They have two remote occasions outside off’s Diego: The commercial division is 40 miles east in Chula Vista, California and the defense division is 30 miles away in Santa Ana, California. Aircraft Solutions prides itself on being recognized as an industry leader. However, after assessing the company’s information security, they may not be a leader for much longer. Two major security weaknesses have been identified: a hardware configuration problem and an unsound security policy for the firewalls. The company has five servers, a database, one switch, two routers, and a firewall.All of the hardware is behind the firewall except the main router. This router connects directly to the Internet, Which is also the connection the commercial division in Chula Vista uses to connect to the headquarters.
This configuration is set up in such a way where all Internet traffic hits the main router first. This is a major vulnerability for the company because no Internet traffic into the company is blocked before hitting the main router, allowing people or systems with malicious intent into the network, The other weakness relates to the firewall as well, but in regards to the security policy.The policy dictates that the firewall and router rule sets are evaluated every two years. This means that if a virus or any other type to mallard that is router or firewall specific gets created in that two year period and infiltrates the network.
Chances are it will not get removed or blocked. The mallard could stay on the network indefinitely until the next time the firewall and router rules are evaluated. These weaknesses in security will inevitably lead to threats. In regards to the hardware policy where there is no firewall between the main router and the Internet, the threats are fairly obvious.Firstly, there is a threat that information may be intercepted while being passed teen the headquarters and Chula Vista, or even the company and external customers. This is because one a network firewalls main function is to examine all incoming and outgoing data to ensure that the information is authorized (Hajjes, Mood, lateral, & Quota, 2013). Without this protection, malicious traffic could enter the network at the main router and intercept data packets. These packets can be easily captured and read by outside parties.
Interruption Of service can also occur due to firewall configuration issue. Malicious people or systems outside the company could bombard the main router with data quests, so much so that it cannot keep up with them. This could lead to denial of service for authorized users at the Chula Vista site attempting to connect to the headquarters, or even anyone at the headquarters trying to connect to the Internet. If these attacks are severe enough, the damage done to the data can be irreparable.Knowing how likely these interruptions and interceptions will occur is difficult to determine, It largely depends on how willing and able people on the Internet are to attempt the attacks. However, given that there are thousands it not millions of malicious people and systems out there, it is inevitable. In fact, nearly 20% to cyber-attacks prey on small businesses like Aircraft Solutions, and there’s a chance that small businesses close within six months of a cyber attack (Wassermann, 2013). The threats for out-of-date rule sets on the firewall and routers are more extensive.
Not only are there interception and interruption threats, but there are also fabrication and modification. Interception can happen when someone on the Internet uses a new mallard tool not blocked by the out-of-date firewall rules to gain access to the network. They could then install clogging software, not found by the antivirus software, on an employee’s imputer. They could easily capture surname and password information, Which they can use to access the BPML servers and copy proprietary customer information to their own computer outside of the N.B.
,fork.Interruptions can occur because outside users could gain access to the network With new techniques not blocked by the updated firewall rules, as noted above, and install a virus on a server to delete all the system files. Even though these files may be backed up, it could take hours or even days to restore the BPML system to the state before the attack, and there’s no guarantee the attack will not occur again. Modifications and fabrications can easily happen once an unauthorized user accesses the Nortek due to the out-of-date firewall and router rule sets.For example, they could get access to a server and create fake customer files, which will be difficult to identify, causing engineers and programmers to waste time working on them. Or, they could modify existing customer records so a customer is quoted the wrong price tort an item. The possibilities of what an unauthorized user could do are virtually limitless given the user knows what he/she is doing, Again, it is difficult to say how likely these types of intrusions are likely to happen.A lot of it depends on the motivations of the people behind them.
They could be former employees, for example. Or they could be untrustworthy customers who want to gain access to information on their competitors who also happen to be clients of Aircraft Solutions. They could also be people who would van to do it just to see if they can But the potentially most harmful type would be the criminals. They could find customer bank account information, or even the company’s, and try to gain access to those accounts.This information is getting easier to obtain, thanks to the power of Internet and the ability of alignments to attack enterprise networks (Blain, 2014).
Regardless Of the type of intrusion, will most likely happen at some point, given enough time and the current network configuration and security policy. Aircraft Solutions mission is to provide customer success while meeting cost. Quality, and schedule requirements. If unauthorized access to the systems occur due to the incorrect location of the firewall or the out-of-date rule sets. That mission Will most likely be compromised.Costs could increase due to the amount of administrative overhead needed to track down these intrusions. Quality could decrease if customer records are tampered with.
And schedules would be compromised if systems go down due to unauthorized system modifications, Aircraft Solutions wants to maintain looters customer relationships and secure repeat business. This will be virtually impossible to do with unsecured systems and an out-of- date security policy; customers would not want to continue doing business with an entity that loses their information or has compromised quality.In order to secure future success, it is recommended that Aircraft Solutions proceed with the solutions outlined here, These solutions should be implemented as soon s possible in order to immediately address the vulnerabilities noted above. In order to address the hardware configuration problem, the recommendation is to move the firewall from behind the main router to in front of it, so it is between the main router and the Internet, as is the design many organizations implement (Pizzazz, Karri, El Miramar, & Butadiene, 2013).
This way, all incoming traffic passes through the firewall first and helps protect the router from malicious attacks. However, moving the location of the firewall is not the only part of the solution: It is also recommended that Aircraft Solutions purchase a statutes inspection firewall. A fairly recent study shows that statutes inspection firewalls have increased throughput and smaller network delays over packet filtering firewalls when dealing with attempted network attacks (Hajjes teal. , 2013). In accordance to the research, the recommendation is to purchase a Cisco SASHAYS or SASHAYS.
Both are statutes inspection firewalls, but the SASHAYS provides up to 300 Mbps statutes inspection throughput and gigabit connectivity (“Cisco Compare”, 2014). The SASHAYS is not inexpensive at $1 ,424. 73 (Amazon. Com), but it is well worth the price. The SASHAYS is significantly cheaper at $341. 9 (Amazon.
Com) hut does not provide the throughput of the SASHAYS, Purchasing the new firewall and putting it in front tooth main router will certainly help Aircraft Solutions main headquarters, but the Commercial Division in Chula Vista still has to connect to the headquarters using the Internet with the current network configuration.A recommended solution to this is to either move the connection to Chula Vista to the same router Santa Ana is on, or purchase a new router behind the new firewall, The reason for this is because it will remove the dependency of the Internet connection for Chula Vista to connect to the quarters and not cause any impact if the Internet connection is interrupted.The recommended hardware is a Cisco 2821 router, available for approximately 5521 _g (Amazon.
Iron Addressing the policy vulnerability of having the firewall and router rule sets updated only every two years is fairly straight forward. Generally speaking, these rule sets should be updated much more frequently. As stated in a recent article, firewall policies are always subject to change and need updated on a regular basis; new network threats, such as worms, are a constant threat (Ill, 2012). The recommendation is to update these rule sets n at least a weekly basis; this includes researching What rules Will be needed since the previous change and thoroughly testing them.Plus, each Cisco device should the Cisco small business pro three year support service to help address any problems with maintenance, which is $70 for the three year period per device. Per Peeler (2011), it is also recommended that the firewall is backed up prior to every change so there is a restore point if the change causes problems. One may ask how changing the location of the firewall and updating the security policy would address the vulnerabilities mentioned previously.
Well, as mentioned previously, placing the firewall in front of the main router will cause all the Internet traffic to pass through the firewall. Statutes inspection firewalls keep track tooth data packets tort any given connection, so it can detect it the packets are invalid or potentially part of an attack and discard them before getting into the network. As far as the policy is concerned, keeping the rules up to date helps guard against the most recent viruses, worms, and new types of malicious attacks.After all, Aircraft Solutions would not want to have to wait for up to two years to guard against a new worm, It should be noted that there ill be additional costs outside of the new hardware and maintenance plan from Cisco. However, these costs should not come from the implementation; current employees of Aircraft Solutions should be able to implement the new hardware and update the security policy for the firewall and router rule sets. The additional costs will come from hiring a network engineer to maintain the firewalls and routers; this is a necessary cost to ensure the firewalls and routers are properly maintenance.The website Indeed.
Com indicates the average salary for a network engineer is approximately 588,000 per year. The solutions commended here for Aircraft Solutions can be extremely beneficial. The organization will have a more secure network, one that can help safeguard against malicious attacks. This improved security is something that can help keep customers satisfied and maintain relationships with them, as there is a significantly smaller chance of a security issue that would affect Aircraft Solutions ability to fulfill a customer order.Plus, Aircraft Solutions could have confidence that its network is secure and inform potential customers of its enhanced security, thus increasing the likelihood of new business.
Not everything about he solutions are positive; there are some downsides as well. For one, the costs associated with the network changes and the maintenance can be significant if Aircraft Solutions hires a network engineer. Plus, there can be network latency if a significant amount of data is passing through the firewall, potentially creating a bottleneck to the Internet.