CJ 682 7-1 Short Paper Revised

.docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

682

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

9

Uploaded by CountOctopus1696

Report
1 7-1 Short Paper: Countermeasures and Recommendations Viktoria Prifti CJ 682 Threat Assessment – 7-1 Short Paper Professor Henderson 11/06/2023
2 High-Tech Hanscom Air Force Base relies on the PEO C3I&N, which is susceptible to various threats that can impact operational efficiency. In order to protect this critical infrastructure, the organization must implement access control systems. These systems are automated and manage access to the controlled area or system. Specifically, the top brass will implement the Mandatory Access Control, wherein the leaders have control over settings[ CITATION Bar231 \l 1033 ]. The administrators will determine which parties have privileges while evaluating the nature of their operations in the system. The MAC model will be complemented by Role-Based Access Control, which assigns permissions to key members in the air base. The network access will be limited based on the individual roles and responsibilities within the firm. The government facility can use SecureLink, which is the latest product in the industry that controls devices and user access to the C3I&N. Figure 1: Role-Based Access Control Source: Hoffman (2023) The second countermeasure is explosives detection systems, which are seminal in mitigating the entry of bombs into the base. These systems will be placed in the base's gate to
3 automatically detect weapons of mass destruction. They contain RX scanners, trace detectors, and people screening solutions [ CITATION Bri18 \l 1033 ]. The trace detectors are vital in identifying explosive-related particles and vapors while sending an alert to the responsible authorities. Furthermore, the high-tech measure will contain new technology that helps detect biological agents and chemical risks. Specifically, it will have portable spectrometers and gas detectors to enhance the effective mitigation of threats. Low-tech Hanscom Air Force Base will also resort to low-tech elements, including deployable barriers that rise into position during an attack. The barriers can be rapidly set up on asphalt or concrete roads to manage the flow of cars or individuals. Specifically, the base will use Delta's portable barriers to secure its key facilities[ CITATION Del231 \l 1033 ]. The permanent steel bollards will be installed at the gate where the necessary checks are conducted. The MP5000 and DSC1000 barriers from Delta will be purchased and placed across the base.
4 Figure 2: Barriers Source: [ CITATION Del231 \l 1033 ] Likewise, the base will mitigate the physical security vulnerabilities through mechanical and electrical turnstiles. The turnstiles are part of the control system, which will detect and deter unauthorized entries. The base will ensure that each door has a card or biometric reader that offers access only to authorized parties [ CITATION Bri18 \l 1033 ]. Specifically, it will utilize the latest technology, like optical turnstiles that rely on electronic beams and visual interfaces when managing entry. Figure 3: Turnstines Source: AIS Technology (2023)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help