Changes between Initial Version and Version 1 of BluePrint/SecurityManagment/ProjMgt


Ignore:
Timestamp:
11/25/13 20:39:44 (8 years ago)
Author:
Robbie
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • BluePrint/SecurityManagment/ProjMgt

    v1 v1  
     1[[TOC]]
     2
     3== Introduction ==
     4
     5== Project Description ==
     6
     7Our company is designing a software to completely redesign the way you think about security. We want to have eyes on everything that goes on at a certain location or company. The software will be advanced and it will be the most high tech security software available. The software will redefine security and the way it’s viewed. We want to deliver a main security software, protected website for off site use, mobile application exclusively for administrators and CEO’s.. It should sound crazy because it is. We absolutely do not want another National Security leak of information. The software will monitor hallway activity, opening and closing of doors, live feed of cameras, a virtual feed of the activity, scanning of ID’s, employees on duty and their location at all times, location of certain special personal and monitoring of the network usage. The software will also have the capabilities to monitor offsite locations so we can plan the best action, depending on the situation. The software will serve as a top of the line system to protect the companies employee’s, companies data, and the overall image of the company. The website will be simply a place for the Administrators and CEO to securely log on to in case of a disaster. It will be simple, secure, and most importantly useful. The mobile application will serve as the same purpose. We hope that each will serve as a backup if we are to have a catastrophic disaster. We hope that this serious approach to security will minimize incidents like information leaks, non trusted individuals on grounds, and future planning. We want to provide our own equipment for each site that we will secure. Our employee’s will operate the equipment, manage the software from our office, and work with security already in place to guarantee success. The software is designed to keep everything out and to keep everyone safe from disasters. The main goal of this project and software is to keep a company safe from disasters.
     8
     9== Requirements ==
     10
     11
     12
     13== User Cases ==
     14
     15The user will be able to use our software in different ways. It would work well if there was a mobile application, website, and software.
     16
     17The Software user-case.
     18
     19The software will be setup in the a centralize and secure location. The systems will only be available for privileged individuals. It would also be helpful if the main user (CEO / Owner)  had the software running on his personal computer. The user should be able to securely log in. The login process should contain username, password, and special code. After correctly gaining access the user will be able to have multiple windows open containing live video feed of hallways, streets surrounding the facility, certain employees on duty, and rooms. The software will also have the capabilities to show live feed of whatever the user wants. There will also be a twitter like section for employee’s to use to post statuses about workflow and things going on in the company. The software should also have a technology incorporated to where we can log doors opening and closing, badges being scanned at certain entrances, and network traffic.
     20
     21The Website user-case.
     22
     23Should be a simple and secure place for the privileged users to sign in and access limited features of the software. For instance, if a hurricane takes place employees have to evacuate. The certain individuals can log in to view what’s going with the facility if the system is offline.
     24
     25The mobile application user-case.
     26
     27Will be very basic and provide minimum access of certain data from the software. This should be for privileged users. The idea for this is if the CEO is away for the week and is limited to only his cellular device he can access data and view certain things with his office.
     28
     29== Design ==
     30[[Image(http://i809.photobucket.com/albums/zz16/Quanta_Gibson/Mockups/http___makeagifcom__media_11-24-2013_xsyaSl_zpsb3ec6fee.gif)]]
     31
     32
     33== Time Table ==
     34[[Image(http://i809.photobucket.com/albums/zz16/Quanta_Gibson/VehicleManagement_zpsb1800fcd.jpg)]]