Location from several coastal areas

Assignment Help Business Management
Reference no: EM131291558

You are a newly hired civilian contractor for the U.S. Navy at a naval air station. Your position is a security engineer. This project has recently been consolidated to this location from several coastal areas. The team is a small department that focuses on unmanned naval surveillance vehicles.

You have been asked to perform the initial network design while you wait for your security clearance to get approved. You have to bear in mind the requirements that Navy has for this project. There is a 2 terabyte UNIX DB2 database, which is used for craft designs, part lists, and experimental results; additionally, a smaller Oracle database running on Windows servers takes care of scheduling, administration, and personnel data.

The network will require 200 hosts in the design and development department, 20 in the personnel department, and 40 in the acquisition department. The acquisition department will need access to the secure internal network and external Department of Defense suppliers, whose networks are not considered secure. Both of these departments will need access to Windows laser printers and UNIX-based design plotters. The captain in charge of the project and his staff of 10 need a wireless virtual private network (VPN).

This work is considered top secret and outside of the requirements of the acquisition department; the network is considered a secure one that must meet the requirements of common criteria and evaluation assurance level 4+ (EAL 4+). The internal, border, wireless, and default gateway duties are handled by a major equipment company. Data availability is important because the government has tens of millions of dollars already invested in this project.

In preparation for your network design project, discuss with your classmates ideas for addressing the security vulnerabilities in the network design. In your discussion, address the following: 

  • What challenges will need to be addressed with the U.S. Navy project described in your scenario?
  • What types of vulnerabilities need to be addressed in the design?
  • Where might there be points of failure in the design?
  • What areas concern you about securing the network?
  • What steps would you recommend to overcome those concerns?  

Outline your ideas in a 3-5-paragraph posting.

Reference no: EM131291558

Questions Cloud

What are some tips you learned from this unit lesson : What are some tips you learned from this unit's lesson that you might find helpful?What are some study tips you have found help you most for study in the past?
Store the message hello world : Write a program that carries out the following tasks: Open a file with the name hello.txt; Store the message "Hello World!" in the file; Close the file; Open the same file again; Read the message into a string variable and print it. The program s..
Standing conference for the incident team : Once a secure connection was in place, he ran the remote desktop software, and it was as if he were sitting in his office. He plugged in his headset and ran the virtual meeting software. He saw that there was standing conference for the incident t..
Discuss about the journal entries given below : Discuss about the journal entries given below:Elder abuse is any intentional or negligent behavior that results in physical, sexual, emotional, pharmacological, and/or financial abuse. Unfortunately, abuse is sometimes difficult to identify, and el..
Location from several coastal areas : You are a newly hired civilian contractor for the U.S. Navy at a naval air station. Your position is a security engineer. This project has recently been consolidated to this location from several coastal areas. The team is a small department that ..
What is the conversion of decimal number : What is the conversion of decimal number 61 base 10to it's binary number equivalent?
Description of the communicable disease : Description of the communicable disease (causes, symptoms, mode of transmission, complications, treatment) and the demographic of interest (mortality, morbidity, incidence, and prevalence).Describe the determinants of health and explain how those ..
Definition of conditional probability : You throw these three dice in a box so that they end up at uniformly random orientations.You pick a uniformly random die in the box and observe that it has 0 on its top face. Use the formal definition of conditional probability to determine the pr..
Great majority of businesses today : The Microsoft Windows enterprise operating system is utilized by a great majority of businesses today. Write an essay defining a Network Operation System (NOS), and briefly summarize the Microsoft Windows operating system. Be sure to include a min..

Reviews

Write a Review

Business Management Questions & Answers

  Improving workers and patients safety in a healthcare

For this assignment, choose one of the components in your project management plan and evaluate potential problems associated with that particular aspect of the project; for example: project scope, scheduling, budgeting, procurement, or communicati..

  Business violate maria rights

Since the FMLA leave was not granted and since Maria was absent from work from June 15 to July 1, Big Business terminated her. Was Maria entitled to the FMLA leave that she requested? Did Big Business violate Maria's rights in terminating her?

  Responsibility of developing new supplier evaluation process

Your Supply Chain Manager has assigned you the responsibility of developing a new Supplier Evaluation process for your company.  Your company has experienced an unfavorable trend in low productivity as a result of component availability, re-workin..

  Disadvantages of compensating salespeople by salary

What are the advantages and disadvantages of compensating salespeople by salary? By commissions?- What do you think is an acceptable compromise?

  Roles and responsibilities of leaderswhat would be some

roles and responsibilities of leaderswhat would be some roles and responsibilities of leaders in creating and

  Relationship between roic and growth and cash flow

How does return on invested capital (ROIC) affect a company's cash flow? Explain the relationship between ROIC, growth, and cash flow.

  Capital structure theorycompany x has an all common equity

capital structure theorycompany x has an all common equity capital structure. pertinent financial characteristics

  Method has to check for thatcondition

You cannot assume that the three arrays are the same length; the method has to check for thatcondition. If the three arrays are not the same length, the return value should be a single elementint array with the value of -1.

  Couple of thousand friends and acquaintances

We get married a few times in our lives, have a couple of hundred close friends, a couple of thousand friends and acquaintances but we enterinto hundreds of thousands of contracts. As such the contract is the fundamental basis for our relationship..

  Original objective statement and a summary of qualifications

The cover letter should be concise and to the point

  Explain what is an incident report in health care

Explain What is an incident report in health care and When would you complete an incident report and what would you be sure to include in the report?

  Discuss the path-goal theory and the substitutes for leaders

Discuss the path-goal theory and the substitutes for leadership approach. Which one would you recommend to Phil to use? Explain why?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd