Sumanth Bobba
D03558118
SE571
TABLE OF CONTENTS 1. Introduction 3 2. Company Overview 3 3. Security Weakness 3 a. Hardware Vulnerabilities 3 b. Software Vulnerabilities 5 4. Recommended Solutions 7 a. Hardware 7 i. Impact on business 8 b. Software 9 i. Impact on business 10 5. Summary 10 6. References 11
Introduction
This report is prepared to assist the aircraft solutions (AS), a well-known company for equipment and component fabrication in Southern California, in identifying the most important security vulnerabilities. This report also discusses possible threats, the likelihood of the threats occurring and the threat if exposed in two remarkable areas. Aircraft Solutions maintains a large capacity plant, trained workforce, large variety of equipment, design modules and solution database provided to multiple industries. These companies include aerospace, electronics and defense sectors. In this report I will focus on the vulnerabilities present in the existing system of Aircraft Solutions and its operations.
Company Overview
Aircraft Solutions, with its headquarters in San Diego, California develop and fabricate products and services for different companies. It has two divisions, commercial and the defense. The commercial division is in Chula Vista, CA and the defense division is in Santa Ana, CA. They offer designs at low cost and computer aided modeling packages. They also provide lifecycle of the product being manufactured.
Security Weakness
In the two key areas targeted, I will discuss here about the vulnerabilities in hardware and the software.
Hardware Vulnerabilities
In my security assessment on the hardware of AS, it has been identified that it’s hardware system could be a potential security weakness and cause a threat in the near future. Their system has; 1. Five individual servers 2. A switch 3. Two
References: 1. Interview with Harry, program manager at Varsun e Technologies, Orange, CA 2. http://www.unixguide.net/freebsd/fbsd_installguide/54.06.00_Network_Security.htm 3. http://blogs.technet.com/b/srd/archive/2011/07/12/mitigating-software-vulnerabilities.aspx 4. http://infosecalways.com/2007/07/12/security-threat-statistics-resources/ 5. (n.d.). Retrieved 04 04, 2011, from Amazon : http://www.amazon.com/Dell-PowerEdge-R710-Server-48GB/dp/B0037S9MTM 6. (n.d.). Retrieved 04 04, 2011, from Dell: www.dell.com 7. http://www.cio.com/article/494522/Hidden_Threat_on_Corporate_Nets_Misconfigured_Gear