Aircraft Solutions, headquartered in San Diego, California, is a company specializing in business-to-business products and services. Their customers are primarily in the electronic, commercial, defense and aerospace industries. They specialize in offering low-cost design and computer-aided packages to help their customers lower their costs for development and involve their customers in every step of the fabrication process while utilizing the Business Process Management System (BPM). With this method they hope to keep repeat business and attain long-lasting customer relationships. They have two remote locations outside of San Diego: The commercial division is 40 miles east in Chula Vista, …show more content…
Not only are there interception and interruption threats, but there are also fabrication and modification. Interception can happen when someone on the Internet uses a new malware tool not blocked by the out-of-date firewall rules to gain access to the network. They could then install keylogging software, not found by the antivirus software, on an employee’s computer. They could easily capture username and password information, which they can use to access the BPM servers and copy proprietary customer information to their own computer outside of the network.
Interruptions can occur because outside users could gain access to the network with new techniques not blocked by the updated firewall rules, as noted above, and install a virus on a server to delete all the system files. Even though these files may be backed up, it could take hours or even days to restore the BPM system to the state before the attack, and there’s no guarantee the attack will not occur …show more content…
A lot of it depends on the motivations of the people behind them. They could be former employees, for example. Or they could be untrustworthy customers who want to gain access to information on their competitors who also happen to be clients of Aircraft Solutions. They could also be people who would want to do it just to see if they can. But the potentially most harmful type would be the criminals. They could find customer bank account information, or even the company’s, and try to gain access to those accounts. This information is getting easier to obtain, thanks to the power of Internet and the ability of malcontents to attack enterprise networks (Belani, 2014). Regardless of the type of intrusion, it will most likely happen at some point, given enough time and the current network configuration and security