Table of Contents
Contents
Executive Summary
The purpose of this paper is to evaluate the computer security for Aircraft Solutions. When discussing computer security, the three main areas aspects of any computer-related system are confidentiality, integrity, and availability. Confidentiality determines the security or privacy of the system. Integrity refers to only the authorized users making changes to parts of the computer system. Availability means if someone has a requirement to get onto the computer they are not impeded in that facet. The main challenge in constructing any secure system is determining …show more content…
Located in Southern California, Aircraft Solutions has a dedicated, trained workforce and maintains a large capacity plant and extensive equipment to meet customer requirements. Much of the equipment is automated to increase production while reducing costs. The company 's workforce has a large skill base: design engineers, programmers, machinists, and assembly personnel to work its highly-automated production systems.”(DeVry) Their mission is to determine the customers’ needs and provide “products and related services, and to meet cost, quality, and schedule requirements.” (DeVry) Given the amount of influence that Aircraft Solutions has in the Defense and Aerospace Industry, I will determine the best course of action to assist in their advancement of their hardware and policies of the hardware. Aircraft Solutions Business Process Management system is an end user design. This means customers, vendors, suppliers all collaborate with Aircraft Solutions to get the desired end product. “The Business Process Management also aligns internal business operations with IT support to maintain production in support of customer …show more content…
The problem comes in finding and fixing these problems. Depending on how big or small the weakness is determines how detrimental the risk is. After reviewing the infrastructure of Aircraft Solutions, I was able to determine that there were a few things that would put their system in a vulnerable state and potentially put their system at risk. The two areas where they are most vulnerable are the hardware and the policy. The first vulnerable area is the hardware of the firewalls that are not being used appropriately to protect the network against breaches in the networks architecture and hierarchy. Without the firewall in place it exposes the network (LAN) to any malicious internal as well as external attacks. These attacks can lead to the compromising of any of the company’s data.
The second vulnerability is the policies that are in place to evaluate the firewalls, routers and the personnel to maintain them. There should always be checks and balances with any system. This means you have two sets of personnel maintaining the system. One set of personnel on site, such as a security officer and an assistant security officer to maintain these controls. And the second set being from an outside vendor that would continuously monitor Aircraft Solution’s Systems regularly. This would deter any internal or external malicious attacks to the