Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Defense/coastal guard operate at remote areas. Guards need critical information at unusual times to step further in the mission.

Following are the key requirements of the defense department:
• Members of military need to have access to information on their PCs and desktops. It is not feasible for them to use these devices on fields.
• They also require to command and control programs and different solutions which allow them to operate with same criteria as that of control environment.
• Military face the challenge of searching a gadget and operating system. It should have a rugged feature so that it can be used in a battle field without compromising on security of defense network.

People engaged in military defense operations make use of a number of electronic devices that range from simple devices which are used by a common man such as a gps, pda to sophisticated devices whose internal workings may very well be classified. However when it comes to devices such as Smartphone, Laptop or a Tablet the US Coast Guard is very strict as these devices could prove to be a security issue. This could be due to various reasons, for instance let's say personnel brings in his laptop which carries a malicious Trojan capable of spreading through the wireless network and then causing harm to the computers on the network or possibly even steal sensitive data. This cannot be allowed to happen and the US Coast Guard is therefore extremely strict when it comes to such devices and thus it blatantly disallows any personnel to carry personal devices on board. However until recently, they've decided to go a little lenient on their stand with such electronic devices and they're thinking of deploying such devices on their own to the personnel on board rather than having them carry their own personal device so as to maintain security.

So as to make that happen a series of security practices needs to be followed which are mentioned in the requirements below:

R1: The device shall be encrypted so that no one can make use of the data saved in it if it gets into the wrong hands.
R2: A system administrator shall be able to control the device remotely
R3: A system administrator should be able to monitor the device remotely.
R4: A system administrator should be able to perform operations on the device remotely.
R5: The data stored in the device should be encrypted.
R6: The tablet should be able to encrypt the data when the user logs in.
R7: The user of the tablet should be able to connect to all the major government websites and subscribe to its updates via their email. All further communications to and fro from that email should not store in an easily readable database.
R8: If the user needs to view a particular attachment, it should be viewable. For instance, if the user wishes to view a word document attached in his emails, he should be able to have the ability to open that attachment.
R9: The tablet should be secured in all respect. Any unauthenticated wireless connection to and fro from the device should not be allowed unless it is authenticated.
R10: All the wireless capabilities of the device except WIFI connectivity should not be allowed. This includes Bluetooth, Infrared and NFC capabilities.
R11: The tablet should come free of any pre-installed 3rd party apps such as Wireless carrier Installed Apps. Only the most basic apps should be present.
R12: The tablet should be able to encrypt the emails so that no one can capture packets wirelessly and decipher what information is contained in them.
R13: The tablet should allow proper authentication policies through a PIN and a Smart Card.
R14: The GPS functionality of the tablet should be disabled.
R15: The tablet should prevent unauthenticated user login.


Attachment:- ASSIGNMENT.rar

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M9893764
  • Price:- $70

Priced at Now at $70, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Discussion bulldefine a packet analyzer and describe its

Discussion: • Define a packet analyzer and describe its use • List commonly used packet analyzers (beyond WireShark) • List best practices for analyzing packets • Describe uses (good and bad, ie. hacker) of a packetanaly ...

Recent tariff actions by president trump include raising

Recent tariff actions by President Trump include raising tariffs and quotas on imports of both manufactured goods like televisions and automobiles and intermediate goods like steel and aluminum sheets. How will the econo ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

What is the difference between a positive economic

What is the difference between a positive economic statement and a normative one.

Assignment -global finance inc gfi - global finance inc gfi

Assignment - GLOBAL FINANCE, INC. (GFI) - Global Finance, Inc. (GFI) is a financial company that manages thousands of accounts across Canada, the United States, and Mexico. A public company traded on the NYSE, GFI specia ...

Wireless networks and security assignment - design and

Wireless Networks and Security Assignment - Design and implementation of secure enterprise wireless network Purpose of the assessment - The purpose of this assignment is to design and implement a secure enterprise wirele ...

Assignment descriptionproject scope a typical

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Question do some research and find a case of cyber

Question : Do some research and find a case of cyber harassment or cyberbullying. Explain the case, and discuss the relevant theories of criminal justice associated with the perpetrator(s). Your response should be a mini ...

Question for the remaining questions consider a 4-bit block

Question : For the remaining questions, consider a 4-bit block cipher, described in hexadecimal by the following table: Plaintext Ciphertext Plaintext Ciphertext 0 a 8 e 1 c 9 d 2 f a 0 3 6 b 7 4 3 c 5 5 8 d b 6 4 e 9 7 ...

Metasoft ltd is a software development company which works

MetaSoft Ltd is a software development company which works across Australia and New Zealand. The company is considering the following strategic proposal: - They plan to close down the Melbourne data centre rather than up ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As