Preview

Aircraft Solutions: Security Assessments and Recommendations

Good Essays
Open Document
Open Document
679 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Aircraft Solutions: Security Assessments and Recommendations
Aircraft Solutions:
Security Assessments
And
Recommendations

Ruth Garcia
Session: March 2012
Security in Computing
Professor: Randy Strauber

BACKGROUND
Aircraft Solutions (AS) located in beautiful southern California has become a recognized leader in the electronics, commercial, defense and aerospace industries. This is due their design and fabrication of component products and services available to their customers in the various industries. What set Aircraft Solutions apart from other design and fabrication companies are their dedicated, trained workforce and the maintenance of a large capacity plant and extensive equipment that enables the company to meet customer requirements. The company is made up of a large highly skilled work force that works its highly automated production systems from design engineers, programmers, machinists and assembly personnel. Aircraft Solutions goals are to provide excellent customer service and success through its machined products and services. This is achieved while at the same time keeping their cost, quality and scheduled deliveries in check.
The main headquarters for Aircraft Solutions is currently in San Diego, California, while their Commercial Division is located 40 miles east of headquarters and the Defense Division is located in Santa Ana, California.
Security Weakness
In reviewing the current business process, geographic layout, current IT architecture and network infrastructure there were some security issues that could and should be improved upon. Currently the existing security policy is not sufficient for the needs of the company. It is being evaluated every two years and there appears to be no encryption software use to prevent the possibility of data being mishandled, lost or stolen. A security “policy begins with assessing the risk to the network and building a team to respond. Continuation of the policy requires implementing a security change management practice and



References: 1) Author Unknown. Network Security Policy: Best Practices White Paper. 04 October 2005. Cisco.com. Retrieved: March 15, 2012, http://www.cisco.com. 2) Tyson, Jeff. "How Firewalls Work" 24 October 2000. HowStuffWorks.com. Retrieved: March 18, 2012, http://www.howstuffworks.com/firewall.htm. 3) Author Unknown. Encryption Software. December 2011. Wikipedia.org. Retrieved: March 14, 2012, http://en.wikipedia.org/wiki/Encryption_software ----------------------- NO FIREWALL No Firewall No Firewall

You May Also Find These Documents Helpful

  • Powerful Essays

    INDP Final Project

    • 1793 Words
    • 4 Pages

    Clark, J. (2012, October 17). What Is a Mantrap and Do You Need One? Retrieved from http://www.datacenterjournal.com/design/what-is-a-mantrap-and-do-you-need-one/…

    • 1793 Words
    • 4 Pages
    Powerful Essays
  • Best Essays

    Aircraft Solutions Project

    • 2440 Words
    • 10 Pages

    Aircraft Solutions, headquarters located in San Diego, California develop and fabricate products and services for companies in the electronic, commercial, defense and aerospace industries. AS is made up of two (2) different divisions, the Commercial Division and the Defense Division. The Commercial Division is located in Chula Vista, CA and the Defense Division is located in Santa Ana, CA. AS company strategy is to offer low cost design and computer aided modeling packages to companies and assists them through the lifecycle of their product in an effort to save money for the consumer while profiting from their business.…

    • 2440 Words
    • 10 Pages
    Best Essays
  • Powerful Essays

    Aircraft Solutions

    • 1868 Words
    • 8 Pages

    Aircraft Solutions (AS) is a recognized leader in the design and fabrication of component products and services for companies in the electronics, commercial, defense, and aerospace industry. The mission of AS is to provide customer success through machined products and related services, and to meet cost, quality, and schedule requirements.…

    • 1868 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Paquet, C. (2013, February 5). Security Policies > Network Security Concepts and Policies. Retrieved from http://www.ciscopress.com/articles/article.asp?p=1998559&seqNum=3…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Powerful Essays

    Aircraft Solutions, with its headquarters in San Diego, California develop and fabricate products and services for different companies. It has two divisions, commercial and the defense. The commercial division is in Chula Vista, CA and the defense division is in Santa Ana, CA. They offer designs at low cost and computer aided modeling packages. They also provide lifecycle of the product being manufactured.…

    • 2041 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Corporation Tech will face many security risks with their current network. The user domain is the single most vulnerable part of any network and as such poses the most obvious security risk. To mitigate risks involving the users is to implement policies and training to educate the user on proper use and security best practices. By educating the user on security practices such as secure passwords, safe web surfing, and securing their workstations, many potential attacks can be avoided. Policies and training are also necessary because they can be used as evidence when taking administrative action against a user or intruder in the event the system or data information is compromised.…

    • 612 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    The purpose of this paper is to evaluate the computer security for Aircraft Solutions. When discussing computer security, the three main areas aspects of any computer-related system are confidentiality, integrity, and availability. Confidentiality determines the security or privacy of the system. Integrity refers to only the authorized users making changes to parts of the computer system. Availability means if someone has a requirement to get onto the computer they are not impeded in that facet. The main challenge in constructing any secure system is determining…

    • 870 Words
    • 4 Pages
    Better Essays
  • Good Essays

    It/205 Dq 1

    • 369 Words
    • 2 Pages

    Ensuring proper level of security is important for a business because it is crucial to the operations. The business must protect the valuable asset, confidential information pertaining to trade secrets, financial data, product development, business strategy, and customer’s information. Inadequate security could result in legal liability and demise of business. Strong security and control can result in an increase of employee productivity and lower operational costs. Some tools available to prevent breaches are firewalls, intrusion detection, and antivirus software.…

    • 369 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The Boeing Company is the world’s largest aerospace company and one of the top aircraft manufacturers in the world (Boeing, 2014). The company employs over 170,000 people across 70 countries and exports products to 150 countries. In 2003, Boeing decided to adopt Toyota’s supply chain strategies for production of a new aircraft, the Boeing 787. This strategy involved moving all manufacturing to its Tier 1 suppliers who would be responsible for coordinating with all Tier 2 and Tier 3 suppliers and then the finished parts would be shipped to Boeing for assembly and distribution (Collins, 2010). This created an extreme shift in Boeing’s supply chain causing some significant issues for the company. They struggled with quality, delivery, communication, and control. This paper will outline the shortcomings of the 787 project and explore the significant changes Boeing has implemented as a result.…

    • 1589 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Windows Firewall

    • 13700 Words
    • 55 Pages

    FirewallSoftware or hardware that can help protects a computer from hackers or malicious software. A firewall helps prevent malicious software (such as worms) from gaining access to a computer through a network or over the Internet, and helps prevent a computer from sending malicious software to other computers.…

    • 13700 Words
    • 55 Pages
    Better Essays
  • Good Essays

    Designers, operators, and users of multiple-device, access control security systems are challenged by the false alarm, false clear tradeoff. Given a particular access control security system, and a prespecified false clear standard, there is an optimal (minimal) false alarm rate that can be achieved. The objective of this research is to develop methods that can be used to determine this false alarm rate. Meeting this objective requires knowledge of the joint conditional probability density functions for the security device responses. Two sampling procedures, the static grid estimation procedure and the dynamic grid estimation procedure, are proposed to estimate these functions. The concept of a system response function is introduced and the problem of determining the optimal system response function that minimizes the false alarm rate, while meeting the false clear standard, is formulated as a decision problem and proven to be NP-complete. Two heuristic procedures, the Greedy algorithm and the Dynamic Programming algorithm, are formulated to address this problem. Computational results using simulated security data are reported. These results are compared to analytical results, obtained for a prespecified system response function form. Suggestions for future research are also included.…

    • 21492 Words
    • 86 Pages
    Good Essays
  • Powerful Essays

    History of Firewall

    • 18732 Words
    • 75 Pages

    Firewalls are network devices which enforce an organization’s security policy. Since their development, various methods have been used to implement firewalls. These methods filter network traffic at one or more of the seven layers of the ISO network model, most commonly at the application, transport, and network, and data-link levels. In addition, researchers have developed some newer methods, such as protocol normalization and distributed firewalls, which have not yet been widely adopted. Firewalls involve more than the technology to implement them. Specifying a set of filtering rules, known as a policy, is typically complicated and error-prone. High-level languages have been developed to simplify the task of correctly defining a firewall’s policy. Once a policy has been specified, the firewall needs to be tested to determine if it actually implements the policy correctly. Little work exists in the area of firewall theory; however, this article summarizes what exists. Because some data must be able to pass in and out of a firewall, in order for the protected network to be useful, not all attacks can be stopped by firewalls. Some emerging technologies, such as Virtual Private Networks (VPN) and peer-to-peer networking pose new challenges for firewalls. Categories and Subject Descriptors: C.2.0 [COMPUTER-COMMUNICATION NETWORKS]: General General Terms: security Additional Key Words and Phrases: Firewalls, Network Security…

    • 18732 Words
    • 75 Pages
    Powerful Essays
  • Best Essays

    Aviation Security

    • 3678 Words
    • 15 Pages

    Haas, E.P. (2004) Back to the Future - The Use of Biometrics, Its Impact of Airport Security, and How This Technology Should Be Governed. Journal of Air Law & Commerce, 69(2), 459-493.…

    • 3678 Words
    • 15 Pages
    Best Essays