Preview

Aircraft Solutions

Best Essays
Open Document
Open Document
2805 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Aircraft Solutions
Aircraft Solutions Security and Policy Assessment

Table of Contents

Executive Summary 1 Company Overview 1 Security Vulnerabilities 1 Decentralized Anti Virus 1 Access Control List Policy 3 Recommended Solutions 6 Bitdefender 6 AlgoSec Security Management Suite 7 Impact on Business Processes 7 Budget 8 Summary 8 References 9

Executive Summary

As Aircraft Solutions takes the next step in its growth, it is imperative that its IT infrastructure keep pace as to not counteract gains made by the company during this expansion. This is especially important given it designs and fabricates components for both commercial and defense related industry. Given the increase in staff as well as outside vendors accessing the network, a more centralized approach to antivirus protection has to be adopted. It is equally important that certain elements within the network that have been done manually, such as Access Control List policy, be automated to avoid consuming the IT department in an ever escalating bar of employee hours.

Company Overview

Aircraft Solutions operates within California in two separate physical locations in San Diego and Santa Ana. Working within both commercial and defense industries, their products are used globally. Aircraft Solutions is overtly technical in nature utilizing Business Process Management (BPM) for end to end processes that interacts with customers, vendors, and suppliers. BPM also fills a critical role of internal communications for IT to ensure customer needs are being fulfilled precisely as they have been ordered.

Security Vulnerabilities

Decentralized Anti Virus In reviewing the software utilized by Aircraft Solutions, it is stated that security is handled by anti-virus software that is independently operated for all workstations and servers. This seems to be a continuation of the host centric theme as evidenced by host based IDS. Whereas host based IDS can be seen as a more viable



References: AlgoSec. (2012, january). AlgoSec Security Management Suite. Retrieved February 18, 2013, from Algosec.com: http://www.algosec.com/en/products/products_overview AlgoSec Department of Homeland Security. (2012). Virus Basics. Retrieved 1 22, 2013, from http://www.us-cert.gov/reading_room/virus.html#tips Fisher, S Hogg, S. (2011, July 31). Retrieved February 20, 2013, from Firewall Administration Techniques and Tools: http://www.networkworld.com/community/blog/firewall-administration-techniques-and-tools Kaspersky Security Bulletin Notenboom, L. (2008). Retrieved February 21, 2013, from What 's a port scan, and should I be worried about them?: http://ask-leo.com/whats_a_port_scan_and_should_i_be_worried_about_them.html Salary.com Salary.com. (2013). Retrieved February 24, 2013, from Network Operations Manager: http://swz.salary.com/SalaryWizard/Network-Operations-Manager-Salary-Details.aspx Squidoo.com Weinberger, S. (2012, March 20). Top Ten Most-Destructive Computer Viruses. Retrieved February 20, 2013, from http://www.smithsonianmag.com/science-nature/Top-Ten-Most-Destructive-Computer-Viruses.html Zorz, Z

You May Also Find These Documents Helpful

  • Best Essays

    Aircraft Solutions Project

    • 2440 Words
    • 10 Pages

    The purpose of the report is to assist Aircraft Solutions (AS) in indentifying the most significant Information Technology (IT) security vulnerabilities. AS products and services are at the forefront of the industry and the protection of such is very important as they are an industry leader. The vulnerabilities that will be discussed are the firewall configuration, virtualization of their hardware assets and defining security policy regarding the timeliness of firewall configuration and updates.…

    • 2440 Words
    • 10 Pages
    Best Essays
  • Powerful Essays

    This report is prepared to assist the aircraft solutions (AS), a well-known company for equipment and component fabrication in Southern California, in identifying the most important security vulnerabilities. This report also discusses possible threats, the likelihood of the threats occurring and the threat if exposed in two remarkable areas. Aircraft Solutions maintains a large capacity plant, trained workforce, large variety of equipment, design modules and solution database provided to multiple industries. These companies include aerospace, electronics and defense sectors. In this report I will focus on the vulnerabilities present in the existing system of Aircraft Solutions and its operations.…

    • 2041 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Data

    • 1644 Words
    • 7 Pages

    The purpose of the report is to assist Aircraft Solutions (AS) in indentifying the most significant Information Technology (IT) security vulnerabilities. AS products and services are at the forefront of the industry and the protection of such is very important as they are an industry leader. The vulnerabilities that will be discussed are the firewall configuration, virtualization of their hardware assets and defining security policy regarding the timeliness of firewall configuration and updates.…

    • 1644 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    The idea of having independent anti-virus software installation on all workstations and servers, however, a host based detection system on corporate office servers. The hardware at the corporate level server lack of a firewall protection creates vulnerabilities to:…

    • 1104 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Aircraft Solutions

    • 1868 Words
    • 8 Pages

    Aircraft Solutions (AS) is a recognized leader in the design and fabrication of component products and services for companies in the electronics, commercial, defense, and aerospace industry. The mission of AS is to provide customer success through machined products and related services, and to meet cost, quality, and schedule requirements.…

    • 1868 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Aircraft Solutions, headquartered in San Diego, California, is a company specializing in business-to-business products and services. Their customers are primarily in the electronic, commercial, defense and aerospace industries. They specialize in offering low-cost design and computer-aided packages to help their customers lower their costs for development and involve their customers in every step of the fabrication process while utilizing the Business Process Management System (BPM). With this method they hope to keep repeat business and attain long-lasting customer relationships. They have two remote locations outside of San Diego: The commercial division is 40 miles east in Chula Vista,…

    • 2240 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Paper on Physical Security

    • 4681 Words
    • 19 Pages

    An important consideration of an information or operating system of a business or organization is to have a security system that protects information, data, and integrity of the company’s sensitive information and records. If a business or company does not have adequate security, financial, sensitive, and classified information may be compromised and prone to possible viruses and malware, hacking, or at risk of a cyber-attack to the company’s data resulting in possible financial loss. If this scenario is the case, extensive resources most likely will be required to repair or undo the damage caused by the breach of security or virus. This essay will discuss the Service Request SR-rm-013 for Riordan Manufacturing and address security issues and concerns. In addition, this document proposes solutions, methods, and options, and provide information that would best suit the company’s needs and requirements for the security and integrity of sensitive data, based on Riordan’s current security, operating system, and database.…

    • 4681 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Deploying the right security products – IT security today has a wide range of technologies that are aimed specifically at lowering risks and threats.…

    • 584 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Microsoft Corporation. (2007, August 1). Fast Facts About Microsoft. Retrieved April 6, 2008, from Microsoft website: http://www.microsoft.com/presspass/inside_ms.mspx…

    • 1133 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Rim Case Study

    • 1069 Words
    • 5 Pages

    Licensed software includes features and services that improve the effectiveness and efficiency of businesses in ways like it reduces the exposure to viruses and other security vulnerabilities, meaning fewer system malfunctions, downtime, and IT repair costs. This is because licensed software comes with value-added services that provide access to upgrades, patches, and manufacturer support such as training and problem resolution. Capturing these efficiencies on a daily basis delivers operational and financial gains that help firms reduce costs and drive further investment.…

    • 1069 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Week 1 Case Study

    • 1259 Words
    • 4 Pages

    With the increased and wide spread use of computers in the military, a need for procedures we due. These procedure recommendations revolved around technique and security which had not previously existed on such a broad scale. Even with the large scale of operations, there still needed to be some privacy around the system and data that was shared or accessed. Through this study, batch, multiprogramming, and time-shared processing were all recommended for different levels of access and control. Three types of threats to system security were identified. These are accidental access of data, deliberate access of data, and a physical attack on the system. There were recommended safeguards to protect from all three vulnerabilities. This protection had to be identified and secured by the system designer so not gaps were missed. These gaps could be in the software, hardware, communication of information and general lack of organization or the organization itself. There were recommended…

    • 1259 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    The purpose of this paper is to evaluate the computer security for Aircraft Solutions. When discussing computer security, the three main areas aspects of any computer-related system are confidentiality, integrity, and availability. Confidentiality determines the security or privacy of the system. Integrity refers to only the authorized users making changes to parts of the computer system. Availability means if someone has a requirement to get onto the computer they are not impeded in that facet. The main challenge in constructing any secure system is determining…

    • 870 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Unit 4

    • 1878 Words
    • 8 Pages

    Organizations invest a large portion of their information technology budgets on security applications and services, such as antivirus software, firewalls, and encryption. But no matter how much security hardware or software you deploy, how tightly you control the rights of users, or carefully you configure security permissions on your data, you should not consider the job complete unless you have a well-defined, timely auditing strategy to track the effectiveness of your defenses and identify attempts to circumvent them.…

    • 1878 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Boeing 767: Case Study

    • 1855 Words
    • 12 Pages

    The aerospace industry differs from almost all other industry in the huge costs incurred at the product development level as well as the product manufacturing level. A single airplane will have a few million parts that are expected to run better than an ordinary computer that might have a few hundred parts at most. Furthermore safety regulations allow little flexibility and the harsh procedures add to the costs of development and testing.…

    • 1855 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    When securing the modern enterprise, consider that IT systems do not operate alone. Securing them involves securing their interfaces with other systems as well. It is important to know the different interconnections each system may have.…

    • 312 Words
    • 3 Pages
    Satisfactory Essays