Preview

Security Assessment - Aircraft Solutions

Better Essays
Open Document
Open Document
1345 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security Assessment - Aircraft Solutions
Course Project:
Security Assessment and Recommendations – Phase I & II
Aircraft Solutions

Table of Contents

Executive Summary……………………………………………………..1

Company Overview……………………………………………………..1

Hardware Vulnerability………………………………………………...2

Policy Vulnerability……………………………………………………..3

Hardware Solution………………………………………………………4

Policy Solution…………………………………………………………...5

Summary…………………………………………………………………6

Executive Summary

The purpose of this paper is to explore and assess computer security as it relates to Aircraft Solutions. Aircraft Solutions provides products and services to a range of companies that require highly specialized skills. Information is accessed by internal and external users via their Business Process Management system. Based on the information provided, two vulnerabilities have been identified. The first vulnerability lies within the network infrastructure and the lack of sufficient firewalls. The second vulnerability is driven by their security policy as it relates to the evaluation of firewall protection. Subsequently, it is suggested that the company purchase additional firewall protection for the connection between the main router, the internet and the Chula Vista location as well updating their security policy to evaluate firewalls every six months.

Company Overview

As a leader in its industry, Aircraft Solutions provides design and fabrication of component products and services for companies in the electronics, commercial, defense and aerospace industries. It is headquartered in Southern California with several locations throughout the state that were strategically placed close to intermodal hubs for ease of access. These locations house a voluminous plant, extensive equipment and a highly skilled workforce that includes design engineers, programmers, machinists and assembly workers. Ultimately, the company’s goal is provide machined products and services that would enable their customers



References: Common Network Security Threats. Retrieved on July 29, 2012 from http://www.orbit-omputer-solutions.com/Common-Network-Security-Threats.php Security Lifecycle – Managing the Threat. Retrieved on August 22, 2012 from http://www.sans.org/reading_room/whitepapers/basics/security-lifecycle-managing-threat_592. Study Finds Cyber Threats to be Largest Security Concern. Retrieved on August 10, 2012 from http://www.scmagazine.com/study-finds-cyberthreats-to-be-largest-security-concern/printarticle/164294/. The Cost of Lost Data. Retrieved on August 10, 2012 from http://gbr.pepperdine.edu/2010/08/the-cost-of-lost-data/. What is a Firewall? Retrieved on August 22, 2012 from http://www.microsoft.com/security/pc-security/firewalls-whatis.aspx. The Cisco ASA 5500 as a Superior Firewall Solution. Retrieved on August 16, 2012 from http://www.cisco.com/en/US/prod/collateral/vpndevc/ps6032/ps6094/ps6120/prod_white_paper0900aecd8058ec85.pdf.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    -In reference to previous network plan U1A1 a firewall will be in place in the LAN/WAN Domain & System/Application Domain to protect internal network from potential external threats.…

    • 565 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Aircraft Solutions

    • 2805 Words
    • 12 Pages

    Aircraft Solutions operates within California in two separate physical locations in San Diego and Santa Ana. Working within both commercial and defense industries, their products are used globally. Aircraft Solutions is overtly technical in nature utilizing Business Process Management (BPM) for end to end processes that interacts with customers, vendors, and suppliers. BPM also fills a critical role of internal communications for IT to ensure customer needs are being fulfilled precisely as they have been ordered.…

    • 2805 Words
    • 12 Pages
    Best Essays
  • Best Essays

    Aircraft Solutions Project

    • 2440 Words
    • 10 Pages

    The purpose of the report is to assist Aircraft Solutions (AS) in indentifying the most significant Information Technology (IT) security vulnerabilities. AS products and services are at the forefront of the industry and the protection of such is very important as they are an industry leader. The vulnerabilities that will be discussed are the firewall configuration, virtualization of their hardware assets and defining security policy regarding the timeliness of firewall configuration and updates.…

    • 2440 Words
    • 10 Pages
    Best Essays
  • Powerful Essays

    robust hardware based firewall. Having an intranet is a key feature that will enable the…

    • 4187 Words
    • 22 Pages
    Powerful Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Product lines include VPN, Firewall, Wireless LAN, Biometrics, and Access Control. Using the two sites that contain evaluated products (www.commoncriteriaportal.org or http://www.niap-ccevs.org/cc-scheme/) identify the products that will provide Sony with the optimal solution and use the Security Targets to describe the security functionality it provides, and state how this product reduces the potential risks identified in the media.…

    • 394 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    References: Cisco. (n.d.). (Cicso) Retrieved 10 26, 2014, from Cisco ASA 5500-X Series Next-Generation Firewalls: http://www.cisco.com/c/en/us/products/security/asa-5500-series-next-generation-firewalls/index.html…

    • 1214 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Weaknesses are a symptom that is prevalent in today’s information technology realm, indicating vulnerabilities and risks that come hand and hand with shared networks like Aircraft Solutions. With enterprises exchanging an unprecedented level of information over open networks, the vulnerabilities and possibility of compromised security by unwanted intruders is swelling up into a new type of beast.…

    • 1105 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Security Assessment

    • 824 Words
    • 4 Pages

    Choose one of the Facts for Consideration sections from Ch. 3 of the text and list the page number for the section you chose. Then, complete the following table. List five threats appropriate to the environment from the section you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures. Once you complete the table, write a brief explanation of the countermeasures for the two threats with the highest risk total, stating how the countermeasure reduces the risk associated with that threat.…

    • 824 Words
    • 4 Pages
    Good Essays
  • Better Essays

    The purpose of this paper is to evaluate the computer security for Aircraft Solutions. When discussing computer security, the three main areas aspects of any computer-related system are confidentiality, integrity, and availability. Confidentiality determines the security or privacy of the system. Integrity refers to only the authorized users making changes to parts of the computer system. Availability means if someone has a requirement to get onto the computer they are not impeded in that facet. The main challenge in constructing any secure system is determining…

    • 870 Words
    • 4 Pages
    Better Essays
  • Good Essays

    I would say cyber attacks pose the biggest threats. Cyber attacks against companies like Lockheed Martin, Northrop-Grumman, Sony, Google, Visa and Mastercard, among others, show just how vulnerable the economy is to tech-savvy terrorists. If certain classified information gets in the hands of terrorists, who knows all the damage they can be willing to do against our country. Cyber attacks against government agencies and businesses in the United States continue to rise, and cyber threats will one day surpass the danger of terrorism to the United States…

    • 700 Words
    • 3 Pages
    Good Essays
  • Good Essays

    A computer security career is a highly diverse and important position, where you could work anywhere from a College Campus to a Hospital Administration building, all the way up to the Government Agencies all over the world. With so many new businesses’ opening daily, worldwide, the job market will be forever expanding. Whenever a business’s computer system acts up it’s the job of their computer security specialist to carefully take all the required steps to identify and resolve the specific issue, combining many people into one, saving the company lots of money. These specialists have and exceptional and advanced overall knowledge of all things computer.…

    • 525 Words
    • 3 Pages
    Good Essays
  • Good Essays

    As we already know Fullsoft Inc, has recently experienced a malware attack that has resulted in proprietary information being leaked. Even though the company is now in the process of this breach being recovered, we will need to come up with a plan so we can prevent such incident of happening again.…

    • 1033 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The 152nd Aerodrome Security Committee meeting was chaired by Mrs. Lindy Ann Horsford-Redman, Manager Airport Operations and Services (Ag.). The morning’s proceedings commenced with a prayer by Mr. Julian Chance.…

    • 1154 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Technical Paper

    • 2498 Words
    • 10 Pages

    References: Beaver, K. (2013, July 31). The Top 5 Network Security Vulnerabilities that Are Often Overlooked. Retrieved December 15, 2013, from Acunetix Web Application Security: http://www.acunetix.com/blog/featured/the-top-5-network-security-vulnerabilities/…

    • 2498 Words
    • 10 Pages
    Better Essays