Security Assessment - Aircraft Solutions
Security Assessment and Recommendations – Phase I & II
Aircraft Solutions
Table of Contents
Executive Summary……………………………………………………..1
Company Overview……………………………………………………..1
Hardware Vulnerability………………………………………………...2
Policy Vulnerability……………………………………………………..3
Hardware Solution………………………………………………………4
Policy Solution…………………………………………………………...5
Summary…………………………………………………………………6
Executive Summary
The purpose of this paper is to explore and assess computer security as it relates to Aircraft Solutions. Aircraft Solutions provides products and services to a range of companies that require highly specialized skills. Information is accessed by internal and external users via their Business …show more content…
iii. Provides a baseline from which to acquire, configure and audit computer systems and networks for compliance with the policy.” (Common Network, 2010)
Hardware Solution In efforts to remedy the hardware vulnerability of insufficient firewall protection, it is suggested that Aircraft solutions purchase the Cisco ASA 5500 to serve as the filter between the internet, the main router and the Chula Vista location. This product’s “ high performance application-inspection capabilities automate the network to treat traffic according to detailed policies based not only on port, state, and addressing information, but also on application information buried deep within the packet header”. Additionally, it “detects and filters protocols with industry leading performance”( The Cisco ASA 5500 as a Superior Firewall Solution, 1992-2006). The diagram below provides a sample network configuration utilizing this product. Source: The Cisco ASA 5500 as a Superior Firewall Solution (1992-2006)
The expense versus benefit trade off is highly in favor of the purchase of this product as this protection is virtually priceless and could mean the difference between continued operations and business failure. There would be no training costs involved as it would be installed by IT. The impact on business processes would be minimal as the firewall could be installed during off-peak hours.
Policy Solution As a measure to resolve the policy