Preview

Aircraft Solution Se571 Course Project

Powerful Essays
Open Document
Open Document
2041 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Aircraft Solution Se571 Course Project
AIRCRAFT SOLUTIONS

Sumanth Bobba
D03558118
SE571
TABLE OF CONTENTS 1. Introduction 3 2. Company Overview 3 3. Security Weakness 3 a. Hardware Vulnerabilities 3 b. Software Vulnerabilities 5 4. Recommended Solutions 7 a. Hardware 7 i. Impact on business 8 b. Software 9 i. Impact on business 10 5. Summary 10 6. References 11

Introduction
This report is prepared to assist the aircraft solutions (AS), a well-known company for equipment and component fabrication in Southern California, in identifying the most important security vulnerabilities. This report also discusses possible threats, the likelihood of the threats occurring and the threat if exposed in two remarkable areas. Aircraft Solutions maintains a large capacity plant, trained workforce, large variety of equipment, design modules and solution database provided to multiple industries. These companies include aerospace, electronics and defense sectors. In this report I will focus on the vulnerabilities present in the existing system of Aircraft Solutions and its operations.
Company Overview
Aircraft Solutions, with its headquarters in San Diego, California develop and fabricate products and services for different companies. It has two divisions, commercial and the defense. The commercial division is in Chula Vista, CA and the defense division is in Santa Ana, CA. They offer designs at low cost and computer aided modeling packages. They also provide lifecycle of the product being manufactured.
Security Weakness
In the two key areas targeted, I will discuss here about the vulnerabilities in hardware and the software.
Hardware Vulnerabilities
In my security assessment on the hardware of AS, it has been identified that it’s hardware system could be a potential security weakness and cause a threat in the near future. Their system has; 1. Five individual servers 2. A switch 3. Two



References: 1. Interview with Harry, program manager at Varsun e Technologies, Orange, CA 2. http://www.unixguide.net/freebsd/fbsd_installguide/54.06.00_Network_Security.htm 3. http://blogs.technet.com/b/srd/archive/2011/07/12/mitigating-software-vulnerabilities.aspx 4. http://infosecalways.com/2007/07/12/security-threat-statistics-resources/ 5. (n.d.). Retrieved 04 04, 2011, from Amazon : http://www.amazon.com/Dell-PowerEdge-R710-Server-48GB/dp/B0037S9MTM 6. (n.d.). Retrieved 04 04, 2011, from Dell: www.dell.com 7. http://www.cio.com/article/494522/Hidden_Threat_on_Corporate_Nets_Misconfigured_Gear

You May Also Find These Documents Helpful

  • Best Essays

    Aircraft Solutions

    • 2805 Words
    • 12 Pages

    Aircraft Solutions operates within California in two separate physical locations in San Diego and Santa Ana. Working within both commercial and defense industries, their products are used globally. Aircraft Solutions is overtly technical in nature utilizing Business Process Management (BPM) for end to end processes that interacts with customers, vendors, and suppliers. BPM also fills a critical role of internal communications for IT to ensure customer needs are being fulfilled precisely as they have been ordered.…

    • 2805 Words
    • 12 Pages
    Best Essays
  • Powerful Essays

    References: Arthur, C. (2012, May 29). Cyber-Attack Concerns Raised Over Boeing 787 Chip’s Back Door. Retrieved…

    • 1124 Words
    • 4 Pages
    Powerful Essays
  • Best Essays

    Aircraft Solutions Project

    • 2440 Words
    • 10 Pages

    The hardware infrastructure of the AS Headquarters in San Diego, California had been identified during our recent security assessment as being a potential security weakness to the company's overall information systems security infrastructure.…

    • 2440 Words
    • 10 Pages
    Best Essays
  • Powerful Essays

    Aircraft Solutions

    • 1868 Words
    • 8 Pages

    Aircraft Solutions (AS) is a recognized leader in the design and fabrication of component products and services for companies in the electronics, commercial, defense, and aerospace industry. The mission of AS is to provide customer success through machined products and related services, and to meet cost, quality, and schedule requirements.…

    • 1868 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 1244 Words
    • 5 Pages

    Analysis and explanation of the threat and vulnerability pairs and their likelihood of occurrence. The chart explains the aspects of the vulnerabilities and threats. b\Because we have no data on these threats on the amount of occurrences we cannot assign an impact rating or a probability rating in which is high medium an low (reference page 121 of book)…

    • 1244 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Weaknesses are a symptom that is prevalent in today’s information technology realm, indicating vulnerabilities and risks that come hand and hand with shared networks like Aircraft Solutions. With enterprises exchanging an unprecedented level of information over open networks, the vulnerabilities and possibility of compromised security by unwanted intruders is swelling up into a new type of beast.…

    • 1105 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    This risk assessment was to identify threats and vulnerabilities related to the Department of the Army (DoA) Information Technology (IT) systems. It will be utilized to identify vulnerabilities in the Computer Network Defense (CND) Capabilities and mitigation plans related to DoA’s IT systems. It was realized that this was a potential high-risk system as noted by the Department of Defense (DoD) Chief Information Officer (CIO). (DoD, 2012)…

    • 1633 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    This article discusses Homeland Security's decision to renew Raytheon's contract as its cyber protector. In September Raytheon was picked as the main contractor for the Network Security Deployment division. This new contract is directly influenced by the companies new plans to prioritize cyber security as just last year the Office of Personnel Management was hacked, leaving data on 21.5 million people comprised. Moreover, in January of this year, a report on Homeland's cyber security admitted to limitations in ability to detect possible malware. Overall, cyber security is a controversial issue. An example of this is the debate surrounding the unlocking of a terrorist's iPhone in December, which Apple refused to do.…

    • 111 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    ISS Information Systems Information NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 5…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    All rights reserved. Page 5 Types of Threats  Malicious software  Device failure  Application failure  Natural disaster  Intrusive cracker NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    The purpose of this paper is to evaluate the computer security for Aircraft Solutions. When discussing computer security, the three main areas aspects of any computer-related system are confidentiality, integrity, and availability. Confidentiality determines the security or privacy of the system. Integrity refers to only the authorized users making changes to parts of the computer system. Availability means if someone has a requirement to get onto the computer they are not impeded in that facet. The main challenge in constructing any secure system is determining…

    • 870 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Flight 19 Research Paper

    • 1107 Words
    • 5 Pages

    Development has leaded the world. Life has been much easy in everything. There is not even single thing that is not possible. Technology has reached in every corner of world. The technology has surrounded almost everyone in the modern society, affecting both work and leisure activities. Technology contains information that many would rather it did not have. It influences minds in good and bad ways, and it allows people to share information which they would otherwise not be able to…

    • 1107 Words
    • 5 Pages
    Good Essays
  • Better Essays

    project

    • 914 Words
    • 4 Pages

    In this phase you will choose either Aircraft Solutions or Quality Web Design as the company you will work with. You will then identify potential security weaknesses.…

    • 914 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Though the technology has made several things simpler and easier, there is one major problem that arises because of it and that is the issue of security. The ease of sharing…

    • 466 Words
    • 2 Pages
    Satisfactory Essays