The following report is a security assessment on Aircraft Solutions and the primary objective in this assessment is to identify the existence of vulnerabilities present within the global context of Aircraft Solutions’ operations. An evaluation of the associated threats will be deduced, accompanied by the exposed weaknesses. This will be followed by an analysis of the degree of risk present. Finally, there will be a focus on the consideration of the consequences resulting from revealing of potential threats. Assessment Hardware and policy will be the main focus of this investigation. It will be narrowed down more to hardware issues.
It is very curious that there is no firewall implemented between the commercial division and the Internet. The Defense Department must be routed through Headquarters, but the Commercial department is connected straight to the Internet. This is a significant vulnerability. The second weakness that will be examined is the security policy stating router and firewall rule sets should be evaluated every two years. Such a time span between rule-set evaluations is also a substantial liability to the continued and unimpeded success of the organization. Further elaboration of the identified security vulnerabilities is presented.
Hardware Vulnerabilities:
The issue pertaining to Aircraft Solution’s hardware weakness is that of the lack of adequate protection implemented between its
References: Northrop, T. (2010). Firewalls. Microsoft/Technet. Retrieved Nov 14th 2010 from, http://technet.microsoft.com/enus/library/cc700820.aspx#XSLTsection12312112020 The Scottish Government: Model for Organizational Risk Management. Risk Matrix. Retrieved November 14th, 2010