Defense/coastal guard operate at remote areas. Guards need critical information at unusual times to step further in the mission.
Following are the key requirements of the defense department:
• Members of military need to have access to information on their PCs and desktops. It is not feasible for them to use these devices on fields.
• They also require to command and control programs and different solutions which allow them to operate with same criteria as that of control environment.
• Military face the challenge of searching a gadget and operating system. It should have a rugged feature so that it can be used in a battle field without compromising on security of defense network.
People engaged in military defense operations make use of a number of electronic devices that range from simple devices which are used by a common man such as a gps, pda to sophisticated devices whose internal workings may very well be classified. However when it comes to devices such as Smartphone, Laptop or a Tablet the US Coast Guard is very strict as these devices could prove to be a security issue. This could be due to various reasons, for instance let's say personnel brings in his laptop which carries a malicious Trojan capable of spreading through the wireless network and then causing harm to the computers on the network or possibly even steal sensitive data. This cannot be allowed to happen and the US Coast Guard is therefore extremely strict when it comes to such devices and thus it blatantly disallows any personnel to carry personal devices on board. However until recently, they've decided to go a little lenient on their stand with such electronic devices and they're thinking of deploying such devices on their own to the personnel on board rather than having them carry their own personal device so as to maintain security.
So as to make that happen a series of security practices needs to be followed which are mentioned in the requirements below:
R1: The device shall be encrypted so that no one can make use of the data saved in it if it gets into the wrong hands.
R2: A system administrator shall be able to control the device remotely
R3: A system administrator should be able to monitor the device remotely.
R4: A system administrator should be able to perform operations on the device remotely.
R5: The data stored in the device should be encrypted.
R6: The tablet should be able to encrypt the data when the user logs in.
R7: The user of the tablet should be able to connect to all the major government websites and subscribe to its updates via their email. All further communications to and fro from that email should not store in an easily readable database.
R8: If the user needs to view a particular attachment, it should be viewable. For instance, if the user wishes to view a word document attached in his emails, he should be able to have the ability to open that attachment.
R9: The tablet should be secured in all respect. Any unauthenticated wireless connection to and fro from the device should not be allowed unless it is authenticated.
R10: All the wireless capabilities of the device except WIFI connectivity should not be allowed. This includes Bluetooth, Infrared and NFC capabilities.
R11: The tablet should come free of any pre-installed 3rd party apps such as Wireless carrier Installed Apps. Only the most basic apps should be present.
R12: The tablet should be able to encrypt the emails so that no one can capture packets wirelessly and decipher what information is contained in them.
R13: The tablet should allow proper authentication policies through a PIN and a Smart Card.
R14: The GPS functionality of the tablet should be disabled.
R15: The tablet should prevent unauthenticated user login.
Attachment:- ASSIGNMENT.rar