Preview

Se571 Aircraft Solutions

Best Essays
Open Document
Open Document
1896 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Se571 Aircraft Solutions
AIRCRAFT SOLUTIONS

Professor
SE571
Principles of Information Security and Privacy
Phase II Course Project

Company Overview
Aircraft Solutions (AS) is a recognized leader in the design and fabrication of component products and services for companies in the electronics, commercial, defense, and aerospace industry. Located in Southern California, AS has a dedicated, trained workforce and maintains a large capacity plant and extensive equipment to meet customer requirements. Much of the equipment is automated to increase production while reducing costs. The company's workforce has a large skill base: design engineers, programmers, machinists, and assembly personnel to work its highly-automated production systems.
The mission of AS is to provide customer success through machined products and related services, and to meet cost, quality, and schedule requirements.
The company strategy is to offer low-cost design and computer-aided modeling packages to customers to reduce their development expenses. AS will help the customer through all phases of new product deployment, from initial prototypes through final large-volume production and assembly. By involving itself in all phases of customer product development, AS hopes to establish long-term relationships and secure repeated follow-on business with its customers. In addition, AS continues to invest heavily in workforce education and training, so as to improve capability to serve its customers.
Security Vulnerabilities Overall the network has solid hardware firewall protection at every public network connection but one. The Commercial Division(CD) in Chula Vista, CA does not have a hardware firewall protection, it is connected directly to the public internet. The CD is directly connected to the headquarters in San Diego which contains the IT, Finance and S&M servers. These servers are vulnerable to attack since there is not a firewall in place to prevent an intrusion. A perpetrator could



References: Firewall. (n.d.). Firewall Protection. Retrieved April 14, 2012, from www.britannica.com.proxy.devry.edu/EBchecked/topic/1235238/firewall Firewall Protection - Why You Need It? | TopChoiceReviews. (n.d.). Top Antivirus Software | TopChoiceReviews. Retrieved April 14, 2012, from http://antivirus-software.topchoicereviews.com/firewall-protection-why-you-need-it_168.html Cisco. (n.d.). Cisco ASA 5500 Series Adaptive Security Appliances - Cisco Systems . Cisco Systems, Inc. Retrieved April 14, 2012, from http://www.cisco.com/cisco/web/solutions/small_business/products/security/ASA_5500_series/index.html Dell. (n.d.). Firewall Management | Firewall Management Services | Dell SecureWorks. Information Security Services, Managed Security Services - Dell SecureWorks. Retrieved April 14, 2012, from http://www.secureworks.com/services/firewall/

You May Also Find These Documents Helpful

  • Best Essays

    Aircraft Solutions

    • 2805 Words
    • 12 Pages

    References: AlgoSec. (2012, january). AlgoSec Security Management Suite. Retrieved February 18, 2013, from Algosec.com: http://www.algosec.com/en/products/products_overview…

    • 2805 Words
    • 12 Pages
    Best Essays
  • Satisfactory Essays

    IS3230 Final Project

    • 687 Words
    • 2 Pages

    The entirety of the network will have to be protected with Barracuda Firewalls as the threat to intrusion is rather high judging the frequency of the preceding attacks. The company will need to do a cost management analysis to this, however from my understanding, with the increased efficiency; we will be looking to come out on top after a three year return of investment on this purchase. I fully recommend we look at putting a honeypot somewhere in the DMZ so we can monitor how hackers attempt to gain access and thwart their efforts in the future. The Warsaw, Poland location, we must find a new proxy server to replace the IBM Infinity hardened server.…

    • 687 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Aircraft Solutions Project

    • 2440 Words
    • 10 Pages

    The hardware infrastructure of the AS Headquarters in San Diego, California had been identified during our recent security assessment as being a potential security weakness to the company's overall information systems security infrastructure.…

    • 2440 Words
    • 10 Pages
    Best Essays
  • Powerful Essays

    Aircraft Solutions

    • 1868 Words
    • 8 Pages

    Aircraft Solutions (AS) is a recognized leader in the design and fabrication of component products and services for companies in the electronics, commercial, defense, and aerospace industry. The mission of AS is to provide customer success through machined products and related services, and to meet cost, quality, and schedule requirements.…

    • 1868 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    The private-public network edge is considered particularly vulnerable to intrusions, because the Internet is a publicly accessible network and falls under the management purview of multiple network operators. For these reasons, the Internet is considered an untrusted network. So are wireless LANs, which-without the proper security measures in place-can be hijacked from outside the corporation when radio signals penetrate interior walls and spill outdoors.…

    • 1214 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Goals in the company are to find the right product for the customer’s particular needs and build a relationship with the customers…

    • 1177 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    This report is prepared to assist the aircraft solutions (AS), a well-known company for equipment and component fabrication in Southern California, in identifying the most important security vulnerabilities. This report also discusses possible threats, the likelihood of the threats occurring and the threat if exposed in two remarkable areas. Aircraft Solutions maintains a large capacity plant, trained workforce, large variety of equipment, design modules and solution database provided to multiple industries. These companies include aerospace, electronics and defense sectors. In this report I will focus on the vulnerabilities present in the existing system of Aircraft Solutions and its operations.…

    • 2041 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    After further review to three relevant sections: hardware, software and policy, Aircraft Solutions needs special attention to hardware and policy relates processes. The Defense Division is routed through Headquarters, the Commercial Division is however directly connected to the Internet, but no firewall has been setup. This action is a concern for Aircraft Solutions. A policy vulnerability that has been noticed is the rule that states “routers and firewalls rule-sets would be evaluated once in every two years”. With today’s world and technology changing ever so often security threats happen by Internet hackers, on an everyday basis. This is a rather impractical and long time span for a company to ensure that their security measures are up-to-date. These weaknesses are detailed in the sections below:…

    • 745 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Manufacturing must now prepare for the designing of a system that puts into account all the…

    • 1463 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Strong tie Case Summary

    • 322 Words
    • 2 Pages

    4. After the death of Bill Johnstone in 1975, his son David (CEO) took over the business with his three daughters, Ellen (product design and production), Elizabeth (marketing, sales and distribution) and Audrey (company’s finance).…

    • 322 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    700 600 500 400 300 200 100 0 2008 2009E 2010E 2011E 2012E 2013E Aerospace Market1 Defence Market1…

    • 5658 Words
    • 23 Pages
    Good Essays
  • Satisfactory Essays

    Firewalls are an extremely beneficial and necessary security tool that organizations need to implement in their network. There are so many ways that information can be shared over the internet either by an organization 's employee for example just searching on the net or by hackers trying to break into the network. Thus, organizations need to implement a security device such as a firewall to protect them from the world (internet).…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    FM Transmitter Design Report

    • 7213 Words
    • 29 Pages

    This document was developed as a part of the requirements of an electrical and computer engineering course at Iowa State University, Ames, Iowa. This document does not constitute a professional engineering design or a professional land surveying document. Although the information is intended to be accurate, the associated students, faculty, and Iowa State University make no claims, promises, or guarantees about the accuracy, completeness, quality, or adequacy of the information. The user of this document shall ensure that any such use does not violate any laws with regard to professional licensing and certification requirements. This use includes any work resulting from this student-prepared document that is required to be under the responsible charge of a licensed engineer or surveyor. This document is copyrighted by the students who produced this document and the associated faculty advisors. No part may be reproduced without the written permission of the senior design course coordinator.…

    • 7213 Words
    • 29 Pages
    Powerful Essays
  • Satisfactory Essays

    Zappos supply chain

    • 368 Words
    • 2 Pages

    2. Manufacturing – Manufacturing process can be expedited by design collaboration between ASI and Chinese manufacture. Designing the product for postponement and performing late-stage product completion as close to demand as possible is vital for reliability to valued customers. Postponement can be employed across fast or slowing products/ customized and non-customized product line to improve the delivery process. With postponement comes greater levels of customization to improve the reliability of deliveries thus increasing the delivery cycle times. ASI should leverage on this process to identify differences of customized and non-customized product line segmentation manufacturing requirements and cater according to the valued customers. To avoid back order situation, Chinese manufacture should be advised to become effective design coordinators early in the process.…

    • 368 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Columbia Computer Center Davao, Inc., one of the pioneers in the computer industry of Davao City, Started its operation in 1982 as a video center. Due to a promising opportunity in the computer business, investment in this industry was also tried and later concentrated in this field. Consequently, due to a greater demand in the national capital region, the company decided to establish its main office in Manila. Since then, the growth of the company was extended to every major city in the country.…

    • 347 Words
    • 2 Pages
    Satisfactory Essays