AllFreePapers.com - All Free Papers and Essays for All Students
Search

Security Analysis of Aircraft Solution (as)

Autor:   •  March 12, 2013  •  Case Study  •  471 Words (2 Pages)  •  1,485 Views

Page 1 of 2

Company Overview

This report is on Security analysis of Aircraft Solution (AS). Aircraft Solutions is a leader in the industry for equipment and component fabrication for different companies such as commercial defense, and aerospace industry. The company corporate office is in San Diego, California with offices in different cities. The Commercial Division (CD) is 40 miles east of San Diego County. The Defense Division (DD) is in Orange County, in the city of Santa Ana, California. The company strategy is to offer low cost design along with computer modeling packages for development of products and help customers save money. Aircraft Solution hel Aircraft Solution hopes by staying involve throughout the process, they can establish a long term relationship with consumers. The users at Aircraft Solutions are employees, customers, suppliers and contractors who need to access the network. The company has control access in place to protect confidential and proprietary information from unauthorized access. For business process, Aircraft Solutions uses Business Process Management (BPM) to handle end to end process with multiple systems and organizations. BPM handles multiple projects across every department of the company and handles all the operation aspect of the company such as accounting, human resources, sales and marketing, and compliance activities.Security Vulnerabilities

Security weakness at Aircraft Solutions (AS) can put the company at risk of threats and attacks. Vulnerabilities are weaknesses that no organization would like to have on their system. Having system weakness is a mean of inviting unauthorized users to manipulate the data or hack the system, and making attacks and threats to the system easier. After conducting the security analysis at Aircraft Solutions, the team discovered, network infrastructure of AS could put the organization at risk. The risk of Hardware vulnerability such as location of firewall

...

Download as:   txt (3 Kb)   pdf (58.5 Kb)   docx (10.7 Kb)  
Continue for 1 more page »