What are the primary reasons attackers engage in “fun” attacks? Choose all that apply.

so on. The goal of such an alarm is to make further intrusion or attack more difficult. Alarms that trigger repellants usually sound an audio siren or bell and turn on lights. These kinds of alarms are used to discourage the intruder or attacker from continuing their malicious or tres- passing activities and get them to leave the premises. Alarms that trigger notification are often silent from the perspective of an intruderattacker, but they record data about the incident and notify administrators, security guards, and law enforcement. The recording of an incident can take the form of log files andor CCTV tapes. The purpose of a silent alarm is to bring autho- rized security personnel to the location of the intrusion or attack in hopes of catching the person committing the unwanted acts. Local alarm systems must broadcast an audible alarm signal that can be easily heard up to 400 feet away. Additionally, they must be protected, usually by security guards, from tampering and disablement. For a local alarm system to be effective, there must be a security team or guards positioned nearby who can respond when the alarm is triggered. A centralized alarm sys- tem may not have a local alarm; a remote or centralized monitoring station is signaled when the alarm is triggered. Auxiliary alarm systems can be added to either local or centralized alarm sys- tems. The purpose of an auxiliary alarm system is to notify local police or fire services when an alarm is triggered. Secondary Verification Mechanisms When motion detectors, sensors, and alarms are used, secondary verification mechanisms should be in place. As the sensitivity of these devices is increased, a false trigger will occur more often. Innocuous events such as the presence of animals, birds, bugs, and authorized personnel can trigger false alarms. Deploying two or more detection and sensor systems and requiring two or more triggers in quick succession to occur before an alarm is triggered may significantly reduce false alarms and increase the certainty of sensing actual intrusions or attacks. CCTV closed-circuit television via security cameras is a security mechanism related to motion detectors, sensors, and alarms. However, CCTV is not an automated detection-and- response system. CCTV requires personnel to watch the captured video to detect suspicious and malicious activities and to trigger alarms. Security cameras can expand the effective visible range of a security guard, therefore increasing the scope of his oversight. In many cases, CCTV is not used as a primary detection tool due to the high cost of paying a person to sit and watch the video screens. Instead, it is used as a secondary or follow-up mechanism that is reviewed after a trigger by an automated system occurs. In fact, the same logic used on auditing and audit trails is used for CCTV and recorded events. A CCTV is a preventative measure, while review- ing recorded events is a detective measure. Technical Controls The technical controls most often found employed as an access control mechanism to manage physical access include smartdumb cards and biometrics. In addition to access control, physical security mechanisms include audit trails, access logs, and intrusion detection systems IDSs.