SE571 Principles of Information Security and Privacy Security Assessment and Recommendations (Phase II)

Phase II of a security assessment project.

Olivia Smith
Contributor
4.6
32
5 months ago
Preview (4 of 10 Pages)
100%
Purchase to unlock

Page 1

SE571 Principles of Information Security and Privacy Security Assessment and Recommendations (Phase II) - Page 1 preview image

Loading page image...

Security Assessment and Recommendations(Phase II)Ravindra PatelSubmitted to: Professor John MichalekSE571 Principles of Information Security and PrivacyKeller Graduate School of ManagementSubmitted:February 21, 2014For your courseproject, you are tasked with identifying and addressing two significant securityvulnerabilities in a company’s network and security policies. Choose a company, such asAircraft Solutions, and analyze its current hardware and policy weaknesses. You will assess therisks and consequences associated with each vulnerability and propose detailed solutions,including the implementation of necessary hardware (e.g., firewalls) and policy changes (e.g.,updated security review frequency). Discuss the impact these solutions will have on thecompany's business processes and provide a cost analysis of implementing the recommendations.Be sure to include a budget breakdown for the hardware solution and the ongoing costs related topolicy updates. Finally, conclude with a summary of your findings and justifications for therecommended actions. (Word count requirement: 2,5003,000 words)

Page 2

SE571 Principles of Information Security and Privacy Security Assessment and Recommendations (Phase II) - Page 2 preview image

Loading page image...

Page 3

SE571 Principles of Information Security and Privacy Security Assessment and Recommendations (Phase II) - Page 3 preview image

Loading page image...

Security Assessment and Recommendations (Phase II)2Table of ContentsExecutive Summary…………………………………………………………..3Company Overview…………………………………………………………...3Two Security Vulnerabilities…………………………………………………4oHardware Vulnerability..........................................................................4oPolicy Weakness……………………………………………………..…5Recommended Solutions………………………………………………..…….6oHardware Solution…………………………………………………..…6oPolicy Solution........................................................................................8oImpact on Business Processes……………………………………….....8Budget……………………………………………………………………..…...9Summary………………………………………………………………………9References……………………………………………………………………..10

Page 4

SE571 Principles of Information Security and Privacy Security Assessment and Recommendations (Phase II) - Page 4 preview image

Loading page image...

Security Assessment and Recommendations (Phase II)3Executive SummaryThis report identifies thepotential security weaknessesofthe chosen companyand explainspotential solutions of the security weaknesses.According to the information provided, there arepotential vulnerabilities in hardware and policy of the company.According to the networkinfrastructure of the company, there is no firewall has been setup between the Internet and thecommercial division of the company.The solution to this hardware weakness would be to buyand install a firewall where needed.Also the security policy requires that all firewalls and routerrule sets are evaluated every two years.The solution to this policy weakness would be to updatethe new rule sets and evaluate them semi-annually.In this report these weaknessesand theirsolutionswill be explained in detail.Company OverviewAircraft Solutions (AS) is a recognized leader in the design and fabrication of componentproducts and services for companies in the electronics, commercial, defense, and aerospaceindustry. The mission of AS is to provide customer success through machined products andrelated services, and to meet cost, quality, and schedule requirements.AS has a large and skilledworkforce of design engineers, programmers, machinist, assembly personnel. Thecompany islocated in Southern California. The headquarters is in San Diego, California. AS has acommercial Division (CD) is 40 miles east in San Diego County. The Defense Division (DD) islocated in Orange County in the city of Santa Ana, California. AS uses Business ProcessManagement (BPM) to handle end-to-end processes that span multiple systems andorganizations. The BPM system is designed to connect customers, vendors, and suppliers toshare information and maintain a timely business dialogue. Business process effectiveness beginswith the IT organization. Customer data such as project information, computer-aided design and
Preview Mode

This document has 10 pages. Sign in to access the full document!

Study Now!

XY-Copilot AI
Unlimited Access
Secure Payment
Instant Access
24/7 Support
Document Chat

Document Details

Related Documents

View all