Posted: September 9th, 2022
Perimeter Intrusion Detection Systems
Perimeter Intrusion Detection Systems
. Providingphysicalsecuritytoafacilityinvolvesnumerousmethods designed to discourage a determined attacker. Perimeter fencing, gates, bollards, lighting, CCTV, as well as roaming security patrols and dogs are all designed to prevent easy access to the facility. In the event that these physical security controls are breached, perimeter monitoring and detecting devices can provide notification of further attempts to gain access to the facility. Describe three perimeter intrusion detection systems and give an example of one that you have seen deployed either at work or another location that you are familiar with.
2. Manyorganizationsvaluetheirinformationsohighlythattheyinvestina redundant site in the event that a catastrophic event interrupted service operations in their primary site. Different options are available for facility recovery at varying costs and states of readiness. Describe the differences between the hot, warm, and cold site methods of facility recovery. What is a rolling hot site? What is a reciprocal agreement?
3. There are many different categories of evidence and each type varies in its value in supporting an investigation. What are the four characteristics that help ensure that evidence is legally admissible in court? Describe hearsay evidence and its admissibility.
Perimeter Intrusion Detection Systems
The systems that are used to detect any intruder in an external environment that attempts to breach a perimeter are known as the perimeter intrusion detection systems. There are four types of perimeter intrusion detection systems, which include Ground-Based PIDS, Free-Standing PIDS, Barrier-Mounted PIDS, and Rapidly Deployable PIDS. According to IT, perimeter security defines the endpoints that are vulnerable to hackers in penetrating the network of an organization.
PIDS
The Ground-Based PIDS usually are deployed under the ground. An example is a pressure-sensitive cable. Free-Standing PIDS often are used above the ground. They don’t require to be installed with the aid of the physical barrier, for example, a bistatic microwave link. Barrier-Mounted PIDS are usually deployed on a physical barrier such as a fence. An example is a microphonic cable. Rapidly Deployable PIDS is powered by a battery that assists in transmitting the alarm without a wire.
One of the most used PIDS is the Barrier-mounted systems, such as the fence–mounted or wall-mounted system (Cantave, 2016). It is a kind of barrier that attaches the DAS cable or technology with a similar sensing motion. Such a system makes it very difficult for intruders to get into the business premises. The people in charge of the security are also alerted to the issue where they take action as soon as possible.
Hot, cold and warm sites
A hot site is a mirror of the infrastructures of a datacenter. It contains servers, power, cooling, and office space and offers an environment for production running concurrently with the primary datacenter. The syncing gives room for an impact that is minimal and downtime for the operations of a business. The hot site takes the location of the location impacted by an outage event to the primary data center (Gross Jr, 2017). The redundancy level is expensive. The cold site doesn’t have server-related equipment that is installed in the office. It gives a cooling, power, and a space for the office where in case of an outage to the primary datacenter, it waits. The cold site needs support from the IT personnel in the migration and functioning of necessary servers.
These cold sites happen to be the cheapest option for cost-recovery. A warm site comes at the center of the hot and cold sites. It provides office or data center space, and it has a server hardware that is pre-installed. A warm site has servers that are ready for production environments installation, and it requires a level of redundancy. A warm site can be used by an organization in recovering infrastructure in case its primary data center goes down. A hot rolling site is a physical facility with mobility. It could be the back of a truck and is capable of the roles of a host site. It is versatile but expensive. A reciprocal agreement is a type of agreement between two or more companies in using each other’s resources during a disaster.
Evidence
There are four characteristics of evidence which make sure it admissible in court legally. They are hearsay, authenticate, privileged, and relevant. Hearsay is a statement used out of court to prove if there is some truth in an asserted matter other than the statement declared while testifying in a court (Halpern, 2018). This kind of evidence is not necessarily a spoken word. It could include gestures or documents, and it’s inadmissible in a court. There was a rule designed against hearsay whose primary purpose is to prevent gossip from the opponent party to convict the other party.
In conclusion, the hearsay evidence can only be accepted in a trial if an exception applies. The rule that is against hearsay is deceptive and straightforward but full of expectations. The warm site is a redundant facility, and it takes almost a week or a few weeks to activate. There is a direct impact given by the recent technology trends and evolutions on the PIDS systems evaluation and performance. An example is a development seen in artificial intelligence, signal processing, data analytics, and machine learning.
References
Cantave, G. (2016). U.S. Patent No. 9,330,548. Washington, DC: U.S. Patent and Trademark Office.
Gross Jr, W. F. (2017). Disaster Recovery Plans for Small and Medium Businesses (SMBs). In Computer and Information Security Handbook (pp. 549-553). Morgan Kaufmann.
Halpern, M. (2018). Trends in Admissibility of Hearsay Evidence in War Crime Trials: Is Fairness Preserved. Duke J. Comp. & Int’l L., 29, 103.
Order | Check Discount
Sample Homework Assignments & Research Topics
Tags:
Perimeter Intrusion Detection Systems