University of Maryland Campus Perimeter Intrusion Detection Systems Essay
Question Description
1. Providing physical security to a facility involves numerous methodsdesigned to discourage a determined attacker. Perimeter fencing, gates,bollards, lighting, CCTV, as well as roaming security patrols and dogs are alldesigned to prevent easy access to the facility. In the event that thesephysical security controls are breached, perimeter monitoring anddetecting devices can provide notification of further attempts to gainaccess to the facility. Describe three perimeter intrusion detection systemsand give an example of one that you have seen deployed either at work oranother location that you are familiar with.
2. Many organizations value their information so highly that they invest in aredundant site in the event that a catastrophic event interrupted serviceoperations in their primary site. Different options are available for facilityrecovery at varying costs and states of readiness. Describe the differencesbetween the hot, warm, and cold site methods of facility recovery. What isa rolling hot site? What is a reciprocal agreement?
3. There are many different categories of evidence and each type varies in itsvalue in supporting an investigation. What are the four characteristics thathelp ensure that evidence is legally admissible in court? Describe hearsayevidence and its admissibility.
Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."