Airport Security Plan

Improved Essays
Overview
The following documentation shows an initial security planning report for Airport Network Security. The information takes into consideration and provides the following:
1. Network Diagram
2. Stakeholder Information
3. Laws and Regulations
4. Risk Assessment
5. Operational Technical Controls
SNHU Consulting has been hired to provide technical services to propose a Risk Mitigation Plan for the Airport and involves securing the following:
1. Network Security
2. Wireless Security
3. Physical Security
4. Customer/Patron Security
5. Commerce Security
The fundamental parts of system security are, for example,
• Secure remote access can be given virtual private systems VPNs
• Antispyware & Antivirus
• Unauthorized access to system can
…show more content…
These can be viewed as travelers who expect better quality services and on the other hand these can also be viewed as participants in the economic system (Schaar).

Laws and Regulations
The laws and regulations are established by the transportation security administration of the airport organization. In order to provide extra security to the air travelers or to the airport itself, following laws and regulations needs to be developed:
• The travelers should pack their carry-on bags in an effective manner in order to get through the airport security faster. A perfect manner of carrying the content is defined by the transport security administration which must be followed by the passengers so that proper security can be provided in the airport.
• The transport security administration department of an airport has also established the law pertaining to the liquids.
• The laws and regulations pertaining to clothes have also been established by the transport security administration in order to reduce the burden of X-ray machine. Travelers are allowed to wear light clothes and are also restricted to use cell phones, keys, etc

Related Documents

  • Improved Essays

    9/11 Changes

    • 444 Words
    • 2 Pages

    After September 11, 2001 America was never the same again. The terrorist attacks changed the way our government works and thinks. Our policy and politics were directed towards security reforms. This includes airports, government buildings and nationwide international security heightening. America also changed how it dealt with extremist, after the devastating 9/11 incident, no one wanted to live through that again.…

    • 444 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The Transportation Security Administration sets rules and regulations for airport security to protect passengers and prevent hijacking on planes (Airport Security Strategies). Patrick Smith argues that the TSA has the wrong mindset because security regulations and screenings currently in place are too focused on searching for pointy objects, shoe removal, and liquids/gels. These methods are self-destructive because with the majority of security measures focused in airports dangerous people or weapons are still a risk if they slip past the weak security screenings and board the aircraft. Moreover, the present security screenings are annoying for passengers. After unpacking all electronic devices and liquids, unloading anything metal from the…

    • 305 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    These studies might show labor hours needed, hardware and software costs, utility costs and prevention of data lost. Another aspect of computer security is disaster recovery, this might include damage caused by a natural or manmade occurrence. Computer equipment that is damaged might include sensitive information stored on hard drives and these would either need to be recovered or disposed of. The key decision makers in a security project would include: Chief Executive Officer: The most senior corporate officer reports to the board of directors.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Task 2 (P2) Describe the following physical security measures and explain how they may be used to help keep systems secure. • Locks Locks are physical security measure that can be used in different aspect within the company. The locks can be put on the door to avoid people who not supposed be in the building or employees who not supposed be on that room. There are different types of locks that can be used within the company such as Password locks that be put on the doors, this will avoid anyone coming to room without password identification to enter the room. Also the company can use ID IDENIFACTION on the door so any employees comes have to use their ID in order to enter the building, this will…

    • 806 Words
    • 4 Pages
    Decent Essays
  • Improved Essays

    Capstone Project Essay

    • 752 Words
    • 4 Pages

    This capstone project will present the methods Acme Regional Airport (AAE) used to upgrade its enterprise network and simultaneously secure it…

    • 752 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    The security systems will be focused on management security, operational security and technical security controls. Management Security: These are management controls that will focus on the management of the IT security system and the management of risk for interconnected systems in HBWC environment, and includes techniques and concerns usually addressed by IT management. Operational Security: The operational controls address security methods focusing on mechanisms primarily implemented and executed by people (as opposed to systems). These controls are put in place to improve the security of a particular system (or group of systems). Often, they require technical or specialized expertise and rely upon management activities as well as technical controls.…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Policies and procedure will be found in our office and can access all the time, as well You can found them in main corridor on desk and in the “blue book” along with rota. Keep it up to date ?! Panta Rhei – All Flows -Heraclitus of Ephesus As everything change and it is in motion and adapt to situations so does rules and regulations in order to keep us in control and save us from danger and harm.…

    • 715 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    9/11 Research Paper

    • 1403 Words
    • 6 Pages

    Effects of 9/11 On September 11th, 2001, the United States underwent one of its most violent, devastating terrorist attacks. This event reverberated through the country’s foundation and left an incredible impact. The lasting effects of 9/11 stretched across multiple facets of America’s way of life. Prejudice has always lingered in the United States, and after this major terrorist attack, Muslims experienced an overwhelming amount of hatred and prejudice directed at them.…

    • 1403 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    9/11 Research Paper

    • 1886 Words
    • 8 Pages

    September 11, 2001 is a date in history that will never be forgotten by American’s. On this date, the World Trade Center otherwise known as the Twin Towers collapsed by two planes getting flown into them. This was a terrorist attack by the group al-Qaeda. They were able to overtake the two planes and run them right into the buildings. This is the reason why airport security is so intensive.…

    • 1886 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    9/11 In Aviation

    • 2038 Words
    • 9 Pages

    But one should remember that flying is fascinating and convenient. In a matter of hours, you can be in another part of the earth. Security measures were implemented to ensure your safety. What is clear now is that many things changed and continue to change as airport security seems to be an evolving…

    • 2038 Words
    • 9 Pages
    Improved Essays
  • Improved Essays

    The IA/IP is responsible for intelligence/information gathering and sharing, analyzing data, and the recommendation and development of a comprehensive plan for protecting critical infrastructures and key resources which it executes through utilization of a specialized risk management approach. The DHS implements attack scenarios to prepare the 18 critical infrastructure areas for potential hazards. Subject matter experts from various departments of the IA/IP come together and determine specific vulnerabilities based on the potential scenarios. This allows the DHS to plan for necessary resources required to react in the event of a disaster or attack on one of the elements of the nation’s critical infrastructure. The attack scenarios are modified annually based on new terrorist trends or attacks that have happened around the world.…

    • 784 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Thesis: The transportation system is composed of independent subsystems that depend on each other to help identify vulnerabilities. Each system is evaluated individually and then collectively to identify vulnerable areas. Interoperability is disabled among modes of transportation when independent systems operate on private hardware and software platforms. Electronic communication and internet exposes interoperability to viruses and malicious acts by hackers and insider threats. Each mode of the transportation system must identify Sector Specific Plans (SSP) to protect both passenger and intermodal cargo carrier modes using the system based risk management (SBRM) approach.…

    • 483 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Homeless Youth Shelters

    • 1375 Words
    • 6 Pages

    Safety rules and precautions have been established for the protection of each and every person who enters TCHYP’s campus, or receives…

    • 1375 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Code Enforcement

    • 448 Words
    • 2 Pages

    Hence, authorization authorities must be completely familiar with the selection procedure and the reasoning behind the regulations they implement and additionally as far as possible set on them. On the other hand, the individuals who compose the laws must comprehend the issues specific to authorization and organization as the codes and regulations are…

    • 448 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    A good method of managing risk is by looking back at their past mistakes, evaluating them, correcting them, working on them and ensuring they don’t happen again. By doing so, they can avoid and mitigate potential pitfalls. In December 2006, the Boeing airplane was found to be much heavier than it was supposed to be as well as other technical problems which had caused a delay for it to enter service (Laurin, C. 2010). The company should consider possible events that could affect the project’s outcomes and then creating contingency plan. Boeing Commercial Airplanes should take up proactive attempts to foresee probable conditions that could prove adverse to the project and to plan to mitigate (find a solution which decreases the negative impact of the…

    • 862 Words
    • 4 Pages
    Improved Essays