Aircraft Solution Inc. Security Weaknesses Essay Example
Aircraft Solution Inc. Security Weaknesses Essay Example

Aircraft Solution Inc. Security Weaknesses Essay Example

Available Only on StudyHippo
  • Pages: 2 (474 words)
  • Published: June 23, 2016
  • Type: Case Study
View Entire Sample
Text preview

A security weakness in the field of IT refers to a situation where a resource is susceptible to attacks, whether they come from internal or external sources. The level of vulnerability of a resource depends on how easily it can be rendered non-functional by an attack, leading to disruptions in business operations (Schellenberg, 1995).

Aircraft Solutions, which designs and fabricates products and services for electronic, commercial, defense, and aerospace firms, may face significant vulnerability due to its network infrastructure.

The network infrastructure of Aircraft Solutions, a large firm, includes contractors, suppliers, and customers. Due to the large number of users on the network, vulnerabilities in hardware, software, and policies are bound to arise.

The primary reason for this is that network infrastru

...

ctures are more vulnerable to attacks from insiders rather than outsiders. In general, insiders find it easier to launch an attack on the Network compared to outsiders due to the strong defenses most networks have against external attacks, such as firewalls within and outside their virtual private networks (Basole, 2008).

Aircraft Solution’s network is susceptible to attacks from both inside and outside sources. The hardware and policy of the company are vulnerable. An employee with access inside the network can easily attack the servers. Although system access for users in different network levels may be tightly controlled, employees who work remotely or in the field mostly connect to the company’s servers through the network's gray zones.

When logging into the network and accessing the servers, an attacker who has potentially hacked into the computer can gain access to the company's server and copy important informatio

View entire sample
Join StudyHippo to see entire essay

like access codes, passwords, and other user authentication keys or codes. Using these codes, the attacker may directly launch an attack on the servers or simply copy data from the employee's laptop hard drive. Implementing a virtual private network for the company, separate from its contractors, clients, and suppliers, would enhance server security.

The server hardware is prone to virus attacks because employees often take their laptops home and connect to the internet outside the company's network firewall. This makes their laptops vulnerable to viruses. However, updating virus signatures can often take a long time, so many employees choose to skip this process. Consequently, when they reconnect to the company's network at the office, viruses can spread to other devices and attack them (Luce, 1995).

A denial of service attack is a type of vulnerability that can disable hardware. This attack floods the network with data packets, rendering the hardware slow to respond to requests from network clients.

The American Institute of Aeronautics and Astronautics (1996) emphasizes the importance of ensuring a stable power supply and having appropriate backups for networks' hardware resources. Power spikes and outages can have severe consequences on the system, as even a small voltage variation can lead to system crashes.

Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New