Course Project:
Security Assessment and Recommendations – Phase I & II
Aircraft Solutions
Table of Contents
Executive Summary……………………………………………………..1
Company Overview……………………………………………………..1
Hardware Vulnerability………………………………………………...2
Policy Vulnerability……………………………………………………..3
Hardware Solution………………………………………………………4
Policy Solution…………………………………………………………...5
Summary…………………………………………………………………6
Executive Summary
The purpose of this paper is to explore and assess computer security as it relates to Aircraft Solutions. Aircraft Solutions provides products and services to a range of companies that require highly specialized skills. Information is accessed by internal and external users via their Business
…show more content…
“Security needs to be addressed as a continued lifecycle to be effective. Daily, there are new attack signatures being developed, viruses and worms being written, natural disasters occurring, changes in the organization workplace taking place and new technologies evolving, these all effect the security posture in the organization” (King, 2002). This being said, it is important to evaluate firewall and router rule sets more frequently. The possible threats against this policy include improperly configured network infrastructure which leads to a domino effect that could start with malicious programming which could end in data loss. Many of these threats may be unintentional as some users may not be aware of the risks and how their processes and procedures open the door for such attacks. For this reason alone, a more frequent evaluation is needed. This vulnerability could lead to data loss and the exposure of trade secrets, client lists and product design. The exposure of such information for most companies could mean a financial collapse as it no longer has the competitive edge that makes it the industry leader. While the likelihood of this threat is very high, “security risks to the network exist if users do not follow the security policy. Security weaknesses emerge when there is no clear cut or written security policy document. A security policy meets these goals:
i. To inform users, staff and managers of their obligatory requirements
The purpose of the report is to assist Aircraft Solutions (AS) in indentifying the most significant Information Technology (IT) security vulnerabilities. AS products and services are at the forefront of the industry and the protection of such is very important as they are an industry leader. The vulnerabilities that will be discussed are the firewall configuration, virtualization of their
Weaknesses are a symptom that is prevalent in today’s information technology realm, indicating vulnerabilities and risks that come hand and hand with shared networks like Aircraft Solutions. With enterprises exchanging an unprecedented level of information over open networks, the vulnerabilities and possibility of compromised security by unwanted intruders is swelling up into a new type of beast.
is the air resistance on any given object that is moving in the presence of air. In the
This project is to help the Aircraft Solutions (AS), Aircraft Solution Company for equipment and component fabrication in Southern California, in identifying the most important security vulnerabilities. This project also describes about the possible threat for the company security, Hardware and Software systems.
This report is prepared to assist the aircraft solutions (AS), a well-known company for equipment and component fabrication in Southern California, in identifying the most important security vulnerabilities. This report also discusses possible threats, the likelihood of the threats occurring
Using obsolete rule sets in routers and firewalls is like using no protection at all. The methods of attackers will eventually evolve and surpass security measures which is why they should be updated at a closer interval than once every two years. Outdated rule sets in routers and firewalls could be used against the company by outside attackers. Attackers could potentially gain access to and change the security rules so they are in their favor. Disastrous conditions could occur and potentially it would be like the President without the Secret Service in place to protect him. He would be extremely vulnerable to attack. The company could lose all of its data to include client information, financial records, product details, employee records and even Aircraft Solutions tricks of the trade on what makes them profitable. All of these items should be closely guarded since they could potentially destroy the company and put them out of business.
Organizations should develop a security policy for the wireless LAN infrastructure prior to the implementation stage. In order to have a strong security policy,
internal and external users to whom access to the organization’s network, data or other sensitive
This is an open exposure due to the uncertainties of the internet. Controlling access to information systems and associated networks is necessary for the preservation of their confidentiality, integrity, and availability. Confidentiality assures that the information is not disclosed to unauthorized persons or processes. Any automated attacks or personal attack or attack to exploit the company secrets/statistics/data is the biggest threat to that may occur without the firewall.
The aim of this assessment is to address weaknesses and provide recommendations on the network security of Aircraft Solutions. Aircraft Solutions is a recognized leader in the design and fabrication of component materials and services for companies in the electronics, commercial, defense, and aerospace industry.
Ever since I was little I was amazed at the ability for a machine to fly. I have always wanted to explore ideas of flight and be able to actually fly. I think I may have found my childhood fantasy in the world of aeronautical engineering. The object of my paper is to give me more insight on my future career as an aeronautical engineer. This paper was also to give me ideas of the physics of flight and be to apply those physics of flight to compete in a high school competition.
A pilot does not have to be an aeronautical engineer to learn to fly an airplane. However, it is a good idea to have good knowledge of aerodynamics and flight theory to be able to fly safely. There are four basic components in making an airplane fly, lift, drag, thrust, and weight. All of these work in unison to make a plane stay in the air. If one of the first three is taken out of the equation, gravity and weight will take over and cause the plane to descend. It is up to the pilot to understand how to make them equal in order to keep the airplane in flight or descend at an acceptable rate, in order to safely land the airplane. Before staring work to get a pilot’s license it would be a good idea to understand several aspects before the
A firewall is a system or group of systems that enforces an access control policy between two or more networks. The means by which this control is accomplished varies widely, but in principle, the firewall is a pair of mechanisms, one that blocks traffic and one that permits traffic. Some firewalls emphasize blocking traffic, while others emphasize permitting traffic. The most important thing to recognize about a firewall is that it implements an access control policy. If you don't know what kind of access you want to permit or deny, or you let someone else or some product configure a firewall based on judgment other than yours, that entity is making policy for your whole organization.
increased its efforts in protecting its airports. At that time, “the security scanners already in place in most airports included baggage x-rays, metal detectors, and chemical residue detectors, which help security staff search out illegal items that a passenger might have” (DiLascio). These security scanners unfortunately failed in their job. Since then, the Transportation Security Administration has been keeping American airports safe using the latest technology. Airports have now been fitted with high-tech body scanners rather than the archaic metal detectors that only detect metal objects. During the past few years, individuals have attacked the
The American Institute of Aeronautics and Astronautics (AIAA) announced “A framework for Aviation Cyber security” decision paper. According to the president of the AIAA Elect Jim Albaugh, the purpose of this paper is to outline a method that the aviation industry should follow. The decision paper focuses on