Recto to provide a test digital certificate used for proof of concept and project testing. 14 Figure 3 Access control management system deployment diagram 15 Figure 4 Summary of respondents by expected role. Access control management is an essential component of data center security, ensuring that only authorized individuals can access data center facilities during permitted visiting hours.
With the current process, there are challenges such as maintaining an organized and easily searchable record of the date and time individuals entered the data center. One of the first steps to enforce access control is managing who can enter the data center and when. The information system should also enable DCMD to track and review the audit trail of data center visits.
For other visitors, DCMD intends to rent unnamed access cards upon entry and return the access card by the end of the visit. Additionally, the software for the Access Control System is currently still off-limits to the guards who are at the front desk of the data center and who monitor access to the main door. As mentioned in the previous section, DCMD aims to rent unnamed access cards upon entry and return the access card by the end of the visit.
It would be possible to implement the desired process, i.e., rental of access cards per visit, as stated in user requests, using the existing Access Control System software. Then, when the visit ends or after returning the access card, the system user can click the "take back" button. Information system security is controlled through authentication mechanisms with role-based access control (RBAC), firewall policies / security groups, and Transport Layer Security (TLS) protocols using socket layer certificates secure (SSL).
For the network security controls, the information system will take advantage of the security group feature of the cloud environment to be used in testing and deployment. It focuses on the key features and functions of the access control management system as specified in the user requirements. Parts of the effort for future works will be to recommend improvements to the system so that the users will have a greater chance of using the system over using paper routes.
Based on the project assessment and the above discussions, it is concluded that the access control management system is ready for use by the data center management department, with the belief that the functionalities meet the client's requirements, there is a low risk of cyber security attacks and that the users will have a positive experience when using the system. The functionality of the system can also be further extended, such as adding alternative authentication mechanisms and providing greater flexibility. Part of the future work will be to improve the dashboards, especially for the admin and DC manager.
Graphs and overview of the activities should help to monitor the active visits and activities within the data center.
Deliverables and Milestones
Budget
The author has knowledge and experience in developing web information systems using PHP, HTML and CSS, including the use of available frameworks such as Bootstrap and database management platform, specifically MySQL. The author has also gained skills and experience in implementing web information systems using cloud services, hardening the security of web servers, and leveraging APIs. As part of the courses under the MIS program, the author has already developed and implemented at least two information systems that are notable in the scale of development involved, the Sell Used Books website, an online buy & sell website for books, and PHPdesk, a help desk portal.
With this project, the author hopes to sharpen her skills in project management, communication skills (through coordination with customers and employees), system design, system testing and documentation. The author also expects to gain additional knowledge and experience in the development of web information systems with more complex components. The author worked for six years as a computer programmer/system administrator for the government in the field of Information and Technology.
Customer participation will be sought during the development and testing phases through user input, e.g. data required from existing software, clarifications on user requirements, etc., and user feedback. Contributions are also expected from the online community and fellow students, especially for relatively complex parts of the information system such as the implementation of the calendar function.
Resources
This will be used to store the backup of software source codes and patches, documentation, configuration files and database backups. The prototype (including source code and configuration files) and documentation resulting from project completion are stored on an encrypted USB device. This documentation is intended to analyze the readiness or suitability of the system, the Access Control Management System, for use by Data Center Management Department personnel and customers in managing access requests and access card leases.
To gather feedback on the usability of the system, the Access Control Management System, an on-site screening and usability survey was conducted for the Data Center Management Division staff. Some of the expected users were also asked to complete the questionnaire based on their user experience. The questionnaire is based on the “quick and dirty” system usability reliability measurement tool developed by John Brooke.
It is a ten-item Likert scale that provides a subjective assessment of the website's usability. I think I need the support of a technical person to use this system.