Reference no: EM131291558
You are a newly hired civilian contractor for the U.S. Navy at a naval air station. Your position is a security engineer. This project has recently been consolidated to this location from several coastal areas. The team is a small department that focuses on unmanned naval surveillance vehicles.
You have been asked to perform the initial network design while you wait for your security clearance to get approved. You have to bear in mind the requirements that Navy has for this project. There is a 2 terabyte UNIX DB2 database, which is used for craft designs, part lists, and experimental results; additionally, a smaller Oracle database running on Windows servers takes care of scheduling, administration, and personnel data.
The network will require 200 hosts in the design and development department, 20 in the personnel department, and 40 in the acquisition department. The acquisition department will need access to the secure internal network and external Department of Defense suppliers, whose networks are not considered secure. Both of these departments will need access to Windows laser printers and UNIX-based design plotters. The captain in charge of the project and his staff of 10 need a wireless virtual private network (VPN).
This work is considered top secret and outside of the requirements of the acquisition department; the network is considered a secure one that must meet the requirements of common criteria and evaluation assurance level 4+ (EAL 4+). The internal, border, wireless, and default gateway duties are handled by a major equipment company. Data availability is important because the government has tens of millions of dollars already invested in this project.
In preparation for your network design project, discuss with your classmates ideas for addressing the security vulnerabilities in the network design. In your discussion, address the following:
- What challenges will need to be addressed with the U.S. Navy project described in your scenario?
- What types of vulnerabilities need to be addressed in the design?
- Where might there be points of failure in the design?
- What areas concern you about securing the network?
- What steps would you recommend to overcome those concerns?
Outline your ideas in a 3-5-paragraph posting.
What are some tips you learned from this unit lesson
: What are some tips you learned from this unit's lesson that you might find helpful?What are some study tips you have found help you most for study in the past?
|
Store the message hello world
: Write a program that carries out the following tasks: Open a file with the name hello.txt; Store the message "Hello World!" in the file; Close the file; Open the same file again; Read the message into a string variable and print it. The program s..
|
Standing conference for the incident team
: Once a secure connection was in place, he ran the remote desktop software, and it was as if he were sitting in his office. He plugged in his headset and ran the virtual meeting software. He saw that there was standing conference for the incident t..
|
Discuss about the journal entries given below
: Discuss about the journal entries given below:Elder abuse is any intentional or negligent behavior that results in physical, sexual, emotional, pharmacological, and/or financial abuse. Unfortunately, abuse is sometimes difficult to identify, and el..
|
Location from several coastal areas
: You are a newly hired civilian contractor for the U.S. Navy at a naval air station. Your position is a security engineer. This project has recently been consolidated to this location from several coastal areas. The team is a small department that ..
|
What is the conversion of decimal number
: What is the conversion of decimal number 61 base 10to it's binary number equivalent?
|
Description of the communicable disease
: Description of the communicable disease (causes, symptoms, mode of transmission, complications, treatment) and the demographic of interest (mortality, morbidity, incidence, and prevalence).Describe the determinants of health and explain how those ..
|
Definition of conditional probability
: You throw these three dice in a box so that they end up at uniformly random orientations.You pick a uniformly random die in the box and observe that it has 0 on its top face. Use the formal definition of conditional probability to determine the pr..
|
Great majority of businesses today
: The Microsoft Windows enterprise operating system is utilized by a great majority of businesses today. Write an essay defining a Network Operation System (NOS), and briefly summarize the Microsoft Windows operating system. Be sure to include a min..
|