...SE571 Course Project: Security Assessment and Recommendations SE571 Course Project: Security Assessment and Recommendations Charlie Furze Professor: Eddie Wachter SE571 Principles of Information Security and Privacy Keller Graduate School of Management July 24, 2015 Table of Contents Executive Summary 1 Company Overview 1 Security Vulnerabilities 3 A Hardware Example Title 3 A Software Example Title 4 Recommended Solutions 5 A Hardware Example Solution 6 A Software Example Solution 8 Impact on Business Processes 9 Budget 10 Summary 11 References 12 Executive Summary The executive summary can’t really be completed until the course project is completed. This is because the section should summarize BRIEFLY the entire paper. There should be one or two sentences about the purpose of the report, a one to two-sentence description of the company and then a quick summary of the two vulnerabilities and the two solutions that you have identified. Company Overview Here you should identify which of the two company scenarios you are using and briefly summarize the organizations products or services, and business processes. Two Security Vulnerabilities Software Vulnerability Remember, you need to choose only two vulnerabilities from the three categories: hardware, software and policy. It is recommended that you make them limited in scope and very specific. Also, before starting on this section, be sure you have a very clear...
Words: 1180 - Pages: 5
...SE571 Principles of Information Security and Privacy James Smikonis Week 3 Project March 18, 2012 Professor George Danilovics Security Assessment and Recommendations A report needs to be assessed for Aircraft Solutions. This report consists of a security assessment that exhibits all founding flaws in their system, as well as giving AS a report regarding their current infrastructure. Aircraft Solutions is a component fabrication and equipment company that delivers different architectural designs. One of their specialties is establishing communications and solutions to defense, commercial, aerospace industries. The employees at AS are fully qualified for the tasks they entail hence making their workforce more efficient and supplying outstanding service. The purpose of this assessment is to investigate the weaknesses that are presented in the operations of Aircraft Solutions (AS). While conducting this assessment, we will expose vulnerabilities; give an analysis of any relative threats, risks that will be addressed and a comprehensive analysis of the relative threats and consequences pertaining to this mission. Assessment and Investigation After carefully examining the three sections pertaining to Aircraft Solutions, we found that policy and hardware related issues require special attention. We found that Aircraft Solutions does not utilize any firewall between the commercial division and the Internet Gateway. In fact, we exhibited that the Department Defense routes...
Words: 907 - Pages: 4
...Security Assessment and Recommendations for Aircraft Solutions Principles of Information Security and Privacy Keller Submitted: December 11, 2013 Executive Summary The purpose of this report is to investigate the vulnerabilities of Aircraft Solutions (AS) in the areas of hardware and policy. Furthermore, it provides recommended solutions to the security weaknesses mentioned in Phase 1. Aircraft Solutions is a well known leader in the design and production of component products and services for companies ranging from commercial industry to the aerospace industry. In addition, Aircraft Solutions maintains a large capacity plant filled with an extensive variety of equipment, which is mostly automated alongside skilled specialists in a range of fields to ensure they meet their customers’ needs. The weaknesses that are being addressed are hardware and policy. Company Overview Aircraft Solutions is a leader in the planning and production of component products and services for companies in the electronics, commercial, defense, and aerospace industry. The headquarters of Aircraft Solutions is located in San Diego, California. The goal of Aircraft Solutions is to use machined products and related services to supply customer success, and to achieve cost, quality, and schedule requisites. They have a Defense Division (DD) of Aircraft Solutions located in Orange County, California and a Commercial Division (CD) located in San Diego County, California. Aircraft...
Words: 1560 - Pages: 7
...Security Recommendations To Prevent Social Engineering Attacks A social engineering attack is a non technical attack that attacks the mindset of the victim. An intruder prefers this attack, because the human mindset has more weaknesses than many systems do. There are several implementations that can be used to deter social engineering attacks. The following are list of security recommendations to thwart social engineering attacks that must be used by all company employees: · Do not click on any links in an e-mail instead scan the link with a virus scanner and type the link in the browser instead of clicking on the link. · Do not open any e-mail attachments without first during a virus scan on the e-mail or e-mail attachments can be blocked. · Do not talk about company business in front of anyone that is not a part of the company this includes family or friends. · Do not hold the door open to let anyone in the building instead have them go to the front desk to present their credentials. · Make sure that all paper company documents are burned in an incinerator. · Install mantraps where access cards must be used to enter in secure or employee only areas. · To obtain lost or forgotten passwords the user must come to the help desk with the proper identification and answer 2 security questions and the temporary password must be changed as soon as the account is accessed. · Internal e-mail addresses should only be given to employees with proper identification that can...
Words: 362 - Pages: 2
...Running head: Security Assessment and Recommendations Week 6: Weaknesses Assignment Phase II- Security Assessment and Recommendations SE571 Principles of Information Security and Privacy Introduction Aircraft Solutions (AS) is a renowned equipment and component fabrication company with the capability to provide full range designs and implantation solutions to different sectors such as defense, aerospace, commercial and electronics industries. This paper discusses the possible recommendations based on the security assessment conducted in Phase 1, and proposes possible changes in order to ensure the safety of AS networks. The Company owns an enormous production plan which promises to deliver high quality solutions for targeted at various industries. It is equipped with a team of excellent and highly qualified professionals who cater to various needs of different industries. This paper intends to find possible solutions to bridge the gaps as found in the investigation in Phase 1. The weaknesses that are being addressed are the firewall configuration, virtualization of their hardware assets and defining and revisiting their security policy regarding firewall configuration and updated software at least twice a year. Brief overview of the Vulnerabilities in AS After a thorough investigation of the IT architecture and systems of the Aircraft Solutions, two main concerns were identified as the priority items that needed attention. The first was hardware related concern and was...
Words: 1692 - Pages: 7
...Course Project: Security Assessment Recommendations Vincent Hill DeVry University Keller Graduate School Principles of Information Security and Privacy SE571 Professor Krell April 15, 2012 Course Project: Security Assessment Recommendations INTRODUCTION An organization that specializes in making web site and providing web business solutions is known as Quality web design is. The company’s goal is to help its customers increase consumer generated revenue to Quality Web Design customer web sites. The other business solutions accompanied are accounting, payroll marketing, also parts of the business process and for which it assets are employed. Quality Web Design should be made aware of various security issues, even those that are not common. Identified are two of the potential security weaknesses that require improvement, and the possible remedies for each threat. The company Quality Web Design provides business solutions to the customers... The circuit used by the company may prove various flaws to security and the hardware and software used have various limitations as Microsoft share point which have limitations in supporting virtualization, up gradation whereas the web server provided by IBM provides various functionalities over the Microsoft web server. The company has a very good hardware, software, network system, the assets used by the company provide the support to the business process but there are many limitations of the hardware, software, assets and...
Words: 1453 - Pages: 6
...RECOMMENDATIONS FOR WIRELESS NETWORK SECURITY POLICY Introduction One of the newer technologies being increasingly used in today's business is that of wireless networks. While this technology has the advantages of providing greater user mobility and temporary access, it does have the disadvantage of an intrinsic lack of security. SECURITY THREATS There are a number of types of attack that wireless LANs are vulnerable to, based on different aspects of their operation and configuration. These include. i. Broadcast medium Wireless is a broadcast medium, where there is no way to control where the information is sent and who therefore has access to it. If an access point is set up and used in its default Configuration, then the user of such a system is vulnerable to attack, because anyone running sniffer software can see and capture everything that a user does across that network... ii. WEP Vulnerabilities. There were two problems with the original WEP encryption system. Firstly, the shared key system requires the use of the WEP key to verify a user attempting to connect to the wireless network. The second was the actual implementation of the encryption system itself. iii. Denial of Service This type of attack can be perpetrated by a jamming attack which can be either intentional attack which is one in which the attacker broadcasts a very high-power signal at the same frequency that the wireless network is operating on, causing interference to the network...
Words: 906 - Pages: 4
...Computing Benefits, risks and recommendations for information security Rev.B – December 2012 2 Cloud Computing Benefits, risks and recommendations for information security Document History Date December 2009 Version 1.0 Modification Initial Release, Rev.A Author Daniele Catteddu, Giles Hogben Thomas Haeberlen Lionel Dupré December 2012 2.0 Rev.B About ENISA The European Network and Information Security Agency (ENISA) is a centre of network and information security expertise for the EU, its member states, the private sector and Europe’s citizens. ENISA works with these groups to develop advice and recommendations on good practice in information security. It assists EU member states in implementing relevant EU legislation and works to improve the resilience of Europe’s critical information infrastructure and networks. ENISA seeks to enhance existing expertise in EU member states by supporting the development of cross-border communities committed to improving network and information security throughout the EU. More information about ENISA and its work can be found at www.enisa.europa.eu. Contact details This report has been edited by: Lionel Dupré, Thomas Haeberlen For contacting ENISA or for general enquiries about this report, please use the following details: Email: resilience@enisa.europa.eu Internet: http://www.enisa.europa.eu Cloud Computing 3 Benefits, risks and recommendations for information security Legal notice Notice must...
Words: 12166 - Pages: 49
...If exploited, these vulnerabilities could result in: • Unauthorized disclosure of data • Unauthorized modification to the system, its data, or both • Denial of service, access to data, or both to authorized users This Risk Assessment Report evaluates the confidentiality (protection from unauthorized disclosure of system and data information), integrity (protection from improper modification of information), and availability (loss of system access) of the system. Recommended security safeguards will allow management to make decisions about security-related initiatives. PROJECT RISKS This risk assessment methodology and approach was conducted using the guidelines in NIST SP 800-30, Risk Management Guide for Information Technology Systems. The assessment is broad in scope and evaluates security vulnerabilities affecting confidentiality, integrity, and availability. The assessment recommends appropriate security safeguards, permitting management to make knowledge-based decisions about security-related initiatives. The methodology addresses the following types of controls: • Management Controls: Management of the...
Words: 1565 - Pages: 7
...significant competition from competitors such as Yahoo, Microsoft, WebMD, Kayak, Monster.com, Amazon.com, and others. Google was subject to increased regulatory scrutiny that had a negative impact on the company. Google faced internet security issues and security breaches. Google was facing some important issues and concerns that could affect not only its future growth but its very survival. In order to ensure their survival the corporation needs to implement better planning procedures, establish plans for diversification, and train the undereducated employees, to increase work quality. Relevant Factual Information about the Problem or Decision the Organization Faced Google currently faces several challenges that range from things such as legal action, international risk, internet security issues, revenue and growth sustainability, and recovering from losses. As Google continues to grow and continued purchasing other companies such as its acquisitions of YouTube, DoubleClick, and Postinie. It may not lead to more revenue and acquisitions may become difficult in the future. As the company continues to grow management will be challenged to find new and innovative ways to maintain a strong corporate future. Recommendations The first recommendation would be for Google to continuously improve...
Words: 408 - Pages: 2
... | | Table of Contents 1 INTRODUCTION 1 2 IT SYSTEM CHARACTERIZATION 2 3 RISK IDENTIFICATION 6 4 CONTROL ANALYSIS 8 5 RISK LIKELIHOOD DETERMINATION 11 6 IMPACT ANALYSIS 13 7 RISK DETERMINATION 15 8 RECOMMENDATIONS 17 9 RESULTS DOCUMENTATION 18 LIST OF EXHIBITS Exhibit 1: Risk Assessment Matrix 18 List of Figures Figure 1 – IT System Boundary Diagram 4 Figure 2 – Information Flow Diagram 5 List of Tables Table A: Risk Classifications 1 Table B: IT System Inventory and Definition 2 Table C: Threats Identified 4 Table D: Vulnerabilities, Threats, and Risks 5 Table E: Security Controls 6 Table F: Risks-Controls-Factors Correlation 8 Table G: Risk Likelihood Definitions 9 Table H: Risk Likelihood Ratings 9 Table I: Risk Impact Rating Definitions 13 Table J: Risk Impact Analysis 13 Table K: Overall Risk Rating Matrix 15 Table L: Overall Risk Ratings Table 15 Table M: Recommendations 17 1 INTRODUCTION Risk assessment participants:...
Words: 1518 - Pages: 7
...Current Situation The store was developed for the sole purpose of communicating with customers electronically, as it related to the fuel and lubricants department of Shell Canada. With the main intention and focus for agricultural customers to utilize technology to attain their products with more “ease”. From a business perspective eStore’s goal was to reduce cost and provide a similar services that provided by customer agents. Unfortunately, after a year of implementation of the eStore, the company was faced with high customer response in applying to use eStore but low overall customer utilization. In addition to this the company faces technical issues , where considerations must be made for both utilization & technical issues to determine what must be done to improve the current status of the online store. Evaluation of eStore Basis for Development The development was based on customer habits and e-commerce is viewed as a method utilized when minimal but effective interaction is required. Thus based on the prominent customer group of Shell Canada, the idea of the eStore was developed. These groups being: • Transactors: highly price sensitive with no consultation which accounted for 95% of the customer base • Progressives : price insensitive with required price consultation These transactors significantly influenced the development of the eStore, as it required minimal consultation. Accomplishments of the eStore ...
Words: 1749 - Pages: 7
...analyze materials for data dictionaries. • Change Metadata, Worksheets, for Data Element name changes, Source name changes and updated definitions. • Correct metadata for various tables. • Approve new/modified data element names prior to physical implementation. • Update Data Element Metadata Collection • Verify definitions in Business Objects PROD (Production) to match any corrections made in dictionaries. • Maintain Metadata for operational and data warehouse • Verify correct changes were made to all worksheets and metadata. Assistant Facility Security Officer/Finanical Management Analyst; March 2009 to February 2014 • Implementing of security regulations, policies and procedures in coordination with NIPSPOM. • Conduct annual Security briefings for company personnel • Support and process Personal Security Questionaries (i.e. EQIP/SF-86/SF-85P) • Maintain oversight and management of employee Security Clearances. • Perform review of...
Words: 945 - Pages: 4
...Company Findings and Analysis III. Summary and Conclusions – Findings Communicated to the President and Recommendations IV. Work Cited – References to support Recommendations Introduction: The purpose of this document is to discuss the internal controls and why the principle activities are important for a business to operate effectively. Our goal is to make the necessary recommendations and evaluate the system for future planning. We hope to uncover any issues that will prevent the company’s productivity. We’ll submit our recommendations to correct and improve the current system in place. In conclusion we’ll present our analysis to the President along with the recommendations needed to implement a better system of internal control. Issues: There’s an issue with too much responsibility placed on one employee. The accountant serving as the controller and treasurer creates a problem with documentation as you don’t have anyone to verify cash and revenue is accounted for correctly. It’s too easy for one employee to manipulate the books in his favor without a clear segregation of duties. The accountant is leaving checks in his office during the week exposing sensitive information and increasing the risk of theft in the office without securing the checks prior to leaving for the weekend. Access to petty cash is not regulated effectively due to lack of security and poor documentation. There’s a lack of human resource presence in order to complete a competent interview process...
Words: 615 - Pages: 3
...In 1988 the Securities and Exchange Board of India (SEBI) was established by the Government of India through an executive resolution, and was subsequently upgraded as a fully autonomous body (a statutory Board) in the year 1992 with the passing of the Securities and Exchange Board of India Act (SEBI Act) on 30th January 1992. In place of Government Control, a statutory and autonomous regulatory board with defined responsibilities, to cover both development & regulation of the market, and independent powers have been set up. Paradoxically this is a positive outcome of the Securities Scam of 1990-91. The basic objectives of the Board were identified as: * to protect the interests of investors in securities; * to promote the development of Securities Market; * to regulate the securities market and * for matters connected therewith or incidental thereto. Since its inception SEBI has been working targetting the securities and is attending to the fulfillment of its objectives with commendable zeal and dexterity. The improvements in the securities markets like capitalization requirements, margining, establishment of clearing corporations etc. reduced the risk of credit and also reduced the market. SEBI has introduced the comprehensive regulatory measures, prescribed registration norms, the eligibility criteria, the code of obligations and the code of conduct for different intermediaries like, bankers to issue, merchant bankers, brokers and sub-brokers,...
Words: 2239 - Pages: 9