Open Access Open Access  Restricted Access Subscription Access

Information Security Plan for Flight Simulator Applications


Affiliations
1 Information Assurance and Security, Capella University, Minneapolis, United States
2 University of Hawaii-Hilo, Hilo, United States
 

The Department of Defense has a need for an identity management system that uses two factor authentications to ensure that only the correct individuals get access to their top secret flight simulator program. Currently the Department of Defense does not have a web interface sign in system. We will be creating a system that will allow them to access their programs, back office and administrator functions remotely. A security plan outlining our security architecture will be delivered prior to the final code roll out. The plan will include responses to encryption used and the security architecture applied in the final documentation. The code will be delivered in phases to work out any issues that may occur during the implementation.

Keywords

Information Security, Public Key Encryption, Certificate Authentication, Token Authentication, Identity Management, Internet Security.
User
Notifications
Font Size

Abstract Views: 332

PDF Views: 127




  • Information Security Plan for Flight Simulator Applications

Abstract Views: 332  |  PDF Views: 127

Authors

Jason Slaughter
Information Assurance and Security, Capella University, Minneapolis, United States
Syed M. Rahman
University of Hawaii-Hilo, Hilo, United States

Abstract


The Department of Defense has a need for an identity management system that uses two factor authentications to ensure that only the correct individuals get access to their top secret flight simulator program. Currently the Department of Defense does not have a web interface sign in system. We will be creating a system that will allow them to access their programs, back office and administrator functions remotely. A security plan outlining our security architecture will be delivered prior to the final code roll out. The plan will include responses to encryption used and the security architecture applied in the final documentation. The code will be delivered in phases to work out any issues that may occur during the implementation.

Keywords


Information Security, Public Key Encryption, Certificate Authentication, Token Authentication, Identity Management, Internet Security.