Defense coastal guard operate at remote areas

Assignment Help Computer Networking
Reference no: EM13314452

Defense/coastal guard operate at remote areas. Guards need critical information at unusual times to step further in the mission.

Following are the key requirements of the defense department:
• Members of military need to have access to information on their PCs and desktops. It is not feasible for them to use these devices on fields.
• They also require to command and control programs and different solutions which allow them to operate with same criteria as that of control environment.
• Military face the challenge of searching a gadget and operating system. It should have a rugged feature so that it can be used in a battle field without compromising on security of defense network.

People engaged in military defense operations make use of a number of electronic devices that range from simple devices which are used by a common man such as a gps, pda to sophisticated devices whose internal workings may very well be classified. However when it comes to devices such as Smartphone, Laptop or a Tablet the US Coast Guard is very strict as these devices could prove to be a security issue. This could be due to various reasons, for instance let's say personnel brings in his laptop which carries a malicious Trojan capable of spreading through the wireless network and then causing harm to the computers on the network or possibly even steal sensitive data. This cannot be allowed to happen and the US Coast Guard is therefore extremely strict when it comes to such devices and thus it blatantly disallows any personnel to carry personal devices on board. However until recently, they've decided to go a little lenient on their stand with such electronic devices and they're thinking of deploying such devices on their own to the personnel on board rather than having them carry their own personal device so as to maintain security.

So as to make that happen a series of security practices needs to be followed which are mentioned in the requirements below:

R1: The device shall be encrypted so that no one can make use of the data saved in it if it gets into the wrong hands.
R2: A system administrator shall be able to control the device remotely
R3: A system administrator should be able to monitor the device remotely.
R4: A system administrator should be able to perform operations on the device remotely.
R5: The data stored in the device should be encrypted.
R6: The tablet should be able to encrypt the data when the user logs in.
R7: The user of the tablet should be able to connect to all the major government websites and subscribe to its updates via their email. All further communications to and fro from that email should not store in an easily readable database.
R8: If the user needs to view a particular attachment, it should be viewable. For instance, if the user wishes to view a word document attached in his emails, he should be able to have the ability to open that attachment.
R9: The tablet should be secured in all respect. Any unauthenticated wireless connection to and fro from the device should not be allowed unless it is authenticated.
R10: All the wireless capabilities of the device except WIFI connectivity should not be allowed. This includes Bluetooth, Infrared and NFC capabilities.
R11: The tablet should come free of any pre-installed 3rd party apps such as Wireless carrier Installed Apps. Only the most basic apps should be present.
R12: The tablet should be able to encrypt the emails so that no one can capture packets wirelessly and decipher what information is contained in them.
R13: The tablet should allow proper authentication policies through a PIN and a Smart Card.
R14: The GPS functionality of the tablet should be disabled.
R15: The tablet should prevent unauthenticated user login.


Attachment:- ASSIGNMENT.rar

Reference no: EM13314452

Questions Cloud

Estimate the length of the lake : A hiker determines the length of a lake by listening for the echo of her shout reflected by a cliff at the far end of the lake. Estimate the length of the lake
Provide details of work to get a good rating at room temp : Water boils at room temperature of 25 degrees celsius when the pressure is 3.17 kPa (abs). Express this as a vaccum gage pressure (in mmHg) if atmospheric pressure is 101 kPa. Provide details of work to get a good rating.
Compute enthalpy for the aforementioned gas-phase reaction : The reaction between sodium metal and chlorine gas is highly exothermic and produce NaCl. Comment on this observation relative to the calculated enthalpy for the aforementioned gas-phase reaction.
Convert pressure to mm of blood assuming specific gravity : The sphygmomanometer is a device used to measure blood pressure. For a healthy person, the diastolic pressure is about 80mmHg (gage). Convert the pressure to mm of blood assuming the specific gravity of mercury and blood are 13.6 and 1.05
Defense coastal guard operate at remote areas : Defense/coastal guard operate at remote areas. Guards need critical information at unusual times to step further in the mission.
Determine the required height z in meters at ground level : Water is contained in a pressurized tank to a level of z meters above the ground. the air pressure over the water surface (in the tank) is 135kPa (abs). Assume the water density is 1000 kg/m^3 and take g=9.807 m/s^2.
Evaluate the total mass percent recovery : A student separated the components of a 2.743 g sample of beach sand. The separation yielded 0.632 g sea salt, 0.456 g sea shells, and 1.352 g sand. (A) calculate the mass percent of each component in the original mixture. (B) Calculate the total ..
Calculate the electric potential of each of two conductors : A +30mc charge is placed on a metallic sphere of 1.0cm radius. The sphere is surrounded by a spherical thick metallic shell, calculate the electric potential of each of the two conductors
Quality management and continuous improvement : Quality Management and Continuous Improvement

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd