Ali Hassan
Submitted to: John Michalek
SEC571 Principles of Information Security and Privacy
Keller Graduate School of Management
Submitted: April 21, 2013
Table of Contents
Company Overview ……………………………………………1
Company Assets ………………………………………………..1
Vulnerabilities ………………………………………………….2 Hardware Vulnerability………………………………….......2 Policy Vulnerability …………………………..……………..3
Recommended Solutions…………………………………….... 5 Hardware Solutions ……………………...………………..…5 Policy Solutions ……………………………...……………...10
Budget ………………………………………………………….12
Summary ………………………………………………………13
References……………………………………………………...14
Company Overview
Aircraft Solutions (AS) company …show more content…
Advanced Security: Take advantage of the latest in content security, encryption, identity authentication, authorization, and intrusion prevention.
4. Simplicity: Use one device that 's easy to install, manage, and monitor.
5. Advanced Networking: Set up virtual private networks (VPNs) that give mobile and remote workers secure access to company resources or create VPNs between partners, other offices, or employees based on roles.
When a VPN connection is established between the two gateways (firewalls between the Headquarter and the Branch), users at branch locations are unaware of the connection and do not require any special settings on their computers. VPN software enables private information to be shared over the public network while being encrypted. Aircraft Solutions has many groups and users that need different levels of access to the internal network. Clients need access to the company website, employees need to be granted different levels of access to certain facets of the internal network. With all of these parties accessing the business, the VPN gives security to those whom feel that the information they are viewing not be available to others.
The below diagrams indicates our current hardware assets would be if we virtualized the IT …show more content…
It is proposed that a public router be installed to handle all the inbound traffics for contractors, customers, suppliers, and the traffic from AS 's sister sites in Chula Vista and Santa Ana, California. Once the inbound traffic has made it past the AS Headquarter router, two main gateway Firewalls will filter all inbound for authentication. The firewalls will provide the needed security and business management case of one Firewall failed, need to be patched, maintenance, or need to be replaced. The firewalls will be configured on Intrusion prevention system mode (IPS Mode) and Intrusion Detection System (IDS), to give more sophistication to AS’s internal network against any intrusion, viruses and the other threats mentioned in page 2. Firewalls play a very big rule in securing the internal network infrastructure of AS’s company. Also the extra firewall in AS’s headquarter network infrastructure will support the availability of AS’s business management system, and this configuration will help AS to implement or develop a better business continuity plan and more comprehensive Disaster recovery plan. Firewalls are very important components in securing any network connectivity because, firewalls is the primary controls against any malware, adware, viruses and other unauthorized accesses, “A firewall does the