StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

How the Global System for Mobile Communication Security Systems Will Work - Assignment Example

Cite this document
Summary
The paper "How the Global System for Mobile Communication Security Systems Will Work" is a good example of a finance and accounting assignment. An intrusion detection system is supposed to detect the intrusion by any unauthorized person to a given facility. Detection systems offer information in terms of how to deal with the attacks and other challenges posed to the security system…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.9% of users find it useful

Extract of sample "How the Global System for Mobile Communication Security Systems Will Work"

Running Head: Intrusion Detection Security Proposal. Intrusion Detection Name Institution Date Contents Introduction: 3 Objective: 3 Activities: 3 Buildings 7 Security building 7 Access gates 8 Roadways 8 Closed-circuit televisions: 10 How the Closed-circuit television cameras will be working; 11 Advantages of using the Closed-circuit television: 11 Global System for Mobile communication security systems: 12 How the Global System for Mobile communication security systems will work: 12 Conclusion: 13 Introduction: An intrusion detection system is supposed to detect the intrusion by any unauthorized person to a given facility. Detection systems offer information terms of how to deal with the attacks and other challenges posed to the security system. In our case, the facility at hand is a compound composed of three buildings which contain computer facilities. Due to the fragile nature of data that is contained in this company’s database, it is of much essence to design a security system that will prevent any ill intended individuals from accessing the system either to vandalize the information systems or maybe access it for other mischievous uses (K Scarfone, 2007). Objective: The setting up of a security system that would be effective and to enable a faster communication for an immediate and timely well coordinated security response to be mounted. Activities: For such a kind of action to take place the most important thing is to limit intruders from accessing the place. The use of a perimeter fence and enough manpower and the integration of other devices like cameras come in handy. In this case, we will device a fence that is manned by guards at the gates. The other parts of the fence will be electrified such that any person planning to jump over will immediately be electrocuted. Above this the fence will be fitted with an alarm system which goes off immediately any intended tampering is detected. Apart from this perimeter fence, we will include a perimeter wall which is used to inhibit seeing of what goes on within the compound. It is obvious that any person gets attracted to something upon seeing it. The moment this is avoided by erecting a wall, we will have eliminated quite a number of would have been intruders (Buecker et al 2008). Apart from these two fences each building will be fitted with cameras on the outer sides which will serve to detect all movements within the building and also without. The cameras should be having a large memory so as to store the recorded information for a large amount of time. Some other critical thing to consider with the cameras is the monitoring of the movements. This will be effective when a separate room is set aside for a person to be constantly receiving real time images of the compound. For effectiveness, it is necessary to have night and day shift personnel. The real time images will be displayed by use of digital liquid crystal display screens which will be receiving the information from the cameras. Hereby is a simple sketch of the compound (K Scarfone, 2007) Main road 300m Fence 1 Fence 2 A) Post for the 1st gate guard B) Post for the 2nd gate guard C) Generator for backup power Buildings 1, 2 and 3 are the three buildings with computers inside the compound. Fence 1 is the outer fence which is electric and fence two is a wall which has barbed wire reinforcement at the top. The fence will be made of an inner and an outer fence. The outer one will be an electric fence whereas the inner one will be wall fence which has been reinforced with barbed wires. This outer fence will act as a mental barrier for an intruder. It is definite for an intruder, once he sees the fence, it will be registered in his mind that the computer facility is protected. It will also act as a delay obstacle because the intruder must come up with an idea on how he can penetrate to the inner part. In so doing, through monitoring by use of security guards and sensory devices, he can be detected (William Deutsch, 2011). The wall will first limit the intruders from knowing the activities being carried out in the computer facility since he or she is barred from seeing inside. On top of it, some mounting will be done using wire which is connected to electricity power. This will provide current continuously such that, if an intruder touches it, he will be short circuited. To enhance this, the wall be concreted, thus some electric current will follow through his body thus causing a shock. The intruder may faint or die. To protect an intruder from dying, the current should be regulated to some low level (William Deutsch, 2011). Buildings The buildings will comprise three main building and one security room at the main gate. For maximum security provision, the roof will be made of bricks reinforced with concrete. The windows will be made of glasses which are opaque such that an intruder cannot see the equipment within are in the building. In case of attacks, to reduce injuries it should be coated with plastic thin cover. This is because it makes it hard to cut one’s body if it breaks. Doors made of wood, glass and metals are susceptible to blasts. To reduce the risk an outer door can be added. The other option is to replace the door with an explosion resistant door to provide high level security (William Deutsch, 2011). For public relations, it will be of great importance to protect the image of the computer facility. A car pack will be constructed. It will be located far away from the main buildings and near the gates to protect the main buildings in case of attacks. Being away from main building, this creates a delay in case an intruder has a boom. The time taken to reach the main building will be longer than expected and an explosion can occur in the car pack thus reducing the impact it could cause (William Deutsch, 2011). Security building There will be a need for security house at the main gate. It will have electronic security devices which will include CCTV, sensor devices, and weapons to be used for self defense in case an intruder tries to attack. In order to know the people who are visiting, there will be a need to buy a registration book. This will help to reduce chances intruders to get into the computer facility without self identification (William Deutsch, 2011). On top of this an observation tower ought to be included in one of the buildings. This tower room will be used for maximum observations. A computer will be hosted at the tower chamber for intruder detection. Access gates The computer facility needs two gates: main and emergency gate. The main gate will be used for entrance and exit purposes. At the main gate will be a security house which has a door and window as earlier described (Farley J, 2010). Roadways The facility will be located 300m from the local highway. A speed signboard will be located near the main gate to show speed limit of 5km/h within the main gate. Three bumps to reduce vehicle’s speed as it approaches the main gate. A stop sign board will be put 10m from the main gate, this will signal a vehicle to stand for vehicle inspection. In the computer facility, pavements will be constructed from one building to the other and even to the main gate (William Deutsch, 2011). Security is a paramount thing to consider in any kind of development. This is because the society has greatly changed and any organization developing any new facility should be well prepared to counter any attacks. Generally, there are basic things to consider when choosing a security system for a facility. These may include available resources, assets within the facility needing protection, the possible threats, and possible measures to be taken against these threats together with possible risks. The possible threats are put into consideration. In addition, the appropriate security system should be able to detect any attempt to intrude and alert the security team. In addition, it should be able to delay the intruders’ entry to the point of giving the security team time to prepare to counter the attack. Moreover, it should provide a way for the security team to assess the security situation and finally allow them to respond without exposing them to the intruders (William Deutsch, 2011). After doing a thorough analysis of the possible threats; both real and perceived, the security measures below were chosen as the most reliable security measures for the new computer premises. In analyzing the [possible threats, the location of the facility was considered. It being 300m from the highway and being located in semi- rural district, it means that it is less populated and therefore, if proper security measures are not put in place, then, the facility can be easily attacked and destroyed. Possible Threats include espionage, sabotage, damage, theft and hackers. Use of passwords to log into authorized A/Cs- done by system administrators in conjunction with top management. Screening of materials entered and transmitted-who can access what depending on responsibilities. Physical protective measures: barriers, lighting and electronic security systems, back-ups to protect information. Lighting arrestor, consider natural threats like floods, fires, fog (William Deutsch, 2011). Buildings: walls, opaque window glasses, roofs-flat roof-bricks, reinforced concrete roofs and walls, install detection elements: IDSs, CCTV systems used to access intrusion alarms, weapons and explosive detectors plus guards to be equipped with bomb detectors, weapons to counter attacks, registration books for signing in and out. Car park same distance away from the facility and a standoff zone-place for inspection. Bumps-speed control and speed indication (William Deutsch, 2011). Fencing to will act like a psychological deterrent. Main gate and emergency gates are locked when not in use. Security towers to provide maximum observation. Closed-circuit televisions: They are monitoring devices which employ the use of video cameras in the transmission of signals to a specific place with the use of a limited set of monitors. There are many types of Closed-circuit television cameras and they are categorized basing on the types of images they capture, the amount of frames they can take per minute, the type of connection used to monitor or video recording device, whether they are able to move or remain in the same position and the special functions they can provide. The Closed-circuit television cameras used in this case will be that of the following features, the camera that can take coloured images, it will be that which can be wireless connection while relaying signals back to the monitor, it will also have the capabilities of being able to have night vision and the full frames taken will be 30 per second and with a large storage capacity. The zooming capabilities of the cameras will also be high to all to enable easy and closer viewing (Lazaro J Hester, 2011). The Closed-circuit television cameras will have modifications and will contain additional features such as having computer controlled analytics and identification and this assists in identification of persons because they have facial recognition systems and this will prevent unidentified intruders from getting into the compound without being noticed. The Closed-circuit television cameras will also be networked and use the local area networks to transmit video data across networks in digital forms (Jesse Lanclos, 2009). How the Closed-circuit television cameras will be working; The Closed-circuit television system will consist of a camera, a lens, a monitor, and a wireless system which will transmit signals from the cameras to the monitor. The signals are monitored and captured by the camera using the lens. The lens determines how far and also how wide of an angle the camera is able to see. In the wired system, the signals are send by the cable to the monitor or the recording device. But in a wireless set up, the signals are simply broadcasted by the camera strait to the monitor itself. The monitor to be used will either be a simple television set or even a personal computer or a laptop (Jesse Lanclos, 2009). Advantages of using the Closed-circuit television: The clarity of the images due to the high resolution of images captured. This makes it easy to identify faces and also other physical characteristics. In the long run it makes it easy for the security personnel to easily monitor many activities within a range of cameras and this enables them to easily detect suspicious or any unauthorized behavior while getting the clear images of those perpetuating the crimes. The wireless cameras are also able to record and this enables the storing of records of many hours of surveillance. This enables the storage of volumes of records being made possible. These recorded images could also be used by the law enforcing authorities to prosecute criminals. Simultaneous play back is possible and also archiving of compatibilities especially in the remote controlled Closed-circuit television monitoring devices. The use of Closed-circuit television is also impervious to corruption. One guard can monitor several monitors hence could save on the labor to be employed in the provision of security (Jesse Lanclos, 2009). Global System for Mobile communication security systems: This involves the use of the phone in the provision of a monitored security system to the compound. This will require the use of the Global System for Mobile communication cellular alarm communicator. This will link the compound, the employees who will be in charge of security having the phones and the central station providing the security service which will be situated away from the compound.gsm communication will prevent intrusion in the sense that the system will be able to send alerts all over the world in the form of texts or email alerts. The cellular communication is able to disarm or arm and can be controlled from anywhere in the world. Each of the security guards who have the phones will have their own passwords to avoid in personification from among the security guards and they will also be held accountable for the actions they take (Mobile technologies security, 2008). How the Global System for Mobile communication security systems will work: The Global System for Mobile communication security systems will comprise of the company providing the service and it is from here that communication to guards is made. The guards will be having the phones. On intrusion signal will be relayed to the to the central station and it is from here that the communication is send to the security guards who will then act by the text messages or emails send to them. The Advantage will be Faster sending of the signals is enabled and this will offer ample time to coordinate an immediate response to the intrusion. Disadvantages will include the misplacement of the phones by the security guards will render a threat to security since it will be unable for them to receive the messages that will alert the guards on intrusion. Other disadvantages would include data leakage via mobile devices by disgruntled or even unauthorized persons, the Spreading of viruses could also pose a threat to the system (Mobile technologies security, 2008). Conclusion: Intrusion detection systems are supposed to collect information from a wide range of sources and networks sources which is followed by the analysis of the information to be able to prepare and to deal with attacks. Good intrusion detection systems will be able to send information as fast as possible for an immediate response to be mounted against an attack or aggression. References Jesse Lanclos, 2009, Advantages & Disadvantages of CCTV Cameras ,accesed 7th april,2011 from http://www.ehow.com/about_5387590_advantages-disadvantages-cctv- cameras.html#ixzz1IhAQhp00 Lazaro J Hester, 2011.CCTV System - The Advantages and the Disadvantages, accessed on 7th April, 2011 from http://www.EzineArticles.com/ K Scarfone, 2007.Guide to Intrusion Detection and Prevention Systems (IDPS) An intrusion detection system (IDS) is software that automates the intrusion detection process. An intrusion prevention system accessed on 7th April, 2011 http://csrc.nist.gov/publications/nistpubs/800-94/SP800-94.pdf William Deutsch, 2011. How to Secure Your Building and Property accessed on 7th April 2011 from http://bizsecurity.about.com/od/physicalsecurity/a/What_is_physical_security.htm Mobile technologies security, 2008.The Government of the Hong Kong Special Administrative Region, accessed April 7th, 2011 from http://www.infosec.gov.hk/english/technical/files/mobilets.pdf Buecker et al 2008, understanding it perimeter security accessed on10th April 2011 from http://www.redbooks.ibm.com/redpapers/pdfs/redp4397.pdf Farley J, 2010 facility security & escort procedures, accessed on 10th April from http://www.panynj.gov/port/pdf/twic-escort-terminal-operators.pdf Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(How the Global System for Mobile Communication Security Systems Will Work Assignment Example | Topics and Well Written Essays - 2500 words, n.d.)
How the Global System for Mobile Communication Security Systems Will Work Assignment Example | Topics and Well Written Essays - 2500 words. https://studentshare.org/finance-accounting/2034822-report-an-intrusion-detection-security-proposal
(How the Global System for Mobile Communication Security Systems Will Work Assignment Example | Topics and Well Written Essays - 2500 Words)
How the Global System for Mobile Communication Security Systems Will Work Assignment Example | Topics and Well Written Essays - 2500 Words. https://studentshare.org/finance-accounting/2034822-report-an-intrusion-detection-security-proposal.
“How the Global System for Mobile Communication Security Systems Will Work Assignment Example | Topics and Well Written Essays - 2500 Words”. https://studentshare.org/finance-accounting/2034822-report-an-intrusion-detection-security-proposal.
  • Cited: 0 times

CHECK THESE SAMPLES OF How the Global System for Mobile Communication Security Systems Will Work

E-business: Success Factors of IGo Inc

This work will elaborate on the selection of the particular business model and implementation of a business on that business model.... This research will discuss and present the detailed analysis of the business strategy, main advantages of utilizing the Internet for this business, critical success factors for the business and functional specification and execution phases, for the implementation of the new website and to finalize the information technology or information systems strategy for the organization....
11 Pages (2750 words) Case Study

AirGlow Mobile Phone

… The paper "AirGlow mobile Phone" is a perfect example of a business case study.... The AirGlow mobile phone represents a bold new concept in mobile technology by harnessing the scientific principle of ambient energy – electromagnetic energy in the form of radio waves in the atmosphere – to provide a part of the unit's electrical power requirements.... The paper "AirGlow mobile Phone" is a perfect example of a business case study....
14 Pages (3500 words) Case Study

Bluetooth Technology

Bluetooth can also be viewed as an open wireless protocol that is used for data exchange on small distances by use of short radio waves form mobile and other fixed devices hence creating a personal area network.... Bluetooth technology is generally a cable-replacement technology that allows various devices like MP3 players, PCs and peripherals, mobile phones, and headsets devices to connect.... The core system of a Bluetooth consists of a host and one or more controllers....
7 Pages (1750 words) Assignment

Political and Legal Issues - Bangladesh

It has concentrated its efforts on legal and political issues affecting the business, the ethnicity and cultures affecting the business, regionalist effects, open market operations and access to global markets.... … The paper "Political and Legal Issues - Bangladesh" is a perfect example of a business case study....
11 Pages (2750 words) Case Study

Challenges Faced by HSBC Bank

The nature of technology is very dynamic and as such the bank systems need frequent updates and installation of new software that is concurrent with the banking services in the market (Setia et al.... The previous systems of operation are best suited for the generation that is gone.... ith the integration of several technological banking systems into the establishment, some operations may be unnecessary.... he use of current technology is an advantage in competition as it increases consumer trust in the security of their possessions and privacy in the bank....
12 Pages (3000 words) Case Study

The Organizational Strategy Employed by Starbucks

The report also highlights the communication strategy used by Starbucks between the company and its customers which was before 2008 more word-of-mouth and traditional means and how the same has shifted to advancement in technological fields by use of social media advertising.... The report then provides a flashback and current scenario of Starbuck's communication strategy between the company and its customers which has made a rapid change from the traditional mouth-to-mouth publicity to the use of technology and social media for branding and marketing strategies....
11 Pages (2750 words) Case Study

Innovative Management: International Mobile Money Transfer

ith the innovation of communication systems and consider the mobile communication system, there has been a loud calling by the subscribers for the introduction of mobile money transfer systems that will comprehend the communication part of the mobile system.... The presence of trade, communication and transaction influence this project.... he motivation towards the invention of this system was the need for a system that can allow users and other parties to transfer money from continents to people in different communication Subscriber Identity Modules (SIM)....
11 Pages (2750 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us