Group analyzes NMCI while services lighten app load

Group analyzes NMCI while services lighten app load

Personnel from the Defense Operational Test and Evaluation division finished an assessment of the Navy-Marine Corps Intranet last Friday and will spend the next 30 days analyzing the results. The division tested thousands of computer seats that have been transferred to NMCI and that now ride on the NMCI infrastructure.

Meanwhile, the Navy and Marine Corps continue to whittle away the systems' excess applications.

Speaking at a plenary session at the 2002 Military Communications Conference in Anaheim, Calif., yesterday, Rear Adm. Charles L. Munns gave an update on the $6.9 billion outsourcing program led by Electronic Data Systems Corp.

Munns said the Navy started with more than 100,000 legacy applications riding on thousands of disparate networks, and in about five months has reduced that number to 30,000. The Marine Corps chopped 8,000 apps down to 428, Munns said.

Munns said his office has directed 23 Navy managers, in charge of divisions ranging from maintenance and administration to logistics and nuclear propulsion, to get that number down to 2,000 apps.

"What we're doing is to try to bring some order to where our information is," Munns said.

Prior to NMCI, Munns said, a team assessed the Navy's security and found more than 140,000 vulnerabilities.

NMCI removes those security risks by:

  • Screening incoming e-mail

  • Requiring longer log-on times

  • Implementing computer lock-outs after 15 minutes of inactivity, which requires users to re-enter their passwords

  • Requiring a longer log-on process for using its public-key infrastructure.



  • inside gcn

    Reader Comments

    Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

    Please type the letters/numbers you see above

    More from 1105 Public Sector Media Group