Requirements of the acquisition department

Assignment Help Basic Computer Science
Reference no: EM131368481

You are a newly hired civilian contractor for the U.S. Navy at a naval air station. Your position is a security engineer. This project has recently been consolidated to this location from several coastal areas. The team is a small department that focuses on unmanned naval surveillance vehicles.

You have been asked to perform the initial network design while you wait for your security clearance to get approved. You have to bear in mind the requirements that the Navy has for this project. There is a 2 terabyte UNIX DB2 database, which is used for craft designs, part lists, and experimental results; additionally, a smaller Oracle database running on Windows servers takes care of scheduling, administration, and personnel data.

The network will require 200 hosts in the design and development department, 20 in the personnel department, and 40 in the acquisition department. The acquisition department will need access to the secure internal network and external Department of Defense suppliers, whose networks are not considered secure. Both of these departments will need access to Windows laser printers and UNIX-based design plotters. The captain in charge of the project and his staff of 10 need a wireless virtual private network (VPN).

This work is considered top secret and outside of the requirements of the acquisition department; the network is considered a secure one that must meet the requirements of common criteria and evaluation assurance level 4 + (EAL 4 +). The internal, border, wireless, and default gateway duties are handled by a major equipment company. Data availability is important because the government has tens of millions of dollars already invested in this project.

Question.

In preparation for your network design project, discuss with your classmates ideas for addressing the security vulnerabilities in the network design. In your discussion, address the following:

  • What challenges will need to be addressed with the U.S. Navy project described in your scenario?
  • What types of vulnerabilities need to be addressed in the design?
  • Where might there be points of failure in the design?
  • What areas concern you about securing the network?
  • What steps would you recommend to overcome those concerns?

Outline your ideas in a 3-5-paragraph posting. Study the postings of at least 2 other classmates and respond to them with comments and questions. Ask for clarifications of their ideas if necessary.

Be sure to document your references using APA format.

Reference no: EM131368481

Questions Cloud

Write a response about the given post : The field of Human Services has the objective of meeting human needs through an "interdisciplinary knowledge base, focusing on prevention as well as remediation of problems, and maintaining a commitment to improving the overall quality of life of ..
Identify issues and troubleshooting steps covering : Create a 2.5- to 3-page troubleshooting document that is intended to become part of the internal knowledge base for IT staff members to reference when encountering issues. Your document should identify issues and troubleshooting steps covering the..
Discuss about the post given below : You are creating a database for a research study that is investigating the effectiveness of trampoline jumping for improving cognitive functioning in alzheimer's patients. Enrolled patients are being randomized into either intervention or control ..
What are key differences between gazella and its competitors : What are the key differences between Gazella and its competitors? How should Gazella use its resources to grow on its buy side? Should Gazella launch a direct-to-consumer site on its sell side?
Requirements of the acquisition department : This work is considered top secret and outside of the requirements of the acquisition department; the network is considered a secure one that must meet the requirements of common criteria and evaluation assurance level 4 + (EAL 4 +).
Write the given paper assignment : Write the given paper assignment.- Term paper topic is : "The Contract Air Mail Act of 1925, a.k.a., the Kelly Act."
St. anselms ontological argument : St.Anselm''s Ontological argument. Defend a thesis using the following formats: thesis, argument, objection, responses and conclusion.
Provide an analysis of the health care policy issue : Provide an analysis of the health care policy issue you chose, making sure to address these specific points: describe the health care policy issue you selected; provide and explain the statistics depicting the issue; and explain how this issue rel..
Calculate all of the ratios for stetson skydiving adventures : Using Altman's model for privately held firms, calculate the Z-score for Stetson Skydiving Adventures. Does it appear that the firm is in imminent danger of bankruptcy?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Beginning or completion of another task

Include resources, using job roles. For example: graphic designer, tester, etc. Make good use of your team's time by ensuring no one is idle for too long. Stand-alone tasks - which are not related to the beginning or completion of another task - ma..

  Introduce a predator bird into the flocking model

Add more ethnicities to the Ethnocentrism model (in the Social Science section of the NetLogo models library). Does the behavior change?

  Print the file path and the number of lines in the file

Run my script on a weekday, redirecting your output to the file my_save and append a copy of my script.

  Write the code to read the name of a baseball team

Write the code to read the name of a baseball team, the number of games won, and the number of games lost, and display the name of the team and the percentage of games won.

  What are the challenges in achieving edm

1) What are the challenges in achieving EDM? 2) What are the business drivers for Cloud Computing? 3) What are some of the Big Data guidelines for Enterprise Decision Makers?

  Find the measure of each angle of the triangle

If the legs of a right triangle are 24 centimeters and 18 centimeters long, find the measures of the acute angles. The base of an isosceles triangle is 14 inches long. Its height is 8 inches. Find the measure of each angle of the triangle

  Input file or files must have at least ten student names

Your input file or files must have at least ten student names, their scores, and their finals. Again, the calculations (processing) should remain the same. Submit the Visual Logic flowchart and associated input text files.** will provide instructor V..

  Experiment with computer system measurements

Platform. Pick a Unix-based platform to work on. This might very likely be something like a PC running Linux, but feel free to experiment with whatever system you have access to, e.g., FreeBSD, some old UNIX system like AIX, or even Mac OS X.

  Write a non recursive quicksort algorithm

Write a non recursive quicksort algorithm. Analzye your algorithm and show the results using order notation. Note that it will be necessary to explicitly maintain a stack in your algorithm.

  Concepts of market segmentation-targeting

In this assessment, you will analyze and use the concepts of market segmentation, targeting, and positioning to develop a product strategy for your selected product. This analysis includes describing the information used to determine appropriate m..

  Simulate the operation of a simple robot

Write a program to simulate the operation of a simple robot . the robot moves in four directions :forward, right,left. the job of the robot is to move items and place it in the right slots in each station

  The importance of operational definitions

How might the use of one or the other lead to different conclusions from experimental results regarding who helps more, males or females? What does this tell you about the importance of operational definitions?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd