Part of your network design for the U.S. Navy project will include a design of a
ID: 3912725 • Letter: P
Question
Part of your network design for the U.S. Navy project will include a design of a plan that focuses on authentication issues. The overall design will be for a network that includes Windows server active directory and Unix servers. Discuss authentication methods that could be used in this environment. Do you think that biometrics could be useful for this situation?
Outline your ideas in a 3–5-paragraph posting. Study the postings of at least 2 other classmates, and respond to them with comments and questions. Ask for clarifications of their ideas if necessary.
Explanation / Answer
The plan for the network design of a U.S. Navy project mainly should focus on its authentication issues.This project is not as simple as to design as it is regarding to a total county.It can also become a inter-country issue if not properly designed.In a ny project the main issue which can arise abruptly is its authentication.Authentication can be considered as the main reason behind the hacking and spoofing.
Before starting a design we need to gather all the requirements and all the considerations which are to be considered for the start of a design.The design may include many things like its physical design and its databade design also its network design.Database design may include all the files and all the confidential information regarding the navy base and the government.This information can be transported through the network with great sort of authentication.
The network design can be considered as the vital point in designing a navy project as Information security is very important in any aspect.The main serve stores all the information which processes the client requests.Windows server can be most prominently used where in te directory all the files are stored highly confidentially.Many hackers try to hack this information as it also resembles to the security of the government and also the country.
One method for security is by the use of SSL protocol in which the database is authenticated by the user.The main advantage of using this is that the user can authenticate even without a directory.Another method to provide authentication is that the use of any third-party servive.Best example fr this is Kerberos that mainly rely on secret sharing.It provides signing in with centralized password security to reach the data.These methods can be used for authentication.
Biometrics can also be a good choice for providing security until and unless there is a hope of honesty.Finger sensors can be helpful for authenticated people to access the data.Thus these are the main methods and discussions regarding the navy project design.