AIRCRAFT SOLUTIONS Sumanth Bobba D03558118 SE571 TABLE OF CONTENTS 1. Introduction 3 2. Company Overview 3 3. Security Weakness 3 a. Hardware Vulnerabilities 3 b. Software Vulnerabilities 5 4. Recommended Solutions 7 a. Hardware 7 i. Impact on business 8 b. Software 9 i. Impact on business 10 5. Summary 10 6. References 11 Introduction This report is prepared to assist the aircraft solutions (AS), a well-known company for equipment and component fabrication in Southern California, in identifying the most important security vulnerabilities. This report also discusses possible threats, the likelihood of the threats occurring …show more content…
This might lead in the break through into the main server. If the main server is being tampered, it leads to breakage in the clients’ server. The clients cannot access AS network and causes the work to a standstill. The possibility of this occurring is low but the consequences of it are severe. Another problem with the present AS software configuration is that they do not have their data replicated. They do have a backup but having their data replicated at the onsite plant is more important. If they lose their data, to decrypt their data from the backup might take them days or even weeks. This makes them to hold on to their advancements till they get the data back and thereby making the work standstill at the clients place. To avoid this, AS must be using PLEX, an invisible hard drive in the main server which holds the database of the company. Recovering data from this is done in minutes and the main advantage of this is that no one can authorize the plex except the administrator. Finally, adoption of a third party software vendor delays the time in authorizing your software solutions. The emergency tasks cannot be finished on time if the vendor delays the software registration and verification. This threat is low in occurrence and the consequences of it are with medium severity. To avoid such kind of threats, it’s better that AS develop their own software
The purpose of the report is to assist Aircraft Solutions (AS) in indentifying the most significant Information Technology (IT) security vulnerabilities. AS products and services are at the forefront of the industry and the protection of such is very important as they are an industry leader. The vulnerabilities that will be discussed are the firewall configuration, virtualization of their
Weaknesses are a symptom that is prevalent in today’s information technology realm, indicating vulnerabilities and risks that come hand and hand with shared networks like Aircraft Solutions. With enterprises exchanging an unprecedented level of information over open networks, the vulnerabilities and possibility of compromised security by unwanted intruders is swelling up into a new type of beast.
Physical security can be very complex, as the evolution of technology changes on a daily basis. The dual role concept is a dilemma that poses a constant struggle within the agency. The ability to maintain consistency with technological advancements utilizing physical security practices of the past is a significant challenge that FPS faces. Another area of concern is the complexity of security and the deficiency of training. Advancements in technology necessitate training advancements. From the initial understanding of basic alarm theory covering the simplistic concept and design of an intrusion detection system (IDS), to a system that is virtually state of the art in capability and technical
is the air resistance on any given object that is moving in the presence of air. In the
This project is to help the Aircraft Solutions (AS), Aircraft Solution Company for equipment and component fabrication in Southern California, in identifying the most important security vulnerabilities. This project also describes about the possible threat for the company security, Hardware and Software systems.
A firewall should be installed in the Chula Vista location. Cisco ASA 5500 Series Adaptive Security Appliances offer state-of-the-art security that is still flexible enough to meet your company's needs as it grows and changes. Cisco ASA 5500 Series Adaptive Security Appliances support:
The purpose of this paper is to explore and assess computer security as it relates to Aircraft Solutions. Aircraft Solutions provides products and services to a range of companies that require highly specialized skills. Information is accessed by internal and external users via their Business
This is an open exposure due to the uncertainties of the internet. Controlling access to information systems and associated networks is necessary for the preservation of their confidentiality, integrity, and availability. Confidentiality assures that the information is not disclosed to unauthorized persons or processes. Any automated attacks or personal attack or attack to exploit the company secrets/statistics/data is the biggest threat to that may occur without the firewall.
On 1 May 1960, a ‘dragon lady,’ or a Lockheed U2 spy plane, operating at over 70,000 feet, disappeared while conducting espionage and reconnaissance missions over the Soviet Union. President Eisenhower released a public statement that a weather aircraft had crashed due to mechanical failure, and contrary to CIA guarantees that Russia would find no proof; Khrushchev produced a live pilot and virtually intact wreckage of the aircraft, publicly embarrassing the United States and Eisenhower (History.com, 2009). These events proceeded to derail the Paris Summit, a meeting of the four most influential world leaders. As stated by Kent & Steury (1994), Presidents Eisenhower and De Gaulle, Chairman Khrushchev, and Prime Minister Macmillan “were to come face to face and take up the major problems which troubled the relations between their states,” (para. 1). This was not the last incident involving the U2 Spy plane, The United States and the Soviet Union would again spar, but this time with the
To better understand the mechanics of the communications system, it is important to highlight how the physical, network, communications, and administrative security components mitigate risks that hinder the system. The key to physical security is to prevent potential breaches to facilities where communications systems are located. This includes policies and measures to protect the physical facilities where the “communications center, remote tower sites, maintenance facilities, as well as the communications equipment itself” are stored (p.
Gene Kranz once stated, “Failure is not an option.” Kranz is a retired NASA flight director. He stated those words after a disaster occurred during Apollo 13’s mission to the Moon. I’ve always been interested in space travel. It has been one thing I have dreamed of ever since I was a young child.
There were also some unknown variables that needed to be taken into account. Development and per-copy costs were the costs that the board wanted to minimize. The forecast assumes that development costs would be $8 billion. There was great uncertainty surrounding the manufacturing cost of the 7E7. The element that adds the most uncertainty to the manufacturing costs are in the engineering of the aircraft. While the engineering costs could be high, Boeing was hoping that the lower construction costs of using the composite materials would compensate for the elevated engineering costs.
Airbus operates in this industry by building airplanes with seating capacities ranging from 100 to 350 seats. Over the past few years, Airbus has been extremely successful developing airplanes in this size range, increasing its industry market share to approximately 33%. However, quantifying Airbus ' past financial success is difficult because prior to its 1999 1.6 billion euro IPO, Airbus was a private partnership. As a result, very little past financial information is available.
As the world’s largest aerospace company and leading manufacturer of commercial jetliners and defense, space and security system, Boeing puts a lot of efforts and innovations in its products and services. These include commercial and military aircraft, satellites, weapons, electronic information and communication systems, and performance-based logistics and training.
New Large Aircraft (NLA) or New Generation Large Aircraft (NGLA) are the future of long distance air travel. With current air craft size reaching unknown proportions to humankind, airports that are interested in attracting future business as well as the revenue the large amount of passengers per flight may generate, will have to adapt their installations to the demanding needs of these supersized vehicles. The following paper will focus on the new Airbus A380 and the requirements that airports inviting this magnificent work of engineering to use their installations will need to meet.