preview

Aircraft Solutions: Principles Of Information Security Vulnerability

Better Essays

Running head: AIRCRAFT SOLUTIONS

AIRCRAFT SOLUTIONS
Keller Graduate School of Management
SEC 571 Principles of Information Security and Privacy

Abstract
An assessment of Aircraft Solutions (AS) as to what Security Vulnerabilities that might be found, two areas discussed are Hardware & Policy weakness and impact.

Table of Contents

Executive Summary 1 Company Overview 1 Security Vulnerabilities 2
Hardware Vulnerability …………………………………………………..…….....2 Policy Vulnerability……………………………………………………………….3 Recommended Solutions 5 Hardware Vulnerability 5 Policy Vulnerability 8 Impact on Business Processes 9 Summary 11 References 12

Executive Summary
The purpose of this paper is to explore and assess …show more content…

This is an open exposure due to the uncertainties of the internet. Controlling access to information systems and associated networks is necessary for the preservation of their confidentiality, integrity, and availability. Confidentiality assures that the information is not disclosed to unauthorized persons or processes. Any automated attacks or personal attack or attack to exploit the company secrets/statistics/data is the biggest threat to that may occur without the firewall.
According to the survey, "Perceptions about Network Security," 90 percent of the 583 companies polled said they've suffered a network security breach at the hands of hackers at least once in the past year.
Those don't include website hacks, which are annoying but often not serious, or denial-of-service attacks, which are more like roadblocks than actual hacks.
A company's website is its public face; its internal networks are its concealed valuables. If hacking a website is akin to throwing toilet paper onto a company's front lawn, then hacking into its internal networks is like breaking into its house and stealing its jewelry.
Below is AS current Architecture: Passable Effects

A possible worst-case scenario might involve company data which could be lost or hijacked or tampered with, client orders stolen. Company or client

Get Access