Aircraft Solution Essay

1137 Words Aug 11th, 2013 5 Pages
Aircraft Solutions (AS)
Security Overview 
Aircraft Solutions is a well respected equipment and component fabrication company who 
provides a full spectrum design and implementation solutions to several industries which
 includes; electronics, aerospace, commercial and the defense sectors. Aircraft Solutions employs 
a range of highly qualified professionals and houses an immense production plant, with an 
overall goal of providing high-quality solutions to accommodate specifications from a wide
range of customer demands.

The following report is a security assessment on Aircraft Solutions
and the primary objective in this assessment is to identify the existence of vulnerabilities present 
within the global context of
…show more content…
The fact remains in either case 
that there is a significant increase of this division of AS operations to outside threat. The threat
here is characterized by the inability of the CD to filter web traffic, which is effectively
 equivalent to inviting the world in to see everything there is to see. (Northrop, T. 2010) In this 
case, this might include AS’s commercial client’s confidential information, classified divisional
 statistics pertaining to budgets, deadlines, or contracts, confidential employee information, etc.
The vulnerability is the absence of a firewall. The threat is an open exposure to the uncertainties
 of the Internet, to any number of automated or personalized attacks or attempts to exploit
 company vital statistics and/or confidential or classified data. To help illustrate the risks of such a 
threat occurring, a typical Risk Matrix, which is commonly used by a number of companies and 
organizations, to include the military, will be utilized. This matrix was borrowed from the
 Scottish Government’s, Risk Management website.
 Because the possible consequences of the threat of company infiltration by malicious parties 
could result in not only devastating company-wide data leak but also the potential of client data
 exploitation, modification, or even blackmail, the potential consequences would be marked 
‘Extreme’. Because the likelihood is not

Related Documents