Building an Access Control System



Buildingan Access Control System

Buildingan Access Control System

ProjectScope Statement

Thisproject will be used to install and operationalize an access controlsystem (ACS) in a dormitory.

TheAccess Control System will be located at the dormitory doors and willautomatically unlock it when a student swipes their identificationcard at an electronic proximity reader. Swiping the card triggers thesecurity camera, which is located at the entrance that will enable itto rotate to face and record the person that uses theiridentification card to unlock the door.

Therecurrently exists a security camera system, which only records whichpersons accessed the dormitory, but it does limit access to thedormitory facility.

TheAccess Control System will control access to the dormitory byallowing only authorized identification card holders to access thedormitory. Such technology ensures there is maximum security to thedormitory. It will record information of the times when each studententered and exited the dormitory as well, using the security camerasystem. As such, not only will the system guard against externalintrusion, it will keep information on every student who entered andleft the facility. Therefore, in the event of a suspicion, it iswould be easy to identify the culprits. However, although there is asecurity camera system, there are no restrictions as who can orcannot access the dormitory. The new ACS will combine an electronicproximity reader with the existing security camera system to improvesecurity.

Thesystem enables users to access their dormitories by using theiridentification cards.


  • Planning

Thisis the first task of the project, and it will involve creating of aset of plans to help guide the team through the execution and closurephases of the project. The programs created during this phase willhelp to manage time, cost, quality, change, risk and issues. Theywill also help manage staff and external suppliers, to ensure thatdelivery of the project is on time and within budget.

Someof the sub-tasks will include:

➢ Securityneeds analysis

➢ Definingassets

• Design

Inthis phase, the information security team will build the physicalproject deliverables and present them to the college for signoff. TheProject Execution Phase is usually the longest phase in the projectlife cycle, and it typically consumes the most energy and the mostresources.

Toenable the team to monitor and control the project during this phase,they will need to implement a range of management processes. Theseprocesses help them to manage time, cost, quality, change, risks andissues. They also help the information security team to manageprocurement, customer acceptance and communications.

Ithas the following sub-task:

Submittingof the design bid proposal

  • Implementation

• Implementation

Thisphase entails the construction of a feasible project outcome. Contractors are building, and the actual reorganization takes place.It is during this phase that the project becomes visible to themanagement of the college, to whom it may appear that the project hasjust begun. The implementation phase is the doing phase, and it isimportant to maintain the momentum. At the end of the implementationphase, the result is evaluated according to the list of requirementsthat were created in the planning phase. It is also evaluatedaccording to the designs. For example, tests may be conducted todetermine whether the web application does any corrections. It may bedetermined whether the trim on the building has been made accordingto the agreement, or whether the materials that were used were indeedthose that had been specified in the definition phase. This phase iscomplete when all of the requirements have been met and when theresult corresponds to the design.

Itssub-tasks include:

Schedulingwith all milestones involved

Inspectingvarious implementation phases

• Testing

Thisphase might begin staggered as various parts of the implementationphase are completed. At some point, testing will often involve theauthority having jurisdiction particularly in the life-safety areasof your access control system. Testing is often very methodical. Itshould include checklists, and all relevant parties must sign off onthe results. Make sure to save copies for your records.

Itis also recommended that, within a few weeks prior to starting to usethe access control system, all operations, management and servicepersonnel be trained. Training, if not properly implemented, willmake for a bumpy transition to that new access control system.

Itinvolves these sub-tasks:

Trainingthe management and personnel

Makingchecklists of the tasks

• Maintaining

Thesystem will need ongoing support, so that the contract formaintenance continues. Many suitable sized security undertakingswould not be in need of the maintenance programs in progress becauseit is difficult to complete such projects. We therefore go back tothe beginning of the undertaking. Such is life in the day of aproject manager.

Ganttchart: showing the tasks included in the system

Figure 2: Showing systemdiagram illustrating the equipment and connections required for thisproject