Intrusion detection and fire safety-perimeter protection

Assignment Help Basic Computer Science
Reference no: EM132552425

Scenario: The location is a courthouse, a government building with offices, records, and rooms for criminal and civil law proceedings. This courthouse is a very large, two-story building with one main entrance and dozens of small, private entrances. All sorts of people use this building, including professionals, civilians, and a security force. For each of these three groups of people, consider what physical space they are using.

The first type of physical space includes offices for processing records requests related to criminal and civil proceedings. There are file rooms for physical records as well as computer systems for electronic filing, storage, and processing. There are both public areas for citizens making requests and private areas for the civil servants working with private records.

The second type of physical space includes courtrooms of various sizes and private rooms for meeting and negotiating. These spaces also have public and private areas.

The third type of physical space includes large public areas used for informal gathering or waiting, a cafeteria with coffee machines, and the public restrooms.

There are public hours of operation, like 8 a.m. to 5 p.m., but professionals might be in the building very early or stay very late, and there are on-sight security personnel always.

Also in this building is a built-in security force that includes bailiffs and police charged with keeping the building secure. They have already established the building design, access control, surveillance, and lighting.

Part I:

Your assignment is to focus first on alarms and intrusion detection. Using especially chapter 23 from the textbook, choose where to use intrusion detection systems and which systems to use.

· Perimeter Protection-what types of intrusion detection systems would you use on doors and windows? Will you use different types based on the type of physical space? Explain and justify your choices.

· Area Protection-what types of intrusion detection will you use and where? Explain and justify your choices.

· The above alarms might be more for after-hours or for unpopulated areas. What about alarms for populated areas, like panic alarms? Explain and justify your choices.

· How will you use the security staff to monitor and respond to intrusion or duress?

· Besides the security staff, who will be responsible for turning on or off the sensors or using the alarms?

Part II:

Now, focus on fire prevention, detection, and response. Use especially chapter 22 from the textbook.

· Discuss the fire classification most likely for this type of physical space.

· Where would you put fire alarms? What maintenance is required for fire detection alarms?

· Would you use sprinklers? If so, where and why? Where would you locate fire extinguishers? What kind would you use and why?

· Discuss the maintenance required for any systems used for fire safety, and using the fire safety inspection section as a guide, discuss special areas of concern for fire safety in this type of location.

Reference no: EM132552425

Questions Cloud

Business control plan : When law enforcement becomes involved, the need may arise to freeze systems as part of the evidence.
How does the theory of expanding consciousness apply : Nurses provide care to a diverse population of patients. How does the theory of expanding consciousness apply to our health care society today?
Calculate direct labour efficiency variance for each labor : Calculate the direct labour efficiency variance for each labour class variances for April, indicating whether each is favourable or unfavourable
What are the primary concerns for the patient right now : Mrs. Smith is a 50 year old Caucasian woman who has 4 children ages 17, 15, 13, and 10. She was 33 with the birth of her first child. Her BMI is 25.
Intrusion detection and fire safety-perimeter protection : Perimeter Protection-what types of intrusion detection systems would you use on doors and windows?
Discuss the use of incoterms in international trade : Discuss the use of Incoterms in international trade. At a minimum, address aspects such as the value Incoterms bring to an agreement
What could be the underlying cause of the given symptoms : Mr. B is a 77 year old African American man who complains of difficulty urinating. What could be the underlying cause of these symptoms?
Write review of each system with normal and abnormal finding : For this assignment, perform a complete head-to-toe assessment on someone of your choice or a hypothetical person who has at least two (2) systems issues.
Prepare direct materials purchases budget for chocolate mix : Prepare direct materials purchases budget for chocolate mix for the months of January and February. What is the beginning inventory of chocolate

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Unauthorized individual gains

Explain that when an unauthorized individual gains access to the information an organization trying to protect

  Obstacles faced by the industrial sector

1) Elaborate (5) obstacles faced by the industrial sector in the 21st century

  The relationship between NIST and FISMA

The relationship between NIST and FISMA. This should not be a two part paper explaining what NIST and FISMA are separately.

  Write a program for decoding of an english text

Experiment with your encoding program to find out how sensitive the compression ratios are to using standard estimates of frequencies instead of actual frequencies of symbol occurrences in English texts.

  Determine the long run price for the firms product

Determine the long run price for the firms product and how much the firm produces.

  What is the project npv

The WACC is 10%. The CF0 = -$1,000, CF1 = $314, CF2 = $474, and CF3 = $573. What is the project's NPV?

  Explain distributed lift control system

Distributed lift control system. Make the lift control system of chapter 5 into a distributed system. Put each component in a separate process. Extend the system to handle partial failure, i.e., when one of the components fails or has communicatio..

  Topic of big data and business impacts

Research at least two articles on the topic of big data and its business impacts. Write a brief synthesis and summary of the two articles.

  Potential business owner in the hoomaflopper industry

Decision Analysis Problem: You are a potential business owner in the hoomaflopper industry. You have hired Dustin R. Mopps as your industry insider to help you decide which businesses to focus on potentially buying.

  Discuss risk-costs of compromised data integrity breaches

Discuss risk and costs of compromised data integrity breaches. Focus on integrity not confidentiality. Look at military, education, science, medicine

  How is it that perfume can be bad for digital designers

Name and draw the logic symbols of four different 3-input CMOS gates that each use six transistors.

  Discuss the scope of cloud computing audit for business

Cloud computing/cloud security: discuss the scope of a cloud computing audit for your business.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd