CJ 682 7-1 Short Paper Revised
.docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
682
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
9
Uploaded by CountOctopus1696
1
7-1 Short Paper: Countermeasures and Recommendations
Viktoria Prifti
CJ 682 Threat Assessment – 7-1 Short Paper
Professor Henderson
11/06/2023
2
High-Tech
Hanscom Air Force Base relies on the
PEO C3I&N, which is susceptible to various
threats that can impact operational efficiency. In order to protect this critical infrastructure, the
organization must implement access control systems. These systems are automated and manage
access to the controlled area or system. Specifically, the top brass will implement the Mandatory
Access Control, wherein the leaders have control over settings[ CITATION Bar231 \l 1033 ]. The
administrators will determine which parties have privileges while evaluating the nature of their
operations in the system. The MAC model will be complemented by Role-Based Access Control,
which assigns permissions to key members in the air base. The network access will be limited
based on the individual roles and responsibilities within the firm. The government facility can
use SecureLink, which is the latest product in the industry that controls devices and user access
to the C3I&N.
Figure 1: Role-Based Access Control
Source: Hoffman (2023)
The second countermeasure is explosives detection systems, which are seminal in
mitigating the entry of bombs into the base. These systems will be placed in the base's gate to
3
automatically detect weapons of mass destruction. They contain RX scanners, trace detectors,
and people screening solutions [ CITATION Bri18 \l 1033 ]. The trace detectors are vital in
identifying explosive-related particles and vapors while sending an alert to the responsible
authorities. Furthermore, the high-tech measure will contain new technology that helps detect
biological agents and chemical risks. Specifically, it will have portable spectrometers and gas
detectors to enhance the effective mitigation of threats.
Low-tech
Hanscom Air Force Base will also resort to low-tech elements, including deployable
barriers that rise into position during an attack. The barriers can be rapidly set up on asphalt or
concrete roads to manage the flow of cars or individuals. Specifically, the base will use Delta's
portable barriers to secure its key facilities[ CITATION Del231 \l 1033 ]. The permanent steel
bollards will be installed at the gate where the necessary checks are conducted. The MP5000 and
DSC1000 barriers from Delta will be purchased and placed across the base.
4
Figure 2: Barriers
Source: [ CITATION Del231 \l 1033 ]
Likewise, the base will mitigate the physical security vulnerabilities through mechanical
and electrical turnstiles. The turnstiles are part of the control system, which will detect and deter
unauthorized entries. The base will ensure that each door has a card or biometric reader that
offers access only to authorized parties [ CITATION Bri18 \l 1033 ]. Specifically, it will utilize
the latest technology, like optical turnstiles that rely on electronic beams and visual interfaces
when managing entry.
Figure 3: Turnstines
Source: AIS Technology (2023)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help