My two courses for this semester are Application Security and Physical Security : attached the textbooks for both the courses below.Application Security course description: This course covers techniqu


----------------------------------------------------------------------------------------------------------------------

Chapter 1. Encompassing Effective CPTED Solutions in 2017 and

Beyond: Concepts and Strategies.

CPTED is long established and used across the globe but not problem free operations.

CPTED is a preferred model to provide background information relative to the integration of CPTED as conduit to enhance the creation of viable community growth, collaborative partnerships, and reduction of risk management, complication, and diversity and irrelevance concepts. CPTED often contribute to the development of wider planning goals considering the development and maintenance of sustainable communities. Understanding and managing this potentially new direction enables clear links with development and maintenance of sustainable communities through urban planning to be profitable and impactful. Effective CPTED policies aimed at reducing private violence against vulnerable innocent citizens and the community, attempt must be executed to outline the obvious limitations, creating interconnected community is an important component,

Consider, too, that many of the social interactions between men in these impoverished communities do not include designing plans to lower crime rates. they are unemployed, these men spend much of their time together drinking and taking illicit drugs, and lamenting about patriarchal authority threatened by the disappearance of manufacturing jobs, The most reliable and proven approach to accomplish the goal of combining security with design decisions is commonly known as the environmental design model called CPTED. The environmental design approach to security recognizes the designated space, which defines CPTED solution compatible for associated activities often help to prevents crime. The embedded goals and objective of CPTED rest on design and use of space, culture deviating from the traditional targeting pathway to prevent crime. Traditionally. The focus rest predominantly on denying access to a crime target through physical facility such as locks, alarms, fences, and gates. Apparently, modern approach tends to overlook opportunities for natural access control and surveillance, which It can also make environments sterile, unsightly, and unfriendly. The most reliable and proven approach to accomplish the goal of combining security with design decisions is commonly known as the environmental design model called CPTED. The environmental design approach to security recognizes the designated space that defines CPTED solution compatible for associated activities often help to prevents crime. The embedded goals and objective of CPTED rest on design and use of space, culture deviating from the traditional targeting pathway to prevent crime. Traditionally. The focus rest predominantly on denying access to a crime target through physical facility such as locks, alarms, fences, and gates. Apparently, modern approach tends to overlook opportunities for natural access control and surveillance, which it can also make environments sterile, unsightly, and unfriendly.

Chapter 2. Introduction Vulnerability Assessment.

Vulnerability assessment (VA) is a well-projected logical evaluation with quantitative and qualitative components often used to predict physical protection system (PPS), system effectiveness, weakness and threats and attacks.VA supports organization management decision in three dimensions including short-long range planning, steering vulnerability assessment, reporting and using the assessment results to strengthen the organization. Vulnerabilities are weaknesses, physical appearance, environments ready for manipulative schemes by perpetrators to gain unauthorized access organization assets. Vulnerability is the most explosive, volatile, unpredictable component of cybersecurity operations, if left unattended, may result in the squalor, misery, loss of human lives, damaged to mission-essential resources. I must admit, vulnerabilities are often influenced by a variety of factors, such as the buildings were erected, location of community members, equipment, operational policy and procedures practices and lack of social engineering education. Per Fennelly (2017), quantitative approaches are strongly recommended for facilities with high magnitude of loss assets and damages to vital data, whereas, qualitative techniques are utilized in the absence of lower value of asset. In addition, Vulnerability assessment often help to identify the area of weakness in organization, play a key role in determining asset periodization width organization and community facilities. A comprehensive vulnerability assessment is a vital component of risk management process.

Chapter 3. Influence of Physical Design.

Physical Security is entrenched with concepts, external and internal roles, physical security planning and implementation, physical security countermeasures to deter, delay, detect, and prevent cyber-threats and cyber-attacks. Crime prevention through environment design (CPTED) presents layers of conflicts and solutions. As certified member of cybersecurity profession with concentration in physical security I strongly subscribe to my colleague’s assertion that the commanding levels of crime rates in the rural community can eliminated. Crime Prevention through Environmental Design (CPTED) a long-established operation used across the globe.

CPTED is a preferred model designated to provide acceptable background information relative to the incorporation of CPTED as viable channel for the creation of cohesive community growth, collaborative partnerships to help in reduction risk management complication, diversity and irrelevance concepts. Collaborative partnership with CPTED will contribute to the development of wider planning goals, growth, and maintenance of sustainable community. Acceptance of such potential will provide new direction and enable interrelated links through urban planning to measurable growth and achievement. Effective CPTED policies aimed at reducing internal and private violence against vulnerable innocent citizens and the community can be eradicated through the creation of interconnected community partnership. Collaborative social interactions in a penurious, disadvantaged, and underprivileged is comfortable podium for cyber-crime, cyberthreat, and cyber-attack. Members of the community referred to in this book do not have structured short and long range plans to lower crime rates, are unemployed, and spend their productive time in drinking, taking illicit drugs, and lamenting about those in authority and threatened by the disappearance job opportunities.

Chapter 4. Approaches to Physical Security-Levels of Physical Security.

Physical security (PS) is imperative for public and private organizations to protect and defend assets, data, resources, personnel, facility, and infrastructures. Per chapter four of the course materials, emphasis will be on five echelons of physical security systems such as minimum, low level, medium, high level and maximum-security operations.

  • Minimum-security system (MSS-1) developing to obstruct unauthorized external traffic into the system and tends to interface with basic physical security operations like doors and windows and regular locks.

  • Low-level system (LLS) designing to barricade unauthorized external activities such as reinforcement of doors, gates, high security locks, window bars and regular alarm systems.

  • Medium security system (MSS-2) creating to obstruct, detect and assess Most MSS-2 point of reference includes developing perimeter fence to protect against unauthorized intrusion and unarmed security armed.

  • High-level security system (HLSS) creating to obstruct, detect and evaluation most unauthorized internal and unauthorized external activities. HLSS point of reference includes highly trained armed guard, two-way radio links to police unit, duress alarms, use of access control and biometric control.

  • Maximum-security system (MSS-3) developing to impede, detect, access and neutralize external and internal activities.

Types Physical Security

Approaches to physical security is a measurable technique to protect buildings, property, assets, and resources against intruders. Effective execution of physical security program on organization and facilities includes multiple levels of protection such as outer perimeter, inner perimeter, and interior of the facility.

1. Outer Perimeter Security

The outer perimeter often controls persons who walk and drive onto the grounds on the facility and out perimeter security include high-security fence, high-security doors, high security windows, high-security gate, remotely operated garaged; whereas, barbed wire fence with a guarded gate is appropriate in most extreme conditions.

2. Natural Access Control

Natural access control utilizes the building and landscaping features to guide people entering and exiting the property, lessened perpetrator’s unnoticed access into the facility. Natural access control measures often interfere, and lowered sense of risk prevent intruders’ willingness to come closer to the property.

3. Territorial Reinforcement

Territorial reinforcement differentiates private property from public facility to prevent unauthorized access into the facility. The prime objectives of territorial reinforcement is to protect and keeping intruders off the private end public property.

4. Inner Perimeter Security

Perimeter security provides extra measures to secure the facility’s doors, windows, walls, locks, keys, alarm systems, access control, electronic visitor management systems, and key controls to keep intruders from entry and exit the property.

5. Interior Security

Interior security’s emphasis is on interior spaces, employee office locations, security data center, organization assets, security cameras and motion detectors for effective monitoring of interior spaces.

6. Electronic access control systems (EACS)

Electronic access control systems (EACS) continue to feature as important component of physical security with ability sojourn unauthorized companies at the door and control incoming and outgoing traffic into the facility.

Chapter 5. Security Lighting.

Phase 1 of process, 1assignment and discussion will focus on level one through 5 and phase 2 physical security will concentrate on Background check of security protection. Physical security is designed to protect personnel, hardware, software, networking and communication systems and data from natural occurrences meant to cause serious loss of data, damages to private and public organizations and higher education institutions including protection from fire, flood, natural disasters, burglary, theft, vandalism and terrorism activities. Advantages of security lighting system displayed in institution library, cafeteria, classroom and chapel, commercial, industrial, multi-family residences, and retail facility can generate enduring rewards Scope of benefits of security lighting on private and public organizations institution of higher learning include enhancement chances, delineation of the facility, increase resident morale, decreased liabilities, reduction of insurance premiums where applicable, increase real and perceived safety, deter theft, vandalism, and physical assault and the properties, monitor vehicle and pedestrian incoming and outgoing traffic into the facility.

Additional benefits of security lighting making the facility to become less hazardous, less likely to become a target for theft and vandalism, confidence, and trust that and other multi-family residential sites will become the safe dwellings desired by residence. Increase, in space, confidence and trust by current residents will inspire new residents, benefit, increase public traffic and enlarge revenues for titleholders. Narratives in the course materials supports the premise that a security lighting system and relative to security lighting must involve professional designer in order to avoid damages to the facility because, only experience professional security lighting can be able to make selections based upon the location, residents and the space of the facility.

It is worth noting that in the beginning of the computer epoch, protection of properties was easy. Hugh computer system such as mainframe, supercomputer and embedded computer systems weighed thousands of pounds were locked away in the command center and only select few were granted access confined facility.

Today, in our generation, computing devices are unescapable, and organizations are charged with protecting devices range from massive cloud-based multiplex systems to tiny handheld devices such as mobile phones. Physical security defense layers to prevent intruders must include multiple models. The first model to deter and close all angle against intruder and the next layer will further monitor controls and provide additional detection and protective capabilities. Physical layer of defense comprises physical, psychological activities and response systems including locking the facility gates and doors, on-site and remote security notification system, and direct communication with local, county, or state police.

Increase, in space, confidence and trust by current residents will inspire new residents, added value, increase public traffic, and enlarge revenues for titleholders. Narratives in the course materials supports the premise that a security lighting system and relative to security lighting must involve professional designer in order to avoid damages to the facility because, only experience professional security lighting can be able to make selections based upon the location, residents and the space of the facility.

Background Checks

Private and public organization and higher education enterprise is obliged to establish official policies and procedures delineating standards for logical and physical access to facility and infrastructure focusing on key demographic factors such as conducting criminal background checks, as permitted by law, as part of pre-employment screening practices for employees and identification for staff, faculty and administration physical access into the facility during working hours, after hours, weaken and protection from fire, flood, natural disasters, burglary, theft, vandalism and terrorism activities.

Chapter 6. Electronic Elements: Detailed Discussion

Entire process including assignment and discussion will concentrate on physical security on multiple levels stages of security protection.

The emphasis of chapter 6 is on designing modern electronic components to select well-matched components such as alarm, access control systems, access control system, server, system server file servers, workstations, advance elements, closed conduit television, (CCTV), digital video system, wireless digital video, security command system, consoles guard function and communication systems. The following components are among the most common found in electronic devices:

Microcomputers, magnetic stripe cards, Wiegand card-keys, barcode cards, barium ferrite cards, Hollerith, rare-earth magnets, photo identification elements, Multi-technology, card readers, transportation security agency (TSA), transportation worker identification credential (TWIC), electrified strikes and panic hardware, duress switches, digital transmission through protocol transport control protocol (TCP), user datagram protocol (UDP) and developments of ARPANET through applied research protocol agency (ARPA), wireless digital operations such as workstation, central processing unit (CPU), communication system

Microcomputers, fourth-generation systems developed in 1971 are small computers used to control a multitude of devices, such as power tools, remote controls, and medical equipment and office machines. Batteries convert chemical energy to electrical energy. The two different cells of a battery are anode (+) and cathode (-). Fuses help preserve components from overloading with excessive current. A fuse consists of connection body, support, contacts and metal-fuse material such as Zinc or copper. As a protective device, a circuit breaker can be controlled with a remote switch. It is designed to protect the circuit from overloading or a short circuit.

Switches interrupt current. The four types of switches are: single pole single throw (SPST), single pole double throw (SPDT), double pole single throw (DPST) and double pole double throw (DPDT). Relays are electromechanical switches that shut power on or off. A relay includes an electromagnet, an armature, a series of electrical contacts, and a spring.

  • Active components of electronic elements are designed to cover the development of transistors

  • Passive components are designated transformers, inductors, resistors, capacitors.

  • Transformers are commonly used to step up and step-down power.

  • Resistor restricts the flow of current. It is used in thermistors and potentiometers.

  • In a low capacity battery, a capacitor allows delays to occur in circuits and inductors are used to control frequencies.

  • Electronic components are closely related resistors, capacitors, diodes, transistors, inductors, and integrated circuits.

  • Resistor are embedded integrated circuit and often resists the flow of current. Often measured in ohms with electronic symbol of 0 unit

  • Capacitors must store electric charge temporarily and the capacity of a component measured in microfarads.

  • Diodes designed to allow electric current to flow in a single direction only. Each diode has two terminals known as the anode and cathode. When the anode is charged with positive voltage and the cathode with a negative one, electric current can flow. Reversing these voltages will prevent the current from flowing.

  • Transistors an easily to recognize through three terminals and control current flow in the multiple terminals.

  • Inductors and passive components store energy in form of a magnetic field and consists of a coil of wire wound around the core

  • Integrated Circuits: singular device that has all the components required in an electronic circuit and microcomputers.

  • Microcontrollers designated to control multitude devices including power tools, remote controls, medical equipment, and office machines.

  • Transformers Assembled with two coils of wire, transformers are commonly used to step up or step-down power.

  • Batteries convert chemical energy to electrical energy using two different cells of a battery are anode (+) and cathode (-).

  • Fuses use to preserve components from overloading with excessive current.

  • Relays these electromechanical switches shut power on or off.

  • Switches designed to interrupt current four types of switches include single pole single throw (SPST), single pole double throw (SPDT), double pole single throw (DPST), and double pole double throw (DPDT).

  • Motors converts electrical energy into mechanical energy.

  • Circuit Breakers a protective device often controlled with a remote switch.

  • CCTV is an analog video camera designated to transmit signals through coaxial cable to a single central location for monitoring, recording, and video analysis.

Switch is a device that provides a central connection point for cables from workstations, servers, and peripherals. In a star topology, twisted-pair wire is run from each workstation to a central switch and hub. Most switches are active, that is they electrically amplify the signal as it moves from one device to another. The predecessor of the switch was the hub, which broadcasted all inbound packets out all ports of the device, creating huge amounts of unnecessary network traffic. Per our course materials focus on four types of switches are: single pole single throw (SPST), single pole double throw (SPDT), double pole single throw (DPST) and double pole double throw (DPDT). Relays are electromechanical switches that shut power on or off. A relay includes an electromagnet, an armature, and a series of electrical contacts. Active components of electronic elements are designed to cover the development of transistors and passive components is designated transformers, inductors, resistors, capacitors. Door switches are installed on the door to guarantee that if an intruder open the door it will cause a magnet to move away a contact switch and trigger active alarm. As a protective device within a circuit breaker can be controlled with a remote switch.

Chapter 7. Use of Locks in Physical Security Crime Prevention.

It is noting that the use of locks in physical crime prevention is to enumerate available procedures needed to implement and enforce using locks as active components of security operations. Keys and lock are the most widely used security apparatus to support individuals and organization determination attempts to protect their facility and assets against intruders and perpetrators. Notably, there are different types of locking devices available to the public, but importance and efficiency of implementation of keys and locking system depends solely on the combination of interrelated factors such as designing, manufacturing, installation, upgrading and maintenance activities. Individuals, facility manager and organization must include the all parameters of defensive, offensive, strength and weakness, advantages, and disadvantages. The projected procedures must include the danger of doing nothing and lacking behind.

Chapter 8. Internal Threats and Countermeasures

Old-fashioned strategies to battle, prevent, and reduce criminal maneuvering can accomplished by changing illegitimate tendencies. Defensive focuses on preventing instantaneous ability to promptly prevention cyber-attack, reduce the magnitude damages caused by criminals in the environments where crime occurs.

Joyce Owens was in the office alone by herself to complete employee’s payroll and she heard strange noise outside the building, perpetrators broke into the facility through one of the side-windows maltreated her; you are soon to be an expert in cybersecurity with concentration physical security at University of the Cumberlands:

  1. What defensive and offensive measures” should Joyce Owen adopt in this unsurmountable condition to remain calm, keep herself safe, in conjunction with calling 911?

  2. For Joyce Owen safety, which phone can she use to call 911, her personal mobile device, or her office phone?

  3. What must organization security planning team insert in the five years longrange plan to protect Joyce Owen and employees from such cyber-attack in the future?

Per Fennelly (2017-139-166), operative use of locks in physical security crime prevention must include three measures combination locks: Luck Bodies (bolts, latch bolt, dead bolt); Door Lock Types Mortise, (rim mounted, tubular, cylindrical lockset, unit locks, cylinders, padlocks); and Attacks and Countermeasures (surreptitious attacks, Illicit keys, maintain reasonable key security, recombination and replaced compromised lock, circumvention of the internal barriers of the lock, manipulation and picking.

Offensive Culture on the use of locks in physical security crime prevention.

When a traffic camera is installed in as designated community, drivers who operates in that neighborhood where traffic cameras are deployed and proven to successful limit alarming rate of traffic accidents, wrongful death must be willing to accept, comply and obey the role.

a. Countermeasures

Countermeasures the key components of physical security operations. Associated steps to execute countermeasures in at risk facility must include vulnerability assessment, risk management and advantages. Likely counter security instrument against intruder must include demographic factors such as risk management and submitting accurate results, measurable policies, and procedures to assist in the process.

b. Vulnerability

Vulnerability is the weakness in any organization, which often lead to cyber-attacks, cyberthreats, unbending risk, data damages, interruption of communication vital communication channel. Data damages often occurs when hardware and software are attacked by malicious cyber-criminals, unauthorized users have access to data command center and disclose the confidential information such as logon name and password.

  • A vulnerability assessment is a direct responsibility of individuals, private and public organizations to identify advantages and disadvantages.

  • A vulnerability creates more than enough opening for organization to accept the likelihood of unforeseeable circumstances and formulate solutions to remedy any projected impasse relative to vulnerability

  • Advantages and disadvantages are considered determined factors for affordable, feasible, and practical while countermeasures are added values to reduce and eliminate the deficiencies such as hardware (fencing and locks), software (electronic access control), and people (security officers and employees) recognized in the vulnerability assessment process.

  • Effective security process must contain assortment of physical security items such as electronic security, trained personnel with assigned security privileges, active security policies and procedures, structured fence around the facility, security officers on patrol, exterior lighting, steel doors, high-quality mechanical locks, an intrusion detection system, and video surveillance to detect intruders

Chapter 9. External Threats and Countermeasures.

Cyber-attacks offer the ability to obliterate and interrupt organization communication channels, security data center and facility remotely. Indeed, private, and public organizations are often interlinked; hence, data breaches disparaging with damaging influence organization, confidence on economy and innocent citizens. Organizations inability to resolve the age-old problem on how to authorize official trusted to logon onto system, turn around to betray by committing cybercrimes. Vulnerability stem from interactions and communications among several system components and categorized as deficiency, weakness, and security cavity on network data center.

  1. To what extent are internal threats constitute a key factor against organization ability to battle insider threats which abuses assigned privilege?

  2. What is the most effective mechanism for organization to combat internal threats?

  3. Disgruntled employees must be trained on the danger of throwing wastepaper and electronic media in a bin within and outside the facility.

Internal threats and countermeasures are an isolated occurrence where most activities involve direct connection to the Internet for global interaction, digital communication, and transmission. The preeminent method to mitigate internals threats is to equip users with ready-to-act traditional approach. The result of the sophistication of our modern-day culprits, over-all reliance on employees, increasing credo that authorized users are predictable agent in the fight against internal threats. Internal threats operators often use psychological moralities and procedures to sail around security restrictions through persuasion and psychosomatic principles, and crafty manipulation techniques to sway users into divulging confidential information, such as, user names, passwords, bank information, house and offices’ alarm code to take control over organizations’ security centers. Historic channel to internal threats and countermeasures is categorized into employee’s theft, pilferage, embezzlement, fraud, stealing, peculation, and defalcation. Most organizations often ignore to establish and adopt on-board ecological waste management action plans to deal with discarded materials, shredded left-over documents, magnetic media and placing fragments in isolated location as countermeasure process. Per Fennelly (2017-182), “Why do Employees steal?” In addition, employee stealing is a multiple part operation.

  • Most organizations are often intolerant and impatient to verify employee’s identity, background and establish trust due to time-consuming nature of daily assignment.

  • Most organizations often ignore to establish and adopt on-board ecological waste management action plans to deal with discarded materials, shredded left-over documents and magnetic media and placing fragments in isolated location.

Nonetheless, organizations must learn to support and train employers who are assigned to work and protect the organization data center, facility, and resources. Large segments of organizations’ facility managers are often, none-aggressive and choose short cuts in discharging assigned services by posting passwords on the screen and leaving confidential documents lying out on the table and uploading same document to associates, husbands, loved ones and competitors. Most authorized users within the organization are often the puniest linkage in any security operation.

  • Disgruntled employees can install sniffers on organizations’ data file server via polite phone calls; gain required user identification and password to access the organization’s secured data center.

  • Most organization retain an employee on the same salary for twenty years and paid new a newly hired employee the salary of the actively existing employee.

  • Most organizations often ignore to establish and adopt on-board ecological waste management action plans to deal with discarded materials, shredded left-over documents and magnetic media and placing fragments in isolated location.

Chapter 10. Biometric in the Criminal Justice System and Society Today.

“Biometrics,” derived from the Greek “bio” meaning life and “metrics” meaning measure, is entrenched with numerous applications involving the identification and verification of individuals and groups of individuals’ identities. According to Heimdal Security, “Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics.” And “biometric authentication is simply the process of verifying your identity using your measurements or other unique characteristics of your body, then logging you in a service, an app, a device and so on. The technology is mainly used for identification and access control, or for identifying individuals who are under surveillance” (Dasclescu, 2020). Digital biometric authentication security emerged a few decades ago due to weighty advances in computer information systems, cybersecurity attacks, data breach, forensic studies, and analyses. The daytoday increase in terrorist cyber-threat and cyber-attacks across the globe besought the research in the protagonist of biometric authentication forensic analysis to expose challenges facing the authorities of city, county, state and federal law enforcement officers, private and public organizations, nations and global security operations.

Biometric authentication forensic analysis has been deployed without standard procedure and security measures to battle imminent security challenges and threats. Digital biometric authentication operations are rooted with superior level of security that cannot be stolen, manipulated, or exposed to damage and sudden changes. Furthermore, it is less time consuming, dependable, user friendly, hard to falsify and requires negligible training time. It also has an inexpensive and accurate verification process. There is grave concern in education that is deeply rooted in using modern biometric technology for skills, expertise, and knowledge-based experience for public support of biometric authentication and data analysis.

This research calls on global communities’ collaborative agreement to establish biometric authentication forensic and data analysis institutes in each state of the nation to educate first responders of fingerprints, iris patterns, hand geometry, facial image and deoxyribonucleic acid (DNA) analysis and process. For the adoption and implementation of digital biometrics authentication forensic analysis, this research operatives will serve as the best defensive and offensive security measures designated to improve quality and longevity of lives and safeguard human society through the discovery of definite and authentic fingerprints, voice, fingerprints, iris patterns, hand geometry, facial image, and deoxyribonucleic acid (DNA) resulting in the protection of innocent citizens from erroneous conviction and jail terms.

Framework of Biometric Digital Biometric Authentication

Modern digital biometric authentication forensic analysis is designed to provide adequate security to any organization’s network security centers, workstations, network fileservers, digital biometric database storage, reinforcement of the degree of certainty, individual privileges, confidence, integrity, and accountability. As Fennelly (2017); Krutzn and Vines (2007); Kazimov and Mahmudova (2015); and Nanavati, Thieme, and Nanavati (2002) noted, digital biometric authentication provides better structures to obtain vital data, information, retina scan, fingerprint, and iris recognition security than traditional authentication methods. This new method gives access to authorized users and places unauthorized users on a disadvantage. Digital biometrics is imbedded with personal identification numbers (PINs), assorted digit passwords and symbols making it difficult to guess and manipulate data and information. Digital biometric authentication supports a combination of a high level of network system rights and privileges to users, creating an institution of username-password and allowing authorized administrators and users to create longer and more complex passwords that were not practicable prior to the introduction of digital biometric technology (Esin, 2017; Ngwang, 2016; and Nanavati, Thieme, & Nanavati, 2002). Most personnel in private and public organizations are urged to manage manifold passwords and PINs and this multiplicity of passwords and usernames is likely to lead to the forgetfulness and misplacement of this information. The research aims to formulate a horizon to strengthen apparent protagonists of digital biometric authentication and forensic analysis (PDBAFA).

Digital biometric operations have been in operation, deployed and utilized for some decades, but the main problem has been about how to secure these operations from intruders and unauthorized users. Per Chauhan & Gupta (2015), Esin (2017) and Fennelly (2017), most segments of digital biometric authentication are designed to guarantee access to facilities such as colleges and university dormitories, hotel rooms, nuclear power plants, and organizations’ database centers, and automated fingerprint identification operation units. Effort to obtain solutions and much needed advancement for digital biometric authentication is often miscalculated (Hayes, 2015; Nanavati, Thieme, & Nanavati, 2002; and Ngwang, 2016).

Challenges facing public and private organizations amid open-ended operation of biometric authentication forensic analysis in the global workforce rest on the expansion of biometric related skills, expertise, and knowledge-based experience to satisfy and assuage innocent public ambition and confidence in the process. Per Fennelly (2017), Ngwang, (2016) and LeClair & Keeley (2015), unhindered biometric education for first responders in strategic locations such as airport security posts and government facilities and maintaining skilled and qualified biometrics professionals will eradicate the trepidation, restore hope and confidence in the society. The world community is witnessing innocent individuals wrongly convicted, thrown in jail, sentenced to serve jail-terms for many years and later discovered that the fingerprints, iris patterns, hand geometry, facial image and deoxyribonucleic acid (DNA) were wrongly interpreted and analyzed. It is this question of reliability that is at the center of this research and keeping the security forces restless.

Traditional biometric machinists were not equipped to provide reliable result, eliminate apprehension, and restore consumers’ confidence. It is particularly important that all counties, states, nations and global organizations step forward and intensify effort to establish biometric professional institutes in their state in the nation to reinstate buoyancy through unlimited biometric authentication education, installation and configuration of compatible hardware and software to get rid of wrong and faulty analyses that often led to the conviction of innocent citizens. There is sovereignty in education that is deeply rooted in using modern biometric technology for skills, expertise and knowledge-based experience needed to strengthen the public support of biometric authentication and data analysis. This research calls on global communities through collaborative agreement to establish biometric authentication forensic and data analysis institutes in their areas and to educate first responders of fingerprints, iris patterns, hand geometry, facial image, and deoxyribonucleic acid (DNA) analyses and processes. Per Chauhan and Gupta (2015), Krutzn and Vines (2007), and Kazimov and Mahmudova (2015), the United States has responded to this security challenge by the creation of a well-structured unit of digital forensic biometrics authentication and analysis through program educational objectives (PEO) in the West Virginia University, Clarksburg. The PEO at the University of West Virginia in Clarksburg is recognized as a sustainable, innovative benchmark institution enrolling large populations of the United States Federal Bureau of Investigation (FBI) agents and duplicating much needed expertise, skills and knowledge-based experience to restore hope and self-confidence in the world community.

Digital biometric authentication system required users’ logon name, password, and application programming interface (API). Acquired fingerprint recognition images stored in the organization’s databased permits immediate access and futuristic usage only by authorized personnel who have access to or own the organization’s master usernames and passwords to biometric secured centers. Equipment, including hardware and software, installed, and configured in digital biometrics authentication will provide operative connections for incoming and outgoing communication and instructions in the progression.

Modern digital biometrics authentication technology provides flexibility by allowing efficient integration and management of secured data, information and verification of records located in biometric database file servers. As Esin (2017), Fennelly (2017), Nanavati, Thieme, and Nanavati (2002) noted, modern biometric database file servers, codenamed secured digital command center, houses an organization’s protected master username, password, private data and application data. Failure to adhere to or a swerve from modern-day digital biometrics authentication forensic analysis will allow regeneration of apprehension, loss of vital data, alteration of information, unauthorized access, submission of untold sway on digital data integrity, and the complete loss of confidence in operations across the globe. Biometrics authentication forensic analysis has provided a systematic corridor for inventive advancement, recuperation of global economy, security operation, telecommunication, high divination systems, Internet connections and digital data stowage (Esin, 2017; Ngwang, 2016; and Kazimov & Mahmudova, 2015). The adoption and implementation of leading-edge digital biometrics authentication forensic analysis operatives are the best defensive and offensive security measures designated to improve quality and longevity of lives and to safeguard human society. This security has been realized through the discovery and use of definite and authentic fingerprints. voice. fingerprints, iris patterns, hand geometry, facial image, and deoxyribonucleic acid (DNA). These worthwhile initiatives have all resulted in the protection of innocent citizens from erroneous conviction and jail terms.

Per Alexander and Shahnewaz (2020), Hayes (2015), and Nanavati, Thieme, and Nanavati (2002), modern digital biometric authentication forensic analysis is experiencing growing acceptance across the globe due to emerging accuracy of identifying users, authentication of data security, growing strength to close gaps of conventional method and replacing them with the modern approaches. As earlier state, modern digital biometric authentication forensic analysis is designed to provide adequate security to organizations’ network security centers, workstations, network fileservers; it is equally used as a digital database storage and for the reinforcement of the degree of certainty, individual privileges, confidence, integrity and accountability. Modern digital biometric authentication is also a worthwhile point of reference in digital biometric authentication forensic analysis operation often deployed in across-the-board surroundings encountering multiple of incoming and outgoing conducts and characteristics of a large population, such as at local and international airports, judicial offices, national and central banks, and military garrisons to safeguard vulnerable innocent citizens.

Effect of Digital Biometric Amid COVID-19

Today, digital biometric authentication forensic analysis is exerting greater impact on members of the world community who must undergo a thorough screening process by custom and immigration officers at the point of entry, exit and borders crossings. Amid the COVID-19, the major concern is the security of private citizens. Notwithstanding the world citizens’ privacy, digital biometric authentication forensic analysis and testing is recurrently deployed as the most authentic defensive and offensive approach to effective and efficient security measurement tool against the world pandemic shattering episode. However, the pandemic seems to be girded by scriptural and mystical realities when analyzed mathematically:

Today, COVID-19 (C = 100, 0 =79, V = 5, 1 = 1, D = 500 = 685-19 – 666; Revelation 13:18) has put the entire global community in challenging times and uncertain disorders amidst intriguing questions that allow super-powers, middle powers, lowers-powers and zero-powers; first-world, second-world, third-world, fourth-world and zero-world nations to undyingly and undeniably remain humble, unassuming, and untiringly acknowledge the Glory of God’s Creation. God repronounced the Glory, Wonders and Blessings in the Worldly Kingdom that He had created (Job 38:18). God did not declare His servant Job innocent or guilty; hence amid COVID-19, we must continue to work together, pray together and eternally refrain from declaring all God’s dedicated and consecrated families on earth innocent or guilty (Esin, 2011; Murray & Murray, 1985).

Nations who are firmly engrained with stockpiles of nuclear weapons, ballistic long-range, short-range and no-range missiles that act like labor-saving-mechanical appliances, such as washing machines, toasters and photocopy machines contain push buttons, which gives these leaders the unique and unprecedented opportunity and urge to push just a button and have the devastation done on vulnerable innocent global citizens. Leaders with nuclear weapons seem determined to do everything humanly possible to destroy entire nations or regions who attempt to acquire nuclear weapons; where are the nuclear missile buttons now that COVID-19 is drumming the doorbell.? COVID-19 operates on an exclusive agenda that cannot be changed, re-scheduled and in aberration of the new world order and demanding total obedience and submission to God’s last pronouncement across the globe. In compliance to the new world order, global communities, including villages, cities, counties, local regions, states and national organizations are urged to assume equal responsibilities in the re-organization and re-structuring of functional rehabilitation and the establishing of pandemic hospitals, healthcare facilities with well-matched medical equipment and supplies and educational systems with well-suited instructional equipment and learning tools, parallel to national military-weapon budgets. Per Chauhan and Gupta (2015) and Kazimov and Mahmudova (2015), most segments of biometric authentication are used to identify and for voice verification, to record a person’s voice through a microphone. As such, digital biometric system is related to mathematics model and threshold calculations. This process is further categorized into more dimensions such as measurement, signal processing, pattern matching, forensic inquiry, analysis, decision making, creation of the reference model and authentication trial (Esin, 2017; Fennelly, 2017; and Hayes, 2015).

Conclusion

Today, the modern digital biometric authentication is improving quality and longevity of lives and safeguarding human society. It is meeting acceptance across the globe due to emerging accuracy, matching strength to close gaps of predictable approach and replacing the old identification systems with superior level of security that cannot be stolen and/or manipulated. It is also dependable, user friendly, hard to falsify and it requires negligible training time and an inexpensive and accurate verification process.

Per Fennelly (2017), every human being is created differently with physical and behavioral traits that are unique; and everyone’s fingerprints, iris, facial feature, and body types are entirely different from one another. The effective and efficient use of biometric technology will play a key role in automating a new method of identifying living person based on individual physiological and behavioral characteristics. Protecting sensitive information from vulnerable access by unauthorized users is paramount in our digital world and attempting to identify and mitigating such operation is becoming incredibly challenging and troubling to the entire human society.

Biometric authentication-based identity is playing a vital role in security operations. Traditional authentication approach used to identity logon, logout, username, passwords are no longer enough to battle the identity and security crisis. Physical Biometric processes often allow the authentication of an individual personal data to be stored in a document format for future references. The comparison is often used to determine whether the biometric characteristics of individual match the previously information recorded in the document. Physical biometric systems have proven to be amazingly effective in verification and identification processes.

Physical biometric identification and recognition processes are classified in three groupings including acquisition, feature extraction and comparison. Traditionally, biometric characteristics are acquired through measurements, such as a camera, microphone, fingerprint scanner, gathering of specific characteristics and creation of digital representation, photograph, a voice recording and scanned fingerprint. Most naturally significant areas supporting physical biometric process include corners of the eyes, mouth, nose, chin and likely to be identified by human inspection and through an automated biometric process.

Biometric Access Control is a security system used to provides conditional access after scanning for unique physical characteristics including installing Biometric Access at ATM’s and other public facilities to safeguard financial data. Indeed, when faces, fingers, irises and veins are scanned such data are converted into digital format and a complex algorithm is used to make a match. Such physical biometric processes appear to certify as foolproof with no chance of being misused and often confirm homeowners, financial institutions, public and private organization. Technology infiltrating has rearranged every facet of modern living and the global society has become progressively digitized, protective of confidential information, such as username and password. Prior to biometric operations, username and password were enough to provide adequate security to organization’s data security data. Today, in our modern age, username, password, and keys are becoming increasingly feeble and appealing to sophisticated criminals.

Undoubtedly, passwords are the weakest link in an organization’s security system because username and password are shareable, and most passwords and usernames are vulnerable and ready to be cracked with a variety of methods. Physical biometrics continue to remain overly concerned with a record number of devices and platforms connected to the Internet of Things daily and at an alarming rate. Recognizing the magnitude of the plethora of devices such as smartphones, tablets, sensors, cloud-based services and more sending and receiving information continuously, time has come to keep vital data out of the hands of high-tech criminals and unauthorized users. It is worth noting that username and passwords are unwieldy because even authorized officials use the same username and password on multiple devices and create ample opportunities for perpetrators to avail themselves with and accepting the fact that human error are inevitable.

References

Alexander, Felipe & Shahnewaz, Sharon. (2020).Top Ten Mind Blowing Advantages of Biometric Technology.” CircleCare - Corporate Wellness App Digital Marketing App Digital Marketing at M2SYS Technology.

Chauhan, Kapil, and Gupta, Himanshu. (2015). “Role of Biometric Security for the Enhancement of Data Security. Journal of International Journal of Computers and Technology. Vol. 14, No. 10. www.ijctonline.com.

Dascalescu, Ana. (2020). “What is biometric Authentication?” Heimdal Security.

https://heimdalsecurity.com/blog/

Esin, Joseph O. (2017). Landscape of Cybersecurity Threats and Forensic Inquiry. Bloomington,

IN: Author House.

Esin, Joseph O. (2018). “Offensive and Defensive Approach to Ethical Hacking.” Washington, D. C.: Washington Center for Cybersecurity Research and Development (WCCRD).

https://www.washingtoncybercenter.com/publications-projects.

Esin, Joseph O. (2011). The Messianic View of the Kingdom of God. Bloomington, IN.:

I-Universe

Fennelly, Lawrence J. (2017). Effective Physical Security. Waltham, MA: Elsevier, Inc.

Hayes, Darren R. (2015). A Practical Guide to Computer Forensics Investigations. Indianapolis, IN.: Pearson Education, Inc.

Kazimov, Tofig and Mahmudova, Shafagat. (2015). The Role of Biometric Technology in Information Security.” Journal of International Journal of Computers and Technology. Vol. 02. Issue: 03. www.irjet.net.

Krutz, Ronald L. & Vines, Russell Dean (2007). The Certified Information Systems Security Professional (CISSP) and Certification and Accreditation Professionals (CAP) Prep. Guide. Indianapolis, IN: Wiley Publishing, Inc.

LeClair, Jane & Keeley, Gregory. (2015). Protecting Our Future: Cybersecurity in Our Digital Lives. Albany, NY: Hudson Whitman-Excelsior College Press.

McMillan, Troy & Abernathy, Robin. (2014). Certification Guide for Certified Information Systems Security Professional (CISSP). Indianapolis, IN: Pearson Education, Inc.

Murray, Rev. Daniel A & Rev. Murray, John P. (1985). Saint Jerome Edition Catholic Study Bible: Deuterocnonicals/apocrypha. Nashville, TN: Thomas Nelson Publishers.

Nanavati, Samir, Thieme, Michael & Nanavati, Raj. (2002). Biometrics, Identity Verification in a Network. New York, NY: John Wiley & Sons, Inc.

Ngwang, E. N. (2016). “Individual Freedom, Cyber Security and Nuclear Proliferation in a Borderless Land: Innovations and the Trade-offs in Scientific Progress.” The Journal of Educational Research and Technology (JERT). Vol. 5. No. 5, 33-72. www.thejert.com.

Chapter 11. Access Control Systems and Identification Badges.

Access control systems (ACS) is a security system designed to regulates user and group of authorized users name and password to organization secured data center, specific buildings, specific workstation, keys and badges to enter only assigned rooms and buildings relative to allotted duties. Access control systems tend to allow keyless entry to organization high-sensitivity areas, indicating that a special identification (ID) card is required to gain entry. Access control cards operates in conjunction with card readers situated by entrances to facility and high-security data center units within organization facility. Every now and then, the card is swiped or waved in front of the reader, which processes and verify the information on the card prior to allowing authorized user’s access. It must be underscored that ACS is more secure than traditional keyed entry; recognizing the fact that if access control card is misplaced, lost, and makes its way into the wrong hands, it can easily be deactivated for the same personnel.

Access control systems is categorized into three variations: discretionary access control (DAC), mandatory access control (MAC), and role-based access control (RBAC). discretionary access control (DAC) is designated to hold leaders of organization accountable of why individual should be allowed access to secured control locations. DAC is the least restrictive unit compared to the other systems that often allow individual or group of individuals complete access to organization network data center. The downside of discretionary access control is allowing authorized users opportunity to upgrade access level, privileges and permissions even to nonmembers of the organization; mandatory access control (MAC) and mandatory access control is utilized in organizations that require an elevated emphasis on the confidentiality, sorting and identification of vital data. Unlike DAC, MAC have an established mechanism to control authorized and unauthorized users’ access to secured data center. Role-Based Access Control (RBAC) appears somewhat challenging and demanding but susceptible in most facet of access control systems.

Per Fennelly, (2017:256), effective access control system is designated to prevent espionage devices, dangerous materials, assets, records, vital data, and intellectual properties out of the organization facility. Furthermore, access control systems and identification badges often reinforce the recognition of employee activities including Identification (ID) cards, badge exchange, escort of temporary consultant and visitors in and out of the facility.

  1. You have been retained as a Lead Information Technology (IT) Director in University of the Cumberlands registrar unit. Student and personnel records are especially important to the institution. Recognizing three essential components of access control systems and identification badges, which of these components; discretionary access control (DAC), mandatory access control (MAC), and role-based access control (RBAC) will you implement to support the institution registrar unit.

  2. Professional inquiry: which of these three types of can be used to protect and defend access rights to the records, data information of students and personnel embedded in the university registrar unit?

i. Role-based access control ii. Discretionary access control iii. Mandatory access control iv. Relational access control Correct Answer Only

  1. Provide comprehensive narrative on how your plan of action will postulate offensive and defensive measures for university of the Cumberland’s registrar unit.

Chapter 12. Chain-Link Fence Standards

Empirically, chain link fence is a stable and durable barrier designed to protect an organization facility against intruders. Chain-link fence often operates as a workhorse known to have been in existence for decades and operate well with limited maintenance. Notably, chain link fence is strong, resilient, hard-wearing, neither snow nor ultraviolet (UV) electromagnetic radiation output from the sun can keep chain-link fence from protecting the facility. The primary drawback associated with chin-link fence (CLSF) is the flexibility of allowing intruder to see-through the building and be able climb into the facility. The next downside of chin-link fence is a complete lack of privacy. Per Fennelly (2017), a chin-link fence is one of the major building blocks entrenched with additional security measures such as:

  • Legal boundary of the outmost organization facility, controlling and screening outgoing and incoming traffic into organization secure data and information center.

  • Surveillance, detection, assessment, instruction detection and closed-circuit television (CCTV).

  • Deterrence of a well thought-out and unintended intruders into organization secured data and information center.

  • Creation of a psychological deterrence against intruders.

  • Inclusion of cost-effective measures to protect organization facility

Chapter 13: Doors, Door Frames and Signage.

The primary purpose of the doors and door frames is to provide a lasting support to the facility. Professionally designed and maintained doors and door frames are the cornerstone of protecting, securing, and controlling an organization’s data, assets, and information. The protection and controlling are causally related to how the organization’s resources are retrieved, reducing the risk of unauthorized modification and disclosure of data and information to the public. Customary physical security controls and total reliant on mechanical locks, and proximity cards as sole access control mechanisms to secure organization facilities are insufficient. However, doors, doors frames and locks are entrenched with vulnerabilities and inherent risks.

Significance of Doors and Door Frames.

Doors and door frames often play a vital role in keeping an organization’s facilities and employees safe, minimizing property damage during fire, cyber-threat, and cyber-attack. As Fennelly (2017) noted, there has been limited loss of life from fire vulnerability in a building with professionally installed and maintained doors and door frames. Door frame are strong and are reinforced with strength to withstand sizeable natural, synthetic, and intentional exploitation. Professionally installed doors and door frames often last many years before repairs and upgrades are necessary. Furthermore, they typically available in the field at relatively low cost.

Fennelly, (2017-276) in his studies on doors and door frames indicated that the primary function of doors and door frames in physical security is to provide maximum security and barrier at the point of entry into and exit from the organization’s facility. It is worth noting that the projected barrier must be impenetrable by ordinary route and entrenched with all-out measures against intruders. Fennelly further noted that the highest offensive and defensive security approach must commence during the designing and installation of doors and door frames, in consideration of the administrators’ and employees’ entry and exit doors and guests’ and consultants’ entry and exit outlets.

Chapter 14. Glass and Windows

Physical security is a fundamental component of cybersecurity operations. A building is not complete without compatible doors and windows. Windows often facilitate entry and emission of natural light indoors, allowing occupants to enjoy the views of the neighborhood, locality and keeping the house/building ventilated. The functional difference between doors and glass windows is the ability to control the physical atmosphere within the building, screening most areas of the building and keeping utility unit separate from other parts of the building. Glass windows often provide openings which function as natural ventilation and serve as a connecting link between the interior and exterior and provide free movement in and out of the facility. As Fennelly (2017:279282) noted, glass-windows tend to play a health-giving role by allowing sunlight, visibility and ventilation into the building and making the building a healthy facility. Using up-todate and innovative technology often contributes to a relaxed and healthy standard of living in any community. Glass-windows are categorized into five groups: laminated, sheet, tempered, bullet resistant and float.

Laminated glass is designated as a safety glass engrained with polyvinyl butyral, structurally durable, high-performance in nature; not easily shattered. Sheet glass has a thickness of typically 3-4 mm and often vulnerable to rupture in case of strong wind and thunderstorm. Tempered glass is 10 mm tougher, five times sturdier than laminated and sheet glasses and can resist any fracture. Bullet-resistant glass is well-structured with strong transparent materials such as polycarbonate thermoplastic layer of a regular glass, harder than plastic glass and prevent the penetration of bullets. Naturally, bullet-resistant glass is made up of an explosion, thunderstorm, and bullet-resistant materials. Float glass is composed of a sheet of glass made of floating molten glass with molten metal often tin in nature. It is worth indicating that modern windows are made from float glass.

Chapter 15: Importance of Physical Security

Security is a crucial component for any organization and the process of incorporating physical security is incredibly challenging. An organization’s facility must adopt security measures that are fully equipped with available measures to restrict perpetrators and unwanted guest access to certain locations within their premises. Physical security strategies must be implemented in accordance with a broad-range plan to safeguard equipment, resources, assets, data, and information. Organizations must establish the mechanism that works in tandem to enhance collaborative operations. Per Esin (2019) and Fennelly (2017), organizations must recognize the importance of technology in all scopes of physical security stratagems such as inclusion of technology, dedicated file servers, compatible hardware, and software to achieve security safety.

Organization’s objectives must include adequate measures to protect assets from intruders, internal and external threats, cyber-attacks, and natural disasters, which in turn requires assortment of technology, well-suited hardware and software, and in-personnel monitoring.

Physical security operation includes a wider security strategy such as access control, surveillance, and security testing, Access control is one of the outer edges of an organization’s security perimeters. The process must involve fencing and video surveillance systems to monitor incoming and outgoing access, outside resources, and parking lots. All-inclusive and comprehensive access control system measures and strategy would also take account of advanced locks, access control cards, mobile devices, biometric authentication, and authorization processes (Esin, 2017 & LeClair 2016). Surveillance is an added value and critical component in physical security operation. Most organizations tend to install modern multiple types of protective security systems such as surveillance cameras and notification systems to capture crimes on tape. They also deploy associated security systems to detect motion, heat, and smoke against intrusion of envisioned and unintentional access to the facility. As Esin (2018) in his studies on defensive and offensive approach to ethical hacking asserted, all-embracing physical security measures must be structured to precisely deny unauthorized access to equipment, hardware, software, asset, data, information, and resources; and it must monitor discontented personnel, espionage, theft and terrorist access into organization’s facilities.

Guidelines

Locating a suitable site for academic exercise is challenging and could compromise vital demographic factors such as vulnerabilities and security risk management and assessment and zero or limited argument. Risk management and assessment must be pregnant with data and documentation required to make academic-driven decisions suitable for the institution, students, and facility proprietor. Your findings and agreement must show variation based on need priorities, brainstorming a range of possible countermeasure solutions. University of the Cumberlands 2020 fall residency plan of action in Dallas, Texas requires a comprehensive agreement of all parties on building site, student and faculty safety, duration of stay, building construction, room assignments, emergency procedures, surveillance cameras in each classrooms, State of Texas governing occupancy regulations, deadlines fulfilment of financial obligations, security apparatus, number of human security officers on duty and equipment, and hardware and software to support instructional and student learning endeavors.

Based on the objectives and guidelines delineated overhead:

  • Articulate in detail your mission-driven plan of action in locating a suitable site for Fall 2020 residency in Dallas, Texas.

  • Described types of glass-windows to be installed in the classrooms to enhance instructional and student learning endeavors and security.

  • Bearing in mind, “zero or limited argument” axiom, the chosen site facility proprietor prefers video surveillance systems in the classroom to human patrol security officer. Based on your expertise in physical security, what will you prefer, video surveillance systems or human patrol security officer

    1. Video surveillance systems Why?

Provide detail explanation

  1. Human patrol security officer. Why?

Provide detail explanation


33