Preview

Aircraft Solutions Project

Best Essays
Open Document
Open Document
2440 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Aircraft Solutions Project
Table of Contents

Executive Summary 3
Company Overview 3
Vulnerabilities 3
Hardware Vulnerabilities 3
Policy Vulnerabilities 6
Recommended Solution - Hardware 7
Impact on Business Processes 10
Recommended Solution – Policy 10
Impact on Business Processes 11
Budget 11
Summary 11
References 13

Executive Summary
The purpose of the report is to assist Aircraft Solutions (AS) in indentifying the most significant Information Technology (IT) security vulnerabilities. AS products and services are at the forefront of the industry and the protection of such is very important as they are an industry leader. The vulnerabilities that will be discussed are the firewall configuration, virtualization of their hardware assets and defining security policy regarding the timeliness of firewall configuration and updates.
Company Overview
Aircraft Solutions, headquarters located in San Diego, California develop and fabricate products and services for companies in the electronic, commercial, defense and aerospace industries. AS is made up of two (2) different divisions, the Commercial Division and the Defense Division. The Commercial Division is located in Chula Vista, CA and the Defense Division is located in Santa Ana, CA. AS company strategy is to offer low cost design and computer aided modeling packages to companies and assists them through the lifecycle of their product in an effort to save money for the consumer while profiting from their business.
Vulnerabilities
Hardware Vulnerabilities
The hardware infrastructure of the AS Headquarters in San Diego, California had been identified during our recent security assessment as being a potential security weakness to the company's overall information systems security infrastructure.
The system hardware infrastructure comprises of
Five (5) Individual Servers
One (1) Switch
Two (2) Routers
One (1) Firewall

The hardware area of concern was the lack of Firewalls being used to



References: (n.d.). Retrieved 04 04, 2011, from Amazon : http://www.amazon.com/Dell-PowerEdge-R710-Server-48GB/dp/B0037S9MTM (n.d.). Retrieved 04 04, 2011, from Dell: www.dell.com Bevis, J. (2007, July 12). Security Threats Statistics - Resources. Retrieved March 19, 2011, from InfoSecAlways.com: http://infosecalways.com/2007/07/12/security-threat-statistics-resources/ Halski Systems. (n.d.). Retrieved 04 04, 2011, from http://www.halski.com/p-66-cisco-catalyst-3750-emi-switch-24-ports.php Infinity Microsystems. (n.d.). Retrieved 04 04, 2011, from http://www.infinity-micro.com/ProdDisplay1.asp Marsan, C. D. (2009, June 9). Hidden Threat on Corporate Nets: Misconfigured Gear. Retrieved April 4, 2011, from CIO: http://www.cio.com/article/494522/Hidden_Threat_on_Corporate_Nets_Misconfigured_Gear Northrup, T. (n.d.). Security TechCenter. Retrieved March 18, 2011, from Microsoft TechNet: http://technet.microsoft.com/en-us/library/cc700820.aspx TWA Communications. (n.d.). Retrieved 04 03, 2011, from http://www.twacomm.com/catalog/model_7206VXR.htm?pid=1000&utm_source=fgl&utm_medium=prodlist&utm_term=7206VXR

You May Also Find These Documents Helpful

  • Best Essays

    Aircraft Solutions

    • 2805 Words
    • 12 Pages

    Aircraft Solutions operates within California in two separate physical locations in San Diego and Santa Ana. Working within both commercial and defense industries, their products are used globally. Aircraft Solutions is overtly technical in nature utilizing Business Process Management (BPM) for end to end processes that interacts with customers, vendors, and suppliers. BPM also fills a critical role of internal communications for IT to ensure customer needs are being fulfilled precisely as they have been ordered.…

    • 2805 Words
    • 12 Pages
    Best Essays
  • Powerful Essays

    ITNE455-1204A-01 U3GP3

    • 5030 Words
    • 21 Pages

    Security is embraced by the executive management staff at MJD Electronics. An important task for the Chief Security and Compliance Officer for MJD Electronics is to outline a plan that makes considerations for many of the important aspects of valid security architecture. This discussion presents more detailed information on many topics that should be included in a solid security architecture including border routers, demilitarized zones, proxy firewalls, access control lists and filters, fail-safe equipment, and more.…

    • 5030 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    IS4799

    • 675 Words
    • 8 Pages

     Importance • Significant amount of supplemental information IS4799 Information Systems and Cybersecurity Capstone Project © ITT Educational Services, Inc. All rights reserved. Page 4 Key Concepts  Clarification • Additional information to clarify RFP contents…

    • 675 Words
    • 8 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    In t fid en tia l ity The CIA Triad Co n y rit eg Availability NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    All rights reserved. Page 6 Types of Vulnerabilities  Insecure servers or services  Exploitable applications and protocols  Unprotected system or network resources  Traffic interception and eavesdropping  Lack of preventive and protective measures against malware or automated attacks NT2580 Introduction to Information Security…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    The purpose of this paper is to evaluate the computer security for Aircraft Solutions. When discussing computer security, the three main areas aspects of any computer-related system are confidentiality, integrity, and availability. Confidentiality determines the security or privacy of the system. Integrity refers to only the authorized users making changes to parts of the computer system. Availability means if someone has a requirement to get onto the computer they are not impeded in that facet. The main challenge in constructing any secure system is determining…

    • 870 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Bombardier Aerospace is a division of Bombardier Inc. It is headquartered in Dorval, Quebec, Canada. It is presently the third largest manufacturer of aircrafts after Boeing and Airbus. Bombardier Aerospace designs, manufactures and supports innovative aviation products for the business, commercial, specialized and amphibious aircraft markets having the most comprehensive aircraft portfolio along with holding the number one position in business and regional aircraft.…

    • 161 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Bibliography: U.S. Department of Homeland Security. (n.d.). Cyber-Security. Retrieved from Department of Homeland Security: http://www.dhs.gov/cybersecurity…

    • 1965 Words
    • 8 Pages
    Better Essays
  • Better Essays

    Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    SAMPLE Security Policy

    • 3395 Words
    • 13 Pages

    References: Hausman, K., Weiss, M., & Barrett, D. (2011). Comptia security sy0-301. (3rd ed.). Pearson Education, Inc.…

    • 3395 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    Aerospace and defense manufacturers develop aircraft and spacecraft for the commercial sector, and military aircraft, spacecraft, missiles, tanks, and other products for the United States and other militaries. Nearly half of the aerospace and defense industry's revenue comes from the latter half of the equation. Within the United States, there is only one major aircraft manufacturer—Boeing. Its only domestic rival, McDonnell Douglass, was swallowed up by the maker of 747s in 1997. However, buying McDonnell Douglass didn't take out the competition—Europe's Airbus Industries has been steadily gaining market share in recent years and now ranks as the number-one aircraft manufacturer in the world.…

    • 1250 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    (Please forward this report to the Research Office. A copy will be forwarded to your Research Leader/HOS)…

    • 4921 Words
    • 20 Pages
    Powerful Essays
  • Satisfactory Essays

    * US-based electrical components company Eaton Corporation foresees plenty of opportunities for itself in India's unfolding civil and military aerospace story. "India is expected to emerge as one of the largest aviation markets in the world," as per Joe-Tao Zhou, APAC President, Aerospace Group, Eaton Corporation…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Virus Attack Prevention

    • 595 Words
    • 3 Pages

    References: Hulme, G. (2004, October 11). Security: Get Your Shields Up! InformationWeek. Cisco Systems. Retrieved on July 12, 2008, from http://www.developers.net/ciscoshowcase/view/1201…

    • 595 Words
    • 3 Pages
    Good Essays