Give Authentic And Relevant Answer. (Review these requirements using the checklist and discover possible problems with them. ) A centralized lock control system which controls the locks of all external doors in University buildings is to be implemented. Some requirements for this system are: Req. 1 Staff and students are issued with a card which provides them with access to those buildings which they are authorized to use after normal working hours. Req.2 Access is implemented by wiping a personalized card through a card reader and, if entry is allowed, the door lock is released. Req.3 Users must use the card to both enter and leave locked buildings. Req.4 If a card is lost, it should be reported to the security office that will issue a new card and arrange for all access rights associated with the old card to be cancelled.Review these requirements using the checklist and discover possible problems with them.

Management Of Information Security
6th Edition
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:WHITMAN, Michael.
Chapter8: Security Management Models
Section: Chapter Questions
Problem 6RQ
icon
Related questions
Question

Give Authentic And Relevant Answer.

(Review these requirements using the checklist and discover possible problems with them. )

A centralized lock control system which controls the locks of all external doors in University buildings is to be implemented. Some requirements for this system are:

  • Req. 1 Staff and students are issued with a card which provides them with access to those buildings which they are authorized to use after normal working hours.
  • Req.2 Access is implemented by wiping a personalized card through a card reader and, if entry is allowed, the door lock is released.
  • Req.3 Users must use the card to both enter and leave locked buildings.
  • Req.4 If a card is lost, it should be reported to the security office that will issue a new card and arrange for all access rights associated with the old card to be cancelled.Review these requirements using the checklist and discover possible problems with them.   

 

Expert Solution
steps

Step by step

Solved in 7 steps

Blurred answer
Knowledge Booster
Avoiding deadlock
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Management Of Information Security
Management Of Information Security
Computer Science
ISBN:
9781337405713
Author:
WHITMAN, Michael.
Publisher:
Cengage Learning,