Defense coastal guard operate at remote areas

Assignment Help Computer Networking
Reference no: EM13314452

Defense/coastal guard operate at remote areas. Guards need critical information at unusual times to step further in the mission.

Following are the key requirements of the defense department:
• Members of military need to have access to information on their PCs and desktops. It is not feasible for them to use these devices on fields.
• They also require to command and control programs and different solutions which allow them to operate with same criteria as that of control environment.
• Military face the challenge of searching a gadget and operating system. It should have a rugged feature so that it can be used in a battle field without compromising on security of defense network.

People engaged in military defense operations make use of a number of electronic devices that range from simple devices which are used by a common man such as a gps, pda to sophisticated devices whose internal workings may very well be classified. However when it comes to devices such as Smartphone, Laptop or a Tablet the US Coast Guard is very strict as these devices could prove to be a security issue. This could be due to various reasons, for instance let's say personnel brings in his laptop which carries a malicious Trojan capable of spreading through the wireless network and then causing harm to the computers on the network or possibly even steal sensitive data. This cannot be allowed to happen and the US Coast Guard is therefore extremely strict when it comes to such devices and thus it blatantly disallows any personnel to carry personal devices on board. However until recently, they've decided to go a little lenient on their stand with such electronic devices and they're thinking of deploying such devices on their own to the personnel on board rather than having them carry their own personal device so as to maintain security.

So as to make that happen a series of security practices needs to be followed which are mentioned in the requirements below:

R1: The device shall be encrypted so that no one can make use of the data saved in it if it gets into the wrong hands.
R2: A system administrator shall be able to control the device remotely
R3: A system administrator should be able to monitor the device remotely.
R4: A system administrator should be able to perform operations on the device remotely.
R5: The data stored in the device should be encrypted.
R6: The tablet should be able to encrypt the data when the user logs in.
R7: The user of the tablet should be able to connect to all the major government websites and subscribe to its updates via their email. All further communications to and fro from that email should not store in an easily readable database.
R8: If the user needs to view a particular attachment, it should be viewable. For instance, if the user wishes to view a word document attached in his emails, he should be able to have the ability to open that attachment.
R9: The tablet should be secured in all respect. Any unauthenticated wireless connection to and fro from the device should not be allowed unless it is authenticated.
R10: All the wireless capabilities of the device except WIFI connectivity should not be allowed. This includes Bluetooth, Infrared and NFC capabilities.
R11: The tablet should come free of any pre-installed 3rd party apps such as Wireless carrier Installed Apps. Only the most basic apps should be present.
R12: The tablet should be able to encrypt the emails so that no one can capture packets wirelessly and decipher what information is contained in them.
R13: The tablet should allow proper authentication policies through a PIN and a Smart Card.
R14: The GPS functionality of the tablet should be disabled.
R15: The tablet should prevent unauthenticated user login.


Attachment:- ASSIGNMENT.rar

Reference no: EM13314452

Questions Cloud

Estimate the length of the lake : A hiker determines the length of a lake by listening for the echo of her shout reflected by a cliff at the far end of the lake. Estimate the length of the lake
Provide details of work to get a good rating at room temp : Water boils at room temperature of 25 degrees celsius when the pressure is 3.17 kPa (abs). Express this as a vaccum gage pressure (in mmHg) if atmospheric pressure is 101 kPa. Provide details of work to get a good rating.
Compute enthalpy for the aforementioned gas-phase reaction : The reaction between sodium metal and chlorine gas is highly exothermic and produce NaCl. Comment on this observation relative to the calculated enthalpy for the aforementioned gas-phase reaction.
Convert pressure to mm of blood assuming specific gravity : The sphygmomanometer is a device used to measure blood pressure. For a healthy person, the diastolic pressure is about 80mmHg (gage). Convert the pressure to mm of blood assuming the specific gravity of mercury and blood are 13.6 and 1.05
Defense coastal guard operate at remote areas : Defense/coastal guard operate at remote areas. Guards need critical information at unusual times to step further in the mission.
Determine the required height z in meters at ground level : Water is contained in a pressurized tank to a level of z meters above the ground. the air pressure over the water surface (in the tank) is 135kPa (abs). Assume the water density is 1000 kg/m^3 and take g=9.807 m/s^2.
Evaluate the total mass percent recovery : A student separated the components of a 2.743 g sample of beach sand. The separation yielded 0.632 g sea salt, 0.456 g sea shells, and 1.352 g sand. (A) calculate the mass percent of each component in the original mixture. (B) Calculate the total ..
Calculate the electric potential of each of two conductors : A +30mc charge is placed on a metallic sphere of 1.0cm radius. The sphere is surrounded by a spherical thick metallic shell, calculate the electric potential of each of the two conductors
Quality management and continuous improvement : Quality Management and Continuous Improvement

Reviews

Write a Review

Computer Networking Questions & Answers

  Subnetting mask

Suppose a subnet with prefix 128.119.40.128/26. Provide an example of one IP address (of the form xxx.xxx.xxx.xxx) which can be allocated to this network.

  Basic requirements for data communications and networking

List some of the basic requirements for the data communications and networking required to support the business information needs? Discuss in scholarly detail. Your answer should be of 300 words.

  Explain nefarious computer activities

Write a short description of what they are and include your assessment of whether this activity is something to worry about or not.

  How client process in given end system can find location

Describe how client process in given end system can find location of given user to establish connection, for instance, Internet telephone, at given point in time.

  Create the technology survey of lans

Create the technology survey of LANs, which means for each LAN determine (or create): Hardware (# of computers, printers, etc.) CPU architecture (Intel, RISC, etc)

  Write characteristics of smtp-pop3-tcpprotocols

There is an alphabet soup of protocols in TCP/IP - HTTP,FTP,SMTP,POP3,TCP,UDP,IP,ARP,ICMP, and others. What are the characteristics of these protocols? What are they used for?

  Attacks on servers on one of company-s departments

After reading about attacks on servers like to ones used in one of company's departments, the CIO has asked you to come up with a report as to what.

  Explain comprehensive disaster recovery plan for network

Explain a comprehensive disaster recovery plan for hypothetical network consisting of 20 desktop computers in domain network with 2 network servers and 2 application servers.

  How web caching can reduce delay in receiving object

Describe how Web caching can reduce the delay in receiving a requested object. Will Web caching reduce the delay for all objects requested by a user

  Different routing protocols into a new network design

Design a plan to integrate the different routing protocols into a new network design for Genome4U's lab and identify the information you will redistribute between routing protocols.

  Calculate its nearest neighbor distance dmin

Calculate its nearest neighbor distance DMIN and farthest neighbor distance DMAX. Calculate ratio r = DMAX/DMIN. Repeat this 100 times for each d, and report he average r for each d in a table.

  Attack can be detected and mitigated by stateless firewall

For each of the following attacks, say whether the attack can be detected and mitigated (to a significant degree) by a stateless or stateful firewall. Explain briefly.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd