CJ 682 Milestone Two -1

.docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

682

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

12

Uploaded by CountOctopus1696 on coursehero.com

Threat Assessment: Hanscom Air Force Base Southern New Hampshire State University Viktoria Prifti CJ682: Threat Assessment – Milestone Two Professor James Henderson 10-22-2023
HAFB CJ 682 Milestone Two Vulnerability Identification Hanscom Air Force Base is guided by the mission of “providing worldwide support for the Air Force Life Cycle Management Center and outstanding quality-of-life opportunities for our military personnel, their family members, and the many workers who are part of Team Hanscom” [ CITATION Han232 \l 1033 ]. Overview of Property Hanscom Air Force Base is located in the state of Massachusetts. The infrastructure is set up on a land spanning 846 acres which contains at least 155 buildings. The topmost building is the medical clinic, which serves the needs of the residents [ CITATION Han232 \l 1033 ]. Likewise, it houses auto skills, force aid, barber shop-exchange, base-exchange, and churches. Most of the buildings in the area are 731 privatized family housing for current or former military officers [ CITATION Han232 \l 1033 ]. Also, the base is home to numerous civilians from divergent backgrounds. It has a surrounding perimeter wall, which is bordered by residential properties. Source: [ CITATION Han232 \l 1033 ]
HAFB CJ 682 Milestone Two Source: [ CITATION Han232 \l 1033 ] Operating Elements The administrative operating element is managed by the Department of Transportation and Homeland Security. The two agencies work together with the base commander to set up a robust administrative structure that ensures operational efficiency [ CITATION Han232 \l 1033 ]. The base commander also liaises and collaborates with the Massachusetts Port Authority to control the flow of civil airlines in the adjacent airport. The current base commander is Colonel Taona Enriquez, who works with Major General Antony Genatempo to uphold security and continued operations [ CITATION Han232 \l 1033 ]. The second functional element is the PEO C3I&N, which consists of command, control, communications, and intelligence and networking systems. The system was set up at the base to collect information that is shared with combatant commanders [ CITATION Han232 \l 1033 ]. The C3I&N is also responsible for coalition and joint cyberspace, as well as developing cryptologic algorithms that safeguard military data. It connects various systems across the force with the intention of sustaining war-winning capabilities.
HAFB CJ 682 Milestone Two People The administrative element contains 5 leaders/executives, as shown in the figure below. Major General Anthony Genatempo is the executive officer for the C3I&N and is flanked by Scott C. Hardiman. The latter is the civilian director responsible for the NC3 and program execution. Likewise, Steven Wert is the program executive officer (PEO) for the base’s life cycle management center. The base commander (Taona) works together with Chief Master Sergeant Alan Weary to manage the facility’s operations. Source: [ CITATION Han232 \l 1033 ] The C3I&N has a total workforce of 10,306 employees. Out of the total, at least 899 are active duty service men, with 400 working under the National Guard [ CITATION Han232 \l 1033 ]. Likewise, the LCMC and DOD civilians account for 1,743 and 555 employees compared to non-DOD and non-appropriated fund civilians at 92 and 170, respectively [ CITATION Han232 \l 1033 ]. There are 2,208 contractors, with the MIT Lincoln lab having 4058 employees. Valuable and Critical Assets The topmost valuable and critical asset at the facility is its cyber systems. These systems (C3I&N) are responsible for the collection of intelligence information, which is shared with combatant commanders to ensure decision-making. Subsequently, the Boston Logan International Airport is critical to its operations with regard to the movement of goods and people.
HAFB CJ 682 Milestone Two Proprietary Information The cyber technology systems contain proprietary files and data that can be targeted by terrorists. Specifically, the C3I&N is used to collect intelligence information and protect the nation’s network infrastructure. It contains data regarding missions and America’s security posture, which can be detrimental if accessed by the wrong parties. Likewise, the adjacent civilian airport has computer systems with personally identifiable information. Terrorists might gain access to the systems and use the information for identity theft purposes in order to gain entry into Hanscom Air Force base. Reputation Hanscom Air Force Base has a positive reputation in the area due to its operations and security mechanisms. The C3I&N has, however, come under intense scrutiny as it collects pertinent information about domestic and international operations. The data collection process is often conducted without consent, which might violate citizen privacy. Nonetheless, the loss of information can contribute to attacks and damaged organizational reputation. Protection Justification Both the C3I&N and Air Force base must be protected because of their two-pronged role in warfighting and transportation. For instance, any disruptions to the former can contribute to lost connection and communication between servicemen. The occurrence of an attack on the latter will ultimately lead to disrupted transportation. Common Vulnerabilities
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help