Preview

Aircraft Solutions

Best Essays
Open Document
Open Document
2805 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Aircraft Solutions
Aircraft Solutions Security and Policy Assessment

Table of Contents

Executive Summary 1 Company Overview 1 Security Vulnerabilities 1 Decentralized Anti Virus 1 Access Control List Policy 3 Recommended Solutions 6 Bitdefender 6 AlgoSec Security Management Suite 7 Impact on Business Processes 7 Budget 8 Summary 8 References 9

Executive Summary

As Aircraft Solutions takes the next step in its growth, it is imperative that its IT infrastructure keep pace as to not counteract gains made by the company during this expansion. This is especially important given it designs and fabricates components for both commercial and defense related industry. Given the increase in staff as well as outside vendors accessing the network, a more centralized approach to antivirus protection has to be adopted. It is equally important that certain elements within the network that have been done manually, such as Access Control List policy, be automated to avoid consuming the IT department in an ever escalating bar of employee hours.

Company Overview

Aircraft Solutions operates within California in two separate physical locations in San Diego and Santa Ana. Working within both commercial and defense industries, their products are used globally. Aircraft Solutions is overtly technical in nature utilizing Business Process Management (BPM) for end to end processes that interacts with customers, vendors, and suppliers. BPM also fills a critical role of internal communications for IT to ensure customer needs are being fulfilled precisely as they have been ordered.

Security Vulnerabilities

Decentralized Anti Virus In reviewing the software utilized by Aircraft Solutions, it is stated that security is handled by anti-virus software that is independently operated for all workstations and servers. This seems to be a continuation of the host centric theme as evidenced by host based IDS. Whereas host based IDS can be seen as a more viable



References: AlgoSec. (2012, january). AlgoSec Security Management Suite. Retrieved February 18, 2013, from Algosec.com: http://www.algosec.com/en/products/products_overview AlgoSec Department of Homeland Security. (2012). Virus Basics. Retrieved 1 22, 2013, from http://www.us-cert.gov/reading_room/virus.html#tips Fisher, S Hogg, S. (2011, July 31). Retrieved February 20, 2013, from Firewall Administration Techniques and Tools: http://www.networkworld.com/community/blog/firewall-administration-techniques-and-tools Kaspersky Security Bulletin Notenboom, L. (2008). Retrieved February 21, 2013, from What 's a port scan, and should I be worried about them?: http://ask-leo.com/whats_a_port_scan_and_should_i_be_worried_about_them.html Salary.com Salary.com. (2013). Retrieved February 24, 2013, from Network Operations Manager: http://swz.salary.com/SalaryWizard/Network-Operations-Manager-Salary-Details.aspx Squidoo.com Weinberger, S. (2012, March 20). Top Ten Most-Destructive Computer Viruses. Retrieved February 20, 2013, from http://www.smithsonianmag.com/science-nature/Top-Ten-Most-Destructive-Computer-Viruses.html Zorz, Z

You May Also Find These Documents Helpful

  • Satisfactory Essays

    | * OS Update appliance * Patch/Configuration appliance * Embedded biometrics * Remote policy management * Endpoint Encryption * Secure browser * Secure Email * Incremental backup…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Aircraft Solutions Project

    • 2440 Words
    • 10 Pages

    The purpose of the report is to assist Aircraft Solutions (AS) in indentifying the most significant Information Technology (IT) security vulnerabilities. AS products and services are at the forefront of the industry and the protection of such is very important as they are an industry leader. The vulnerabilities that will be discussed are the firewall configuration, virtualization of their hardware assets and defining security policy regarding the timeliness of firewall configuration and updates.…

    • 2440 Words
    • 10 Pages
    Best Essays
  • Powerful Essays

    Aircraft Solutions

    • 1868 Words
    • 8 Pages

    Aircraft Solutions (AS) is a recognized leader in the design and fabrication of component products and services for companies in the electronics, commercial, defense, and aerospace industry. The mission of AS is to provide customer success through machined products and related services, and to meet cost, quality, and schedule requirements.…

    • 1868 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Robert Jones Unit 8 Discussion: John Motorcycle Parts 8/5/2014 IS3110 Mr. Jackson Risk Assessment Plan Performed for John Motorcycle Parts Co. Risks: 1. Identify risks and problems with security plan 2. 5 things to go wrong without Biz Continuity Plan Disaster Recovery Plan. 3. List five risks to be addressed I. Identification of risks and problems:…

    • 186 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    This report is prepared to assist the aircraft solutions (AS), a well-known company for equipment and component fabrication in Southern California, in identifying the most important security vulnerabilities. This report also discusses possible threats, the likelihood of the threats occurring and the threat if exposed in two remarkable areas. Aircraft Solutions maintains a large capacity plant, trained workforce, large variety of equipment, design modules and solution database provided to multiple industries. These companies include aerospace, electronics and defense sectors. In this report I will focus on the vulnerabilities present in the existing system of Aircraft Solutions and its operations.…

    • 2041 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    Weaknesses are a symptom that is prevalent in today’s information technology realm, indicating vulnerabilities and risks that come hand and hand with shared networks like Aircraft Solutions. With enterprises exchanging an unprecedented level of information over open networks, the vulnerabilities and possibility of compromised security by unwanted intruders is swelling up into a new type of beast.…

    • 1105 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Nt1310 Unit 33

    • 595 Words
    • 3 Pages

    The most modern method of firewall scanning that does not rely on memory intensive examination is ‘Stateful inspection’. A Stateful firewall holds significant attributes of each connection of trusted information for the duration of session. These attributes which are collectively known as state of the connection may include ip addresses, ports involved in the network and number of packets being…

    • 595 Words
    • 3 Pages
    Good Essays
  • Better Essays

    The purpose of this paper is to evaluate the computer security for Aircraft Solutions. When discussing computer security, the three main areas aspects of any computer-related system are confidentiality, integrity, and availability. Confidentiality determines the security or privacy of the system. Integrity refers to only the authorized users making changes to parts of the computer system. Availability means if someone has a requirement to get onto the computer they are not impeded in that facet. The main challenge in constructing any secure system is determining…

    • 870 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    When securing the modern enterprise, consider that IT systems do not operate alone. Securing them involves securing their interfaces with other systems as well. It is important to know the different interconnections each system may have.…

    • 312 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    * All PC's are to be configured such that they schedule regular updates from the Network Services centralized anti-virus servers.…

    • 1030 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Quarterly profit-and-loss report that shows a breakdown of revenue and cost for each separate activity…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Week 1 Case Study

    • 1259 Words
    • 4 Pages

    With the increased and wide spread use of computers in the military, a need for procedures we due. These procedure recommendations revolved around technique and security which had not previously existed on such a broad scale. Even with the large scale of operations, there still needed to be some privacy around the system and data that was shared or accessed. Through this study, batch, multiprogramming, and time-shared processing were all recommended for different levels of access and control. Three types of threats to system security were identified. These are accidental access of data, deliberate access of data, and a physical attack on the system. There were recommended safeguards to protect from all three vulnerabilities. This protection had to be identified and secured by the system designer so not gaps were missed. These gaps could be in the software, hardware, communication of information and general lack of organization or the organization itself. There were recommended…

    • 1259 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Deploying the right security products – IT security today has a wide range of technologies that are aimed specifically at lowering risks and threats.…

    • 584 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Compulsory Assignment n 1

    • 1085 Words
    • 3 Pages

    Cox, K., (2014) Bitcoin: What The Heck Is It, And How Does It Work? Consumerist Retrieved from: http://consumerist.com/2014/03/04/bitcoin-what-the-heck-is-it-and-how-does-it-work/…

    • 1085 Words
    • 3 Pages
    Powerful Essays
  • Better Essays

    smallbusinesscomputing.com. (2009, May 7) Document: What is Virtualization, and Why Should you care? Retrieved from: http://www.smallbusinesscomputing.com/testdrive/article.php/3819231/What-is-Virtualization-and-Why-Should-You-Care.htm…

    • 1564 Words
    • 7 Pages
    Better Essays