Preview

Aircraft Solution Company: Case Study

Powerful Essays
Open Document
Open Document
3659 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Aircraft Solution Company: Case Study
Aircraft Solution (AS) Company

Ali Hassan

Submitted to: John Michalek
SEC571 Principles of Information Security and Privacy
Keller Graduate School of Management
Submitted: April 21, 2013

Table of Contents

Company Overview ……………………………………………1
Company Assets ………………………………………………..1
Vulnerabilities ………………………………………………….2 Hardware Vulnerability………………………………….......2 Policy Vulnerability …………………………..……………..3
Recommended Solutions…………………………………….... 5 Hardware Solutions ……………………...………………..…5 Policy Solutions ……………………………...……………...10
Budget ………………………………………………………….12
Summary ………………………………………………………13
References……………………………………………………...14

Company Overview

Aircraft Solutions (AS) company
…show more content…
Advanced Security: Take advantage of the latest in content security, encryption, identity authentication, authorization, and intrusion prevention.
4. Simplicity: Use one device that 's easy to install, manage, and monitor.
5. Advanced Networking: Set up virtual private networks (VPNs) that give mobile and remote workers secure access to company resources or create VPNs between partners, other offices, or employees based on roles.

When a VPN connection is established between the two gateways (firewalls between the Headquarter and the Branch), users at branch locations are unaware of the connection and do not require any special settings on their computers. VPN software enables private information to be shared over the public network while being encrypted. Aircraft Solutions has many groups and users that need different levels of access to the internal network. Clients need access to the company website, employees need to be granted different levels of access to certain facets of the internal network. With all of these parties accessing the business, the VPN gives security to those whom feel that the information they are viewing not be available to others.

The below diagrams indicates our current hardware assets would be if we virtualized the IT
…show more content…
It is proposed that a public router be installed to handle all the inbound traffics for contractors, customers, suppliers, and the traffic from AS 's sister sites in Chula Vista and Santa Ana, California. Once the inbound traffic has made it past the AS Headquarter router, two main gateway Firewalls will filter all inbound for authentication. The firewalls will provide the needed security and business management case of one Firewall failed, need to be patched, maintenance, or need to be replaced. The firewalls will be configured on Intrusion prevention system mode (IPS Mode) and Intrusion Detection System (IDS), to give more sophistication to AS’s internal network against any intrusion, viruses and the other threats mentioned in page 2. Firewalls play a very big rule in securing the internal network infrastructure of AS’s company. Also the extra firewall in AS’s headquarter network infrastructure will support the availability of AS’s business management system, and this configuration will help AS to implement or develop a better business continuity plan and more comprehensive Disaster recovery plan. Firewalls are very important components in securing any network connectivity because, firewalls is the primary controls against any malware, adware, viruses and other unauthorized accesses, “A firewall does the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to the local network will be secured by user authentication passwords. Users will be limited to only the system resources that they absolutely need to complete their work. Users’ passwords must be changed every 90 days.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Sdsa300 Unit 1

    • 178 Words
    • 1 Page

    Most would say VPN is the low-cost way to establish remote connections between offices and to securely provide connections to a mobile workforce. The central office should be equipped with a VPN concentrator that is configured to maintain the number of connections to be serviced for the mobile sales force. In order to provide complete network access to the mobile workforce the use of IPSec with L2TP, ESP, AH, using SHA-256, RSA2048 and AES256 is recommended over a UDP transport. Each branch office and the central office will require a point of presence to the Internet along with a local loop that provides enough bandwidth to accommodate the office demands. In order to keep cost to a minimum, it is recommended that SDSL be used at each branch…

    • 178 Words
    • 1 Page
    Satisfactory Essays
  • Best Essays

    Munasinghe, K. S. and Shahrestani, S.A.,“Analysis of Multiple Virtual Private Network Tunnels over Wireless LANs,” in Proceedings of the 3rdInternational Business Information Management Conference (IBIMA 2004), pp. 206-211, December 2004b.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Powerful Essays

    robust hardware based firewall. Having an intranet is a key feature that will enable the…

    • 4187 Words
    • 22 Pages
    Powerful Essays
  • Satisfactory Essays

    Remote access for employees is deployed by using remote access VPN connections across the Internet based on the settings configured for the VPN Server, and the following additional settings.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Lab 7 & 8

    • 1094 Words
    • 5 Pages

    Authorized secure remote access, Traffic inspection and Coordinated Threat Control, Centralized security management and enterprise-wide visibility and control.…

    • 1094 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    NT1330 Unit 3 Assignment 3

    • 1030 Words
    • 5 Pages

    Firewall these devices are designed to keep threats out of the company network, but unfortunately, the devices are configured by humans which can have error or security risks put in place to take over the network.…

    • 1030 Words
    • 5 Pages
    Good Essays
  • Good Essays

    This domain needs strict security controls given the risks and threats of connecting to the internet. This domain is where all data travels into and out of the IT infrastructure. A security solution for unauthorized access through the LAN-to-WAN domain is to apply strict security monitoring controls for intrusion detection and prevention.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Unit 3 assignment 1

    • 479 Words
    • 2 Pages

    Remote access for employees is deployed by using remote access VPN connections across the Internet based on the settings configured for the VPN Server, and the following additional settings.…

    • 479 Words
    • 2 Pages
    Good Essays
  • Good Essays

    He or she must read magazines and journals to learn about commonly available technologies that can be used on a network or work in parallel to it. For example, security personnel must be aware of how electrical power-line network adapters work. By understand how this technology works, the security administrator can can prevent an employee from setting up a second Ethernet adapter in his or her computer, creating a workgroup of covert network of employees communicating and running a private business over the electrical wires in the building.…

    • 11068 Words
    • 45 Pages
    Good Essays
  • Good Essays

    To secure the network and ensure a degree of protection from external intrusion, the first step is to ensure it is a private network and each host in the different remote locations is part of the private network; this minimizes the intrusion from public networks. Through the use of firewalls in the central computer network enforces authentication of all users in the network thus minimizing internal and external unauthorised access (Stallings, 2007).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Good Essays

    In today’s world, most businesses rely heavily on the use of information technology ad information systems. Corporate communication is usually dependent upon wired as well as wired networks within the company. With these networks being set up in businesses, there has been a major shift in data storage to using computers to store and transfer data instead of the traditional ways of using paperwork and hard copies. Companies can securely share information with other companies through the use of virtual private networks, called VPNs. My current occupation is very technologically driven.…

    • 791 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    This case study is a practical application of all of the knowledge you have acquired from your courses in the networking curriculum over the past two years. It will allow you to demonstrate both your knowledge and experience in networking both academically and hands-on. It will also allow you to draw on what you have learned as you worked your way through the online Microsoft IT Academy Security course. It is intended to be used as first a mid-term examination and then will also be continued as your end of class project and final exam. It presents a thorough review of concepts and applications presented in courses you have taken while at JSRCC. To complete this case study, read the scenario below and perform the tasks that follow. You will perform many of these tasks in teams of two but your final reports will be written individually. In addition to your analysis you are required to submit a formal written proposal that makes specific recommendations. You will be provided additional instructions regarding the format of your project report and other requirements.…

    • 5277 Words
    • 22 Pages
    Powerful Essays
  • Satisfactory Essays

    1.1 Understand the unique design, operation, and management conditions associated with an Enterprise System Architecture (ESA).…

    • 2331 Words
    • 10 Pages
    Satisfactory Essays
  • Better Essays

    Many organizations use the Internet and the Web technology to make their business more productive, efficient, and to cut cost. Developing a central information system or IS, is vital to organizing and storing information pertaining to all company processes. An IS will make the “six important business objectives: operational excellence; new products, services, and business models; customer and supplier intimacy; improved decision-making; competitive advantage; and survival” achievable. (Laudon & Laudon, 2011) “Information systems and technologies are some of the most important tools available to managers for achieving higher levels of efficiency and productivity in business operations.” (Laudon & Laudon, 2011) A firewall is important to have to make a security barrier that ensures that the information within the company’s information systems safe from hackers and access by outside sources. A system’s firewall is just one of many ways a company can ensure the safety of their private information.…

    • 1139 Words
    • 5 Pages
    Better Essays