Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Instructions: Answer all questions in a single document. Then submit to the appr

ID: 3822107 • Letter: I

Question

Instructions: Answer all questions in a single document. Then submit to the appropriate assignment folder. Each response to a single essay question should be about a half-page in length (about 150 words). PROVIDE CITATION IN APA

1. Providing physical security to a facility involves numerous methods designed to discourage a determined attacker. Perimeter fencing, gates, bollards, lighting, CCTV, as well as roaming security patrols and dogs are all designed to prevent easy access to the facility. In the event that these physical security controls are breached, perimeter monitoring and detecting devices can provide notification of further attempts to gain access to the facility. Describe three perimeter intrusion detection systems and give an example of one that you have seen deployed either at work or another location that you are familiar with.

2. Many organizations value their information so highly that they invest in a redundant site in the event that a catastrophic event interrupted service operations in their primary site. Different options are available for facility recovery at varying costs and states of readiness. Describe the differences between the hot, warm, and cold site methods of facility recovery. What is a rolling hot site? What is a reciprocal agreement?

3. There are many different categories of evidence and each type varies in its value in supporting an investigation. What are the four characteristics that help ensure that evidence is legally admissible in court? Describe hearsay evidence and its admissibility.

Explanation / Answer

I have answered the questions with the help of the numbering and the number represent to the answer of your questions respectively.

1.

The intrusion detection system is a system to keep the fraud activities away from the company or an organization. There are two types of IDS.They are as follows:

Signature Based Intrusion Detection

A signature attack is a type of attack in which the intruder will try to do a series of attacks(TCP SYN) packets sent to many of the different ports in succession and try to exploit the system too.If the intruder continues to do the same activity and demands the access it may or may not succeed in gaining access. Hence , these type of attacks are called as Signature Attacks

For eg:- The attacker may try to do a dictionary attack on one of the firewall or any system in the orgnization and it may be held by the attacker. This type of attacks comes under the Signature Attacks

Heuristics Based Intrusion Detection

As , the signature intrusions are limited to a specific or know attack patterns this system works different from it and looks for the unique type of the intrusion detections instead. Hence, it is more useful to block the intruder from getting access to the organization's systems. Hence it is most used and powerful technique.

For eg:- Except for a few utilities (new User, Password Access,etc), or any other form of accessing to the organization's network . This form of intrusion detection is known as misuse intrusion detection. In this type, the real detection is used and helped to gain the safety of the systems.

2.

HOT SITE:-

A hot site is a commercial disaster recovery service which helps the system to continue with the computer and network operations in the event of a computer or disaster.

For example,If suppose in a disaster the data center has been destroyed so to access the data all the data will be automatically shifted to the hot site and the data center will be runnable.

COLD SITE:-

A cold site is a similar type of disaster recovery service that provides office space, but the customer provides and installs all the equipment needed to continue operations. A cold site is less expensive, but it takes longer to get an enterprise in full operation after the disaster.

RECIPROCAL AGREEMENT

The reciprocal agreement , also called reciprocity is an agreement between the two organizations is called reciprocity and the reciprocal agreement is the request made and accepted on both ends.

3.

The main characteristics of the admissible evidence in court are as follows:-

Evidence inadmissibility is an extremely nuanced field of law. Although evidence rules are driven by public policy, those same rules often have exceptions and those exceptions can have exceptions. In general though, evidence is more likely to be inadmissible if the evidence is:

The hearsay statements ,are never admissible as evidence in court. These statements are exceptions in the trial.

Hope it helps.