Good Morning Everyone, I Hope You Are All Having A Wonderful ✓ Solved

Good Morning Everyone I Hope You Are All Having A Wonderfu

The Azure Cognitive Services from Microsoft are able to contain applications encompassing decision-making, speech, language, vision, and search. Similar to humans, this type of AI has the ability to process facial recognition, emotion, image classification, etc. With the services from Microsoft, they are able to harness the power of all those skills, and produce a product with all of the data and descriptions. The control here are the images that will be uploaded to be analyzed. They are generic thumbnails taken from certain resources to provide good experimentation data.

With my argument, I am reaching that this tool should be used across the intelligence community, so if I were conducting this experiment, I would change the pictures to be that of SARs, sensor generated, etc. That would be a modification in terms of tools. I would also implement analysts with similar qualifications and experience to see what they pull from the pictures, and do a comparison. The data being collected contains both quantitative and qualitative information. The time it took to process, what it did process, and how it categorizes the picture can be pulled from the software application being used.

In terms of validity, the comparison of the human generated analysis and the artificial intelligence generated analysis, it would center around criterion validity. In order to prove the content validity, there would have to be some research conducted and published within the research paper about the applications from Microsoft. For research reliability, since I am basing this experiment off of experiments done before, I can see what consistent results work, and what issues arise in the process. Test-retest is another instrument that would be useful, to ensure that each decomposition of the pictures is true, and that the data does not change.

For my research proposal, I chose the topic of security management, more specifically, how the studying of the history of security management significantly impacts the effectiveness of those who practice it. At first, I was very confused on how to go about this assignment. I used a qualitative approach at first to delve into the history of security management.

I went back at documentation of attacks and how had they been managed more properly they could have been avoided. Then I went to a more quantitative route and looked at the statistics of similar attacks and reviewed the logistics and casualties to come up with my purpose statement. My odd topic for a proposal led me to use some interesting research instruments. I started with first-hand accounts of world and military leaders' choices and mindsets at the times, this I consider to be an observation. An observation is a first or second-hand account of events taking place.

Then once I went into the numbers and statistics of my research, I went to using old and newer surveys that had already been conducted. Surveys aid the researcher by gathering quantitative data to assist with displaying the quantitative aspects of their proposal.

Technological advancements flooding the security industry are beneficial to the protection of critical infrastructure and assets. However, execution of applying such devices requires an educated security manager that can extract the most benefit from often various integrated systems. Smith and Brooks (2012) support this by stating that an emphasis on the context of the security is necessary for technology to be applied within a security management strategy. Technology is frequently used to fill gaps of security programs or enhance security in high security or critically defined areas.

One of the most used Defense-in-Depth strategies is access control. This strategy protects assets by reducing access by unauthorized personnel. Smith and Brooks (2012) ultimately confer that the role of access control systems (ACS) is to deter, detect, and delay intrusions while facilitating a response.

While there are many aspects that can be incorporated into an ACS, I have found a few that I consider essential to maintain the integrity of the system. First and foremost, a physical security assessment of the facility is primary to any access control system. Identifying high security areas and providing a desired traffic pattern of both visitors and employees is crucial.

Within the employee roles, I would identify levels of security clearances. This includes control panels, access points, card readers, cameras among other devices. This will ultimately identify what access control measures are employed and where. Once the base system is designed, establishing a badging station with dedicated personnel to manage the issuance and termination of badge activity is essential. This will ensure that only active personnel have access to the facility.

For identification purposes, all employees will have an updated picture placed on their badge and will show up for all swipes performed on the system. Additionally, I will establish a mandatory display policy for all employees. Clients or visitors will also be issued a visitor badge and must be escorted by an employee at all times while in the building. The employees will be responsible for all visitor badges.

A base station that handles access control and security monitoring will dispatch security personnel for any alarms that may occur. This would include intrusion alarms, door forced open alarms, door held open alarms, etc. This would give the security staff monitoring the facility a bird’s eye view of activity within the facility. Overall, this framework will give a decent starting point for an ACS.

While access control measures can be a powerful tool, enhanced methods may be used for higher security areas. Biometrics uses biological traits to identify individuals. Traditional biometric characteristics have been fingerprints and retinal scans; however, there have been improvements to include other identifiable elements such as voice identification and hand vein patterns. Biometric use can be expensive to install and maintain, so this protocol should be used sparingly if budget constraints are an issue. With this in mind, I would personally use biometric to secure highly sensitive information or where high levels of security are needed.

An added benefit to using biometric measures in limited capacities is that the access pool may be considerably smaller, making it easier to manage. Overall, there are several ways to implement access control elements. While many are very good, establishing how and what to implement based on the specific environment is the key to a well-rounded system.

Paper For Above Instructions

Access control systems (ACS) are essential to any security program. These systems are designed to allow access for authorized personnel while preventing or detecting entry by unauthorized individuals. The ability to accurately identify those accessing a facility or sensitive location will aid in the security posture of any organization. ACS systems work in conjunction with many other systems, including Defense in Depth security systems, alarms and detection systems, fire and safety systems, emergency management, and building management.

There are several features to utilize in an integrated access control system. Security staff at entry points and/or monitoring closed-circuit television cameras can work with ACS systems to enhance safety measures. Identification can be aided at access control points utilizing identification cards and biometric technology. Biometric technology can help ensure identification by utilizing individual characteristics of a person, such as facial recognition, retina scan, voice recognition, hand geometry, and fingerprints.

Security managers must carefully select which biometric system to utilize based on the organization’s needs. For access into sensitive areas, hand geometry is a biometric technology that can be employed. This technique measures the geometric dimensions of hand features for identification purposes. The features measured include hand length and width, as well as finger width and length. One advantage of this technique is that it is minimally intrusive and relatively simple to collect data.

Despite its benefits, there are challenges associated with biometrics, such as false positives or negatives. For instance, hand geometry may offer remedies to false readings by employing significant lighting for improved readings; however, dirty settings can hinder verification. Therefore, security managers must ensure proper maintenance to address these issues. Additionally, biometric systems can be costly due to proprietary equipment requirements and physical space needed for installations.

References

  • Cremer, S., & Loebbecke, C. (2019). Artificial intelligence imagery analysis fostering big data analytics. Future Internet, 11(8), 178. doi:10.3390/fi11080178
  • Smith, C., & Brooks, D. J. (2012). Security Science: The Theory and Practice of Security. Burlington: Butterworth-Heinemann.
  • Zuva, T., Esan, O. A., & Ngwira, S. M. (2014). Hybridization of bimodal biometrics for access control authentication. International Journal of Future Computer and Communication, 3(6), 474-479. doi:10.7763/IJFCC.2014.V3.303
  • Asha, S., & Chellappan, C. (2012). Biometrics: An overview of the technology, issues and applications.
  • Blog, F. (2019, July 23). 7 Data Collection Methods & Tools For Research. Retrieved December 09, 2020, from Technological advancements.
  • Gams, M., & Tušar, T. (2007). Intelligent High-Security Access Control. Informatica, 31(4), 341-348.