Essays on How the Global System for Mobile Communication Security Systems Will Work Assignment

Download full paperFile format: .doc, available for editing

The paper "How the Global System for Mobile Communication Security Systems Will Work" is a good example of a finance and accounting assignment. An intrusion detection system is supposed to detect the intrusion by any unauthorized person to a given facility. Detection systems offer information in terms of how to deal with the attacks and other challenges posed to the security system. In our case, the facility at hand is a compound composed of three buildings that contain computer facilities. Due to the fragile nature of data that is contained in this company’ s database, it is of much essence to design a security system that will prevent any ill-intended individuals from accessing the system either to vandalize the information systems or maybe access it for other mischievous uses (K Scarfone, 2007). Objective: The setting up of a security system that would be effective and to enable faster communication for an immediate and timely well-coordinated security response to be mounted.   Activities: For such a kind of action to take place the most important thing is to limit intruders from accessing the place.

The use of a perimeter fence and enough manpower and the integration of other devices like cameras come in handy.

In this case, we will devise a fence that is manned by guards at the gates. The other parts of the fence will be electrified such that any person planning to jump over will immediately be electrocuted. Above this, the fence will be fitted with an alarm system that goes off immediately any intended tampering is detected. Apart from this perimeter fence, we will include a perimeter wall which is used to inhibit the seeing of what goes on within the compound.

It is obvious that any person gets attracted to something upon seeing it. The moment this is avoided by erecting a wall, we will have eliminated quite a number of would have been intruders (Buecker et al 2008). Apart from these two fences, each building will be fitted with cameras on the outer sides which will serve to detect all movements within the building and also without. The cameras should be having a large memory so as to store the recorded information for a large amount of time.  

References

Jesse Lanclos, 2009, Advantages & Disadvantages of CCTV Cameras ,accesed 7th april,2011 from http://www.ehow.com/about_5387590_advantages-disadvantages-cctv- cameras.html#ixzz1IhAQhp00

Lazaro J Hester, 2011.CCTV System - The Advantages and the Disadvantages, accessed on 7th April, 2011 from http://www.EzineArticles.com/

K Scarfone, 2007.Guide to Intrusion Detection and Prevention Systems (IDPS) An intrusion detection system (IDS) is software that automates the intrusion detection process. An intrusion prevention system accessed on 7th April, 2011 http://csrc.nist.gov/publications/nistpubs/800-94/SP800-94.pdf

William Deutsch, 2011. How to Secure Your Building and Property accessed on 7th April 2011 from http://bizsecurity.about.com/od/physicalsecurity/a/What_is_physical_security.htm

Mobile technologies security, 2008.The Government of the Hong Kong Special Administrative Region, accessed April 7th, 2011 from http://www.infosec.gov.hk/english/technical/files/mobilets.pdf

Buecker et al 2008, understanding it perimeter security accessed on10th April 2011 from http://www.redbooks.ibm.com/redpapers/pdfs/redp4397.pdf

Farley J, 2010 facility security & escort procedures, accessed on 10th April from

http://www.panynj.gov/port/pdf/twic-escort-terminal-operators.pdf

Download full paperFile format: .doc, available for editing
Contact Us