Security Assessment - Aircraft Solutions

Only available on StudyMode
  • Download(s) : 675
  • Published : September 21, 2012
Open Document
Text Preview
Course Project:
Security Assessment and Recommendations – Phase I & II Aircraft Solutions

Table of Contents

Executive Summary……………………………………………………..1

Company Overview……………………………………………………..1

Hardware Vulnerability………………………………………………...2

Policy Vulnerability……………………………………………………..3

Hardware Solution………………………………………………………4

Policy Solution…………………………………………………………...5

Summary…………………………………………………………………6

Executive Summary

The purpose of this paper is to explore and assess computer security as it relates to Aircraft Solutions. Aircraft Solutions provides products and services to a range of companies that require highly specialized skills. Information is accessed by internal and external users via their Business Process Management system. Based on the information provided, two vulnerabilities have been identified. The first vulnerability lies within the network infrastructure and the lack of sufficient firewalls. The second vulnerability is driven by their security policy as it relates to the evaluation of firewall protection. Subsequently, it is suggested that the company purchase additional firewall protection for the connection between the main router, the internet and the Chula Vista location as well updating their security policy to evaluate firewalls every six months.

Company Overview

As a leader in its industry, Aircraft Solutions provides design and fabrication of component products and services for companies in the electronics, commercial, defense and aerospace industries. It is headquartered in Southern California with several locations throughout the state that were strategically placed close to intermodal hubs for ease of access. These locations house a voluminous plant, extensive equipment and a highly skilled workforce that includes design engineers, programmers, machinists and assembly workers. Ultimately, the company’s goal is provide machined products and services that would enable their customers achieve cost, quality and time requirements. The company uses one system, Business Process Management, to handle processes that span across several systems and organizations. The users of this system are employees, customers, suppliers and contractors. There is a multitude of information stored on designated servers that include project information, design and development models, payroll data, sales figures, accounting and human resource data. The system is managed by the information technology group within the company who also selects, installs and trains the workforce on the system.

Two Security Vulnerabilities

Hardware Vulnerability
The hardware vulnerability within this scenario is the insufficient number of firewalls used within this organization. According to the illustration below of Aircraft Solution’s network infrastructure, the connection between the main router, the internet and CD Chula Vista isn’t protected by a firewall.

Source: SE571 Course Project: Security Assessment and Recommendations - Scenerios “A firewall is a software program or piece of hardware that helps screen out hackers, viruses and worms that try to reach your computer over the internet” (Microsoft, 2012). The absence of a firewall at the main connection to the internet leaves the company vulnerable to unauthorized network traffic and cyber attacks. Consequently, this could lead to malicious attacks on the entire company bringing operations to a halt. According to a survey conducted by Symantec, forty-two percent of organizations rate cyber attacks their top security issue. While seventy-five percent of respondents said their organization has experienced at least a few cyber attacks in the past 12 months. On average, cyber attacks cost companies about $2 million per year in reduced productivity, revenue and customer confidences associated with such events (Moscaritolo, 2010).

Policy Vulnerability
The second vulnerability for Aircraft solutions is driven...
tracking img