Preview

Data

Powerful Essays
Open Document
Open Document
1644 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Data
The Title of My Project

Methaq Alabidy

Submitted to: Professor Robert

SE571 Principles of Information Security and Privacy

Keller Graduate School of Management

Date : 10/19/2012

Table of Contents

Executive Summary Company Overview Security Vulnerabilities A hardware and policy Recommended Solutions A Hardware and ploicy soulotion Budget Summary References

Executive Summary
The purpose of the report is to assist Aircraft Solutions (AS) in indentifying the most significant Information Technology (IT) security vulnerabilities. AS products and services are at the forefront of the industry and the protection of such is very important as they are an industry leader. The vulnerabilities that will be discussed are the firewall configuration, virtualization of their hardware assets and defining security policy regarding the timeliness of firewall configuration and updates.

Company Overview

Aircraft Solutions, headquarters located in San Diego, California develop and fabricate products and services for companies in the electronic, commercial, defense and aerospace industries. AS is made up of two (2) different divisions, the Commercial Division and the Defense Division. The Commercial Division is located in Chula Vista, CA and the Defense Division is located in Santa Ana, CA. AS company strategy is to offer low cost design and computer aided modeling packages to companies and assists them through the lifecycle of their product in an effort to save money for the consumer while profiting from their business.

Two Security Vulnerabilities

Hardware vulnerabilities. According to the network infrastructure diagram, we can see that there are 5 servers, 2 routers, 1 switcher, and 1 firewall. Each one of those servers is operate by a specific department, and all of those servers are connected to the main database server.The connection between each department’s server to the main database server take

You May Also Find These Documents Helpful

  • Best Essays

    Aircraft Solutions

    • 2805 Words
    • 12 Pages

    Aircraft Solutions operates within California in two separate physical locations in San Diego and Santa Ana. Working within both commercial and defense industries, their products are used globally. Aircraft Solutions is overtly technical in nature utilizing Business Process Management (BPM) for end to end processes that interacts with customers, vendors, and suppliers. BPM also fills a critical role of internal communications for IT to ensure customer needs are being fulfilled precisely as they have been ordered.…

    • 2805 Words
    • 12 Pages
    Best Essays
  • Best Essays

    Aircraft Solutions Project

    • 2440 Words
    • 10 Pages

    The purpose of the report is to assist Aircraft Solutions (AS) in indentifying the most significant Information Technology (IT) security vulnerabilities. AS products and services are at the forefront of the industry and the protection of such is very important as they are an industry leader. The vulnerabilities that will be discussed are the firewall configuration, virtualization of their hardware assets and defining security policy regarding the timeliness of firewall configuration and updates.…

    • 2440 Words
    • 10 Pages
    Best Essays
  • Powerful Essays

    Aircraft Solutions

    • 1868 Words
    • 8 Pages

    Aircraft Solutions (AS) is a recognized leader in the design and fabrication of component products and services for companies in the electronics, commercial, defense, and aerospace industry. The mission of AS is to provide customer success through machined products and related services, and to meet cost, quality, and schedule requirements.…

    • 1868 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    All rights reserved. Page 6 Types of Vulnerabilities  Insecure servers or services  Exploitable applications and protocols  Unprotected system or network resources  Traffic interception and eavesdropping  Lack of preventive and protective measures against malware or automated attacks NT2580 Introduction to Information Security…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Aircraft Solutions, headquartered in San Diego, California, is a company specializing in business-to-business products and services. Their customers are primarily in the electronic, commercial, defense and aerospace industries. They specialize in offering low-cost design and computer-aided packages to help their customers lower their costs for development and involve their customers in every step of the fabrication process while utilizing the Business Process Management System (BPM). With this method they hope to keep repeat business and attain long-lasting customer relationships. They have two remote locations outside of San Diego: The commercial division is 40 miles east in Chula Vista,…

    • 2240 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    The purpose of this paper is to evaluate the computer security for Aircraft Solutions. When discussing computer security, the three main areas aspects of any computer-related system are confidentiality, integrity, and availability. Confidentiality determines the security or privacy of the system. Integrity refers to only the authorized users making changes to parts of the computer system. Availability means if someone has a requirement to get onto the computer they are not impeded in that facet. The main challenge in constructing any secure system is determining…

    • 870 Words
    • 4 Pages
    Better Essays
  • Good Essays

    operations in organisations and business environments. Security threats on the remote machines can always be averted easily and their impacts are not as serious compared to threats on the central computer system (Kaufman et al, 2002).The central computer system is a valuable resource that must be secured to ensure continued operation in the organisation. Securing a central computer network is the key to ensuring network security in any institution (Kaeo, 1999).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    1.24 (U) Risk Management Framework. DoDI 8510.01, Risk Management Framework (RMF) for DoD Information Technology, requirements are integrated throughout System Acquisition Lifecycle to control the cost and operational impact associated with known system vulnerabilities. In addition to Department of Defense Manual (DoDM) 5200.01 Volumes 1-4, DoD Information Security Program, NIST 800-60 Vol 1 and Vol 2, Guide to Mapping Type of Information and Information Systems to Security Categories, dated August 2008, and Federal Information Processing Standard (FIPS) 199, Standards for Security Categorization of Federal Information and Information Systems, were leveraged as guidance for classification of enclaves, networks, and information systems where…

    • 212 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Creating profit by decreasing consumer advantages or increasing price, but still being affordable and good quality…

    • 428 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Proc 5830

    • 3108 Words
    • 13 Pages

    either impeding on the competition by offering same or like product at a cheaper cost with the…

    • 3108 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Breathe Right Strips

    • 444 Words
    • 2 Pages

    profit, increase customer base and there is a demand for the product. Some of the…

    • 444 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Channel Distribution

    • 1985 Words
    • 8 Pages

    unknown or new brands of goods. They also insist on the customer buying the lesserknown…

    • 1985 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    E-banking has become a common trend here in our country. It has made life easier for the life of Batswana, they can easily access their checking’s, savings credit card, mortgage and loan accounts with just a few clicks, anytime anywhere. They can transfer funds, pay bills and view transaction history just with a few clicks. They do not have to leave their home to do their banking. They can access their accounts in a matter of seconds. They can receive monthly statements electronically instead of by mail and save a lot of paper work in the process. They can view their statements in order of date and are likely to find the information you are looking for quicker than flipping through pages of older paper statements. Their many fundamental benefits e-banking has brought to Batswana but unfortunately, technology is never 100 percent reliable. Online banking can compromise your security and privacy. Hackers can obtain your account number or Social Security number and make unauthorized transactions on your behalf. Someone may get your security details if you didn't close the browser window or if the password memorization feature is enabled for your bank's website.…

    • 1719 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    • It helps the consumer to save time. As the consumer has already been the consumer is not required to spend time in getting the products.…

    • 303 Words
    • 2 Pages
    Satisfactory Essays