You are designing an intrusion detection system (IDS) to prevent theft at a bank occupying a 60-floor downtown Chicago building. IDS interfaces with motion sensors located both inside and outside of the building as its only means of sensing intrusion. IDS must satisfy the following: Ensurethat a police officer arrives at the location of any intrusion quickly; Makeany intruder run away quickly; Ensure that a maintenance worker arrives at the location of any failed sensor quickly. Question Re-write each of these as an effective requirement
You are designing an intrusion detection system (IDS) to prevent theft at a bank occupying a 60-floor downtown Chicago building. IDS interfaces with motion sensors located both inside and outside of the building as its only means of sensing intrusion. IDS must satisfy the following: Ensurethat a police officer arrives at the location of any intrusion quickly; Makeany intruder run away quickly; Ensure that a maintenance worker arrives at the location of any failed sensor quickly. Question Re-write each of these as an effective requirement
Principles of Information Security (MindTap Course List)
6th Edition
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Michael E. Whitman, Herbert J. Mattord
Chapter9: Physical Security
Section: Chapter Questions
Problem 4E
Related questions
Question
Subject: Software Engineering
You are designing an intrusion detection system (IDS) to prevent theft at a bank occupying a 60-floor downtown Chicago building. IDS interfaces with motion sensors located both inside and outside of the building as its only means of sensing intrusion. IDS must satisfy the following:
- Ensurethat a police officer arrives at the location of any intrusion quickly;
- Makeany intruder run away quickly;
- Ensure that a maintenance worker arrives at the location of any failed sensor quickly.
Question
Re-write each of these as an effective requirement
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
Step by step
Solved in 2 steps
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Recommended textbooks for you
Principles of Information Security (MindTap Cours…
Computer Science
ISBN:
9781337102063
Author:
Michael E. Whitman, Herbert J. Mattord
Publisher:
Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:
9781337097536
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning
Principles of Information Security (MindTap Cours…
Computer Science
ISBN:
9781337102063
Author:
Michael E. Whitman, Herbert J. Mattord
Publisher:
Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:
9781337097536
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning