Free Essay

Aircraft Solutions Risk Assessment

In:

Submitted By dave1453
Words 2620
Pages 11
Aircraft Solutions (AS) Security Assessment

Submitted to: Professor
SEC-571 Principles of Information Security and Privacy
Keller Graduate School of Management
Submitted:

Overview

Aircraft Solutions (AS) is a southern California company specializing in cutting edge design and manufacturing. AS supplies products and solutions in the fields of electronics, commercial, defense, and aerospace to a wide variety of customers. AS not only has a highly skilled and trained workforce, but they also utilize state of the art equipment that provides efficiency and productivity rarely seen in this industry. AS’s headquarters is located in San Diego, California while their Commercial Division (CD) is located 40 miles east of San Diego in Chula Vista, California. The AS Defense Division (DD) is located between Los Angeles and San Diego in Orange County, California. AS uses Business Process Management (BPM) to integrate customers, vendors, and suppliers in order to create a successful product. The success of the BPM is closely dependent on the success and efficiency of the Information Technology (IT) process of AS. Customer data, design engineering, and Proof For Production (PFP) are all examples of how AS’s IT success directly impacts their BPM.

Vulnerabilities

Hardware vulnerability

AS has an obvious hardware vulnerability that could potentially have a catastrophic effect on the Chula Vista CD and the rest of AS. AS has a current network architecture that employs four (4) firewalls that prevent AS headquarters, DD, contractors, suppliers, and customers from directly connecting through the Internet. CD is positioned in such a way that they have direct exposure to the Internet, which in turn could expose AS headquarters and DD. This lack of a firewall for CD is a major security concern and needs to be addressed immediately. The lack of a firewall between CD and the Internet is a major vulnerability as it allows unfiltered Internet traffic to touch the AS network (Scarfone & Hoffman, 2009). This is a critical exposure as the lack of a firewall increases the risk of malicious attacks, whether from an intrusion, dangerous packets, or exposure to a virus. These types of threats are real and persistent whether from malicious state actors seeking proprietary company information, a disgruntled employee, or just an everyday hacker looking to do some damage. The lack of a firewall allows these attackers to use such websites as www.shodan.com to scan all of the ports that CD is making available to the Internet and discover which avenues of access to the AS network are available (Hill, 2013). The likeliness of one of these attacks occurring is high. The United States Computer Emergency Readiness Team, or U.S. – CERT, reported that more than 12,000 cyber incidents occurred in 2007, and that number has more than quadrupled by 2012. See below:

The specific consequences of a successfully attack or security breach are too numerous to list, however, any degradation or loss of productivity to the CD will have a significant impact on the mission critical businesses of AS. At best, consequences could be minor disruption in network traffic or performance and at worse it could be a complete compromise of business critical information and infrastructure which would effectively cripple AS. AS’s competitive edge would be affected by them losing network integrity and a complete disruption of the BPM. Even if recovery efforts were successful, the loss of consumer confidence in AS’s ability to protect their own network and customer data would be tremendous and AS would still lose their competitive edge.

Policy vulnerability

The policy that AS currently has in place for router and firewall rule set review is a vulnerability that needs immediate attention. The current policy states that rule sets will be reviewed every two years. This policy is so inadequate that it, in all practicality, renders the firewall and routers useless. IT security can literally change on a daily basis and it is a continuing process to stay current on security trends and security needs of an organization (Wilshusen, 2013). For example, ports that were secure can become vulnerable, AS business requirements and practices can change, and newly discovered viruses and threats become known all the time. This information needs to be reviewed in conjunction with the firewall and router rule sets to make sure that a new exposure or vulnerability does not exist. The likelihood of one of these threats occurring under the current security control policy is high. In the IT security world, the amount of change that occurs in two years is astronomical. If a security control rule set for a firewall or router was not reviewed for two years, there would be a significant number of vulnerabilities that the router or firewall would be exposed to. As time passes, the number of vulnerabilities would increase and therefore increasing the risk and likelihood that a threat will occur. The consequences of a vulnerable firewall or router to AS’s mission critical business cannot be understated. Taking the current policy into consideration, if we assume vulnerability came into existence two months after a review of the firewall rule set, then AS has potentially exposed their network and information to undetected exploitation for a 22 month period. Again, this is a worst case scenario, but it is always better to plan for the worst and hope for the best. This 22 month exposure period could destroy any competitive edge that AS had over its competitors. AS’s entire network and business practices could be exploited and made available to rival companies which would effectively put AS out of business.

Recommended solutions

Hardware solution

The recommended hardware solution for AS is to place a Next Generation Firewall (NGFW) product between the Internet and CD. The recommended product for AS, based on a totality of the circumstances, is to deploy a Check Point 13500 NGFW. Check Point’s 13500 device is part of their 13000 series of appliances. Check Point has a long history of being a respected security solutions provider and the companies’ devices are one of the most deployed firewalls in use today. The great thing about this product is that it has a variety of states that it can be deployed in. The 13000 series can be deployed to be a NGFW, Next Generation Threat Prevention (NGTP), Next Generation Secure Web Gateway (NGSWG), and/or a Next Generation Data Protection (NGDP) solution separately or independently depending on the blade package used.
(Wilkins, 2014) That is a great feature as it allows AS to adjust its security posture as it grows, changes, or identifies areas that may be more of a security concern. Here we are only concerned with the NGFW. The specifications for the Check Point 13500 NGFW are as follows: CheckPoint 13500 | Server Application Attacks (Blocked %) | 97.1% | Client Application Attacks (Blocked %) | 95.9% | Evasion Results | Unable to be Evaded | Stable and Reliable | Yes | Successful Enforcement of Application Policies? | Yes | Successful Enforcement of Identify Policies? | Yes | IPS Throughput (Specification) | 5.7 Gbps | IPS Throughput (Tested) | 6.7 Gbps | Total Throughput | 23.6 Gbps | Cost per Protected Mbps | $21.45 | Dual Power Supplies | Yes | Max Power Consumption | 431 Watts | Stackable | No | Rack Space Used per unit | 2U |
(Wilkins, 2014) As you can see from the above chart, the Server Application Attacks and Client Application Attacks blocked are at 97.1% and 95.9% respectively. This is a tremendous percentage while still allowing a total throughput of information at 23.6 Gbps. Additionally, the max power consumption is at 431 Watts which is the second lowest in this class of NGFW. One other great feature is that the Check Point 13500 maximizes connection capacity by supporting up to 28 million concurrent connections. (Check Point Software Technologies LTD, 2016) One of the security features of the Check Point 13500 is it offers complete zero-day threat prevention and alerts when under attack. Their Threat Extraction delivers zero-malware documents in zero seconds and the Threat Emulation feature inspects files for malicious content in virtual sandbox. (Check Point Software Technologies LTD, 2016) Placement for the Checkpoint 13500 would be directly between the CD and the Internet. This is the most vulnerable point of the AS architecture and this is what needs addressed first. The placement of the Check Point 13500 should be re-evaluated periodically to ensure that it is in the most beneficial spot for AS and that it is being used to its greatest potential. The justification for this product and its placement is primarily based on the value of the information that CD handles. As a recognized leader in the design and fabrication of component products and services for companies in the electronics, commercial, defense, and aerospace industry, AS cannot afford to have a security breach in their CD. This could not only compromise their business/production process, but it could also compromise valuable data on AS customers and their products. The latter would be devastating to AS as their current, and future, clients would lose faith that AS can properly safeguard their secrets. The implementation of the Check Point 13500 NGFW can be done with little to no disruption. It can be pre-configured with the help of the network administration staff and they can perform the installation during early hours on the weekend or a holiday when production and customer activity is at its lowest. Maintenance for the NGFW will also cause little to no disruption as the 13500 appliance has hot-swappable and redundant components to prevent downtime. The cost of the Check Point 13500 is approximately $62,000 with an expected yearly maintenance of $5000. The positive effects on the business process are added security and peace of mind. The positive effects will manifest themselves in very subtle ways as it might be harder to quantify since in this case, “no news is good news”. However, the Check Point 13500 NGFW will provide great logging information to give the IT staff much better visibility as to what attacks are being prevented and the vulnerabilities facing CD. The potential negative effect on the Business Impact Analysis (BIA) is that with any type of change there can be problems. The network administration staff needs to prepare to learn a new product and to put in extra hours as they troubleshoot the inevitable problems that will occur. Network administrators should plan on 8-16 hours of training or product review just to become familiar with the new appliance. Additionally, for the first month or so, they should plan on 5-10 hours a week of work time being put towards the set-up and troubleshooting of the new appliance. Lastly, CD employees should plan on having several hours of down or slow network time due to the new appliance. That is not to say it is going to happen, but it is always better to plan on it occurring than having no plan whatsoever. These are all acceptable negative effects as the potential for loss is too great to risk by not putting the Check Point 13500 NGFW in place.

Policy solution
The recommended policy change is to address the current security policy for AS that states in part, “all firewalls and router rule sets are evaluated every two years…”. The recommended policy solution will be to adopt the Payment Card Industry Data Security Standard (PCI DSS) that addresses firewall rule set review. Specifically, PCI requirement1.1.7 states: * 1.1.7.a Verify that firewall and router configuration standards require review of firewall and router rule sets at least every six months. * 1.1.7.b Examine documentation relating to rule set reviews and interview responsible personnel to verify that the rule sets are reviewed at least every six months. * This review gives the organization an opportunity at least every six months to clean up any unneeded, outdated, or incorrect rules, and ensure that all rule sets allow only authorized services and ports that match the documented business justifications.
(PCI Security Standards Counsel, 2013) The justification for using this standard is that the PCI DSS is a widely used policy and is considered a standard for firewall review. In addition, PCI DSS compliance is required for “all entities involved in payment card processing—including merchants, processors, acquirers, issuers, and service providers, as well as all other entities that store, process or transmit cardholder data (CHD) and/or sensitive authentication data (SAD)”. (PCI Security Standards Counsel, 2013) It is incumbent on AS to determine if they fall under the requirements for PCI DSS compliance. AS’s CD does engage in business transactions with customers and other clients so they very well might be required to be PCI DSS compliant. The BIA for AS to implement this policy will be moderate. The positive impact will be that not only will AS have a greater security policy in relation to firewall rule sets, but they will also be PCI DSS compliant as far as firewall policy is concerned. The negative effects of implementing this policy will be that it could potentially be man power intensive. AS will have to officially adopt PCI DSS requirement 1.1.7 and make it part of their official security controls. After that is completed, AS will have to ensure that network administrators are adhering to this requirement by putting in the hours to review the firewalls and their rule sets. To compound things, this policy does not just apply to the new firewall that is being placed between CD and the Internet, but rather it will apply to all firewalls and routers that AS has in use. This could potential be cumbersome for network administrators to find the time to take on this project. AS will need to determine if they should hire additional network administrators, in particular ones that are familiar with PCI DSS requirements. Lastly, if AS determines that they are an entity involved in payment card processing, then they would need to implement and comply with all PCI DSS rule requirements. Complying with all the requirements could be a massive undertaking and is beyond the scope of this assessment. The trade-off between the increased network security vs. the business requirements of this policy implementation is worth it. The new security policy would be in compliance with a recognized and enforced standard of security and would provide AS and their customers with a tremendous level of confidence. The initial cost of implementation could be high when it comes to work hours involved or even the hiring of new employees to assist with the implementation and maintenance. The trade-off for AS is worth it considering the alternative of potentially suffering a data breach or intrusion and losing customer information or valuable work product.

References
Scarfone K., Hoffman P., (2009) Guidelines on Firewalls and Firewall Policy. Special
Publication 800-41, Revision 1, National Institute of Standards and Technology (NIST), U.S Department of Commerce.
Wilshusen, G., (2013) CYBERSECURITY – A Better Defined and Implemented National
Strategy Is Needed to Address Persistent Challenges. United States Government Accountability Office (GAO).
Hill, K., (2013) The Terrifying Search Engine That Finds Internet-Connect Cameras, Traffic
Lights, Medical Devices, and Power Plants. Forbes/Tech. Retrieved January 18, 2016 from, http://www.forbes.com/sites/kashmirhill/2013/09/04/shodan-terrifying-search-engine/#2715e4857a0b1bb07ae174c0
Requirements and Security Assessment Procedures Version 3.0, Payment Card Industry (PCI)
Data Security Standard by PCI Security Standards Counsel. (2013, November). Retrieved February 19, 2016 from https://www.pcisecuritystandards.org/documents/PCI_DSS_v3.pdf
A Guide to Choosing a Next-Generation Firewall by Sean Wilkins. (2014, December 23). Retrieved February 19, 2016, from http://www.tomsitpro.com/articles/next-generation- firewall-vendors,2-847.html
Check Point 13000 Appliances by Check Point Software Technologies LTD. (2016, February).
Retrieved February 19, 2016 from https://www.checkpoint.com/products/13000-appliances/

Similar Documents

Premium Essay

Security Assessment and Recommendations

...SE571 Principles of Information Security and Privacy James Smikonis Week 3 Project March 18, 2012 Professor George Danilovics Security Assessment and Recommendations A report needs to be assessed for Aircraft Solutions. This report consists of a security assessment that exhibits all founding flaws in their system, as well as giving AS a report regarding their current infrastructure. Aircraft Solutions is a component fabrication and equipment company that delivers different architectural designs. One of their specialties is establishing communications and solutions to defense, commercial, aerospace industries. The employees at AS are fully qualified for the tasks they entail hence making their workforce more efficient and supplying outstanding service. The purpose of this assessment is to investigate the weaknesses that are presented in the operations of Aircraft Solutions (AS). While conducting this assessment, we will expose vulnerabilities; give an analysis of any relative threats, risks that will be addressed and a comprehensive analysis of the relative threats and consequences pertaining to this mission. Assessment and Investigation After carefully examining the three sections pertaining to Aircraft Solutions, we found that policy and hardware related issues require special attention. We found that Aircraft Solutions does not utilize any firewall between the commercial division and the Internet Gateway. In fact, we exhibited that the Department Defense routes...

Words: 907 - Pages: 4

Premium Essay

Aircraft Solutions

...Running head: AIRCRAFT SOLUTIONS AIRCRAFT SOLUTIONS Keller Graduate School of Management SEC 571 Principles of Information Security and Privacy Abstract An assessment of Aircraft Solutions (AS) as to what Security Vulnerabilities that might be found, two areas discussed are Hardware & Policy weakness and impact. Table of Contents Executive Summary 1 Company Overview 1 Security Vulnerabilities 2 Hardware Vulnerability …………………………………………………..…….....2 Policy Vulnerability……………………………………………………………….3 Recommended Solutions 5 Hardware Vulnerability 5 Policy Vulnerability 8 Impact on Business Processes 9 Summary 11 References 12 Executive Summary The purpose of this paper is to explore and assess computer security as it relates to Aircraft Solutions. When we talk about computer security, we mean that we are addressing one or all of the three important aspects of any computer-related system: confidentiality, integrity, and availability. One of the challenges in building a secure system is finding the right balance among the goals, which often conflict. Aircraft Solutions provides full spectrum design and implementation solutions to multiple industries including the electronics, aerospace, commercial, and defense industries. In addition to the background information presented in the course assignment, additional information on geographic layout, business process, and IT architecture were presented. With the information provided, and based on...

Words: 1902 - Pages: 8

Premium Essay

Aircraft Solutions

...Aircraft Solutions (AS)
Security Overview 
Introduction 
Aircraft Solutions is a well respected equipment and component fabrication company who 
provides a full spectrum design and implementation solutions to several industries which
 includes; electronics, aerospace, commercial and the defense sectors. Aircraft Solutions employs 
a range of highly qualified professionals and houses an immense production plant, with an 
overall goal of providing high-quality solutions to accommodate specifications from a wide
range of customer demands. The following report is a security assessment on Aircraft Solutions
and the primary objective in this assessment is to identify the existence of vulnerabilities present 
within the global context of Aircraft Solutions’ operations. An evaluation of the associated 
threats will be deduced, accompanied by the exposed weaknesses. This will be followed by an
analysis of the degree of risk present. Finally, there will be a focus on the consideration of the
 consequences resulting from revealing of potential threats.

 Assessment 
Hardware and policy will be the main focus of this investigation. It will be narrowed down more 
to hardware issues. It is very curious that there is no firewall implemented between the
commercial division and the Internet. The Defense Department must be routed through
Headquarters, but the Commercial department is connected straight to the Internet. This is a
significant vulnerability. The second weakness that will be...

Words: 1151 - Pages: 5

Free Essay

Aircraft Solutions

...Aircraft Solutions Security Assessment Phase 2 Table of Contents Executive Summary ……………………………………………………………………..1 Company Overview ……………………………………………………………………..1 Assessment ……………………………………………………………………………….2 Security Vulnerabilities …………………………………………………………............2 A Hardware Firewall Vulnerability …………………………………………………....2 A Software Policy Vulnerability ………………………………………………………..3 Recommended Solutions ………………………………………………………………..5 A Hardware Firewall Solution …………………………………………………...........5 A Software Policy Solution …………………………………………………………….6 Impact on Business Processes …………………………………………………………6 Budget …………………………………………………………………………………....7 Summary ………………………………………………………………………………....9 References ………………………………………………………………………………10   Aircraft Solutions Executive Summary Aircraft Solutions (AS) desired a security assessment to highlight the company’s vulnerabilities. AS is a highly esteemed leader in the design and component manufacturing enterprise those solutions can be used within the business applicability of the electronics, commercial, defense and aerospace industries. There were discovered hardware and software vulnerability of non-firewall at the commercial division and software policy updates. The solutions that will be presented are to purchase a firewall system and update the policy update timeframe within the standards that will be introduced from...

Words: 2065 - Pages: 9

Premium Essay

Security Weakness for Aircraft Solutions

...Security Weakness for Aircraft Solutions Michelle Harris SE 571 Principles of Information Security and Privacy Keller School of Graduate Course Project – Phase 1 January 22, 2012 Introduction In this report I will provide a security assessment of Aircraft Solutions (AS), a well known and respected equipment and component fabrication company located in Southern California. In the assessment I will identify and evaluate potential weaknesses, possible threats, the likelihood of the threat occurring and the threat if exposed in three key potential areas. AS has a dedicated, trained workforce and maintains a large capacity plant and extensive equipment to meet customer requirements. AS provides full spectrum design and implementation solutions to multiple industries, including the electronics, aerospace, commercial, and defense sectors. Aircraft Solutions employs a range of highly qualified professionals and houses an immense production plant, with an overall goal of providing high-quality solutions to accommodate specifications from a wide range of customer demands. I will primarily focus on the assessment that will identify the existence of vulnerabilities present within the context of AS operations as it pertains to their hardware and software. Lastly, recognition of the consequences resulting from the unfolding of potential threats will be given due attention. Security Weakness In the three areas targeted for potential threats, hardware, software...

Words: 782 - Pages: 4

Premium Essay

Paper3

...Security Weakness for Aircraft Solutions Michelle Harris SE 571 Principles of Information Security and Privacy Keller School of Graduate Course Project – Phase 1 January 22, 2012 Introduction In this report I will provide a security assessment of Aircraft Solutions (AS), a well known and respected equipment and component fabrication company located in Southern California. In the assessment I will identify and evaluate potential weaknesses, possible threats, the likelihood of the threat occurring and the threat if exposed in three key potential areas. AS has a dedicated, trained workforce and maintains a large capacity plant and extensive equipment to meet customer requirements. AS provides full spectrum design and implementation solutions to multiple industries, including the electronics, aerospace, commercial, and defense sectors. Aircraft Solutions employs a range of highly qualified professionals and houses an immense production plant, with an overall goal of providing high-quality solutions to accommodate specifications from a wide range of customer demands. I will primarily focus on the assessment that will identify the existence of vulnerabilities present within the context of AS operations as it pertains to their hardware and software. Lastly, recognition of the consequences resulting from the unfolding of potential threats will be given due attention. Security Weakness In the three areas targeted for potential threats, hardware, software and policy and how AS...

Words: 776 - Pages: 4

Free Essay

Aircraft Solutions

...Aircraft Solutions: Security Assessments And Recommendations Session: March 2012 Security in Computing Professor: Randy Strauber BACKGROUND Aircraft Solutions (AS) located in beautiful southern California has become a recognized leader in the electronics, commercial, defense and aerospace industries. This is due their design and fabrication of component products and services available to their customers in the various industries. What set Aircraft Solutions apart from other design and fabrication companies are their dedicated, trained workforce and the maintenance of a large capacity plant and extensive equipment that enables the company to meet customer requirements. The company is made up of a large highly skilled work force that works its highly automated production systems from design engineers, programmers, machinists and assembly personnel. Aircraft Solutions goals are to provide excellent customer service and success through its machined products and services. This is achieved while at the same time keeping their cost, quality and scheduled deliveries in check. The main headquarters for Aircraft Solutions is currently in San Diego, California, while their Commercial Division is located 40 miles east of headquarters and the Defense Division is located in Santa Ana, California. Security Weakness In reviewing the current business process, geographic layout, current IT architecture and network infrastructure there were some security...

Words: 677 - Pages: 3

Premium Essay

Paper

...Security Assessment and Recommendations – Phase I Submitted to: Farhan Farrukh SE571 Principles of Information Security and Privacy Keller Graduate School of Management Submitted: March 18, 2012   Table of Contents Company Overview 1 Security Vulnerabilities 1 Policy Vulnerability 1 Hardware Vulnerability 2   Company Overview With three sites strategically located for global reach, headquarters in San Diego, California, The Defense Division (DD) in Santa Ana, California, and the Commercial Division (CD) 40 miles east of San Diego County, Aircraft Solutions has developed a dedicated and trained work force focused on providing its customers in the electronic, commercial, defense, and aerospace industry with great design and fabrication of component products and services. The mission of Aircraft Solutions is to provide customer success through machined products and related services, and to meet cost, quality, and schedule requirements. The company’s strategy is to offer low-cost design and computer-aided modeling packages to customers to reduce their development expenses. Two Security Vulnerabilities Policy Vulnerability One of the major threats Aircraft Solution’s systems faces, under its current configuration, is its data vulnerability to unauthorized access. Data is consistently being accessed and modified by people such as employees, customers, suppliers, and contractors through...

Words: 605 - Pages: 3

Free Essay

Business Risk

...| | | Table of Contents | | Page no. | Project Brief | 1 | SECTION 1: IDENTIFICATION AND CLASSIFICATION OF RISKS | 3 | 1.11.1.11.1.21.1.31.1.41.1.51.1.61.21.2.11.2.21.2.31.2.41.2.51.2.61.31.3.11.3.21.3.31.3.41.3.51.41.4.11.4.21.4.31.4.41.4.51.51.5.11.5.21.5.31.5.41.5.51.61.6.11.6.21.71.7.11.7.21.81.8.11.8.21.8.31.8.41.91.9.11.9.21.9.31.9.4 | Political, Legal and Regulatory RiskExclusive rights granted by the government of PrussiaImport bansChange in legal requirementsChange in political situation between Azerland and PrussiaChange in CapitalChange in RegulationsBusiness risk and Operational RiskReduced demand for ticket salesIncreased ticket pricesDelays or cancellations due to technical faultsTotal disregard to airline safetyFlight crew stress and fatigueNegligence of airline to check policy proceduresEnvironmental RiskAccessibility increases tourismGenerous CargoBusiness and infrastructure development in AzerlandNoise and Air PollutionAirport ExpansionReputation Risks * Lack of Public Confidence in Airline Operator – Through Technology Risks * Lack of Public Confidence in Airline Operator – Through Human RisksNegligence of Airline Technical Staff * Unreliable Journey Times * Airport Security and Terrorism * International Risks * Rights Granted by Government of Prussia Revoked * Termination of Lease Agreement of International Airline * Contract with Mosco, Prussia Based Catering Company * Outbreak of War – Force Majeure * Change of LegislationTechnology...

Words: 10067 - Pages: 41

Premium Essay

Project Manager Charter

...2008   Sunshine Coast Airport: Project Charter Project Management: Principles, Processes and Practice   Sunshine Coast Airport Project Charter   Project Management Practice: Assessment 1 Team Name: JETTS Group: Simpson Chang, Thomas Le, Trung Huu Nguyen, Safi Ayoush, Edi Ofori Project Management Practice: Assessment 1 1 Page 1/1/2008 Sunshine Coast Airport: Project Charter Project Management: Principles, Processes and Practice   CONTENTS Document Management .......................................................................... 4   Distribution List  .............................................................................................................................................  4   Version Control   ..............................................................................................................................................  5   Project  Registration  .......................................................................................................................................  6   Executive Summary ................................................................................. 7   1 Rationale  .....................................................................................................................................................  7   2 Business Drivers  .........................................................................................................................

Words: 4279 - Pages: 18

Premium Essay

Aircraft Solutions

...Introduction According to information reviewed as part of this project, Aircraft Solutions is a recognized leader and highly respected equipment and component fabrication company. Aircraft Solutions provides full spectrum design and implementation solutions to multiple industries including the electronics, aerospace, commercial, and defense industries. In addition to the background information presented in the course assignment, additional information on geographic layout, business process, and IT architecture were presented. With the information provided, and based on additional research, the primary objective in this assessment was to identify the possible presence of vulnerabilities within the overall framework of Aircraft Solutions operations. Based on the presence on weaknesses, an evaluation of the associated threats was conducted, followed by an analysis of any risks that may be present and potential outcomes. Overview Three areas of potential security weaknesses in Information Technology (IT) for Aircraft Solutions, or any company are hardware, software, and IT policy. In terms of hardware, the provided Network Architecture Map detailed that Aircraft Solutions lacks a firewall between the Commercial Division and the Internet, while all other branches of the company are protected through a firewall in one manner or another. This is a significant vulnerability to the entire system. For Software, Aircraft Solutions uses a Business Process Management System (BPM) that handles...

Words: 1847 - Pages: 8

Free Essay

Wildlife vs. Aircrafts

...Resolving an inherent dilemma-Wildlife vs. Aircrafts MGMT 408 Abstract The recent times since the birth of aviation industry by the Wright Brothers (2005) has seen a massive change in its structure and functioning. As technology advanced more convoluted are the efforts to carry on this gigantic trade of huge mechanical birds on the sky, which nevertheless have to share the natural domain of the birds. One of the major concerns of the aviation industry is also contributed by the obstacles faced to minimize hazards (2012) of wildlife on the human terrain without harming the natural territory. Through this review, a focus is made on the dilemmas faced and efficacy of remedies taken to mitigate the concerns of wildlife strikes in Airport safety. Introduction The natural population of birds took to air about millions of years ago until, the intelligent and progressive human kind started using its airspace more than 100 years ago. So this great invention which is technically called the “Mechanical Bird” or “Airplane” uses the same airspace as birds making the collisions inevitable. Records show that shortly after Wright Brother’s took to air on 1903 and shortly thereafter the first bird strike was reported on September 7, 1905, when Oliver Wright’s aircraft hit a bird (probably a red-winged blackbird) as he flew over Dayton, Ohio (2005). To one’s surprise birds are not the only threat to an airplane, certain...

Words: 2219 - Pages: 9

Free Essay

Security Assessment and Recommendations for Aircraft Solutions

...Security Assessment and Recommendations for Aircraft Solutions Principles of Information Security and Privacy Keller Submitted: December 11, 2013 Executive Summary The purpose of this report is to investigate the vulnerabilities of Aircraft Solutions (AS) in the areas of hardware and policy. Furthermore, it provides recommended solutions to the security weaknesses mentioned in Phase 1. Aircraft Solutions is a well known leader in the design and production of component products and services for companies ranging from commercial industry to the aerospace industry. In addition, Aircraft Solutions maintains a large capacity plant filled with an extensive variety of equipment, which is mostly automated alongside skilled specialists in a range of fields to ensure they meet their customers’ needs. The weaknesses that are being addressed are hardware and policy. Company Overview Aircraft Solutions is a leader in the planning and production of component products and services for companies in the electronics, commercial, defense, and aerospace industry. The headquarters of Aircraft Solutions is located in San Diego, California. The goal of Aircraft Solutions is to use machined products and related services to supply customer success, and to achieve cost, quality, and schedule requisites. They have a Defense Division (DD) of Aircraft Solutions located in Orange County, California and a Commercial Division (CD) located in San Diego County, California. Aircraft Solutions...

Words: 1560 - Pages: 7

Premium Essay

Airport Security

...of passengers boarding through their gates. Finally this lack of security would trickle down to the entire economy not only in the communities surrounding the airport and aviation industry, but to the nation’s economy as well. To keep this economic failure associated with another terrorist attack from happening, our nation must take the appropriate measures to prevent it.      “Airport security procedures are designed to deter, prevent, and respond to criminal acts that may affect safety and security of the traveling public” Wells and Young (2004, p. 280). In order for this to happen, airports must become more proactive instead of reactive to potential threats such as: hijacking, explosive devices on aircraft or any other possible criminal act that could happen aboard an aircraft. To accomplish President George W....

Words: 2747 - Pages: 11

Free Essay

Environmental Case Study: Sydney Airport

...million domestic travelers arriving and departing on approximately 290,000 flights annually. This makes Sydney Airport a major source of pollution in Australia today. Sydney Airports environmental Strategy was developed in accordance with the current laws and legislations. It provides the system by which long term and daily environmental management can be planned, implemented and reviewed, in a cycle of continuous improvement. Sydney Airports Environmental Strategy comprises the following main components: Environmental Policy · Planning, including Environmental Aspect and Risk Identification and Assessment, Objectives, Targets and Action Plans · Implementation and Operation, including Environmental Responsibilities, Training and Awareness, Communication, Document and Operational Control, and Emergency Preparedness and Response ! · Checking and Corrective Action, including monitoring, assessment and auditing, and ! · Management Review. ! Overview ! ! · · · · · · · · Environmental Management and Stakeholder Relationships Resource Use (Water, Energy and Raw Materials) Air Quality Ground Transport Surface Water Quality Soil and Groundwater Quality Noise Flora and Fauna Sydney Airport has a full range of environmental issues to address in accordance with its day-today operations. These Include: · · · ! ! ! Heritage Dangerous Goods and Hazardous Materials, and Waste. Sydney Airports have established key objective...

Words: 1949 - Pages: 8