EssaysForStudent.com - Free Essays, Term Papers & Book Notes
Search

Phase I Aircraft Solutions

By:   •  Research Paper  •  1,009 Words  •  October 6, 2014  •  948 Views

Page 1 of 5

Phase I Aircraft Solutions

Executive Summary

The purpose of this paper is to evaluate the computer security for Aircraft Solutions. When discussing computer security, the three main areas aspects of any computer-related system are confidentiality, integrity, and availability. Confidentiality determines the security or privacy of the system. Integrity refers to only the authorized users making changes to parts of the computer system. Availability means if someone has a requirement to get onto the computer they are not impeded in that facet. The main challenge in constructing any secure system is determining what will be the best course of action to secure the system. Aircraft Solutions provides hands on experience in all areas of aviation in addition to electronics, aerospace, commercial, and defense industries. Additionally Aircraft Solutions provides information on geographic, background information as well as architectural designs. Given the information derived, the main goal of this assessment is to identify possible vulnerabilities and develop solutions to protect Aircraft Solutions operations.

Company Overview

“Aircraft Solutions (AS) is a recognized leader in the design and fabrication of component products and services for companies in the electronics, commercial, defense, and aerospace industry. Located in Southern California, Aircraft Solutions has a dedicated, trained workforce and maintains a large capacity plant and extensive equipment to meet customer requirements. Much of the equipment is automated to increase production while reducing costs. The company's workforce has a large skill base: design engineers, programmers, machinists, and assembly personnel to work its highly-automated production systems.”(DeVry) Their mission is to determine the customers’ needs and provide “products and related services, and to meet cost, quality, and schedule requirements.” (DeVry) Given the amount of influence that Aircraft Solutions has in the Defense and Aerospace Industry, I will determine the best course of action to assist in their advancement of their hardware and policies of the hardware. Aircraft Solutions Business Process Management system is an end user design. This means customers, vendors, suppliers all collaborate with Aircraft Solutions to get the desired end product.  “The Business Process Management also aligns internal business operations with IT support to maintain production in support of customer requirements.”(DeVry)

Two Security Vulnerabilities

There will always be security weaknesses in every system. The problem comes in finding and fixing these problems. Depending on how big or small the weakness is determines how detrimental the risk is. After reviewing the infrastructure of Aircraft Solutions, I was able to determine that there were a few things that would put their system in a vulnerable state and potentially put their system at risk. The two areas where they are most vulnerable are the hardware and the policy. The first vulnerable area is the hardware of the firewalls that are not being used appropriately to protect the network against breaches in the networks architecture and hierarchy. Without the firewall in place it exposes the network (LAN) to any malicious internal as well as external attacks. These attacks can lead to the compromising of any of the company’s data.

The second vulnerability is the policies that are in place to evaluate the firewalls, routers and the personnel to maintain them. There should always be checks and balances with any system. This means you have two sets of personnel maintaining the system. One set of personnel on site, such as a security officer and an assistant security officer to maintain these controls. And the second set being from an outside vendor that would continuously monitor Aircraft Solution’s Systems regularly. This would deter any internal or external malicious attacks to the system.

Recommended Solutions

[pic 1]

From the chart above we can see that there are 5 individual servers, 1 main switch, 2 routers, and 1 firewall. One problem I see glaring to me is that there is only 1 firewall and 1 main switch.

Definition of the solution - Hardware solutions must include vendor, major specifications with an emphasis on the security features, location of placement with diagram. Software solutions must include vendor, major specifications with an emphasis on security features. Policy solutions must include the complete portion of the policy that addresses the weakness identified. Any outsourced solution must include the above details and the critical elements of the service level agreement.

Download as (for upgraded members)  txt (6.6 Kb)   pdf (278.7 Kb)   docx (151.5 Kb)  
Continue for 4 more pages »