ipl-logo

Aircraft Solutions Case Study

1023 Words5 Pages

Potential Weaknesses from the Aircraft Solutions (Phase I) Monowar Hossain Submitted to: Professor Hassan Marzouk SE571: Principles of Information Security and Privacy Keller Graduate School of Management Submitted: September 18, 2017 Table of Contents • Executive Summary of Security Assessment (Phase I) 3 • Company Overview 3 • Two Security Vulnerabilities 4 o Hardware Vulnerability 4 o Policy Weakness 5 • References 6 Executive Summary of Security Assessment (Phase I) This report distinguishes the potential security weaknesses of the picked organization. As indicated by the data gave, there are potential vulnerabilities in equipment and …show more content…

The mission of AS is to provide customer success through machined products and related services, and to meet cost, quality, and schedule requirements. AS has a large and skilled workforce of design engineers, programmers, machinist, assembly personnel. The company is located in Southern California. The headquarters is in San Diego, California. AS has a commercial Division (CD) is 40 miles east in San Diego County. The Defense Division (DD) is located in Orange County in the city of Santa Ana, California. AS uses Business Process Management (BPM) to handle end-to-end processes that span multiple systems and organizations. The BPM system is designed to connect customers, vendors, and suppliers to share information and maintain a timely business dialogue. Business process effectiveness …show more content…

This security policy is a weakness because today technologies are changing every few week and with that new security threats are knocking the doors every day. Evaluating all firewalls and router rules sets every two years does not provide the realistic and attainable security goals. The company changes business processes and policies according to new market trends, government rules and regulations, and other competitive related reasons. The same way with new threats and new technological upgrades, all firewalls and router rules sets should be evaluated from time to time as necessary (InstantSecurityPolicy.com). It is impossible to prevent security breaches and cyber-attacks with the same rules sets for two years. Outdated firewall and router rules sets are same as not having a firewall. Hackers and intruders are getting smarter with the current rate of technological change. They always look for a chance to gain access to a weak system or network and abuse the sensitive

Open Document