Computer Sciences and Information Technology
Institution of Affiliation:
Student’s Name:
Course:
Date:

Computer sciences and Information Technology
Perimeter intrusion systems
These are intruder detection systems that are installed in an external environment that is within a confined private space. They are used to detect the presence of trespassers comprise of both hard ware and software systems aimed at the prevention of malicious activities from an attacker.
Types of perimeter intrusion systems
Rapidly deployable
This system is designed for the temporary deployment for the protection of mobile assets. Its application may be used in the military based environment.
Ground-Based (Below- ground)
The system does not require any physical barrier but is deployed below the ground. Its application can be made possible through the use of either an electromagnetic field or pressure sensitive cables.
Barrier mounted
This is the installation of motion detection sensors on either existing or new metal perimeter security fence. The motion detectors offer detection of an intruder before they enter the property.
This is the most common perimeter installation systems since the system can be incorporated to existing structures and more available to institutions such as banks, schools and domestic homes.
Hot site facility recovery
This is a data recovery service that is beneficial to a business since it enables the continued use of network as well as computer operations in the event of equipment or computer disaster/ failures. Back up services can also be offered as well as second data center.
Warm site facility recovery
This is used by organizations to recover its technological infrastructure in the occurrence of failure of the primary data center. This is used in organizations with relatively short recovery time.
Cold site facility recovery
This is similar to disaster recovery service with the customer providing all installation equipment needed to continue operations. This is less expensive but takes longer time to run the enterprise.
Characteristics that make evidence legally admissible in court
Admissible evidence is described as any document, testimony or tangible evidence used in a court of law so as to help prove a point or an element in a case.

Real Authentic evidence
This is any tangible evidence such as weapons, this is then authenticated by proving the genuine nature of evidence through the use of other physical forms of evidence so as to rule out any forms of forgery
Demonstrative evidence
This is described as the creation of model or a representation of the events that took place within a designated location as well as time
Documentary evidence
The evidence is or has been recorded through both manually such as through letters and blogs or through technological assistance such as through voice recorded statements, video surveillance or electronic mails.
Witness testimonials
These are all the relevant experiences shared through testimonies share by valid bystanders or the victim in a courtroom for the description of what was observed during the specific incident.
Hearsay evidence
This is described as an out of court statement made in a court so as to prove a point to the truth of the matter asserted. It is considered inadmissible unless an exception to the hearsay rule applies.

References
Barnard, R. L. (1988). Intrusion detection systems. Boston: Butterworth-Heinemann
U.S. Nuclear Regulatory Commission. (n.d.). Perimeter Intrusion Alarm Systems, Draft Regulatory Guide DG-5007 (Proposed Revision 3 to Regulatory Guide 5.44), U.S. Nuclear Regulatory Commission, April 1996.
Simons, M. B. (2004). Simons California evidence manual. San Francisco, CA: West Group.
National Research Council (U.S.). (1992). DNA technology in forensic science. Washington, D.C: National Academy Press.

Published by
Write
View all posts