Preview

Lockheed-Martin: A Case Study

Good Essays
Open Document
Open Document
750 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lockheed-Martin: A Case Study
Since 1912 Lockheed-Martin was a concept derived from Glenn Martin with the design of his first airplane in collaboration with the founder of Alco Hydro-Aeroplane Company Malcolm Lockheed (Our History, 2017). The merger between Martin and Lockheed formed the well-known aerospace company Lockheed-Aircraft Company which is currently Lockheed-Martin. However, Lockheed-Martin evolved into a contractor for the U.S. defense in technology and security. Thus, making them extremely vulnerable to outside cyber-attacks and novice 'hackers.' Unfortunately, by 2011 a cyber-attack and Lockheed targeted the company reported no damage to the security. Nonetheless, they sent ninety-thousand employees replacement ID's (Kallegburg, 2015; Lockheed Martin …show more content…

That is, either an email or malware document corrupted the system allowing the keylogger access to credentials, data, information and company assets. In this way, the cyber-attack violated the core tenets of cyber-security system focus on what's crucial, move key assets out of band, and detect/react/adapt (Hughes & Cybenko, 2014). Meaning the methodology to control the occurrence failed to lead to less focus on improving the security of the system with different procedures. Thereby, it questions Lockheed-Martin's motive with retaining the cryptosystem and …show more content…

Since then companies began to become more aware of the problems associated with computer and security. Only in 2013, the Utah government reported twenty-million cyber-attacks each day, so it suggests that there are trillions of cyber-attacks worldwide (Millions of Cyber Attacks Each Day, 2015). So, the steps that companies take are an organizational framework with new operations towards employee education, organizational policies, IT and network advisors to limit access as a job-related function (Trim & Yam-Im, 2010). Meaning education combined with limiting the number of people having full access to everything decreases the chance of a cyber-attack and with the security of an IT specialist proactively monitoring the system. For example, Lockheed-Martin's cyber-kill chain that stops the stages of malware by reconnaissance, weaponization, delivery, exploit, installation, command & control, and actions (Mattern, Felker, Borum, & Bamford, 2014). Although, many companies have taken steps and precautions towards thwarting cyber-attack violators of computer and security still manage to infiltrate systems. That is due to companies failing to change current methodologies to compensate for the advancement of technology and more

You May Also Find These Documents Helpful

  • Powerful Essays

    In 2008 Boeing had made all sorts of headlines in the media, due to some new technological developments in their newly designed 787 Dreamliner. These headlines that splashed across websites were initially brought about due to a FAA “special conditions” report. This topic of this report first appeared in Flight International, and then a few days later it gathered momentum in a critical follow up from Wired Magazine. According to Wired (2008), the FAA states “Boeing’s new 787 may be vulnerable to hacker attack”.…

    • 1124 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Corporation Tech will face many security risks with their current network. The user domain is the single most vulnerable part of any network and as such poses the most obvious security risk. To mitigate risks involving the users is to implement policies and training to educate the user on proper use and security best practices. By educating the user on security practices such as secure passwords, safe web surfing, and securing their workstations, many potential attacks can be avoided. Policies and training are also necessary because they can be used as evidence when taking administrative action against a user or intruder in the event the system or data information is compromised.…

    • 612 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Awareness of these kinds of attacks is the key and to be prepared on the part of management and the user. They must be made aware of the consequences of their actions while using the network and accessing the data. The users of the network and system need to be prepared in case of an attack and have knowledge of…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    As I read an article written by Mr. Mathew J. Schwartz, dated March 12. 2012, for InformationWeek via darkreading.com, and ponder the strength of the subject matter discussed, I asked myself the question when does attack prevention begin? The question does present an abstract yet requires that careful thought be exercised when approaching information security breaches, and how to prevent attacks; a technological melancholy with very expensive associations.…

    • 639 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    1. Discuss common forms of attack on Microsoft systems using the text Internet, and/or your job as reference for full credit.…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The Lockheed Martin used the similar style of font as Northrop Grumman. The header of the website is all capitalized and bolded the color is different. The Northrop Grumman used the blue color for header and Lockheed Martin used the white color. The font size is proper organized they avoid to used big size of font normal size of font is more attract viewers. I really like to how both designer of the website used good color…

    • 78 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    As mentioned in our text, there are two ways to address security issues. First, the technical approach in which computer software and monitoring is used to monitor and control websites being visited or information being copied. Second, the communication methods and partnership and control by the Human Resources department. Because not all possible risks could be addressed by the use of technology there is also a great need to control the flow of information and proprietary technology by implementing policy. A bank for example could implement a security access policy following a “need to know” plan where only if necessary an employee could have access to data or information. The bank could also create an expectation of zero privacy where all files or devices on a company network whether owned or provided by the employee are subject to scanning or monitoring, and finally the automatic acceptance that devices such as peripheral blockers may be in place in order to avoid data extraction or movement. In regards to a new employee versus an employee who has given notice, a new employee could have restricted access that is only opened slowly as they acquire responsibilities and an employee leaving the firm depending on his level of access, the firm may opt to take his termination effective immediately.…

    • 592 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Cyber-security demands are ever increasing in the field of Information Technology with the globalization of the internet. Disruptions due to cyber-attacks are affecting the economy, costing companies billions of dollars each year in lost revenue. To counter this problem corporations are spending more and more on infrastructure and investing to secure the cyber security vulnerabilities which range anywhere from software to hardware to networks and people that use them. Due to the complexity of information systems that interact with each other and their counter parts, the requirement to meet specific cyber security compliances have become a challenging issues for security professionals worldwide. To help with these issues, security professionals have created different standards and frameworks over the years for addressing this growing concern of vulnerabilities within enterprise systems and the critical information they hold (“Critical Security Controls,” n.d.).…

    • 3199 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Lockheed Martin

    • 286 Words
    • 2 Pages

    Question: By laying of Lockheed Martin employees, does it affect the future sales of the company?…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This article discusses Homeland Security's decision to renew Raytheon's contract as its cyber protector. In September Raytheon was picked as the main contractor for the Network Security Deployment division. This new contract is directly influenced by the companies new plans to prioritize cyber security as just last year the Office of Personnel Management was hacked, leaving data on 21.5 million people comprised. Moreover, in January of this year, a report on Homeland's cyber security admitted to limitations in ability to detect possible malware. Overall, cyber security is a controversial issue. An example of this is the debate surrounding the unlocking of a terrorist's iPhone in December, which Apple refused to do.…

    • 111 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Information technology staff can help decrease incidents of security breaches by implementing screen protectors in all computers, by providing logging accreditation to all personnel, by using network security software and hardware, by monitoring the safety of the network and by educating, reporting and enforcing any HIPAA violation.…

    • 672 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Computer Memory Hacking

    • 820 Words
    • 2 Pages

    of reasons that one might participate in hacking the memory of a computer system. One reason…

    • 820 Words
    • 2 Pages
    Good Essays
  • Good Essays

    A computer security career is a highly diverse and important position, where you could work anywhere from a College Campus to a Hospital Administration building, all the way up to the Government Agencies all over the world. With so many new businesses’ opening daily, worldwide, the job market will be forever expanding. Whenever a business’s computer system acts up it’s the job of their computer security specialist to carefully take all the required steps to identify and resolve the specific issue, combining many people into one, saving the company lots of money. These specialists have and exceptional and advanced overall knowledge of all things computer.…

    • 525 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The article “Inside America’s Hacking Epidemic,” shows the destructive power and capability of cyberwarfare. Cyberwarfare has grown increasingly common over the years, and is one of the few areas where combat is on a level playing field. With the widespread use and access to internet, hackers and cases of hacking are continuing to grow at an alarming rate. Not only, but these hacks are usually targeted at important government facilities like the Pentagon, State Department, and the White House. Attacks substantial as this not only have the capability breach classified information, but they also carry a large risk of harming the infrastructure and national security.…

    • 445 Words
    • 2 Pages
    Good Essays
  • Good Essays

    There are many ways to tighten up security when it comes to network security, but the most important part of the security in the actual user. If the user is not trained on the system and does not know ones regulations of the company then security is out the door. First and for most, the personal must continues training on the systems that they will have access to. Then there system must be prepared for the environment that they will be placed in. If the policy allows access to facebook then the server address won’t be blocked. If they don’t allow any other programs, software, or web sites then for work, then the computer must be set up for that purpose of working only. That is how one lowers the threat level on the user’s level. For authentication, authorization, and accounting the IT department must stay on top of their duties and have the passwords changed every so often. The IT team must also give the correct level of access to the person that is due it. And continue with follow ups on the system to insure that all is still well. For prevention they must try and stay one step ahead of the intruders. They must think like the hackers and try and get through their systems. For responding to intrusions a company should have a response team or a Disaster Recovery Team in place to act in cases of intrusions. There should be back systems in place to as not hinder the company day to day operation. Files should be backed up in a timely manner also. But a system is never fully…

    • 310 Words
    • 2 Pages
    Good Essays