Anita Crawford-Cowan
Submitted To: Professor Kevin Reynolds
SEC571 Principles of Information Security and Privacy
Keller Graduate School of Management
Submitted: September 21, 2014
TABLE OF CONTENTS
Company Overview Page 1
Security Vulnerabilities Page 2 Policy Vulnerabilities Page 2 Hardware Vulnerabilities Page 3
References Page 4
Company Overview
Aircraft Solutions (AS) is worldwide provider in the design and fabrication of component parts and services to industries such as aerospace, defense, electronics and commercial. Its headquarters, …show more content…
It gives a loose advantage to users, third parties, customers and administrators to possible unauthorized usage. As noted, all users have access on a need to know basis. This identifies a question as to why each of the user’s needs to know all of the information. It should only be user accessible for those whose job description entails. For instance, is there a need for a supplier or customer to know personal information of the company’s employees pay, social security numbers, addresses or even marital status? Is there a need for customers to have access to information on other customers, such as charges endured for services; what design specifications were implemented for a particular product or passwords used by one …show more content…
It would constitute series of possible identity theft, threats of destruction to the company’s personnel, all users, financial losses and mass havoc to the corporation, its suppliers, contractors, customers and possibly National Security.
(A. Kanellos, 2004)
The Second Vulnerability involves its Hardware Security Controls
The idea of having independent anti-virus software installation on all workstations and servers, however, a host based detection system on corporate office servers. The hardware at the corporate level server lack of a firewall protection creates vulnerabilities to:
a) its backup servers located at the server at the individual server
b) This lack of any firewall protection adheres to system configuration
c) No real protection authentication on either of routers
d) Switchers may become