Saturday, January 25, 2020

Aircraft Solutions Security Assessment And Recommendations Information Technology Essay

Aircraft Solutions Security Assessment And Recommendations Information Technology Essay The purpose of this assessment is to address weaknesses and provide recommendations on the network security of Aircraft Solutions. Aircraft Solutions is a recognized leader in the design and fabrication of component products and services for companies in the electronics, commercial, defense, and aerospace industry. Aircraft Solutions mission is to provide customer success through machined products and related services, and to meet cost, quality, and schedule requirements. Two weaknesses were found in regards to the companys network security. The first weakness is a hardware weakness; not having an AAA server for user authentication and authorization; second, not having a Network-based Intrusion Detection System (IDS) in use. The recommended solutions are to deploy an AAA server for user authentication and authorization to company resources, and deploy a combination Host and Network-based IDS for overall monitoring of the companys enterprise. Company Overview Aircraft Solutions designs and fabricates component products and services for companies in the electronics, commercial, defense, and aerospace industry. The mission of Aircraft Solutions is to provide customer success through machined products and related services, and to meet cost, quality, and schedule requirements. Much of its equipment is automated to increase production while reducing costs. The companys workforce has a large skill base: design engineers, programmers, machinists, and assembly personnel to work its highly-automated production systems. The company strategy is to offer low-cost design and computer-aided modeling packages to customers to reduce their development expenses. Aircraft Solutions uses Business Process Management (BPM) to handle end-to-end processes that span multiple systems and organizations. The BPM system is designed to connect customers, vendors, and suppliers to share information and maintain a timely business dialogue. BPM also aligns internal business operations with IT support to maintain production in support of customer requirements. Security Weaknesses Two security vulnerabilities were found in regards to the companys network security. The first vulnerability is a hardware weakness; not having an Authorization, Authentication, and Accounting (AAA) server for user authentication and authorization; second, not having a Network-based Intrusion Detection System (IDS) in use. Hardware Weakness AAA Server Aircraft Solution has a need for an AAA server to authenticate and authorize legitimate user credentials for its on-site headquarters, intranet remote offices, and extranet for suppliers, contractors, and suppliers. An AAA infrastructure is required in order to authorize and authenticate users to company resources; access control. AAA servers provide a mechanism for encrypted authentication of users and can be used to control access to the network. Authentication verifies the identity of a user by employing a database of usernames and passwords. Authorization assigns network rights or permissions to an authenticated user. Authorization records or logs network usage of authentication and authorized users. Accounting can be used to record information about security breaches. (Kaeo, 2004) Software Weakness Combination Host and Network-based IDS Aircraft Solutions employs a host-based IDS on the servers in the corporate office. I think having a combination of host-based IDS on critical servers and a network-based IDS by the firewall for each network segment is better. A good strategy for IDS would be to use a combination of host and network IDS. A Network-based IDS provides an overall perspective of your network and is useful for identifying distributed attacks, whereas a Host-based IDS would stop most valid threats at the host level. (Kaeo, 2004) An IDS protects a network like an alarm system. When an IDS detects that something is wrong and sees it as an attack, it can take corrective action itself or notify a management system, which would alert a network administrator to take some action. Intrusion Detection Systems are important not only in terms of stopping an attack, but also in maintaining a permanent time-stamped log of intrusion attempts on a host system. An IDS allows a company to know that they are being attacked and who is attacking them, how they are doing it, and what they might be looking for. An IDS is the watchdog that adds a layer of defense over all network security systems and policies. Definition of Solution Deployment of AAA Server Aircraft Solutions needs to centrally manage who has authorization to remotely access network resources from anywhere, which network resource are those remote users authorized to access, and any related issues. Terminal Access Controller Access Control System Plus (TACACS+) and Remote Authentication Dial-In User Service (RADIUS) are the two protocols for implementing the AAA technology framework. A centralized AAA server that uses TACACS+ protocol will provide a centralized location for Authentication, Authorization, and Accounting for Cisco devices. User authentication on Cisco devices can be done in one or two ways; a local database of users on the server, or by a TACACS+ server.   TACACS+ is a Cisco proprietary protocol that uses TCP as a transport protocol and has the ability to separate authentication, authorization, and accounting as separate services. The AAA server acts as a proxy server by using TACACS+ to authentication, authorize, and accounting for access to Cisco routers and network access servers. The Authentication function of an AAA server can provide access control; this proves a useful function in environments where theres a requirement to restrict access to network devices or applications per individual authenticated user. (Kaeo, 2004) Software Weakness Combination Host and Network-based IDS Aircraft Solutions needs to deploy a Network-based IDS in combination with its Host-based IDS. I think Aircraft Solutions should have a Network-based IDS in order to monitor all traffic to and from the Internet to see how many hackers or other malicious activities are trying to access the companys network. In addition to seeing Internet traffic, a Network-based IDS can see traffic going to a firewall or VPN and to other attached devices. A combination IDS will also enable Aircraft Solutions to better monitor and effectively respond to a security incident by employing real-time capability. A Network-base IDS is designed to sense malicious activity occurring on a network and provides real-time alerting to Administrators to investigate. The lack of not having such a system leaves Aircraft Solutions at risk by not having the ability to see malicious network traffic and relying on system events to be alerted of malicious activity. (Kaeo, 2004) Justification Deployment of AAA Server The vendor solution Id select would be Cisco hardware. Cisco Secure Access Control Server (ACS) would be best suited for use as an AAA Server. My justification for that is Cisco ACS server covers the three main functions of Authentication, Authorization, and Accounting; and the use of TACACS+ protocol is Cisco proprietary protocol. Aircraft Solutions has multiple users that take part in end-to-end processes that span multiple systems and organizations. A Business Process Management (BPM) system is in place to handle all of these processes. Systems are access by users at different levels of need to know and these users are responsible for entering, processing data, and information in order to generate reports to be used for decision-making. Customer data such as project information, computer-aided design, and development models are sorted and stored in designated servers. The Design Engineering department is responsible for reviewing the electronic models, interacting with the customer and making necessary modifications with customer approval, then placing them in an Engineering Release (ER) directory for programming. As soon as these electronic models are released, programmers use them to create production programs. All final programs must be thoroughly verified for accuracy before releasing to the Proof For Production (PFP) directory for manufacturing to make the production first article. From the production floor, machinists download PFP programs directly to their DCNC (Direct Computer Numerical Control) machines for execution. After any further processing completed products are inspected for verification to customer requirements, then they are moved to the shipping department for delivery. Looking at how Aircraft Solutions BPM works, there is definitely a need for central user authentication and authorization. An AAA server with TACACS+ can be used to manage the large numbers of user IDs and passwords in a centralized database, providing a scalable network security solution. (Oppenheimer, 2004). An AAA server will ensure access to design, production, accounting, sales, and HR servers only go to authorized engineers and personnel. An AAA server will also track all users activity and attempts to access network resources; event logging. Example, if someone is trying to access production programs and theyre not authorized it will be logged, allowing for an investigation of the incident if required. Software Weakness Combination Host and Network-based IDS Aircraft Solutions has many users accessing its network, be it suppliers, customers, branch office employees etc A Network-based IDS is needed to protect the network. Similar to a home owner having an alarm system to ward off or to alert them of an intruder. I see an IDS in this fashion. An IDS detects if someone tries to break in through the firewall or manages to break in the firewall security and tries to have access on any system in the trusted side and alerts the system administrator in case there is a breach in security. (SANS Institute, 2001) Here are some advantages of Network-based IDS: Easier to deploy: Network based IDS are easier to deploy as it does not affect existing systems or infrastructure. The network-based IDS systems are Operating system independent. A network based IDS sensor will listen for all the attacks on a network segment regardless of the type of the operating system the target host is running. Detect network based attacks: Network based IDS sensors can detect attacks, which host-based sensors fail to detect. A network based IDS checks for all the packet headers for any malicious attack. Many IP-based denial of service attacks like TCP SYN attack, fragmented packet attack etc. can be identified only by looking at the packet headers as they travel across a network. A network based IDS sensor can quickly detect this type of attack by looking at the contents of the packets at the real time. Retaining evidence: Network based IDS use live network traffic and does real time intrusion detection. Therefore, the attacker cannot remove evidence of attack. This data can be used for forensic analysis. On the other hand, a host-based sensor detects attacks by looking at the system log files. Lot of hackers are capable of making changes in the log files so as to remove any evidence of an attack. Real Time detection and quick response: Network based IDS monitors traffic on a real time. So, network based IDS can detect malicious activity as they occur. Based on how the sensor is configured, such attack can be stopped even before they can get to a host and compromise the system. On the other hand, host based systems detect attacks by looking at changes made to system files. By this time critical systems may have already been compromised. Detection of failed attacks: A network based IDS sensor deployed outside the firewall can detect malicious attacks on resources behind the firewall, even though the firewall may be rejecting these attempts. This information can be very useful for forensic analysis. Host based sensors do not see rejected attacks that could never hit a host inside the firewall. (SANS Institute, 2001) Impact on Business Processes I think Aircraft Solutions will have a positive result from deploying an AAA server and adding Network-based IDS to its network enterprise. The impact to its business processes should be transparent, having little negative effect. Using an AAA server to provide authentication and authorization and accounting gives network administrators an added layer of protection in securing Aircraft Solutions network infrastructure. It allows access to network resources to be better controlled and delegated. An example could be branch office users connecting to the network; they can be screened against the user database and a custom policy that controls what device a user can access and what services on a particular device that a user can access. If a users account is compromised that account can be disabled. Using these two tools to correct the identified security weaknesses is a benefit. The only thing that may be viewed as negative is the access speed may be slightly slower. However, I think a slight decrease in access speed to the user is out weighted by having the access control and network monitoring needed to ensure Aircraft Solutions network infrastructure has a more layered defense. Security trumps a speedy user†¦ Summary In conclusion, I identified two areas of security weakness in Aircraft Solutions deployment of an AAA server and Network-based IDS. These are two tools that are necessary in any network enterprise environment. Implementing these recommendations will better ensure security of the companys resources, better overall enterprise integrity, and provide added layers of defense by having access control over network resources and real-time monitoring of network activity. Figure 1: Revised Aircraft Solutions Network Infrastructure

Friday, January 17, 2020

Island of the Blue Dolphins

Island Of The Blue Dolphins I believe that Karana should have jumped rather than stayed on the boat. I think this because it shows her love for her brother, secondly she does it because she feels like she has to protect her younger brother and lastly it is an unselfish act to do. Firstly, Karana should jump because it shows she loves her brother. The thought going through her mind was that she should jump for your younger brother. The love that Karana and her younger brother had for one another should make her jump. For example in a situation like Karana's it is the right thing to go back for her little brother, Karana was going through painful thoughts like the thoughts that her little brother may die. This would make anyone jump. Secondly, she does this because she feels the need to protect her younger brother. Karana is the type of person who would do anything if she had a older or younger sibling in danger or wounded. So in this type of situation in which her younger brother needs a big sisters help, Karana would be doing anything possible to get to her little brother like jumping off the boat. I felt as if I had been gone a long time as I stood there looking down from the high rock. I was happy to be home. Everything I saw- the otter playing in the kelp, the rings of foam around the rocks guarding the harbour, the gulls flying, the tides moving past the sandpit filled me with happiness. A qoute from the novel. (Scott O'Dell) Finally, it was an unselfish act towards her brother. Because if Karana did not have jumped her younger brother would've felt useless with nothing to live for and unfortunately killed himself. Even if Karana hadn't of jumped she would have felt selfish and she would have lost all the love and sympathy that her brother had for her. The love that they had for each other drove Karana to do the most unselfish and Christian act that any human would be able to do. In conclusion, Karana did what was best for her and everyone else. It must have been one of the hardest choices any person could ever make but in Karana made the best of choices. This shows the courage and ability Karana had to do to be able to save and be with her younger brother. A Matter of Life or Death Mrs Hicks EN505 Matt Oakford Week 5-Week 8

Thursday, January 9, 2020

Minimum Wage Is A Touchy Subject - 1454 Words

Minimum wage is a touchy subject for most in this state of Michigan and in the nation as well. The fact that people who work jobs for menial pay, and are expected to survive on this limited budget is absurd. The prices for basic necessities have skyrocketed and has never ceased from creeping upward, and the largest expense for families is child care. Paying a living wage cuts down on absenteeism, decreases employee turnover, and saves on retraining costs. In a recent study of calculating expenses and taxes (MLPP, 2014) Grocery stores located in low- income areas (both rural and urban) tend to charge higher prices than large suburban supermarkets and to be heavily stocked with highly processed convenience foods, while offering little in the way of fresh produce and other nutritious food items. The cost of utilities continues to spiral out of control as does transportation and healthcare. These are basic necessities for a human being is required to survive in this rich nation and state that we all live in. Opposing arguments are wide and varied. There are those that believe the increase of a minimum wage would surely shut down or cut the amount of basic low skilled entry level jobs. According to research and analysis (EPI, 2014) a new analysis estimating that at least 360,000 jobs- and as many as 1,084,000 jobs would be eliminated if the federal minimum wage were raised to $10.10. The claim is making an issue that more than half of poor people in the in the dataShow MoreRelatedNike: The Sweatshop Debate Essay1195 Words   |  5 Pageslegal, cultural, and ethical challenges that confronted the global business presented in the Nike sweatshop debate case study. It illustrates Nike’s part in the sweatshop scandal and it also takes a look at the ethical issues that surround this touchy subject. This paper determines the various roles that the Vietnamese government played in this global business operation. This paper summarizes the strategic and operational challenges facing global managers illustrated in the Nike sweatshop case. Read MoreIs Welfare Really Fair?1478 Words   |  6 Pagesthe financial aid. There are so many people who cannot provide for their families even though they work a full-time job. Living in America and working minimum wage, there isn’t much room for a family to be supported. Between bills, living, and children the cost of everything is very expensive. Welfare has been a very touchy and controversial subject to research. A lot of people believe that we should have it and a lot of people believe that we shouldn’t. Some people believe that the welfare shouldRead MoreEconomic View Of Raising The Minimum Wage Essay1791 Words   |  8 Pagesof Raising the Minimum Wage Minimum wage has been a touchy subject for decades, but especially in this election year, it is more profound than ever before. With candidates screaming at each other, it’s important for the citizens of America to know the facts about minimum wage along with the costs and benefits. Continue reading to discover the truth about wages in America. From a small business owner perspective, it is safe to say people are split 50/50 about raising the minimum wage. The supportersRead MoreWhy Should Minimum Wage Be Allowed?1793 Words   |  8 PagesUnited States, most teenagers are encouraged to get a job. Usually it is for extra money to pay for their own gas, but sometimes they are helping to support their family. Their starting wage is usually the minimum wage that our nation has set for businesses. Many large corporations start people at or around this wage and may increase it from there. The United States is unique because most of its jobs come from small businesses. America has given great opportunity for ambitious people to be their ownRead MoreAbortion Is The Ending Of Hyperlink1534 Words   |  7 Pageschoice to have the procedure. There are many different reasons why individuals choose to have the procedure done. One of the reasons is a pretty good one. In some cases the person choosing to get an abortion is a victim of rape. This is a very touchy subject because no one wants to or chooses to be in that situation. So having an abortion seems to be the decision to make because they didn’t choose to get pregnant, instead it was forced onto them by a sick individual. The emotional and mental stressRead MoreCompensation Management2284 Words   |  10 Pagesof employees while retaining the competitiveness and profitability of the company. Compensation management, also known as wage and salary administration, remuneration management, or reward management, is concerned with designing and implementing total compensation package. The traditional concept of wage and salary administration emphasised on only determination of wage and salary structures in organisational settings. Pay is a difficult topic of conversation in most organizations. In fact, theRead MoreIncome And Wealth : Inequality Essay2609 Words   |  11 Pagesresearched beforehand. What happens when the product fails or an issue arises with said services? The consumer calls the customer service number only to get in touch with someone overseas. Why? Because the companies can get by with paying cheaper wages to overseas workers. What does this practice do to Americans? This practice makes it hard to gain decent employment, at least enough to make ends meet, in today’s job market. In today’s time it takes two incomes to survive, unless a per son alreadyRead MoreThe Issue Of Gun Control2213 Words   |  9 Pagesor a ban on guns. Lower courts have chosen to appeal these conflicts, while the Supreme Court has refused to intervene in every Second Amendment case since the McDonald v. Chicago case. Federal law has set minimum standards for gun control measures throughout the United States. These minimum standards including McDonald and Heller, which still ensures that laws promote public safety and are not restricting the right to bear arms, however, individual states may have their own laws on gun controlRead MoreShould Marijuana Be Legal For Medical Use?2818 Words   |  12 Pagesits recreational use. A UN study found that Canadians consumed more marijuana per capita than any other country in the world. If every marijuana user in Canada was incarcerated, the country would not run. From business leaders and politicians to minimum wage workers, and everyone in between, so many Canadians use it that business could not go on as usual if they were all in jail. The nation would be short-staffed. For this reason, am ong others, police often look the other way to recreational use ofRead MoreComputer Shop Feasibility Study7370 Words   |  30 Pageswhich will result to unlimited liability. * 17. The proponents opt to form the business under sole proprietorship type of business organization as they see it fit considering the nature and capital requirements of the project. Moreover, it is subject to fewer regulations unlike the other type of business organization, the owner has full autonomy with regard to business decisions. * 18. The proposed location had been chosen by the prponents considering such factors as the availability of resources