Authentication

Last Updated: 11 Jul 2021
Pages: 2 Views: 72

In addition, enhanced computer network defense (CNN) capabilities will enable DoD to teeter anticipate and prevent successful attacks on data and networks. IT procurements, coupled with the relatively low cost of IT hardware, make it possible for many entities within DoD to purchase and operate their own computing infrastructure. As a result, the DoD information environment is overly complex and susceptible to exploitation through these myriad devices, systems, and standards by malicious actors intent on causing harm to national interests.

Consolidation will better enable secure mission-driven access to information and services, rendering DoD information securely accessible to all who need it and are authorized access to it. Deploying an enterprise identity, authentication, authorization, and access management service will extend security protection from the network to the data on the network, providing security controls to better enable secure information sharing.

Commanders will have access to information available from all DoD resources, enabling improved command and control (CO), increasing speed of action, and enhancing the ability to coordinate across organizational boundaries or with mission partners. Individual service members and government civilians will be provided with a standard IT user experience, enabling them to do their jobs and providing them with the same look, feel, and access to information on reassignment, manipulation, or deployment. Develop a plan to audit the three identified frameworks for compliance. Centrally manage and restrict the diversity of server (development and operational) platforms used throughout DoD and require all commodity hardware (e.g., servers, server operating systems, and storage area networks) to be purchased through a limited number of consolidated contracts that leverage economies of scale to reduce total cost to the enterprise.

Order custom essay Authentication with free plagiarism report

feat icon 450+ experts on 30 subjects feat icon Starting from 3 hours delivery
Get Essay Help
  • Improve Weber security situational awareness and command and control.
  • Establish processes for granting access to networks and systems access using validated cryptographic identity credentials
  • Detect anomalous behavioral inside DoD networks (e.g., malicious software, unauthorized data movement).
  • Establish a Core Computing infrastructure that will provide assured and ubiquitous access to vital enterprise services.
  • Manage configurations and automate compliance monitoring and enforcement.
  • Reduce or eliminate the need to manually download information onto removable media to move it to another security domain.
  • Streamline certification and accreditation.
  • Establish processes and develop capabilities to protect and defend DoD networks as a single information environment.
  • Virtual networks were layered on top of physical networks and independent access control approaches were developed as organizations worked to protect their systems and networks.

Cite this Page

Authentication. (2018, May 28). Retrieved from https://phdessay.com/authentication/

Don't let plagiarism ruin your grade

Run a free check or have your essay done for you

plagiarism ruin image

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Save time and let our verified experts help you.

Hire writer