SE571 Principles of Information Security and Privacy

Covers fundamental principles of information security and privacy.

Olivia Smith
Contributor
4.2
54
about 1 month ago
Preview (3 of 7)
Sign in to access the full document!
The Title of My Project
Methaq Alabidy
Submitted to: Professor Robert
SE571 Principles of Information Security and Privacy
Keller Graduate School of Management
Date : 10/19/2012
Based on the security vulnerabilities identified in Aircraft Solutions' IT infrastructure, discuss the
proposed solutions for both hardware and policy improvements. How can the implementation of
Writable Domain Controllers (WDC) and Read-Only Domain Controllers (RODC), along with
changes to the firewall update policy, mitigate the identified security risks? Additionally, analyze
the impact of these improvements on the company's business processes and cost structure.
Consider both short-term and long-term effects on security, efficiency, and cost savings.
Word Count Requirement: 1000-1200 words
Table of Contents
Executive Summary
Company Overview
Security Vulnerabilities
A hardware and policy
Recommended Solutions
A Hardware and ploicy soulotion
Budget
Summary
References
Executive Summary
The purpose of the report is to assist Aircraft Solutions (AS) in indentifying the most significant
Information Technology (IT) security vulnerabilities. AS products and services are at the forefront of the
industry and the protection of such is very important as they are an industry leader. The vulnerabilities
that will be discussed are the firewall configuration, virtualization of their hardware assets and defining
security policy regarding the timeliness of firewall configuration and updates.
Company Overview
Aircraft Solutions, headquarters located in San Diego, California develop and fabricate products and
services for companies in the electronic, commercial, defense and aerospace industries. AS is made up of
two (2) different divisions, the Commercial Division and the Defense Division. The Commercial Division
is located in Chula Vista, CA and the Defense Division is located in Santa Ana, CA. AS company
strategy is to offer low cost design and computer aided modeling packages to companies and assists them
through the
lifecycle of their product in an effort to save money for the consumer while profiting from their business.
Two Security Vulnerabilities
Hardware vulnerabilities.
According to the network infrastructure diagram, we can see that there are 5 servers, 2 routers, 1
switcher, and 1 firewall. Each one of those servers is operate by a specific department, and all of those
servers are connected to the main database server.The connection between each department’s server to the
main database server take place without any access list or server, and that mean that any department’s
Preview Mode

Sign in to access the full document!

100%

Study Now!

XY-Copilot AI
Unlimited Access
Secure Payment
Instant Access
24/7 Support
Document Chat

Document Details

University
DeVry University
Subject
Information Technology

Related Documents

View all