and staffs inside the dormitories.
Tasks
This project is conducted in five stages. Each phase will clarify its subtasks in detail.
Groundwork
Form a dedicated ACS team to perform the below listed tasks.
This team will be accountable for the entire process of setting up ACS in the college dormitories and will act as a SPOC (Single Point of Contact).
Inspect the college dormitories
This task is done through
ACS team’s visit to the dormitories
ACS team’s review of the building blue prints
This task is carried out to identify the locations to place or location of placed (if any): Access readers, security cameras and access controller
Study the existing security system
This is essential to aid easy integrity of the new system with the existing system.
This task includes
Scalability and compatibility of exiting system with new ACS
Guarantee existing devices (cameras, readers, alarms, etc) for reparation
Design
Construct outline of the new ACS.
This is done to eliminate the risks at the implementation phase. Furthermore, the probability of identifying the possible risks with the system is high at this stage.
Create a proposal
Budget of the new ACS is to be estimated and confirmed with the user.
Budget includes identification of cost of labor, software, hardware and materials.
Installation
This task involves installation of all the required devices that are required to implement ACS in the college in the identified locations. Install
Controller
Communication lines
Card readers ( Doors - Main, Back, Bedrooms, Utility Closets, Maintenance Room, Walls - Interior and exterior)
Re-position cameras to allow it to turn
Configuration
This phase involves the execution of the blue print of the ACS
Configure ACS server
ACS software will be installed in the server which in turn validates the identity of the person who is accessing the door.
Connect readers and camera to the server
Hand out proximity card
Execution
Changeover phase
Team will perform basic tests on the system before the system is rolled out for use.
Soft-Deployment
System will be tested with staff members only.
Announcement
System roll-out
System will be made available for use for everyone.
Gantt chart
Design Model
References
Tittel, E., Chapple, M., & Stewart, J. M. (2004). CISSP: Certified Information Systems Security Professional study guide. San Francisco, CA: SYBEX.
Solomon, M., & Chapple, M. (2005). Information security illuminated. Sudbury, MA: Jones and Bartlett.