Security Weaknesses Essay

808 words - 4 pages

COURSE PROJECT- PRINCIPLES OF INFORMATION SEC AND PRIVACY
AIRCRAFT SOLUTIONS
PHASE- I

Pinnah Michael

Introduction
Aircraft Solutions (AS), whose headquarters is in San Diego, California deals with the design and fabrication of component products and services for companies in the electronics, commercial, defense, and aerospace industry. Since the company’s strategy is to offer low-cost design and computer-aided modeling packages to customers to reduce their development expenses, most of the equipment is automated to increase production while reducing cost. The mission of Aircraft Solutions Company is to provide customer success through machined ...view middle of the document...

Policy Vulnerability
Among other policies for Aircraft Solutions, the policy for its security directive stating rule that-sets for routers and firewalls be evaluated at intervals of two years is one of the areas that is prone to some vulnerabilities. Two years is a somewhat a long period of time for company to conduct such kind of evaluation, it’s enough time for a lot of changes to happen given that the Company deals with different vendors and customers. In this era of technology where everything changes constantly; it needs a much more frequent evaluation timeline than two years. There are many vendors who specialize in constant rule-set monitoring, like RedSeal.net, which prevent the exploitation of vulnerabilities caused by outdated security configurations. The existence of such out-dated policies; could give a room to the rise of threats that will come along with the consequences that would affect the company’s operations and alter its security system. The consequences of these potential vulnerabilities being exploited could be numerous and severe, or they could amount to a disgruntled ex-employee causing harm through un-expired access rights. In the worst case scenario, an intelligent IT employee alerts a group of malicious persons of the weakness, and then the opportune time is waited for, when the most damage to the company, and/or benefit to the hacker might be caused. This could amount to forced resignations, lost contracts, lawsuits, lost monetary assets, public image, and a shrunken client base, in short, disaster.
Software Vulnerability
The...

Other Papers Like Security Weaknesses

Computer Forensics and Cyber Crime Essay

701 words - 3 pages therefore resulting to a more complete appraisal of current conditions. A security survey/audit should be carried out regularly so as keep improving to and up to date especially with the growing rate of technology. Overall objectives of a security survey are: determination of current states of security, location various weaknesses in the security defenses, determination of level of protection required and finally give recommendations for the

Information Security Evaluation Essay

633 words - 3 pages administrators who are flooded with the security threats that are revealed day by day and not known where to begin. Some software defenselessness is because most effective strikes on computer systems because attackers are opportunistic, and take the simplest path by utilizing the most weaknesses in the systems with extensively accessible attack tools. Hackers rely on individuals and organizations not correcting the faults and frequently

Essay.Designing.A.Security.Strategy

874 words - 4 pages goal of network security is to protect confidentiality, maintain an integrity and ensure availability with this mind it is important to protect all systems asset from threat and vulnerabilities for the company to achieve its full perspective (Loveland, 2009). Usually, these vulnerabilities arise from following Misconfigured hardware or software, Inherent technology weaknesses, Intentional end-user acts and Poor network design (Loveland, 2009

Network Security

1846 words - 8 pages fail. A good Network security frequently checks in on itself and updates itself, or in other words learns. Static systems have their weaknesses and experienced thieves capitalize on them. The best system has got to be adaptive just like any other entity to survive in a cutthroat world. Myth No three according to Noonan is that once you have installed a state of the art, adaptable and ever changing Network security system you are safe. In fact it is

A Security Risk Management Approach for E Commerce.Pdf

2235 words - 9 pages shortcomings can be used to improve an organisation and show its weaknesses, but also, to show possibilities for attack. Baseline security approach The aim of risk analysis is to eliminate or reduce risks and vulnerabilities that affect the overall operation of organisational computer systems. Risk analysis not only looks at hardware and software, but also covers other areas such as physical security, human security, and business and

The Importance of Measuring Enterprise Impact

561 words - 3 pages .  In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, challenge or enjoyment.  There are master minded hacker criminals in the technology world that are able to breach any kind of security and take over your computer. Computer systems can be affected by viruses, and other types of malicious

It456 Db2

744 words - 3 pages from inside the organization. An employee that has been terminated or is disgruntled can be a grave threat to the compromised system as they have a good working knowledge of the system and the weaknesses that are exploitable. The compromised security infrastructure is vulnerable to many threats that under specific circumstances can potentially lead to loss or damage to the infrastructure and/or the data, transfer of sensitive demographic

Security Assessment for Aircraft Solutions

2494 words - 10 pages 5 Recommended Solutions 6 A Hardware Solution 6 Impact on Business Processes 9 A Policy Solution 9 Impact on Business Processes 10 Summary 10 References 12 Executive Summary This report will seek to evaluate and address security weaknesses with the Aircraft Solutions company. As security weaknesses are pointed out relating to hardware and policy weaknesses, recommendations will

Security Recommendations To Prevent Social Engineering Attacks

362 words - 2 pages Security Recommendations To Prevent Social Engineering Attacks A social engineering attack is a non technical attack that attacks the mindset of the victim. An intruder prefers this attack, because the human mindset has more weaknesses than many systems do. There are several implementations that can be used to deter social engineering attacks. The following are list of security recommendations to thwart social engineering attacks that

Operating Systems on the Internet

1793 words - 8 pages excellent print-and-file server, enterprise wide directory services and strong utilities from hundreds of companies. NetWare’s weaknesses are Lags as an application server, grades (1 = Poor; 5 = Excellent): print-and-file services 5, application and database services 3, directory services 5, reliability, availability and security 4, performance 4, remote services 3 and systems management 4. Banyan's Vines Users still love Vines

E Governance

564 words - 3 pages investment and achieve significant business improvement. Security AssessmentAs part of the Infrastructure Assessment Framework, Quadra also offers you a unique, customized Risk Assessment, based on the Microsoft Security Assessment Toolkit, designed to provide information and recommendations about best practices for security within an information technology (IT) infrastructure. This helps you to assess weaknesses in your current IT security environments, and also to identify processes, resources, and technologies that are designed to promote good security planning and risk mitigation practices within your organization.

Related Essays

Weaknesses Assignment Phase Ii Security Assessment And Recommendations

1723 words - 7 pages Running head: Security Assessment and Recommendations Week 6: Weaknesses Assignment Phase II- Security Assessment and Recommendations SE571 Principles of Information Security and Privacy Introduction Aircraft Solutions (AS) is a renowned equipment and component fabrication company with the capability to provide full range designs and implantation solutions to different sectors such as defense, aerospace, commercial and electronics

Week 5 It205 Essay

979 words - 4 pages Check Point: Sony Online Entertainment 1. List and describe the security and control weaknesses at Sony that are discussed in this case. The case discusses the main security and control weaknesses at Sony which allowed a breach of their network. Sony, during the moment of the breach, did not make sure security and the control a top priority. Some of the security weaknesses noted in the case study includes the fact that Sony was using an

Security Management Case Study #1

819 words - 4 pages initial policies and procedures that the custom-tailored security plan of the company is created. Prevention, Control and Recovery – Surveying Security Once the baseline has been established, effort must be made to scrutinize weaknesses in the policies by establishing a security survey. In Appendix A of Broder’s Risk Analysis and the Security Survey, The following security surveys should be used each time to generate a survey report when

Cap Study Guide Essay

5295 words - 22 pages organization); (ii) ensuring that required assessments of common controls are carried out by qualified assessors with an appropriate level of independence defined by the organization; (iii) documenting assessment findings in a security assessment report; and (iv) producing a plan of action and milestones for all controls having weaknesses or deficiencies. Security plans, security assessment reports, and plans of action and milestones for common controls