Security Assessment - Aircraft Solutions

1355 words 6 pages
Course Project:
Security Assessment and Recommendations – Phase I & II
Aircraft Solutions

Table of Contents

Executive Summary……………………………………………………..1

Company Overview……………………………………………………..1

Hardware Vulnerability………………………………………………...2

Policy Vulnerability……………………………………………………..3

Hardware Solution………………………………………………………4

Policy Solution…………………………………………………………...5

Summary…………………………………………………………………6

Executive Summary

The purpose of this paper is to explore and assess computer security as it relates to Aircraft Solutions. Aircraft Solutions provides products and services to a range of companies that require highly specialized skills. Information is accessed by internal and external users via their Business
…show more content…
iii. Provides a baseline from which to acquire, configure and audit computer systems and networks for compliance with the policy.” (Common Network, 2010)

Hardware Solution In efforts to remedy the hardware vulnerability of insufficient firewall protection, it is suggested that Aircraft solutions purchase the Cisco ASA 5500 to serve as the filter between the internet, the main router and the Chula Vista location. This product’s “ high performance application-inspection capabilities automate the network to treat traffic according to detailed policies based not only on port, state, and addressing information, but also on application information buried deep within the packet header”. Additionally, it “detects and filters protocols with industry leading performance”( The Cisco ASA 5500 as a Superior Firewall Solution, 1992-2006). The diagram below provides a sample network configuration utilizing this product. Source: The Cisco ASA 5500 as a Superior Firewall Solution (1992-2006)
The expense versus benefit trade off is highly in favor of the purchase of this product as this protection is virtually priceless and could mean the difference between continued operations and business failure. There would be no training costs involved as it would be installed by IT. The impact on business processes would be minimal as the firewall could be installed during off-peak hours.

Policy Solution As a measure to resolve the policy

Related

  • Healthcare It Security and Cloud Computing
    2587 words | 11 pages
  • Modern Audit Ch10 Solution
    6789 words | 28 pages
  • Physical Security
    2127 words | 9 pages
  • Organizational Security Plan
    1911 words | 8 pages
  • National Security Outline
    40730 words | 163 pages
  • Assessment
    2588 words | 11 pages
  • The Byod Security Risk
    1173 words | 5 pages
  • Role of Security Department in an Organisation
    2090 words | 9 pages
  • Solution
    1587 words | 7 pages
  • An Assessment of Southwest Airlines
    1376 words | 6 pages