Site hosted by Angelfire.com: Build your free website today!

(a.)       N/MCI Security Doubts Persist

(b.)       Verton, Dan. “N/MCI Security Doubts Persist; Users, Navy Officials and EDSs Partners Still Raising Concerns.” Computerworld. Online. Lexis Nexis Academic (23 June 2003).

(c.)         Computerworld featured an article regarding the Navy Marine Corps Intranet in lieu of the N/MCI Industry Symposium held in New Orleans in mid-June.  By interviewing various individuals in the integration and development process, the author was able to identify some key security issues that still remain.  Written with a skeptical point of view, the author questions the project by discussing the doubts, high costs, and approaching deadline for service.  Some of the security issues that were raised include: the certification process integrating N/MCI and the current Defense Information Systems Network, the difficulty with using smart cards and public-key infrastructure (PKI), email and web content filtering from connection points with NIPR Net, remote access, and virus protection. 

(d.)       This article offers no overview of the N/MCI program and offers no solutions for the security issues mentioned.  While the object of the story is to educate and interest Computerworld consumers, I found the information to be lacking and confusing.  The perspective of the author is clear; his attempt to raise doubt and skepticism in the Department of Defense is paramount.  Still, of those interviewed, they bring up important issues that are vital to any private network: email, web connection, spam, and virus protection.  In fact, other articles mentioned how N/MCI was vulnerable to the Welchia worm, clearly supporting the security concerns of any virus protection program.  In short, there are interesting points that are made about security and will remain as challenges for any information system.