Preview

Assignment 1: Principles Of Information Security And Aircraft Solutions

Powerful Essays
Open Document
Open Document
1104 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Assignment 1: Principles Of Information Security And Aircraft Solutions
SECURITY MEASURES AND AIRCRAFT SOLUTIONS

Anita Crawford-Cowan
Submitted To: Professor Kevin Reynolds
SEC571 Principles of Information Security and Privacy
Keller Graduate School of Management
Submitted: September 21, 2014

TABLE OF CONTENTS

Company Overview Page 1

Security Vulnerabilities Page 2 Policy Vulnerabilities Page 2 Hardware Vulnerabilities Page 3

References Page 4

Company Overview

Aircraft Solutions (AS) is worldwide provider in the design and fabrication of component parts and services to industries such as aerospace, defense, electronics and commercial. Its headquarters,
…show more content…
It gives a loose advantage to users, third parties, customers and administrators to possible unauthorized usage. As noted, all users have access on a need to know basis. This identifies a question as to why each of the user’s needs to know all of the information. It should only be user accessible for those whose job description entails. For instance, is there a need for a supplier or customer to know personal information of the company’s employees pay, social security numbers, addresses or even marital status? Is there a need for customers to have access to information on other customers, such as charges endured for services; what design specifications were implemented for a particular product or passwords used by one …show more content…
It would constitute series of possible identity theft, threats of destruction to the company’s personnel, all users, financial losses and mass havoc to the corporation, its suppliers, contractors, customers and possibly National Security.
(A. Kanellos, 2004)
The Second Vulnerability involves its Hardware Security Controls

The idea of having independent anti-virus software installation on all workstations and servers, however, a host based detection system on corporate office servers. The hardware at the corporate level server lack of a firewall protection creates vulnerabilities to:
a) its backup servers located at the server at the individual server
b) This lack of any firewall protection adheres to system configuration
c) No real protection authentication on either of routers
d) Switchers may become

You May Also Find These Documents Helpful

  • Satisfactory Essays

    It protects sensitive personal data being published with out a person's consent. Where children are involved consent has to be given by parent or guardian.…

    • 306 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Aircraft Solutions

    • 2805 Words
    • 12 Pages

    Aircraft Solutions operates within California in two separate physical locations in San Diego and Santa Ana. Working within both commercial and defense industries, their products are used globally. Aircraft Solutions is overtly technical in nature utilizing Business Process Management (BPM) for end to end processes that interacts with customers, vendors, and suppliers. BPM also fills a critical role of internal communications for IT to ensure customer needs are being fulfilled precisely as they have been ordered.…

    • 2805 Words
    • 12 Pages
    Best Essays
  • Best Essays

    Aircraft Solutions Project

    • 2440 Words
    • 10 Pages

    Aircraft Solutions, headquarters located in San Diego, California develop and fabricate products and services for companies in the electronic, commercial, defense and aerospace industries. AS is made up of two (2) different divisions, the Commercial Division and the Defense Division. The Commercial Division is located in Chula Vista, CA and the Defense Division is located in Santa Ana, CA. AS company strategy is to offer low cost design and computer aided modeling packages to companies and assists them through the lifecycle of their product in an effort to save money for the consumer while profiting from their business.…

    • 2440 Words
    • 10 Pages
    Best Essays
  • Satisfactory Essays

    If you have a credit card, pay off the balance each month. This prevents several penalties and late fees. It is best to use a credit card only for emergencies. Keep in mind that the reason you are going to college is to get an education. Debt can cause you to lose focus.…

    • 453 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Aircraft Solutions, with its headquarters in San Diego, California develop and fabricate products and services for different companies. It has two divisions, commercial and the defense. The commercial division is in Chula Vista, CA and the defense division is in Santa Ana, CA. They offer designs at low cost and computer aided modeling packages. They also provide lifecycle of the product being manufactured.…

    • 2041 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario.…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    Without passwords being assigned to data and systems, this simply protection becomes a target for hackers.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In this lab, you implemented a portion of your organization’s BCP. Based on the BIA, the…

    • 314 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Course Project 1

    • 1403 Words
    • 6 Pages

    AirJet Best Parts, Inc. is a company dedicated to the design and manufacturing of aviation and airplane technologies and parts. The company has commercial and military clients worldwide.…

    • 1403 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Data Protection- All information should be protected by staff and professions to protect the clients. Also all private and confidential information you share with your employer is protected so they do not share it without your permission.…

    • 973 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    The purpose of this paper is to evaluate the computer security for Aircraft Solutions. When discussing computer security, the three main areas aspects of any computer-related system are confidentiality, integrity, and availability. Confidentiality determines the security or privacy of the system. Integrity refers to only the authorized users making changes to parts of the computer system. Availability means if someone has a requirement to get onto the computer they are not impeded in that facet. The main challenge in constructing any secure system is determining…

    • 870 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    The basic strategies of attack surface reduction are to reduce the amount of code running, reduce entry points available to untrusted users, and eliminate services requested by relatively few users. One approach to improving information security is to reduce the attack surface of a system or software. By turning off unnecessary functionality, there are fewer security risks. By having less code available to unauthorized actors, there will tend to be fewer failures. Although attack surface reduction helps prevent security failures, it does not mitigate the amount of damage an attacker could inflict once a vulnerability is found.[3]…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    209

    • 584 Words
    • 2 Pages

    It is very important to keep information secure and private that individuals and staffs private information will stay protected from unauthorised viewing. It is their right to to have their private information to be protected. It is important to protect information to avoid indentity theft. As well as to keep service users trust between services and service users. To gain their trust, they have to know that their private information is safe and protected and can`t be used against them or seen by someone who has no permission to see it. Without all these things services can`t have confidentiality and trust from service users and their services wouldn`t have any users as people wouldn`t be able to feel safe and protected and would leave them feeling vulnarable as their information could be accessed by anyone.…

    • 584 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Handle information

    • 579 Words
    • 2 Pages

    To ensure information is accessible for those who need to know, so that if information ever needs to be passed on and shared to other multi disciplinary teams, its easier to find the information required. Also to protect service users from fraud or identity theft and to maintain the rights of service users.…

    • 579 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Gives individuals the right to know what information is held about them and provides a framework to ensure the personal information is handled properly.…

    • 475 Words
    • 2 Pages
    Good Essays