Answered You can buy a ready-made answer or pick a professional tutor to order an original one.

QUESTION

This is a scholarly post and your responses should have more depth than "I agree" and should demonstrate critical reflection of the problem in order to promote vigorous discussion of the topic within

This is a scholarly post and your responses should have more depth than "I agree" and should demonstrate critical reflection of the problem in order to promote vigorous discussion of the topic within the forum.

For the conferences students are expected to make a minimum of three posts on three days for EACH Topic.  Your initial post will be your answer to the Question and is to be 300 – 400 words with at least two references.  The remaining two posts will be comments engaged with your classmates in meaningful discussion, more than affirmation, on their post and the subject matter and be between 150 - 250 words.

Initial post will be graded on length, content, grammar and use of references. The initial post must be submitted by Wednesday at 11:59 PM EST.

You must post directly to the discussion forum to allow other students to respond. No attachments accepted.

APA fromat si mandatory. You need to cite your sources in your discussion post both in-text and in a references section. If you need help forming in-text citations, check out your in-text citation page on the APA guide

Topic 1:

What are the levels of physical security and how do they differ in the amount of security needed?

Topic 2:

How does planning ensure the best results in designing or upgrading a maximum-security system?

Show more
Geffmurimi
Geffmurimi
  • @
  • 1030 orders completed
ANSWER

Tutor has posted answer for $20.00. See answer's preview

$20.00

***** ******** ***************** ** * ******* concern *** **** modern ********* **** companies have **** ** understand **** ******** ******** ** **** as *** technical ****** ******** ******** *** ****** *** ******** and ******* ****** in is *** ***** approach ** guaranteeing *** ******** ** ***** ******** and ******* (DiMase ******* Heffner & Linkov ***** *** **** ****** ** physical ******** include *** ***** perimeter *** inner perimeter *** interior ********* ******** *********** ********* ********* ***** ******** securing *** ***** perimeter ** the ******** *** systems ** ******** segregating ****** from *** ******** **** ******** ********* **** ****** ******** ** **** level include perimeter walls protective ***** *** other deterrents **** ******* people **** ****** direct ****** ** *** ******* and ******** ********* ***** *** ******** involved **** ****** ** the *********** ** **** ***** safeguarded *** ****** ** security ** this ***** ** designed ** **** ****** out ** the ************* perimeterThe **** ***** of ******** ******* ** limiting entry ** *** facility It controls the ***** ****** to *** ******** ** ******* unauthorized ********* One *** is ** **** * single ****** ***** that *********** *** ******** ** ***** ******** *** exiting *** secured ******** *** ****** ******* ** the ***** ********* ******** those ******** the facility and the **** **** are allowed ****** to *** facility ********* ******** to *** ********** *** ******** ******** *********** that ***** their ******* **** of ****** ** this level the ****** ** ******** ** ******** ** control *** ***** **** *** facilityInterior ************ interior ******** ********** ***** ****** *** ******** ****** ***** individuals ******* to ****** *** ******** are **** ******* ** the ****** ** *** ****** *** ******** The security ******** ** this ***** are ******** ** ******* *** unauthorized direct ****** ** *** ****** Surveillance ******* *** ****** ********* are ****** **** ** **** ***** ********** ****** ******** *** also **** to ***** ************ access by ***** **** **** **** ******* ** the facility ** *** ***** perimeter ********************* * ******* Z * ******* * & ****** * ****** ******* engineering ********* for cyber ******** ******** *** ********** *********** Systems *** ********* ***** *************** * (2016) ********* physical security Butterworth-Heinemann  Comment 1I ***** **** the security requirement ** *** ***** perimeter ****** be considered **** ********* **** ** *** level **** ******** the ***** and **** of *** persons within *** ******** ** ******** ***** people ******** *** ******* *** * ***** ****** ** *** ******** ** *** ****** or ****** ** ** ******* for ***** to ****** that *** entry point ** ******* ********** to limit *** ********* ******* ** *** ******* ***** **** ***** Jeschke ***** ******* I believe **** ******** ***** ******* the premise ** ** important ** *********** ****** ** *** ******** The ******** ****** ****** be ******** ** monitor ******* times **** the building Some ******** **** are only allowed ******* time *** take ************ **** time *** ***** ********* activities *** ***** ****** **** ** ********* more *** *** ***** of *** **** ********* **** *** premise In essence * ***** *** security ****** should ** ******** **** ** *** ****** point *** *** exit ******************* * **** * * & Jeschke S ****** ******** *** ******* ** Cyber-physical Systems: *********** ********** *** ************ **** ***** & *************** 2I agree **** *** ********* pose * ****** ** *** ******** ** *** systems *** ******** **** *********** *** *********** ** *** company ********* Others **** to *** ************* ** *** employees *** ******** threat ***** by the ********* *** ****** **** have ****** to *** system ******** **** **** ********* *** ******** ** *** interior ********* level ** physical ******** * ***** *********** ****** to a few *********** **** help ** ********** misuse ** ********* **** * also ***** **** *** access points ****** ** monitored ** ******** *** **** of *********** ******** *** *** employee **** ******** *** information * do ******* ****** *** ********* surveillance of *** ******** ********** ********* excessive ************ in *** ********* *** make the ********* ************* ********* ************ can **** ** ****** ** ** ********* ** privacy ******** ** al ***** *** ************ ****** ** ******* ** ****** ****** **** *** be manipulated ** ************** The ***** ******** ***** **** *** *** ******** ** the system ******** should *** ** ************************* J ****** * ******** * A Maniatakos * ***** Kantarcioglu * (2017) ******** and privacy ** ************** systems: * survey of ******* **** ****** ***** **** ***** *********** ******** PostPlanning ** an ******** **** in ************ * working ****** ** ******* ** * ******* ******** ****** *** ******** of * **** ***** ** the ******* ** a ******* security ****** * **** ******** * ***** *** the design ** the ******* ** *** security system (Fielder et ** ***** ** is **** ** ****** or ******* a security ****** **** ***** ******* ** ** ********** the goals ** the design A **** *********** ***** ** * functional ****** ** no **** ****** **** *** final ****** ** ****** to be ******* **** ** also ********* *** * ******** design ******* it ******* tasks *** **************** *** *** ****** ***** *********** that *********** in the ******* ****** will **** ***** ***** described ** * ******** **** **** ********** ***** ***** ********* ****** *** ****** ***** Every ****** *********** their tasks *** **** fulfill **** ** *** *** best *** ** the ******** ******** ****** *** ************** ** a **** ** securing * ****** allows *** * good management system *** the ********* **** are centralized *** **** more ********* ******* * **** the ********* pertaining ** ****** ******** *** ************* because they *** ******* a response ** ********* ********* ** ********* to **** *** *** ****** or ******* ** * ****** ** avoid *** ******** of the response strategy *** response ******** ** ******* ****** with ****** ******* * plan the system **** ** ******** ** ******** ** * ******** ** an ********* ******** **** ******** ****** & **** 2016) ** *** absence of * **** * ****** ****** ****** mitigation steps *** ********** *** *********** ** * **** **** **** ** a ****** ******** ****** ***** *** the design ******* are ********** All ********* ******* *** ************ **** *** ****** It is **** possible ** ******** *** weakness ** *** ******** ****** ** the early ******** ***** In ******* *** ******** ******* ** ********* *** * ********** system **** ******** ** ******** ** *** ****** ** ******* ** a ******** systemReferenceFielder * ********* E ********* * ****** * & ******** F ****** ******** support ********** *** ***** security ********** ******** Support Systems ** 13-23Hermann * Pentek * ***** **** * ***** ******** Design ********** *** industrie 40 ********* In System ******** ******* **** **** ****** International Conference ** (pp ********** ************* ** ***** **** *** **** **** * plan ******* *** **** ******* ** * ******** system ******* *** ***** it ******** The ***** provided ** a **** helps ****** *** ******** needed ** *** ****** * **** ******* the issues **** **** * ******** system It **** ***** ******** **** ** ***** *** ****** **** overcome the identified issues A plan **** *********** ***** *** objectives **** *** expected ** *** final security system (Knowles ** al ***** ************* *** objectives ** ********* ***** *** ********** ** *** ****** is measured regarding *** *********** ** the ********** ******** the desired outcome ******** an architecture **** ** in line with *** intended ***** The **** ** *********** * focus **** ******** * ***** that ***** to a ********** ****** *** absence ** ********** *** lead ** ****** The ******** ****** ****** will ** ********* *** **** *** ******* ** ********* ******* * **** provides the focus ******** ** design ** ******* a ********** ********************** * ****** * ********* * Disso * * P ***** Jones K ****** * ****** ** ***** ******** ********** ** ********** ******* ******* ************* ******* ** ******** infrastructure protection * ************** ** **** to ***** **** * **** leads ** * ********** security ****** ******* ** *** ******* ** task assignment **** assignment ******* **** *** *** ******* to *** designs or ******* *** centralized ***** ** a ***** line ** ******* *** *** *** efforts ******* *** ******* ** designs are ******* *********** (Trim & Upton ***** ** ********* ** **** ***** coordination ** *** *********** ** *** ********* tasks *** ***** will *** replicate ******* ** *** design and ******* ** the system Different ***** **** *** waste **** ******** *** **** ****** ** the design ** ******* **** ********** ** **** ******* ** speeding up the ******* *** avoiding ********* *** plan ******* ***** to *********** that will produce the **** ******* in *** ******** ***** ***** individuals ******* *** **** *********** *** ***** **** ** **** **** *** ******** ** *** design ** update ** ****** ****** since the plan ********** any confusion that ***** **** to delays ** is ******** **** * role assignment ** ***** ***** ** **** ******* and ******* ** ******* ******** ******************** * ***** Upton * (2016) ***** ******** ******** Counteracting ***** threats ******* organizational ******** *** ******** ***********

Click here to download attached files: Topic 1 and Topic 2.docx
or Buy custom answer
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question