Q:

There is a company called (SecureU LLC). This company works on a surveillance system project for a university based on the following details:

0

There is a company called (SecureU LLC). This company works on a surveillance system project for a university based on the following details:

 

1.     What should the system do?

 

The security system should provide real time information about the state of the grounds under surveillance to on-duty security personnel.  The system should deny/allow access to resources (buildings, rooms, etc.) to individuals based upon their credentials.

 

2.     Work Context

 

Security Guards

Input: commands to cameras/locks

Output: status of system

Cameras, door locks

Input: status

Output: event (lock/unlock, pan, zoom, …)

Police station

Output: emergency event notification

Faculty, students (input via id card)

Input: access request

3.     Risk Analysis

 

Budget/Funding

Will we be able to develop a marketable system before we run out of money?

Technology

Can we build the necessary equipment to interface with locks/cameras in time?

Can we build the system before the technology being used becomes obsolete?

Client Base

Do we have one?

Will we be able to build a large enough client base such that our system becomes profitable?

Technical Staff

Will be able to hire and retain the necessary staff to not only develop the system but to install it.

Electricity

What happens if the electricity goes out and there is no system to control security?

Interference

What happens if signals are interfered with (whether accidental via cell phone or intentional hacking) and the system is unable to react?

Performance

Will the system be able to authenticate users and provide access to resources in a reasonable amount of time?  (What is “reasonable”?)

ID Theft/Hacking

What if the system allows access to an unauthorized individual due to id theft or hacking into the system?  Are we liable for bad things happening in this case?

4.     Stakeholders

 

Us, developers

Client/Customer – University

User – Security guards, faculty, students

Investors

Contractors – Suppliers of system components

5.     Terminology

 

Resource – anything protected by the system (buildings, rooms, people).

Node – a device connected to the network that can accept output from the system and provides input to the system (a lock, camera, pda).

Network – a collection of nodes that make up the security system.

User – any person interacting with the system (security guard, student, faculty).

Infrastructure – the basic components of system that allow it to maintain connectivity (wires, wireless access points, cameras, locks).

Camera – device that delivers real-time images of the grounds under surveillance.

Lock – device that can be controlled to allow or deny access to a resource.

ID Card – a magnetic user identification card (like credit card)

6.     Project Constraints

 

The system will support a network of both indoor and outdoor surveillance cameras.

The system will control access to all campus doors.

The system will support communications among security personnel.

The system will have a command center.

The system should be viable for any size campus:  very small to very large.

7.     Domains of Interest

 

Wireless communication

Control mechanisms and interfaces

Locking mechanisms

Backup power

Emergency override of the system

Information display (user interface)

Distributors of system components

Human factors (ease of use of system)

Current security procedures/protocols

 

Tasks:

 

Write two sets of requirements (one set functional, another nonfunctional)

 

Table 1: Functional Requirements Table

 

Description

Rationale

Fit Criterion

 

 

 

 

 

 

 

 

Table 2: Non-Functional Requirements Table

 

Type (Characteristics)

 

Description

 

Rationale

 

Fit Criterion

All Answers

total answers (0)

Similar questions


need a help?


find thousands of online teachers now