Security Assessment and Recommendations – Phase I & II
Aircraft Solutions
Table of Contents
Executive Summary……………………………………………………..1
Company Overview……………………………………………………..1
Hardware Vulnerability………………………………………………...2
Policy Vulnerability……………………………………………………..3
Hardware Solution………………………………………………………4
Policy Solution…………………………………………………………...5
Summary…………………………………………………………………6
Executive Summary
The purpose of this paper is to explore and assess computer security as it relates to Aircraft Solutions. Aircraft Solutions provides products and services to a range of companies that require highly specialized skills. Information is accessed by internal and external users via their Business Process Management system. Based on the information provided, two vulnerabilities have been identified. The first vulnerability lies within the network infrastructure and the lack of sufficient firewalls. The second vulnerability is driven by their security policy as it relates to the evaluation of firewall protection. Subsequently, it is suggested that the company purchase additional firewall protection for the connection between the main router, the internet and the Chula Vista location as well updating their security policy to evaluate firewalls every six months.
Company Overview
As a leader in its industry, Aircraft Solutions provides design and fabrication of component products and services for companies in the electronics, commercial, defense and aerospace industries. It is headquartered in Southern California with several locations throughout the state that were strategically placed close to intermodal hubs for ease of access. These locations house a voluminous plant, extensive equipment and a highly skilled workforce that includes design engineers, programmers, machinists and assembly workers. Ultimately, the company’s goal is provide machined products and services that would enable their customers
References: Common Network Security Threats. Retrieved on July 29, 2012 from http://www.orbit-omputer-solutions.com/Common-Network-Security-Threats.php Security Lifecycle – Managing the Threat. Retrieved on August 22, 2012 from http://www.sans.org/reading_room/whitepapers/basics/security-lifecycle-managing-threat_592. Study Finds Cyber Threats to be Largest Security Concern. Retrieved on August 10, 2012 from http://www.scmagazine.com/study-finds-cyberthreats-to-be-largest-security-concern/printarticle/164294/. The Cost of Lost Data. Retrieved on August 10, 2012 from http://gbr.pepperdine.edu/2010/08/the-cost-of-lost-data/. What is a Firewall? Retrieved on August 22, 2012 from http://www.microsoft.com/security/pc-security/firewalls-whatis.aspx. The Cisco ASA 5500 as a Superior Firewall Solution. Retrieved on August 16, 2012 from http://www.cisco.com/en/US/prod/collateral/vpndevc/ps6032/ps6094/ps6120/prod_white_paper0900aecd8058ec85.pdf.