Aircraft Solutions (AS) located in beautiful southern California has become a recognized leader in the electronics, commercial, defense and aerospace industries. This is due their design and fabrication of component products and services available to their customers in the various industries. What set Aircraft Solutions apart from other design and fabrication companies are their dedicated, trained workforce and the maintenance of a large capacity plant and extensive equipment that enables the company to meet customer requirements. The company is made up of a large highly skilled work force that works its highly automated production systems from design engineers, programmers, machinists and assembly personnel. Aircraft Solutions goals are to provide excellent customer service and success through its machined products and services. This is achieved while at the same time keeping their cost, quality and scheduled deliveries in check. The main headquarters for Aircraft Solutions is currently in San Diego, California, while their Commercial Division is located 40 miles east of headquarters and the Defense Division is located in Santa Ana, California. Security Weakness
In reviewing the current business process, geographic layout, current IT architecture and network infrastructure there were some security issues that could and should be improved upon. Currently the existing security policy is not sufficient for the needs of the company. It is being evaluated every two years and there appears to be no encryption software use to prevent the possibility of data being mishandled, lost or stolen. A security “policy begins with assessing the risk to the network and building a team to respond. Continuation of the policy requires implementing a security change management practice and monitoring the network for security violations. Lastly, the review process modifies the existing policy and adapts to lessons learned.” (1)
The Term Paper on Public finance and policy solution gruber
Questions and Problems 1. The government of Westlovakia has just reformed its social security system. This reform changed two aspects of the system: (1) It abolished its actuarial reduction for early retirement, and (2) it reduced the payroll tax by half for workers who continued to work beyond the early retirement age. Would the average retirement age for Weslovakian workers increase or decrease ...
Without an updated security and policy procedure the risk of controls that are used to secure confidential and proprietary information are threatened throughout the company if users and systems are not frequently visited more often than the current two year review timeframe. There also appears to be a lack of firewalls especially between the Commercial Division of the company and the internet. “Basically, a firewall is a barrier to keep destructive forces away from your property. In fact, that’s why it is called a firewall. Its job is similar to a physical firewall that keeps a fire from spreading from one area to the next.”(2) There also needs to be firewalls set up between the Commercial and Defense Division linking to Aircraft Solutions main headquarters in San Diego, California since the risk of being hacked from their remote locations without proper precautions can occur anywhere in between. The high risk of security breach in any of its divisions and headquarters area can be quite disruptive and detrimental to the company and its customers. Current IT Architecture
As seen from the diagram below the current IT Architecture is set up and the areas noted are where the risks lie.
Lastly the use of encryption software between all users within the company is vital to prevent any confidential or proprietary information from leaking to the non-essential users. “Encryption software is software whose main task is encryption and decryption of data, usually in the form of files on (or sectors of) hard drives and removable media, email messages, or in the form of packets sent over computer networks.” (3) There are many algorithm encryptions available and selecting the software that would be beneficial and cost effective to the company allows for an extra measure of protection to files, disks, databases and communication.
The Business plan on Questar Company Risk Analysis
INTEROFFICE REPORT Questar Corporation: Energy Company October 6, 2004 Prepared for: S. E. Parks, Senior Vice President and Chief Financial Officer Prepared by: Cathy Caton, Accountant Three segments of Questar operations cover resources and regulated services. Follows is the risk assessment for Questar: Resources, Lack of internal control in estimating reserve (s) revenue, Financial analysis and ...
References
1) Author Unknown. Network Security Policy: Best Practices White Paper. 04 October 2005. Cisco.com. Retrieved: March 15, 2012, http://www.cisco.com. 2) Tyson, Jeff. “How Firewalls Work” 24 October 2000. HowStuffWorks.com. Retrieved: March 18, 2012, http://www.howstuffworks.com/firewall.htm. 3) Author Unknown. Encryption Software. December 2011. Wikipedia.org. Retrieved: March 14, 2012, http://en.wikipedia.org/wiki/Encryption_software