Preview

Securing Aircraft Solutions: Case Study

Powerful Essays
Open Document
Open Document
2240 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Securing Aircraft Solutions: Case Study
Securing Aircraft Solutions

Aircraft Solutions, headquartered in San Diego, California, is a company specializing in business-to-business products and services. Their customers are primarily in the electronic, commercial, defense and aerospace industries. They specialize in offering low-cost design and computer-aided packages to help their customers lower their costs for development and involve their customers in every step of the fabrication process while utilizing the Business Process Management System (BPM). With this method they hope to keep repeat business and attain long-lasting customer relationships. They have two remote locations outside of San Diego: The commercial division is 40 miles east in Chula Vista,
…show more content…
Not only are there interception and interruption threats, but there are also fabrication and modification. Interception can happen when someone on the Internet uses a new malware tool not blocked by the out-of-date firewall rules to gain access to the network. They could then install keylogging software, not found by the antivirus software, on an employee’s computer. They could easily capture username and password information, which they can use to access the BPM servers and copy proprietary customer information to their own computer outside of the network.
Interruptions can occur because outside users could gain access to the network with new techniques not blocked by the updated firewall rules, as noted above, and install a virus on a server to delete all the system files. Even though these files may be backed up, it could take hours or even days to restore the BPM system to the state before the attack, and there’s no guarantee the attack will not occur
…show more content…
A lot of it depends on the motivations of the people behind them. They could be former employees, for example. Or they could be untrustworthy customers who want to gain access to information on their competitors who also happen to be clients of Aircraft Solutions. They could also be people who would want to do it just to see if they can. But the potentially most harmful type would be the criminals. They could find customer bank account information, or even the company’s, and try to gain access to those accounts. This information is getting easier to obtain, thanks to the power of Internet and the ability of malcontents to attack enterprise networks (Belani, 2014). Regardless of the type of intrusion, it will most likely happen at some point, given enough time and the current network configuration and security

You May Also Find These Documents Helpful

  • Best Essays

    Aircraft Solutions

    • 2805 Words
    • 12 Pages

    Aircraft Solutions operates within California in two separate physical locations in San Diego and Santa Ana. Working within both commercial and defense industries, their products are used globally. Aircraft Solutions is overtly technical in nature utilizing Business Process Management (BPM) for end to end processes that interacts with customers, vendors, and suppliers. BPM also fills a critical role of internal communications for IT to ensure customer needs are being fulfilled precisely as they have been ordered.…

    • 2805 Words
    • 12 Pages
    Best Essays
  • Best Essays

    Aircraft Solutions Project

    • 2440 Words
    • 10 Pages

    The purpose of the report is to assist Aircraft Solutions (AS) in indentifying the most significant Information Technology (IT) security vulnerabilities. AS products and services are at the forefront of the industry and the protection of such is very important as they are an industry leader. The vulnerabilities that will be discussed are the firewall configuration, virtualization of their hardware assets and defining security policy regarding the timeliness of firewall configuration and updates.…

    • 2440 Words
    • 10 Pages
    Best Essays
  • Powerful Essays

    Aircraft Solutions

    • 1868 Words
    • 8 Pages

    Aircraft Solutions (AS) is a recognized leader in the design and fabrication of component products and services for companies in the electronics, commercial, defense, and aerospace industry. The mission of AS is to provide customer success through machined products and related services, and to meet cost, quality, and schedule requirements.…

    • 1868 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    The private-public network edge is considered particularly vulnerable to intrusions, because the Internet is a publicly accessible network and falls under the management purview of multiple network operators. For these reasons, the Internet is considered an untrusted network. So are wireless LANs, which-without the proper security measures in place-can be hijacked from outside the corporation when radio signals penetrate interior walls and spill outdoors.…

    • 1214 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    wk 4 lab 2

    • 403 Words
    • 1 Page

    1. Unauthorized network probing and port scanning. IP router, firewall and network appliance operation system vulnerability.…

    • 403 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    NT2580 Unit 1

    • 578 Words
    • 3 Pages

    The first domain that would be affected is the User Domain. The User Domain defines the people who access an organization’s information system. One of the roles and tasks is that the user can access systems, applications, and data depending upon their defined access rights. Inside the User domain is where the user would find the acceptable user policy or AUP. The AUP defines what users are allowed to do within the organization-owned IT assets. The User Domain is considered the weakest and most affected domain. One reason why is that it has a lack of user awareness. Another reason is that when users are downloading various content and different files, they generally do not conform to the established security guidelines. To protect from these issues, there should be enabled content filtering as well as automatic antivirus scans. A way to protect from an user doing Employee blackmail or extortion is to enable intrusion detection system/intrusion prevention system (IDS/IPS) monitoring. The monitoring will examine the IP data streams for inbound and outbound traffic.…

    • 578 Words
    • 3 Pages
    Good Essays
  • Good Essays

    A security breach has been identified within a small Microsoft workgroup LAN. The workgroup consists of three primary workgroups which contain group membership lists of users within the Active Directory infrastructure that currently exists on the SMB Server that is located within the confines of the LAN structure. The security breach, which is defined as any event that results in a violation of any of the CIA (confidentiality, integrity, availability) security principles, was caused by the SMB server being accessed by an unauthorized user due to a security hole that was detected by the server software manufacturer the previous day. The security patch will not be available until possible as long as three days, but hopefully within that timeframe. In addition, the LAN administrator needs at least one week (minimum) to download, test, and install the patch.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Once the attacker has enough information to understand how the business works and what information of value might be available, he or she begins the process of scanning perimeter and internal network devices looking for weaknesses, including…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    This SRP is submitted in partial fulfillment of the requirements of the Master of Strategic Studies Degree. The U.S. Army War College is accredited by the Commission on Higher Education of the Middle States Association of Colleges and Schools, 3624 Market Street, Philadelphia, PA 19104, (215) 662-5606. The Commission on Higher Education is an institutional accrediting agency recognized by the U.S. Secretary of Education and the Council for Higher Education Accreditation. The views expressed in this student academic research paper are those of the author and do not reflect the official policy or position of the Department of the Army, Department of Defense, or the U.S. Government.…

    • 7675 Words
    • 31 Pages
    Powerful Essays
  • Good Essays

    Boeing

    • 1302 Words
    • 7 Pages

    Boeing Australia Limited (BAL) is relatively new company and a global extension of the US firm, the Boeing Company. The BAL developed capabilities in the areas of space and communication, site management and the upgrade and maintenance of military aircraft and equipment. As BAL grew, it had developed various systems to support the procurement operations at four key divisions and 12 sites that made up the organization. However there is no interface of these systems and they operated autonomously, resulting in a lot of administrative redundancies, low productivity, and high processing time for the procurement processes.…

    • 1302 Words
    • 7 Pages
    Good Essays
  • Good Essays

    An assessment of Riordan Manufacturing E-mail Exchange Servers identified high impact vulnerabilities. If these vulnerabilities are not address they can hinder the speed of e-mail delivery and could also cause a denial of service (DoS) to users.…

    • 628 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Insiders have caused damage to networks being terminated or remain in a position to provide information to the outside. They can set up fake websites that look like a real product or supplier but are actually malicious sites designed to attack the computer and add malicious code to the key log, use contact lists, steal data, and other malicious purposes.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Unit 4 Assignment 2

    • 1005 Words
    • 5 Pages

    Internet use creates the possibility of virus attacks or allowing any unauthorized people to get into our system with the potential of accessing company’s confidential information.…

    • 1005 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Harley Davidson Erp It Study

    • 2701 Words
    • 11 Pages

    Since Harley Davison Motor Company started in 1903, they have been successfully “taking the work out of bicycling” better than any other motorcycle manufacturing company. They have experienced great success recently with growing numbers in their percentage of motorcycles shipped, up 14 percent from 1997, and their target market size, up 13.8 percent from 1997. Their brand has also grown so strong over the years that customers are willing to wait up to two years for a motorcycle. The problems that Harley Davison is faced with are how to improve their existing purchasing process, how to integrate their existing procurement methods together, and how to develop longer term relationships with suppliers. Since these issues are enterprise wide, they are looking into software that will allow them to manage their supply chain more efficiently and be more functional than their current system.…

    • 2701 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Aviation Security - Essay

    • 933 Words
    • 3 Pages

    The security of an airport is an important factor to be looked upon once it has been constructed. This is one place where the reputation starts to build up for any nation and therefore it should be of outmost importance. Because of the wide variety and scope of GA aircraft and landing locations, any approach to implementing security guidelines must think about the various types of flight operations as well as the size of aircraft concerned, among other factors. Therefore, an elastic, common-sense approach to airport safety is important if the industry is to retain its financial strength.…

    • 933 Words
    • 3 Pages
    Good Essays