Saturday, August 24, 2019
Week 2 Assignment Example | Topics and Well Written Essays - 500 words
Week 2 - Assignment Example Yes, Offensive Cyber-Warfare is Already Here and Thinking Again: Cyber Warâ⬠. These articles have information about cybercrime and its related offences and outcomes. The essay as a whole provides an in depth look into the issue of cybercrime. Through a company case study, the essay affirms the need for a proper and functional intrusion system to be used to mitigate cybercrimes. Regions which require high security are those with valuable items, potentially dangerous materials, and information. The ease of intrusion depends on the security system used. It is essential that the system implemented meets the intended function. The systemââ¬â¢s function should be carefully monitored to understand its weakness and strengths. The understudy company uses the security guards at the entrance, but once someone is within the building, he or she is free to roam around. Although there are cameras and motion sensors, they are deactivated during the day and are less in numbers. During installation of these security items, distribution was not taken into consideration. The weakness therefore is the deactivation and distribution. Furthermore, the company lacks an offsite monitoring; this offers an opportunity to an intruder to access a restricted area and escape before being noticed. Craighead suggests that ââ¬Å"in the case of offsite monitoring, once notified of an int rusion alarm, the central station staff will either notify security staff at the buildingâ⬠(2009, p. 310). Insecurity over the secured places is often critical. Aside from the presence of security personnel, the most appropriate additional system is the use of technology. An intrusion system is quite an effective security solution. Intrusion systems offer security alerts to security guards and other responsible individuals. The intrusion alert systems incorporate infrastructure that provides adequate security requirements. According to Barnard, ââ¬Å"a physical security system consists
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.