1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fittoniya [83]
3 years ago
8

Describe three perimeter intrusion detection systems and give an example of one that you have seen deployed either at work or an

other location that you are familiar with.
Computers and Technology
1 answer:
dlinn [17]3 years ago
4 0

Answer:

A perimeter intrusion detection system (PIDS) is a device or sensor that detects the presence of an intruder attempting to breach the physical perimeter of a property, building, or other secured area.

the use of buried sensor for perimeter intrusion detection system, becomes very popular due to the advantage of been a discreet or even an invisible detection system and avoiding the need to build an above-the-ground fence to protect the perimeter due to costs or environmental reasons

Explanation:

<em>Description of 3 systems:</em>

Barrier-Mounted :Fence Intrusion Detection System

PIDS deployed on or in conjunction with a fence or other physical barrier (e.g. DAS cable or other motion sensors mounted on a fence).

Ground-based or Below-ground :

PIDS deployed below ground (again a DAS cable can be used or pressure sensitive cable or electromagnetic field). These do not require a physical barrier.

Free-Standing

PIDS deployed above ground that do not need to be installed on or in conjunction with a physical barrier (e.g. bistatic microwave link).

Example of one PIDS system I have seen deployed in a familiar location is the ones at the prison which is a barrier mounted or some inairports that prevent small to cause harm to small animals.

You might be interested in
I have all of the points and brainliest, but it won't level up, I don't know why, anyone know why?
ozzi

Answer:

just refresh

Explanation:

you did level up i just checked, it just hasnt updated for you

8 0
2 years ago
Read 2 more answers
________ was one of the first uses of the Internet
NeTakaya

Government weapon in cold war

3 0
3 years ago
Read 2 more answers
Frank has created a résumé and separated the sections using headings. How can he set the headings apart from normal text?
Pepsi [2]
He could use bold or bigger text just a suggestion.
6 0
3 years ago
How does a firewall provide network security
ehidna [41]
Firewalls are connected with a network device which blocks untrusted network forming a barrier in between trusted and un-trusted network.
8 0
3 years ago
Mad libs are activities that have a person provide various words, which are then used to complete a short story in unexpected(an
Vsevolod [243]

did you just put random a*s word together and expect us to know the ¨answer¨

5 0
2 years ago
Other questions:
  • What is the one common feature that ties together different social media technologies? All of the social media tools we use toda
    5·2 answers
  • You know a Linux command will perform a desired function for you, but you cannot remember the full name of the command. You do r
    14·1 answer
  • Which is a function of network media?
    14·2 answers
  • Add is a function that accepts two int parameters and returns their sum.
    8·1 answer
  • 5. Tricks of the language commercials use are called Rhetorical Devices?
    9·1 answer
  • _____ _____ deals with the definitions properties of mathematical models of computation.
    8·1 answer
  • Kim would like to have a simple method for entering data into a database. She should create a _____.
    14·2 answers
  • bro this scared me, i thought i just got hacked, could someone explain why when i went to ask a question, it kicked me out my ac
    9·2 answers
  • What code would you use to create the login button?
    11·1 answer
  • What skills did Carl work on, and what steps did he take to reach his long term goals?<br>​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!