wolfpack103

CNT_Encryption_and_Cyber

Jan 8th, 2021
611
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.23 KB | None | 0 0
  1. Computer and Networking Project 1
  2.  
  3. This project is based on purely fictional situations and any familiarities to anything or anyone is purely coincidental.
  4.  
  5. Current situation:
  6. There is a virus pandemic and all areas of the United States and around the globe have been hit hard.
  7. This virus has decimated the economy and has forced many areas into lockdown, no travel zones with high death rates.
  8. The governments of the world have come together and rushed through vaccines to combat the virus and try to get back to some kind of normalcy throughout the world.
  9. These vaccines have been distributed and introduced to the populations of the world and we have been receiving very disturbing reports that the side effects can be devastating and are not being reported to the public for fear of panic.
  10. Your teams must setup your respective areas in order to capture, analyze and transmit factual data from around the world and the United States to the appropriate United States government agencies. These agencies include the National Security Agency (NSA) Central Intelligence Agency (CIA) Federal Bureau of Investigation (FBI) Department of Homeland Security (DHS) and any others deemed essential government agencies.
  11. Departments:
  12. Encryption and Cyber Security
  13. Cyber Security is top priority; this team will be responsible for Encryption and Cyber Security of all information technology assets and must meet all Department of Defense security requirements on all floors of the facility.
  14. Your mission is to make sure there is no unauthorized access to any information technology asset and all areas are secured at all times. This includes:
  15. Log on to each computer must be by Common Access Card on a CAC reader connected to every asset which meets or exceeds the DOD IT specifications.
  16. All assets must be encrypted with at least 256 bit encryption while still be able to maintain acceptable bandwidth and computer performance
  17. Bio-Metrics (face and fingerprint) access can be utilized in addition to but not in place of any other requirements.
  18. Wireless assets must be tested and evaluated to not allow any signals to leave a designated area.
  19. All activities must be recorded and stored and backed up for further evaluation of instances of disturbance.
  20.  
  21.  
Advertisement
Add Comment
Please, Sign In to add comment