Preview

Aircraft Solution Company: Case Study

Powerful Essays
Open Document
Open Document
3659 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Aircraft Solution Company: Case Study
Aircraft Solution (AS) Company

Ali Hassan

Submitted to: John Michalek
SEC571 Principles of Information Security and Privacy
Keller Graduate School of Management
Submitted: April 21, 2013

Table of Contents

Company Overview ……………………………………………1
Company Assets ………………………………………………..1
Vulnerabilities ………………………………………………….2 Hardware Vulnerability………………………………….......2 Policy Vulnerability …………………………..……………..3
Recommended Solutions…………………………………….... 5 Hardware Solutions ……………………...………………..…5 Policy Solutions ……………………………...……………...10
Budget ………………………………………………………….12
Summary ………………………………………………………13
References……………………………………………………...14

Company Overview

Aircraft Solutions (AS) company
…show more content…
Advanced Security: Take advantage of the latest in content security, encryption, identity authentication, authorization, and intrusion prevention.
4. Simplicity: Use one device that 's easy to install, manage, and monitor.
5. Advanced Networking: Set up virtual private networks (VPNs) that give mobile and remote workers secure access to company resources or create VPNs between partners, other offices, or employees based on roles.

When a VPN connection is established between the two gateways (firewalls between the Headquarter and the Branch), users at branch locations are unaware of the connection and do not require any special settings on their computers. VPN software enables private information to be shared over the public network while being encrypted. Aircraft Solutions has many groups and users that need different levels of access to the internal network. Clients need access to the company website, employees need to be granted different levels of access to certain facets of the internal network. With all of these parties accessing the business, the VPN gives security to those whom feel that the information they are viewing not be available to others.

The below diagrams indicates our current hardware assets would be if we virtualized the IT
…show more content…
It is proposed that a public router be installed to handle all the inbound traffics for contractors, customers, suppliers, and the traffic from AS 's sister sites in Chula Vista and Santa Ana, California. Once the inbound traffic has made it past the AS Headquarter router, two main gateway Firewalls will filter all inbound for authentication. The firewalls will provide the needed security and business management case of one Firewall failed, need to be patched, maintenance, or need to be replaced. The firewalls will be configured on Intrusion prevention system mode (IPS Mode) and Intrusion Detection System (IDS), to give more sophistication to AS’s internal network against any intrusion, viruses and the other threats mentioned in page 2. Firewalls play a very big rule in securing the internal network infrastructure of AS’s company. Also the extra firewall in AS’s headquarter network infrastructure will support the availability of AS’s business management system, and this configuration will help AS to implement or develop a better business continuity plan and more comprehensive Disaster recovery plan. Firewalls are very important components in securing any network connectivity because, firewalls is the primary controls against any malware, adware, viruses and other unauthorized accesses, “A firewall does the

You May Also Find These Documents Helpful

  • Better Essays

    A viable solution for a situation with several remote offices is a VPN (virtual private network). VPN software enables private information to be shared over the public network while being encrypted. Aircraft Solutions has many groups and users that need different levels of access to the internal network. Clients need access to the company website, employees need to be granted different levels of access to certain facets of the internal network. With all of these parties accessing the business, the VPN gives security to those whom feel that the information they are viewing not be available to others.…

    • 1105 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Administrators could have the option of layering security by enforcing the use of PIN numbers, hardware tokens, client certificates and other forms of secure authentication on top of AD or LDAP (Lightweight Directory Access Protocol). After implementation of several security policies, I would create a SSL (Secure Socket Layer) VPN (Virtual Private Network) network, a form of VPN that can be used with a standard Web browser. In the traditional Internet Protocol Security (IPsec) VPN, an SSL VPN does not require the installation of specialized client software on the end user's computer. It's used to give remote users with access to Web applications, client/server applications and internal network connections. SSL VPN doesn’t require specialized client software on the user computer.…

    • 420 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Sdsa300 Unit 1

    • 178 Words
    • 1 Page

    Most would say VPN is the low-cost way to establish remote connections between offices and to securely provide connections to a mobile workforce. The central office should be equipped with a VPN concentrator that is configured to maintain the number of connections to be serviced for the mobile sales force. In order to provide complete network access to the mobile workforce the use of IPSec with L2TP, ESP, AH, using SHA-256, RSA2048 and AES256 is recommended over a UDP transport. Each branch office and the central office will require a point of presence to the Internet along with a local loop that provides enough bandwidth to accommodate the office demands. In order to keep cost to a minimum, it is recommended that SDSL be used at each branch…

    • 178 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Scenario 2: You manage a group of seven employees in a small consulting business. Some employees work at home and some work in the office. Each of the employees needs to be connected to the Internet.…

    • 426 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    This case study is a practical application of all of the knowledge you have acquired from your courses in the networking curriculum over the past two years. It will allow you to demonstrate both your knowledge and experience in networking both academically and hands-on. It will also allow you to draw on what you have learned as you worked your way through the online Microsoft IT Academy Security course. It is intended to be used as first a mid-term examination and then will also be continued as your end of class project and final exam. It presents a thorough review of concepts and applications presented in courses you have taken while at JSRCC. To complete this case study, read the scenario below and perform the tasks that follow. You will perform many of these tasks in teams of two but your final reports will be written individually. In addition to your analysis you are required to submit a formal written proposal that makes specific recommendations. You will be provided additional instructions regarding the format of your project report and other requirements.…

    • 5277 Words
    • 22 Pages
    Powerful Essays
  • Satisfactory Essays

    1.1 Understand the unique design, operation, and management conditions associated with an Enterprise System Architecture (ESA).…

    • 2331 Words
    • 10 Pages
    Satisfactory Essays
  • Good Essays

    Vpn Solutions

    • 571 Words
    • 3 Pages

    When implementing a VPN within an enterprise environment, security professions should begin with asking the following questions:…

    • 571 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Many organizations use the Internet and the Web technology to make their business more productive, efficient, and to cut cost. Developing a central information system or IS, is vital to organizing and storing information pertaining to all company processes. An IS will make the “six important business objectives: operational excellence; new products, services, and business models; customer and supplier intimacy; improved decision-making; competitive advantage; and survival” achievable. (Laudon & Laudon, 2011) “Information systems and technologies are some of the most important tools available to managers for achieving higher levels of efficiency and productivity in business operations.” (Laudon & Laudon, 2011) A firewall is important to have to make a security barrier that ensures that the information within the company’s information systems safe from hackers and access by outside sources. A system’s firewall is just one of many ways a company can ensure the safety of their private information.…

    • 1139 Words
    • 5 Pages
    Better Essays
  • Better Essays

    The purpose of this paper is to evaluate the computer security for Aircraft Solutions. When discussing computer security, the three main areas aspects of any computer-related system are confidentiality, integrity, and availability. Confidentiality determines the security or privacy of the system. Integrity refers to only the authorized users making changes to parts of the computer system. Availability means if someone has a requirement to get onto the computer they are not impeded in that facet. The main challenge in constructing any secure system is determining…

    • 870 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Network Perimeter: Network perimeter is defined as the boundary between a privately-owned network, and the public network. The idea between network perimeters is that the assets of a network and the hardware and any other element of the network can be monitored and controlled from outside the organization. The concept of this trend was vital because it was quite necessary to defend the internal assets of the organization. There are numerous systems that organizations are trying to implement to help with this new trend. The belief of the organization is that there is a possibility of ensuring that the assets within the network are managed in such a way that it eliminates all the possible threats. The latest trend in setting up network perimeter is adopting of remote access.…

    • 366 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The company prides itself on having a virtual office. Each consultant works out of their home but is connected to the company and co-workers through a virtual private network (VPN). A number of other electronic tools are used to complete work and to communicate including Blackberries, SharePoint, internal website, etc. In addition consultants often work remotely for clients using technologies such as teleconferencing, videoconferencing and web conferencing. Clients often set-up consultants with access into their networks to allow staff access to required information or to perform work related to hospital software programs. This speaks loudly to the concept of telecommuting.…

    • 464 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    A company can build a secure virtual private network over the Internet or over a public WAN. This type of business rely heavily on the Internet and reduce its need for private networks, saving costs and network management overhead. (2) Secure remote access over the Internet: An end user whose system is equipped with IP security protocols can make a local call to an Internet service provider (ISP) and gain secure access to a company network. This reduces the cost of toll charges for traveling…

    • 1348 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Case Study (Boeing)

    • 321 Words
    • 2 Pages

    In late 2003, the company of Boeing was the worst of its life. However, it was changed some market demand and solved the technology issues, then slowing to improve. According to the case study (Boeing), the six-box organisational model provides a framework that succinctly identifies the key factors at the centre of the Boeing situation.…

    • 321 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Boeing-Case Study

    • 311 Words
    • 2 Pages

    Lack of communication and the companies inability to inform the employees of what changes affected production at Perrier, the company made excessive changes, the company introduces a series of changes and the people felt the changes were unnecessary, and they were unsure if they would still have the required skills to continue to work for the company. Perrier has made quite a fair amount of changes in a short period of time and they will need to be aware that some people may not agree to the change and might not work to their full potential. Most of Perrier's employees did not think the changes were necessary for the organization to grow. There were some employees who thought Perrier's conducted unnecessary changes to impact their normal workload. The latter change was considered as the lack of conviction that change is needed. There was also the Perceived Negative Effect on Interest -this resistance to change will be affected by people's perceptions of the likely effect of the change on their "interests'', a term that can cover a wide range of factors including their authority, status, rewards(including salary), opportunity to apply expertise, membership of friendship networks, autonomy, and security. The employees at Perrier were concerned with the implication of the change for themselves and how it may affect their own interests, rather than considering effects for the success of the business.…

    • 311 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Vpn

    • 1208 Words
    • 5 Pages

    Virtual Private Network presents some advantages over the traditional network technologies. VPN offers direct cost savings over leased lines or long-distance calls for remote access, savings resulting from reduced training requirements and equipment, increased flexibility, scalability, and security. The main advantage of VPN is the cost savings of Internet VPN when compared to networks built using conventional leased lines. Leased lines include tariffs that have an installation fee, a fixed monthly cost, and a mileage charge. The cost to an organization of traditional leased lines may be reasonable at first but can increase exponentially as the organization grows. As an organization grows and more companies must be added to the network, the number of leased lines required increases dramatically. VPN that utilizes the Internet avoids this problem by simply tapping into the geographically distributed access already available. Another way VPN reduces costs is by reducing the need for long-distance telephone charges for remote access. Instead of having the offsite team of a company dial into the corporate modem bank via long distance lines, the company 's VPN allows them to simply place local calls to the ISP 's POP in order to connect to the corporate network.…

    • 1208 Words
    • 5 Pages
    Better Essays