Determining the network design project

Assignment Help Basic Computer Science
Reference no: EM131355355

You are a newly hired civilian contractor for the U.S. Navy at a naval air station. Your position is a security engineer. This project has recently been consolidated to this location from several coastal areas. The team is a small department that focuses on unmanned naval surveillance vehicles.

You have been asked to perform the initial network design while you wait for your security clearance to get approved. You have to bear in mind the requirements that the Navy has for this project. There is a 2 terabyte UNIX DB2 database, which is used for craft designs, part lists, and experimental results; additionally, a smaller Oracle database running on Windows servers takes care of scheduling, administration, and personnel data.

The network will require 200 hosts in the design and development department, 20 in the personnel department, and 40 in the acquisition department. The acquisition department will need access to the secure internal network and external Department of Defense suppliers, whose networks are not considered secure. Both of these departments will need access to Windows laser printers and UNIX-based design plotters. The captain in charge of the project and his staff of 10 need a wireless virtual private network (VPN).

This work is considered top secret and outside of the requirements of the acquisition department; the network is considered a secure one that must meet the requirements of common criteria and evaluation assurance level 4 + (EAL 4 +). The internal, border, wireless, and default gateway duties are handled by a major equipment company. Data availability is important because the government has tens of millions of dollars already invested in this project.


In preparation for your network design project, discuss with your classmates ideas for addressing the security vulnerabilities in the network design. In your discussion, address the following: 

  • What challenges will need to be addressed with the U.S. Navy project described in your scenario? 
  • What types of vulnerabilities need to be addressed in the design? 
  • Where might there be points of failure in the design? 
  • What areas concern you about securing the network? 
  • What steps would you recommend to overcome those concerns?   

Outline your ideas in a 3-5-paragraph posting. Study the postings of at least 2 other classmates and respond to them with comments and questions. Ask for clarifications of their ideas if necessary. 

Be sure to document your references using APA format.

Reference no: EM131355355

Understand the significance of the salt

Assuming that you have successfully answered the preceding problem and understand the significance of the salt, here is another question. Wouldn't it be possible to thwart c

Program to take input of an integer and check if palindrom

Write one program using switch/case/default that will offer user choice for all the above ^ programs (1 - 4.b) and will run in an infinite loop. One option (case) will also

Secure windows-unix-linux servers from known shortcoming

The CIO has asked you to explain why you suggest it is so significant to secure your Windows and Unix/Linux servers from known shortcomings/vulnerabilities.

Problem regarding the enumeration techniques

Enhance and elaborate on the port scanning and/or enumeration techniques (attacks) Share any additional thoughts you may have on them and explain how they can be detected an

The gathering of the information by team of core

Describe some likely instances that demonstrate when the gathering of the information by team of core software developers who focus on bitcoin were working to fix the prob

The basics of qualitative research

Create a PowerPoint presentation of 7-8 slides that explains the following: The basics of qualitative research, The basics of quantitative research and The basics of mixed met

Example of weighted directed grap with weight function

Provide an example of weighted directed graph G = (V, E) with weight function ω:E→R and source vertex s such that G satisfies following property.

Deciding on question types and structure

Question 5.5. (TCO C) Which of these steps in interview preparation is most helpful in allowing the interviewer to build a vocabulary common to the interviewee? Deciding on qu


Write a Review

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd