Verified Document

Operational Robustness Article Review

¶ … new High Assurance Domain (HAD) Project has been ensuring businesses and individual users enhanced networking and communications security. The HAD project was expressly "created to foster development and deployment of new network security technologies to increase trust in online communications," ("High Assurance Domain (HAD) Project," 2012). In fulfillment of the HAD primary objectives, developers are compiling a range of technologies and protocols. Observers have noted current weaknesses in Internet protocols and general networking architecture. These weaknesses can and have been exploited. Learning from these weaknesses has led to the development of more secure protocols and systems "to aid in building trust between consumers and business (C2B), business to business (B2B) and consumer to government (C2B) communications," ("High Assurance Domain (HAD) Project," 2012). For the most part, the HAD vision offers sound ways of boosting security and operational robustness, while also complying with new standards and regulations. The most important...

Each of these components ensures compliance with National Institute of Standards and Technology (NIST) recommendations for information security (Bowen, Hash & Wilson, 2006). Moreover, these components also represent long-range planning in coordination with emerging federal mandates. As of 2010, the federal government began implementing regulations related to Internet routing security (Marsan, 2010). As much as $3 billion was allocated in that year alone. Investments into Internet security have risen since then, to account for the growing need for security at the enterprise and individual level. A series of malicious attacks threatening government, business, and other sensitive domains has bolstered the need to…

Sources used in this document:
References

Bowen, P, Hash, J. & Wilson, M. (2006). Information security handbook: Recommendations of standards and Technology. NIST. Available online: http://csrc.nist.gov/publications/nistpubs/800-100/SP800-100-Mar07-2007.pdf

"High Assurance Domain (HAD) Project," (2012). Retrieved online: http://www.nist.gov/itl/antd/had-project.cfm

Marsan, C.D. (2010). Will feds mandate Internet routing security? Network World. Retrieved online: http://www.networkworld.com/news/2010/121510-feds-internet-routing-security.html?page=1
Cite this Document:
Copy Bibliography Citation

Related Documents

Aviation Since the First Authorized
Words: 1766 Length: 6 Document Type: Research Paper

Recommendations With regards to improving the prospects for the Gray Eagle, the United States Army must apply the core principles of CRM to its operations. This entails a strategic decision-making training session, an improved technology interface that will facilitate ground and flight operations, and a thorough training module related to leadership development and communications. When FAA regulations are also integrated with Army safety regulations, the result will be an improved and

Manufacturing Management a Case Study
Words: 5135 Length: 16 Document Type: Essay

Prestowitz (2005) addresses the incongruity that this is presenting to the American laborer. Even as education costs continue their annual climb, the competition for jobs in service and technology industries is making a loser out of the American white-collar worker. The economic demands created by the social parameters of American educational and professional advancement dictate such occupations must command a wage spectrum concordant with the attendant costs above mentioned.

Software Development Life Cycle
Words: 842 Length: 3 Document Type: Essay

Qual Att Quality Attributes in Software Development Every aspect of the software development cycle should ultimately be focused on the client in one way or another, from price to function to program size and more. In order to maintain consistency in the focus and the development trajectory of software, certain concrete goals should be established and built into the processes of development that make up the software development lifecycle. These goals can

Caregiver Grief and Loss Introduction-
Words: 2321 Length: 6 Document Type: Term Paper

There are certainly different approaches to the theory of anticipatory mourning. Clearly, one of the major issues within the literature surrounds the communication between the dying person and the caregiver, and both caregiver and patient and those who will be most affected or will mourn their loss. Conventional theory finds that preparing for loss involves experiencing most of the features of grief prior to the demise of the patient; numbness,

Coach Japan Demand for Luxury
Words: 1283 Length: 4 Document Type: Research Paper

The rate of corruption in Japan is relatively low, at the same level as that of the United States (Japan Today, 2008). Given the popularity of luxury goods in Japan, there is a disincentive for politicians to treat luxury goods in a way that would make them more expensive or less accessible. There is some degree of economic risk. While the luxury goods market in Japan has thrived throughout much

Nursing SWOT
Words: 818 Length: 3 Document Type: SWOT

SWOT analysis focuses on identifying the internal strengths and weaknesses, along with the external opportunities and threats, for an organization. In this case, the SWOT analysis will be done on a specific situation, with a large number of items under each. The initial SWOT analysis for the situation presented is as follows Strengths Weaknesses Opportunities Threats The problem has been identified Overburdened nurses Restructure nursing management Poor customer perceptions/negative publicity Experienced staff Financing issues Gain more funding Board could deny financing New

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now