Thursday, January 9, 2020
Security Assessment - Aircraft Solutions Essay examples
Course Project: Security Assessment and Recommendations ââ¬â Phase I amp; II Aircraft Solutions Table of Contents Executive Summaryâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦..1 Company Overviewâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦..1 Hardware Vulnerabilityâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦...2 Policy Vulnerabilityâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦..3 Hardware Solutionâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦4 Policy Solutionâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦...5 Summaryâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦6 Executive Summary The purpose of this paper is to explore and assess computer security as it relates to Aircraft Solutions. Aircraft Solutions provides products and services to a range of companies that require highly specialized skills. Information is accessed by internal and external users via their Businessâ⬠¦show more contentâ⬠¦Ã¢â¬Å"Security needs to be addressed as a continued lifecycle to be effective. Daily, there are new attack signatures being developed, viruses and worms being written, natural disasters occurring, changes in the organization workplace taking place and new technologies evolving, these all effect the security posture in the organizationâ⬠(King, 2002). This being said, it is important to evaluate firewall and router rule sets more frequently. The possible threats against this policy include improperly configured network infrastructure which leads to a domino effect that could start with malicious programming which could end in data loss. Many of these threats may be unintentional as some users may not be aware of the risks and how their processes and procedures open the door for such attacks. For this reason alone, a more frequent evaluation is needed. This vulnerability could lead to data loss and the exposure of trade secrets, client lists and product design. The exposure of such information for most companies could mean a financial collapse as it no longer has the competitive edge that makes it the industry leader. While the likelihood of this threat is very high, ââ¬Å"security risks to the network exist if users do not follow the security policy. Security weaknesses emerge when there is no clear cut or written security policy document. A security policy meets these goals: i. To inform users, staff and managers of their obligatory requirementsShow MoreRelatedAircraft Solutions Security Assessment And Recommendations1818 Words à |à 8 PagesAircraft Solutions Security Assessment And Recommendations The aim of this assessment is to address weaknesses and provide recommendations on the network security of Aircraft Solutions. Aircraft Solutions is a recognized leader in the design and fabrication of component materials and services for companies in the electronics, commercial, defense, and aerospace industry. Two weaknesses were found in regards to the company s network security. First weakness is a hardware weakness; and another isRead MoreA Short Note On Security Assessment And Solutions- Aircraft Solutions Essay2181 Words à |à 9 PagesSecurity Assessment Solutions- Aircraft Solutions Executive Summary This paper seeks to identify two security vulnerabilities in the Aircraft Solutionââ¬â¢s computer network. The investigation identified one policy and one software vulnerability. The policy vulnerability is the firewall and router rule set policy that requires a review of these settings every two years. The recommendation is to have management develop and support a new policy that will improve network security and abide by currentRead MoreAircraft Solution1151 Words à |à 5 PagesAircraft Solutions (AS)â⬠¨Security Overview â⬠¨Introduction â⬠¨Aircraft Solutions is a well respected equipment and component fabrication company who â⬠¨provides a full spectrum design and implementation solutions to several industries whichâ⬠¨ includes; electronics, aerospace, commercial and the defense sectors. Aircraft Solutions employs â⬠¨a range of highly qualified professionals and houses an immense production plant, with an â⬠¨overall goal of providing high-quality so lutions to accommodate specificationsRead MoreAircraft Solutions Assessment Essay1096 Words à |à 5 PagesCourse Project: Security Assessment and Recommendations Aircraft Solutions SEC: 571 Adam Grann Professor: Reynolds Weaknesses are a symptom that is prevalent in todayââ¬â¢s information technology realm, indicating vulnerabilities and risks that come hand and hand with shared networks like Aircraft Solutions. With enterprises exchanging an unprecedented level of information over open networks, the vulnerabilities and possibility of compromised security by unwanted intruders is swelling up intoRead MoreAviatin Policy1449 Words à |à 6 PagesAirline Policy amp; Strategy Assessment 1 Academic Year 2012-2013 Formulating Analysing amp; Researching Policy The first assessment for this module asks you to deconstruct a piece of tourism policy. It draws directly on the research paradigm outlined by Fidgeon amp; Ritchie (2005). In addition it develops the self-directed activities you have been recommended to undertake in your study pack together with our work in lectures and tutorials. As a consequence you should be familiar withRead MoreAircraft Solutions1902 Words à |à 8 PagesRunning head: AIRCRAFT SOLUTIONS AIRCRAFT SOLUTIONS Keller Graduate School of Management SEC 571 Principles of Information Security and Privacy Abstract An assessment of Aircraft Solutions (AS) as to what Security Vulnerabilities that might be found, two areas discussed are Hardware amp; Policy weakness and impact. Table of Contents Executive Summary 1 Company Overview 1 Security Vulnerabilities 2 Hardware Vulnerability â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦..â⬠¦Ã¢â¬ ¦.....2 Policy Vulnerabilityâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Read MorePricing Of Airport Facilities And Services1086 Words à |à 5 Pagesdevelopers require at least 25-30 year leases (Air Cargo Guide, n.d.). Airports must take in consideration the following aspects when determining rates: ââ¬Å"rental rates against other locations on and off-airport, carrying cost, operating costs such as security and fire protection, utilities, maintenance, personnel, administrative and accounting expensesâ⬠(Air Cargo Guide, n.d.). 7. AIRPORT FEE STRUCTURE While an airport seeks a balance between the social and economic efforts of increased infrastructureRead MoreAviation Security : The Security Threat, Securing Perimeter, And The Transportation Security Administration ( Tsa )1290 Words à |à 6 PagesSecurity is one of the most important departments in aviation. Without security in aviation it would be extremely vulnerable to threat, harm and accidents to passengers, employees and aircrafts. Aviation has been threatened for decades now. From bombings and hijackings since the 1960s to the recent bombing in Brussels. It wasnââ¬â¢t until 9/11 when America knew there was a big gap in the security infrastructure in aviation. So what exactly is aviation security? Aviation Security is techniques and methodsRead MoreThe Use Of Airport Information Systems Between Civilian And Military Airports1412 Words à |à 6 Pagesinvolved with the airport managers but simply observing the historical data although it would be difficult to establish ca use and effect relationships between the airport information systems and airport efficiency. The assessment instrument can be examined in Appendix A. An assessment instrument created to measure the amount of delays will be used to measure the dependent variable. The instrument will have all the airports utilized for the observations without names attached and simply listed in numberRead MoreAircraft Solutions2693 Words à |à 11 PagesAircraft Solutions: Security Assessment and Recommendations Phase I and Phase II Table of Contents Executive Summary 3 Company Overview 3 Security Vulnerabilities 4 A Software Data Loss/Data Leak 4 A Hardware Firewall 5 Recommended Solutions 7 A Software Example Solution 7 A Hardware Example Solution 8 Impact on Business Processes 9 Summary 10 Appendix 11 References 17 Executive Summary
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.