Submitted by: Submitted by macgolfer20
Views: 99
Words: 1560
Pages: 7
Category: Science and Technology
Date Submitted: 10/26/2014 01:40 AM
Security Assessment and Recommendations for Aircraft Solutions
Principles of Information Security and Privacy
Keller
Submitted: December 11, 2013
Executive Summary
The purpose of this report is to investigate the vulnerabilities of Aircraft Solutions (AS) in the areas of hardware and policy. Furthermore, it provides recommended solutions to the security weaknesses mentioned in Phase 1. Aircraft Solutions is a well known leader in the design and production of component products and services for companies ranging from commercial industry to the aerospace industry. In addition, Aircraft Solutions maintains a large capacity plant filled with an extensive variety of equipment, which is mostly automated alongside skilled specialists in a range of fields to ensure they meet their customers’ needs. The weaknesses that are being addressed are hardware and policy.
Company Overview
Aircraft Solutions is a leader in the planning and production of component products and services for companies in the electronics, commercial, defense, and aerospace industry. The headquarters of Aircraft Solutions is located in San Diego, California. The goal of Aircraft Solutions is to use machined products and related services to supply customer success, and to achieve cost, quality, and schedule requisites. They have a Defense Division (DD) of Aircraft Solutions located in Orange County, California and a Commercial Division (CD) located in San Diego County, California.
Aircraft Solutions has a system in place for creating programs. First, the Design Engineering department reviews electronic models. They also interact with the customers in order to get their approval to make modifications when necessary. Then, the electronic models are placed in an Engineering Release (ER) directory for programming. When the electronic models are released in the ER directory, production programs can be created. Lastly, every one of the final programs must be verified in detail...