Operational Robustness Article Review

PAGES
2
WORDS
590
Cite

¶ … new High Assurance Domain (HAD) Project has been ensuring businesses and individual users enhanced networking and communications security. The HAD project was expressly "created to foster development and deployment of new network security technologies to increase trust in online communications," ("High Assurance Domain (HAD) Project," 2012). In fulfillment of the HAD primary objectives, developers are compiling a range of technologies and protocols. Observers have noted current weaknesses in Internet protocols and general networking architecture. These weaknesses can and have been exploited. Learning from these weaknesses has led to the development of more secure protocols and systems "to aid in building trust between consumers and business (C2B), business to business (B2B) and consumer to government (C2B) communications," ("High Assurance Domain (HAD) Project," 2012). For the most part, the HAD vision offers sound ways of boosting security and operational robustness, while also complying with new standards and regulations. The most important...

...

Each of these components ensures compliance with National Institute of Standards and Technology (NIST) recommendations for information security (Bowen, Hash & Wilson, 2006). Moreover, these components also represent long-range planning in coordination with emerging federal mandates. As of 2010, the federal government began implementing regulations related to Internet routing security (Marsan, 2010). As much as $3 billion was allocated in that year alone. Investments into Internet security have risen since then, to account for the growing need for security at the enterprise and individual level. A series of malicious attacks threatening government, business, and other sensitive domains has bolstered the need to…

Sources Used in Documents:

References

Bowen, P, Hash, J. & Wilson, M. (2006). Information security handbook: Recommendations of standards and Technology. NIST. Available online: http://csrc.nist.gov/publications/nistpubs/800-100/SP800-100-Mar07-2007.pdf

"High Assurance Domain (HAD) Project," (2012). Retrieved online: http://www.nist.gov/itl/antd/had-project.cfm

Marsan, C.D. (2010). Will feds mandate Internet routing security? Network World. Retrieved online: http://www.networkworld.com/news/2010/121510-feds-internet-routing-security.html?page=1


Cite this Document:

"Operational Robustness" (2012, November 06) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/operational-robustness-107582

"Operational Robustness" 06 November 2012. Web.25 April. 2024. <
https://www.paperdue.com/essay/operational-robustness-107582>

"Operational Robustness", 06 November 2012, Accessed.25 April. 2024,
https://www.paperdue.com/essay/operational-robustness-107582

Related Documents

Recommendations With regards to improving the prospects for the Gray Eagle, the United States Army must apply the core principles of CRM to its operations. This entails a strategic decision-making training session, an improved technology interface that will facilitate ground and flight operations, and a thorough training module related to leadership development and communications. When FAA regulations are also integrated with Army safety regulations, the result will be an improved and

Prestowitz (2005) addresses the incongruity that this is presenting to the American laborer. Even as education costs continue their annual climb, the competition for jobs in service and technology industries is making a loser out of the American white-collar worker. The economic demands created by the social parameters of American educational and professional advancement dictate such occupations must command a wage spectrum concordant with the attendant costs above mentioned.

Qual Att Quality Attributes in Software Development Every aspect of the software development cycle should ultimately be focused on the client in one way or another, from price to function to program size and more. In order to maintain consistency in the focus and the development trajectory of software, certain concrete goals should be established and built into the processes of development that make up the software development lifecycle. These goals can

There are certainly different approaches to the theory of anticipatory mourning. Clearly, one of the major issues within the literature surrounds the communication between the dying person and the caregiver, and both caregiver and patient and those who will be most affected or will mourn their loss. Conventional theory finds that preparing for loss involves experiencing most of the features of grief prior to the demise of the patient; numbness,

The rate of corruption in Japan is relatively low, at the same level as that of the United States (Japan Today, 2008). Given the popularity of luxury goods in Japan, there is a disincentive for politicians to treat luxury goods in a way that would make them more expensive or less accessible. There is some degree of economic risk. While the luxury goods market in Japan has thrived throughout much

Nursing SWOT
PAGES 3 WORDS 818

SWOT analysis focuses on identifying the internal strengths and weaknesses, along with the external opportunities and threats, for an organization. In this case, the SWOT analysis will be done on a specific situation, with a large number of items under each. The initial SWOT analysis for the situation presented is as follows Strengths Weaknesses Opportunities Threats The problem has been identified Overburdened nurses Restructure nursing management Poor customer perceptions/negative publicity Experienced staff Financing issues Gain more funding Board could deny financing New