CMIT 425 University of Maryland Global Campus Information Systems Security Questions
Question Description
Instructions: Answer all questions in a single document. Then submit to theappropriate assignment folder. Each response to a single essay question shouldbe about a half-page in length (about 300 words). Use attached PDF for sources.
1. Providing physical security to a facility involves numerous methodsdesigned to discourage a determined attacker. Perimeter fencing, gates,bollards, lighting, CCTV, as well as roaming security patrols and dogs are alldesigned to prevent easy access to the facility. In the event that thesephysical security controls are breached, perimeter monitoring anddetecting devices can provide notification of further attempts to gainaccess to the facility. Describe three perimeter intrusion detection systemsand give an example of one that you have seen deployed either at work oranother location that you are familiar with.
2. Many organizations value their information so highly that they invest in aredundant site in the event that a catastrophic event interrupted serviceoperations in their primary site. Different options are available for facilityrecovery at varying costs and states of readiness. Describe the differencesbetween the hot, warm, and cold site methods of facility recovery. What isa rolling hot site? What is a reciprocal agreement?
3. There are many different categories of evidence and each type varies in itsvalue in supporting an investigation. What are the four characteristics thathelp ensure that evidence is legally admissible in court? Describe hearsayevidence and its admissibility.
"Place your order now for a similar assignment and have exceptional work written by our team of experts, guaranteeing you "A" results."