Running head: AIRCRAFT SOLUTIONS
AIRCRAFT SOLUTIONS
Keller Graduate School of Management
SEC 571 Principles of Information Security and Privacy
Abstract
An assessment of Aircraft Solutions (AS) as to what Security Vulnerabilities that might be found, two areas discussed are Hardware & Policy weakness and impact.
Table of Contents
Executive Summary 1 Company Overview 1 Security Vulnerabilities 2
Hardware Vulnerability …………………………………………………..…….....2 Policy Vulnerability……………………………………………………………….3 Recommended Solutions 5 Hardware Vulnerability 5 Policy Vulnerability 8 Impact on Business Processes 9 Summary 11 References 12
Executive Summary
The purpose of this paper is to explore and assess
…show more content…
This is an open exposure due to the uncertainties of the internet. Controlling access to information systems and associated networks is necessary for the preservation of their confidentiality, integrity, and availability. Confidentiality assures that the information is not disclosed to unauthorized persons or processes. Any automated attacks or personal attack or attack to exploit the company secrets/statistics/data is the biggest threat to that may occur without the firewall.
According to the survey, "Perceptions about Network Security," 90 percent of the 583 companies polled said they've suffered a network security breach at the hands of hackers at least once in the past year.
Those don't include website hacks, which are annoying but often not serious, or denial-of-service attacks, which are more like roadblocks than actual hacks.
A company's website is its public face; its internal networks are its concealed valuables. If hacking a website is akin to throwing toilet paper onto a company's front lawn, then hacking into its internal networks is like breaking into its house and stealing its jewelry.
Below is AS current Architecture: Passable Effects
A possible worst-case scenario might involve company data which could be lost or hijacked or tampered with, client orders stolen. Company or client
Aircraft Solutions (AS) is a recognized leader in the design and fabrication of component products and services for companies in the electronics, commercial, defense, and aerospace industry. Located in Southern California, AS has a dedicated, trained workforce and maintains a large capacity plant and extensive equipment to meet customer requirements. Much of the equipment is automated to increase production while reducing costs. The company's workforce has a large skill base: design engineers, programmers, machinists, and assembly personnel to work its highly-automated production systems.
One of these consequences are the injection of a Trojan virus, which is a virus that is hidden to act like a legitimate program or file. Another consequence would be exposing the network to a worm, which could propagate throughout the network and cripple productivity by machine and network slowdowns; this is in addition to possibly injecting other viruses onto the system. Although these are possibilities of allowing outside resources access to the company network, user training, disabling resources, and even standalone virus scanners can prevent these unintentional
This project identifies a two possible issues that can happen during the system operations like hacking or data loss due to improper security provided to the company branches and there is no proper infrastructure of the firewall for the network structure. The aircraft security policy result in failure due to their two year reset program.
This report is prepared to assist the aircraft solutions (AS), a well-known company for equipment and component fabrication in Southern California, in identifying the most important security vulnerabilities. This report also discusses possible threats, the likelihood of the threats occurring
The purpose of the report is to assist Aircraft Solutions (AS) in indentifying the most significant Information Technology (IT) security vulnerabilities. AS products and services are at the forefront of the industry and the protection of such is very important as they are an industry leader. The vulnerabilities that will be discussed are the firewall configuration, virtualization of their
“Security needs to be addressed as a continued lifecycle to be effective. Daily, there are new attack signatures being developed, viruses and worms being written, natural disasters occurring, changes in the organization workplace taking place and new technologies evolving, these all effect the security posture in the organization” (King, 2002). This being said, it is important to evaluate firewall and router rule sets more frequently. The possible threats against this policy include improperly configured network infrastructure which leads to a domino effect that could start with malicious programming which could end in data loss. Many of these threats may be unintentional as some users may not be aware of the risks and how their processes and procedures open the door for such attacks. For this reason alone, a more frequent evaluation is needed. This vulnerability could lead to data loss and the exposure of trade secrets, client lists and product design. The exposure of such information for most companies could mean a financial collapse as it no longer has the competitive edge that makes it the industry leader. While the likelihood of this threat is very high, “security risks to the network exist if users do not follow the security policy. Security weaknesses emerge when there is no clear cut or written security policy document. A security policy meets these goals:
Discuss security standards and methods, including the need for data storage integrity and data backup and recovery. In addition to complying with Health Insurance Portability and Accountability Act (HIPPA), SMC needs to be valiant in how the organization will protect information and manage network security. Information security is the protection of information against risk to its integrity, inadvertent disclosure, or availability (Hawkins, 2013a). The most common threats an organization's network will face are hackers, spyware, viruses, worms, Trojan horses, and malicious insider (Hawkins, 2013a). To protect SMC from hackers, they will use firewalls and intrusion-detection devices. Firewalls protect network systems by obstructing unauthorized entry while allowing approved communications (Hawkins, 2013a). Intrusion-detection systems monitor who the user is and what the user accesses. To promote HIPPA, SMC will track the last names of users who accessed patients with the same last name to reveal inappropriate use of client information.
As the world’s largest aerospace company and leading manufacturer of commercial jetliners and defense, space and security system, Boeing puts a lot of efforts and innovations in its products and services. These include commercial and military aircraft, satellites, weapons, electronic information and communication systems, and performance-based logistics and training.
One of EAM’s biggest compromises is to comply with the aviation’s commitment to safety. Our company, along with government regulatory and investigative authorities, works to maximize safety by providing lightweight, innovative products, which are customizable to meet clients’ specific need over adversity.
When tested in the lab, it was found that Advance Wire was mediocre in conductivity & abrasiveness, while also being heavier than all other samples.
Arthur, C. (2012, May 29). Cyber-Attack Concerns Raised Over Boeing 787 Chip’s Back Door. Retrieved
Additionally, visiting these sites opens our computer systems to hacking, theft, and fraud, which could result in a catastrophic breach of confidential data such as client information and employee profiles.
Stories about hackers that find little weak spots in a major companies computer network are very common. This generally leads to a major breach in data security for the company. However, hackers are also targeted major law firms in New York. Hackers target law firms because they are filled with very sensitive data about high profile companies and individuals that they are able to exploit for monetary purposes. Hackers feel very secure hacking into major law firms because they realize that the firms are more than likely to keep the breach secret because it might alarm their clients.
There are several challenges in aviation security that I will discuss in this paper. The challenges in aviation security are identify the security threat, securing perimeter, and The Transportation Security Administration (TSA) screening related to passenger flow. I will also discuss possible solutions to each challenge that may be used in the future of aviation. Security could vary from place to place, so in this paper I will discuss the challenges within in the United States.
Due to the fact that the web is getting faster and faster and evolves every day and increasing its speed, it allows the hackers to do more effectively some kinds of crimes that require speed and skills. For example robbing money from an account before anyone can trace back the