pscw physical security project n.
Skip this Video
Download Presentation
PSCW Physical Security Project

Loading in 2 Seconds...

play fullscreen
1 / 15

PSCW Physical Security Project - PowerPoint PPT Presentation

  • Uploaded on

PSCW Physical Security Project. Supervised by: Ms. Faten Al- kahtani . Done by: IS 370 Students, 2011. Scope Team. Diana Al- Omari Donia Mohamad. Arwa Abu Shmais Enas Yaghi. Outline. Introduction.

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

PowerPoint Slideshow about 'PSCW Physical Security Project' - shiloh

Download Now An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
pscw physical security project
PSCW Physical Security Project

Supervised by: Ms. Faten Al-kahtani.

Done by: IS 370 Students, 2011.

scope team
Scope Team
  • Diana Al-Omari
  • Donia Mohamad
  • Arwa Abu Shmais
  • EnasYaghi
  • We decided to do a project that will benefit our university "Prince Sultan University for Women“.
  • The idea rose when we were discussing the security issues of the university in one of the Project Management classes and based on that we decided to make a project that will help our university to be secured more and more.
project initiation
Project initiation
  • Project Leader: MS. Faten Al-Kahtani.
  • Teams leaders:
      • Scope Team: Diana Al-Omari.
      • Cost Team: Faten Al-Harthi
      • Quality Team: Alhanouf Al-Nasser
      • Time Team: Arwa Al-Tuwaijri
      • Communication Team: Haifa AlShami.
      • Procurement Team: AlanoudAlhenaki.
      • Integration Team: Arwa Abu-Shmais.
      • Human Resources Team: Abeer El-Sa'adi
      • Risk Team: Aya Aswad.
scope statement
Scope Statement

Our scope is about the physical security of PSCW buildings to protect the buildings from unauthorized access, the misuse of PSCW resources, and to keep the fundamental documents secure.

The main goals will be to protect the PSU's physically from the misuse of resources ,and to keep the fundamental documents secure and also ensure that only authorized people can enter specific places like faculty offices and labs.

scope details
Scope Details
  • Building 1:
      • 25 rooms
      • 12 labs
      • 4 studios
      • 46 faculty offices
      • 2 gym
      • 1 library
      • 13 stores
      • 6 bathrooms
      • 17 administrator offices
Building 2:

Building 3:

  • 9 rooms
  • 4 studios
  • 4 faculty offices
  • 1 meeting room
  • 13 stores
  • 5 bathrooms
  • 10 administrator offices
  • 1 prayer room
  • 29 rooms
  • 2 studios
  • 4 faculty offices
  • 4 stores
  • 1 bathrooms
  • 10 labs
what to protect
What to protect ?
  • We have 600 computers in the three buildings,
  • and there are 15 switches (all switches in building 1).
  • There are also 92 projectors in the three buildings, one in each lab, room, studio.
current security situation in psu
Current security situation in PSU

The already available security management in PSU consists of only key locks on doors, some of the labs have pin code & finger print security machines but they are not implemented yet.

the physical security plan that will be implemented in pscw
The Physical Security Plan that will be implemented in PSCW
  • The plan starts with securing the main entrances and the three buildings of PSCW campus.
    • Add new main keys, alarms, and entrance checking devices to ensure that PSCW members are secure from any threat.
    • For the buildings, the level of security will be changed according to the types of rooms and divisions.
    • We decided to secure buildings sequentially so that the next building will not be started before the prior building is completely secured and successfully tested. By doing that, we would be able to reduce the risk and cut off the cost of workers since some workers could be used repeatedly. We prioritized the buildings according to their importance and to the number of critical rooms that need to be secured.

We will secure the labs by adding the missing pin code & finger print security devices which are six in the first building. The labs that already have pin code & finger print security devices will only require activation of those devices.

  • We will use digital locks to secure the administrative and faculty offices.
  • We will buy new file cabinets to secure the sensitive documents since they are part of PSCW assets. We will install alarms and smoke and fire detectors in each and every room of the three buildings. The portable fire extinguishers will be distributed in corridors.

An important point to consider is that before we install and test any of these devices, we will move the network switches in building (1) labs to a protected room. Moreover, training the users on using those devices is out of our scope and will not be the responsibility of the teams. It is considered the responsibility of PSCW.

scope control
Scope Control

Any required change should go through these steps in order to be approved:

  • The required change should be written by the team that requests it.
  • Then, it should be distributed through the communication team.
  • A meeting with the scope team should be conducted, and discuss the required change, and by that the change will be clearly understood.
  • If the scope approves it, the communication team should prepare a meeting between all groups to discuss the feasibility of the change.
  • If the change is approved, the change request will turn into a change action.
  • Interview with the Head of the IT Department
  • University of Glasgow :: IT Services :: Information Security Management System Scope." University of Glasgow :: Glasgow, Scotland, UK. Web. 07 Mar. 2011. <>.
  • "University Policies." Queen's University. Web. 07 Mar. 2011. <>.
  • "In Depth Security: Using a Layered Approach to Network Security." Internet / Network Security - Tips, Advice and Tutorials About Internet Security and Network Security. 27 Feb. 2009. Web. 07 Mar. 2011. <>.
  • "Security Implementation Mechanisms - The Java EE 5 Tutorial." Automatic Redirection. Web. 07 Mar. 2011. <>.
  • "Authentication and Accounts Security." File Redirection. Web. 07 Mar. 2011. <>.
  • Moens, A. (2011). Physical and environmental security. Retrieved March 4, 2011, from TUDelft: