Table of Contents
Executive Summary 1 Company Overview 1 Security Vulnerabilities 1 Decentralized Anti Virus 1 Access Control List Policy 3 Recommended Solutions 6 Bitdefender 6 AlgoSec Security Management Suite 7 Impact on Business Processes 7 Budget 8 Summary 8 References 9
Executive Summary
As Aircraft Solutions takes the next step in its growth, it is imperative that its IT infrastructure keep pace as to not counteract gains made by the company during this expansion. This is especially important given it designs and fabricates components for both commercial and defense related industry. Given the increase in staff as well as outside vendors accessing the network, a more centralized approach to antivirus protection has to be adopted. It is equally important that certain elements within the network that have been done manually, such as Access Control List policy, be automated to avoid consuming the IT department in an ever escalating bar of employee hours.
Company Overview
Aircraft Solutions operates within California in two separate physical locations in San Diego and Santa Ana. Working within both commercial and defense industries, their products are used globally. Aircraft Solutions is overtly technical in nature utilizing Business Process Management (BPM) for end to end processes that interacts with customers, vendors, and suppliers. BPM also fills a critical role of internal communications for IT to ensure customer needs are being fulfilled precisely as they have been ordered.
Security Vulnerabilities
Decentralized Anti Virus In reviewing the software utilized by Aircraft Solutions, it is stated that security is handled by anti-virus software that is independently operated for all workstations and servers. This seems to be a continuation of the host centric theme as evidenced by host based IDS. Whereas host based IDS can be seen as a more viable
References: AlgoSec. (2012, january). AlgoSec Security Management Suite. Retrieved February 18, 2013, from Algosec.com: http://www.algosec.com/en/products/products_overview AlgoSec Department of Homeland Security. (2012). Virus Basics. Retrieved 1 22, 2013, from http://www.us-cert.gov/reading_room/virus.html#tips Fisher, S Hogg, S. (2011, July 31). Retrieved February 20, 2013, from Firewall Administration Techniques and Tools: http://www.networkworld.com/community/blog/firewall-administration-techniques-and-tools Kaspersky Security Bulletin Notenboom, L. (2008). Retrieved February 21, 2013, from What 's a port scan, and should I be worried about them?: http://ask-leo.com/whats_a_port_scan_and_should_i_be_worried_about_them.html Salary.com Salary.com. (2013). Retrieved February 24, 2013, from Network Operations Manager: http://swz.salary.com/SalaryWizard/Network-Operations-Manager-Salary-Details.aspx Squidoo.com Weinberger, S. (2012, March 20). Top Ten Most-Destructive Computer Viruses. Retrieved February 20, 2013, from http://www.smithsonianmag.com/science-nature/Top-Ten-Most-Destructive-Computer-Viruses.html Zorz, Z