preview

Essay On Aircraft Solutions

Good Essays

Course Project:
Security Assessment and Recommendations – Phase I & II
Aircraft Solutions

Table of Contents

Executive Summary……………………………………………………..1

Company Overview……………………………………………………..1

Hardware Vulnerability………………………………………………...2

Policy Vulnerability……………………………………………………..3

Hardware Solution………………………………………………………4

Policy Solution…………………………………………………………...5

Summary…………………………………………………………………6

Executive Summary

The purpose of this paper is to explore and assess computer security as it relates to Aircraft Solutions. Aircraft Solutions provides products and services to a range of companies that require highly specialized skills. Information is accessed by internal and external users via their Business …show more content…

“Security needs to be addressed as a continued lifecycle to be effective. Daily, there are new attack signatures being developed, viruses and worms being written, natural disasters occurring, changes in the organization workplace taking place and new technologies evolving, these all effect the security posture in the organization” (King, 2002). This being said, it is important to evaluate firewall and router rule sets more frequently. The possible threats against this policy include improperly configured network infrastructure which leads to a domino effect that could start with malicious programming which could end in data loss. Many of these threats may be unintentional as some users may not be aware of the risks and how their processes and procedures open the door for such attacks. For this reason alone, a more frequent evaluation is needed. This vulnerability could lead to data loss and the exposure of trade secrets, client lists and product design. The exposure of such information for most companies could mean a financial collapse as it no longer has the competitive edge that makes it the industry leader. While the likelihood of this threat is very high, “security risks to the network exist if users do not follow the security policy. Security weaknesses emerge when there is no clear cut or written security policy document. A security policy meets these goals:

i. To inform users, staff and managers of their obligatory requirements

Get Access