Aircraft Solutions
Principles of Information Security & Privacy
SEC-571
Professor-Ayman Talib
Week3-Assignment
Prepared By
Premkumaar Arumugam
Introduction:
This project is to help the Aircraft Solutions (AS), Aircraft Solution Company for equipment and component fabrication in Southern California, in identifying the most important security vulnerabilities. This project also describes about the possible threat for the company security, Hardware and Software systems. This project identifies a two possible issues that can happen during the system operations like hacking or data loss due to improper security provided to the company branches and there is no proper infrastructure of the firewall for the network structure. The aircraft security policy result in failure due to their two year reset program.
Company Overview:
Aircraft Solution is a leading company in the design and fabrication of component products and services for companies in the electronics, commercial, defense, and aerospace industry. The company is automated to increase production while reducing costs. The main goal of the Aircraft Solution is to provide users the product by low cost and the quality product. The users of the company are employees, customers, suppliers, and contractors are permitted access the company network.
Business Process Management (BPM) to handle end-to-end processes and control all suppliers, vendors and customers in the
The purpose of the report is to assist Aircraft Solutions (AS) in indentifying the most significant Information Technology (IT) security vulnerabilities. AS products and services are at the forefront of the industry and the protection of such is very important as they are an industry leader. The vulnerabilities that will be discussed are the firewall configuration, virtualization of their
Weaknesses are a symptom that is prevalent in today’s information technology realm, indicating vulnerabilities and risks that come hand and hand with shared networks like Aircraft Solutions. With enterprises exchanging an unprecedented level of information over open networks, the vulnerabilities and possibility of compromised security by unwanted intruders is swelling up into a new type of beast.
Aircraft Solutions (AS) is a recognized leader in the design and fabrication of component products and services for companies in the electronics, commercial, defense, and aerospace industry. Located in Southern California, AS has a dedicated, trained workforce and maintains a large capacity plant and extensive equipment to meet customer requirements. Much of the equipment is automated to increase production while reducing costs. The company's workforce has a large skill base: design engineers, programmers, machinists, and assembly personnel to work its highly-automated production systems.
This report is prepared to assist the aircraft solutions (AS), a well-known company for equipment and component fabrication in Southern California, in identifying the most important security vulnerabilities. This report also discusses possible threats, the likelihood of the threats occurring
The trusted computing base (TCB) internal network in the Global Finance, Inc. Network Diagram hosts the company’s mission critical systems without which the company’s operations and financial situation would suffer. The Oracle database and email systems are among the most intensively used application servers in the company. As we know, GFI cannot afford system outages because its cash flow and financial systems heavily depend on the network stability. GFI has experienced DOS network attacks twice this year and its Oracle database and email servers had been down for a week. The recovery process required GFI to use $25,000 to restore its operations back to normal. GFI estimated the loss from these network attacks at more than $100,000 including lost customer confidence.
The purpose of this paper is to explore and assess computer security as it relates to Aircraft Solutions. Aircraft Solutions provides products and services to a range of companies that require highly specialized skills. Information is accessed by internal and external users via their Business
Aircraft Solutions is aircraft Design Company that allows internal and external users to access its system. As a result of this, the company has made itself vulnerability to certain threats.
Lab #1 – Part A – List of Risks, Threats, and Vulnerabilities Commonly Found in an IT Infrastructure
An assessment of Aircraft Solutions (AS) as to what Security Vulnerabilities that might be found, two areas discussed are Hardware & Policy weakness and impact.
Aircraft Solutions designs and fabricates component products and services for companies in the electronics, commercial, defense, and aerospace industry. The purpose of Aircraft Solutions is to provide customer success through machined products and related services. most of its equipment is automated to increase production while reducing costs. The company 's workforce has a large skill base: design engineers, programmers, machinists, and assembly personnel to work its highly-automated production systems with great skills.
BPM- used to manage the evolution of existing business processes from one version to an improved version. Business process management is a technique used to create new business processes and to manage changes to existing processes (Kroenke & Boyle, 2015, p. 460)
Boeing’s management plan shows determination to improve through creation of new more members of their airplane family (commercial airplanes). This would also be achieved through integration of military platforms, systems for defense and the war fighter by use of network-centric activities. Boeing plan is also inclusive of creation of improved technology to solve problems across all business units. Boeing plans to e-enable airplanes where automation is the key to this development. Finally, Boeing is determined to arrange for financing solutions to its customers. Through this it will be able to attract more potential customers. Moreover, it can also be able to establish a better relationship with its customers through provision of incentives and sales promotion.
Aircraft maintenance is very important for aviation industry and Aircraft are required to be maintained after a period of calendar time or flight hours or flight cycles. Aircraft maintenance is the inspection, repair, overhaul, modification of aircraft or aircraft component. Aircraft maintenance generally includes such tasks those tasks required to restore or maintain an aircraft’s systems, components, and structures with Airworthiness Directives or Service Bulletins and this is highly regulated, in order to ensure safe and correct functioning during flight. Aircraft maintenance requirements vary for different size and types of aircraft, experience which most aircraft need various type of preventive maintenance every 25 hours or less of flying time, and minor maintenance at least every 100 hours. Maintenance is influenced by some kind of operation, climatic conditions, storage facilities, age, and construction of the airplane. The profession of Aircraft maintenance requires extreme knowledge and adept expertise in performing the ingrained tasks. The aircraft maintenance engineer who is on duty he has a great responsibility to work professionally to ensure the safety of aircraft, customers and maintain the reputation of the team or company. The aircraft maintenance engineer normally works in an aircraft hangar and line maintenance and The aircraft maintenance engineer will undertake a number of processes including They may specialize by working on particular aeronautical
Due to customers’ needs and requests, Boeing has expanded its product line and services. The long tradition of aerospace leadership and innovation has given the company the advantages. Its broad range of capabilities includes creating new and more efficient commercial airplane, integrating military platforms and defense systems through
In the Workstation Domain security controls are one of the biggest challenges. Physical security threats are concerns associated more with attackers who gain physical access to the premises. The attackers can cause physical destruction of equipment or sabotage the equipment. The attacker can sabotage the system if the attacker has sufficient knowledge of the system, such as a former employee, and gains access to the system and then renders the system unusable, or deletes and changes information.