Requirements of the acquisition department

Assignment Help Basic Computer Science
Reference no: EM131368481

You are a newly hired civilian contractor for the U.S. Navy at a naval air station. Your position is a security engineer. This project has recently been consolidated to this location from several coastal areas. The team is a small department that focuses on unmanned naval surveillance vehicles.

You have been asked to perform the initial network design while you wait for your security clearance to get approved. You have to bear in mind the requirements that the Navy has for this project. There is a 2 terabyte UNIX DB2 database, which is used for craft designs, part lists, and experimental results; additionally, a smaller Oracle database running on Windows servers takes care of scheduling, administration, and personnel data.

The network will require 200 hosts in the design and development department, 20 in the personnel department, and 40 in the acquisition department. The acquisition department will need access to the secure internal network and external Department of Defense suppliers, whose networks are not considered secure. Both of these departments will need access to Windows laser printers and UNIX-based design plotters. The captain in charge of the project and his staff of 10 need a wireless virtual private network (VPN).

This work is considered top secret and outside of the requirements of the acquisition department; the network is considered a secure one that must meet the requirements of common criteria and evaluation assurance level 4 + (EAL 4 +). The internal, border, wireless, and default gateway duties are handled by a major equipment company. Data availability is important because the government has tens of millions of dollars already invested in this project.

Question.

In preparation for your network design project, discuss with your classmates ideas for addressing the security vulnerabilities in the network design. In your discussion, address the following:

  • What challenges will need to be addressed with the U.S. Navy project described in your scenario?
  • What types of vulnerabilities need to be addressed in the design?
  • Where might there be points of failure in the design?
  • What areas concern you about securing the network?
  • What steps would you recommend to overcome those concerns?

Outline your ideas in a 3-5-paragraph posting. Study the postings of at least 2 other classmates and respond to them with comments and questions. Ask for clarifications of their ideas if necessary.

Be sure to document your references using APA format.

Reference no: EM131368481

Questions Cloud

Write a response about the given post : The field of Human Services has the objective of meeting human needs through an "interdisciplinary knowledge base, focusing on prevention as well as remediation of problems, and maintaining a commitment to improving the overall quality of life of ..
Identify issues and troubleshooting steps covering : Create a 2.5- to 3-page troubleshooting document that is intended to become part of the internal knowledge base for IT staff members to reference when encountering issues. Your document should identify issues and troubleshooting steps covering the..
Discuss about the post given below : You are creating a database for a research study that is investigating the effectiveness of trampoline jumping for improving cognitive functioning in alzheimer's patients. Enrolled patients are being randomized into either intervention or control ..
What are key differences between gazella and its competitors : What are the key differences between Gazella and its competitors? How should Gazella use its resources to grow on its buy side? Should Gazella launch a direct-to-consumer site on its sell side?
Requirements of the acquisition department : This work is considered top secret and outside of the requirements of the acquisition department; the network is considered a secure one that must meet the requirements of common criteria and evaluation assurance level 4 + (EAL 4 +).
Write the given paper assignment : Write the given paper assignment.- Term paper topic is : "The Contract Air Mail Act of 1925, a.k.a., the Kelly Act."
St. anselms ontological argument : St.Anselm''s Ontological argument. Defend a thesis using the following formats: thesis, argument, objection, responses and conclusion.
Provide an analysis of the health care policy issue : Provide an analysis of the health care policy issue you chose, making sure to address these specific points: describe the health care policy issue you selected; provide and explain the statistics depicting the issue; and explain how this issue rel..
Calculate all of the ratios for stetson skydiving adventures : Using Altman's model for privately held firms, calculate the Z-score for Stetson Skydiving Adventures. Does it appear that the firm is in imminent danger of bankruptcy?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Implement the fibonacci algorithm as a function

Implement the Fibonacci algorithm as a function that accepts as input two consecutive Fibonacci numbers and returns as output the next Fibonacci number.

  Design a class numbers

Design a class Numbers that can be used to translate whole dollar amounts in the range 0 through 9999 into an English description of the number.

  How are the topics of the two articles related

Research at least two articles on the topic of managerial issues of a networked organization.

  Prints the entire contents of the array

Find out what happens when you use the Partition Workshop applet on 100 inversely sorted bars. Is the result almost sorted?

  Retrieve information for the user

Build a script so it takes the supplied first name of a user and returns the indicated output. The script should retrieve information for the user the script is run against and an error message if no user is found. Users to test will be Jake, Jim,..

  Callaway''sability to pay its interest expense

What does this tell you about Callaway'sability to pay its interest expense? (Fill in the blank with the times interestearned ratio from above and select the best choice.)

  Are there certain projects in which the traditional approach

Are there certain projects in which the traditional approach

  Describe kinds of pc applications skills

Describe in scholarly detail the kinds of PC applications skills which important for working within a major organization? Also put yourself in the shoes of a manager and share your thoughts.

  Use the resources from careers, enterprise

You are required to carry out secondary research on a specific topic for your award using the University's Learning Centre resources, with the objective of writing a short report on your findings. Your sources must be correctly cited and reference..

  Is there a path from hawaii to every other state in graph

Is there a path from Hawaii to every other state in the graph?

  Constructing a complete object-oriented class diagram

In, you were asked to draw an entity-relationship diagram describing Happy Cruise Lines' business environment. We now report that Happy Cruise Lines has been acquired by MegaShip Lines, Inc., which has a fleet of oil tankers, container ships, and ..

  How does a cd give information

How does a CD give information? What happens if you scratch the front or the back of a CD?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd