Friday, November 15, 2019

Aircraft Solutions Security Assessment And Recommendations Information Technology Essay

Aircraft Solutions Security Assessment And Recommendations Information Technology Essay The purpose of this assessment is to address weaknesses and provide recommendations on the network security of Aircraft Solutions. Aircraft Solutions is a recognized leader in the design and fabrication of component products and services for companies in the electronics, commercial, defense, and aerospace industry. Aircraft Solutions mission is to provide customer success through machined products and related services, and to meet cost, quality, and schedule requirements. Two weaknesses were found in regards to the companys network security. The first weakness is a hardware weakness; not having an AAA server for user authentication and authorization; second, not having a Network-based Intrusion Detection System (IDS) in use. The recommended solutions are to deploy an AAA server for user authentication and authorization to company resources, and deploy a combination Host and Network-based IDS for overall monitoring of the companys enterprise. Company Overview Aircraft Solutions designs and fabricates component products and services for companies in the electronics, commercial, defense, and aerospace industry. The mission of Aircraft Solutions is to provide customer success through machined products and related services, and to meet cost, quality, and schedule requirements. Much of its equipment is automated to increase production while reducing costs. The companys workforce has a large skill base: design engineers, programmers, machinists, and assembly personnel to work its highly-automated production systems. The company strategy is to offer low-cost design and computer-aided modeling packages to customers to reduce their development expenses. Aircraft Solutions uses Business Process Management (BPM) to handle end-to-end processes that span multiple systems and organizations. The BPM system is designed to connect customers, vendors, and suppliers to share information and maintain a timely business dialogue. BPM also aligns internal business operations with IT support to maintain production in support of customer requirements. Security Weaknesses Two security vulnerabilities were found in regards to the companys network security. The first vulnerability is a hardware weakness; not having an Authorization, Authentication, and Accounting (AAA) server for user authentication and authorization; second, not having a Network-based Intrusion Detection System (IDS) in use. Hardware Weakness AAA Server Aircraft Solution has a need for an AAA server to authenticate and authorize legitimate user credentials for its on-site headquarters, intranet remote offices, and extranet for suppliers, contractors, and suppliers. An AAA infrastructure is required in order to authorize and authenticate users to company resources; access control. AAA servers provide a mechanism for encrypted authentication of users and can be used to control access to the network. Authentication verifies the identity of a user by employing a database of usernames and passwords. Authorization assigns network rights or permissions to an authenticated user. Authorization records or logs network usage of authentication and authorized users. Accounting can be used to record information about security breaches. (Kaeo, 2004) Software Weakness Combination Host and Network-based IDS Aircraft Solutions employs a host-based IDS on the servers in the corporate office. I think having a combination of host-based IDS on critical servers and a network-based IDS by the firewall for each network segment is better. A good strategy for IDS would be to use a combination of host and network IDS. A Network-based IDS provides an overall perspective of your network and is useful for identifying distributed attacks, whereas a Host-based IDS would stop most valid threats at the host level. (Kaeo, 2004) An IDS protects a network like an alarm system. When an IDS detects that something is wrong and sees it as an attack, it can take corrective action itself or notify a management system, which would alert a network administrator to take some action. Intrusion Detection Systems are important not only in terms of stopping an attack, but also in maintaining a permanent time-stamped log of intrusion attempts on a host system. An IDS allows a company to know that they are being attacked and who is attacking them, how they are doing it, and what they might be looking for. An IDS is the watchdog that adds a layer of defense over all network security systems and policies. Definition of Solution Deployment of AAA Server Aircraft Solutions needs to centrally manage who has authorization to remotely access network resources from anywhere, which network resource are those remote users authorized to access, and any related issues. Terminal Access Controller Access Control System Plus (TACACS+) and Remote Authentication Dial-In User Service (RADIUS) are the two protocols for implementing the AAA technology framework. A centralized AAA server that uses TACACS+ protocol will provide a centralized location for Authentication, Authorization, and Accounting for Cisco devices. User authentication on Cisco devices can be done in one or two ways; a local database of users on the server, or by a TACACS+ server.   TACACS+ is a Cisco proprietary protocol that uses TCP as a transport protocol and has the ability to separate authentication, authorization, and accounting as separate services. The AAA server acts as a proxy server by using TACACS+ to authentication, authorize, and accounting for access to Cisco routers and network access servers. The Authentication function of an AAA server can provide access control; this proves a useful function in environments where theres a requirement to restrict access to network devices or applications per individual authenticated user. (Kaeo, 2004) Software Weakness Combination Host and Network-based IDS Aircraft Solutions needs to deploy a Network-based IDS in combination with its Host-based IDS. I think Aircraft Solutions should have a Network-based IDS in order to monitor all traffic to and from the Internet to see how many hackers or other malicious activities are trying to access the companys network. In addition to seeing Internet traffic, a Network-based IDS can see traffic going to a firewall or VPN and to other attached devices. A combination IDS will also enable Aircraft Solutions to better monitor and effectively respond to a security incident by employing real-time capability. A Network-base IDS is designed to sense malicious activity occurring on a network and provides real-time alerting to Administrators to investigate. The lack of not having such a system leaves Aircraft Solutions at risk by not having the ability to see malicious network traffic and relying on system events to be alerted of malicious activity. (Kaeo, 2004) Justification Deployment of AAA Server The vendor solution Id select would be Cisco hardware. Cisco Secure Access Control Server (ACS) would be best suited for use as an AAA Server. My justification for that is Cisco ACS server covers the three main functions of Authentication, Authorization, and Accounting; and the use of TACACS+ protocol is Cisco proprietary protocol. Aircraft Solutions has multiple users that take part in end-to-end processes that span multiple systems and organizations. A Business Process Management (BPM) system is in place to handle all of these processes. Systems are access by users at different levels of need to know and these users are responsible for entering, processing data, and information in order to generate reports to be used for decision-making. Customer data such as project information, computer-aided design, and development models are sorted and stored in designated servers. The Design Engineering department is responsible for reviewing the electronic models, interacting with the customer and making necessary modifications with customer approval, then placing them in an Engineering Release (ER) directory for programming. As soon as these electronic models are released, programmers use them to create production programs. All final programs must be thoroughly verified for accuracy before releasing to the Proof For Production (PFP) directory for manufacturing to make the production first article. From the production floor, machinists download PFP programs directly to their DCNC (Direct Computer Numerical Control) machines for execution. After any further processing completed products are inspected for verification to customer requirements, then they are moved to the shipping department for delivery. Looking at how Aircraft Solutions BPM works, there is definitely a need for central user authentication and authorization. An AAA server with TACACS+ can be used to manage the large numbers of user IDs and passwords in a centralized database, providing a scalable network security solution. (Oppenheimer, 2004). An AAA server will ensure access to design, production, accounting, sales, and HR servers only go to authorized engineers and personnel. An AAA server will also track all users activity and attempts to access network resources; event logging. Example, if someone is trying to access production programs and theyre not authorized it will be logged, allowing for an investigation of the incident if required. Software Weakness Combination Host and Network-based IDS Aircraft Solutions has many users accessing its network, be it suppliers, customers, branch office employees etc A Network-based IDS is needed to protect the network. Similar to a home owner having an alarm system to ward off or to alert them of an intruder. I see an IDS in this fashion. An IDS detects if someone tries to break in through the firewall or manages to break in the firewall security and tries to have access on any system in the trusted side and alerts the system administrator in case there is a breach in security. (SANS Institute, 2001) Here are some advantages of Network-based IDS: Easier to deploy: Network based IDS are easier to deploy as it does not affect existing systems or infrastructure. The network-based IDS systems are Operating system independent. A network based IDS sensor will listen for all the attacks on a network segment regardless of the type of the operating system the target host is running. Detect network based attacks: Network based IDS sensors can detect attacks, which host-based sensors fail to detect. A network based IDS checks for all the packet headers for any malicious attack. Many IP-based denial of service attacks like TCP SYN attack, fragmented packet attack etc. can be identified only by looking at the packet headers as they travel across a network. A network based IDS sensor can quickly detect this type of attack by looking at the contents of the packets at the real time. Retaining evidence: Network based IDS use live network traffic and does real time intrusion detection. Therefore, the attacker cannot remove evidence of attack. This data can be used for forensic analysis. On the other hand, a host-based sensor detects attacks by looking at the system log files. Lot of hackers are capable of making changes in the log files so as to remove any evidence of an attack. Real Time detection and quick response: Network based IDS monitors traffic on a real time. So, network based IDS can detect malicious activity as they occur. Based on how the sensor is configured, such attack can be stopped even before they can get to a host and compromise the system. On the other hand, host based systems detect attacks by looking at changes made to system files. By this time critical systems may have already been compromised. Detection of failed attacks: A network based IDS sensor deployed outside the firewall can detect malicious attacks on resources behind the firewall, even though the firewall may be rejecting these attempts. This information can be very useful for forensic analysis. Host based sensors do not see rejected attacks that could never hit a host inside the firewall. (SANS Institute, 2001) Impact on Business Processes I think Aircraft Solutions will have a positive result from deploying an AAA server and adding Network-based IDS to its network enterprise. The impact to its business processes should be transparent, having little negative effect. Using an AAA server to provide authentication and authorization and accounting gives network administrators an added layer of protection in securing Aircraft Solutions network infrastructure. It allows access to network resources to be better controlled and delegated. An example could be branch office users connecting to the network; they can be screened against the user database and a custom policy that controls what device a user can access and what services on a particular device that a user can access. If a users account is compromised that account can be disabled. Using these two tools to correct the identified security weaknesses is a benefit. The only thing that may be viewed as negative is the access speed may be slightly slower. However, I think a slight decrease in access speed to the user is out weighted by having the access control and network monitoring needed to ensure Aircraft Solutions network infrastructure has a more layered defense. Security trumps a speedy user†¦ Summary In conclusion, I identified two areas of security weakness in Aircraft Solutions deployment of an AAA server and Network-based IDS. These are two tools that are necessary in any network enterprise environment. Implementing these recommendations will better ensure security of the companys resources, better overall enterprise integrity, and provide added layers of defense by having access control over network resources and real-time monitoring of network activity. Figure 1: Revised Aircraft Solutions Network Infrastructure

Tuesday, November 12, 2019

Economic Changes of the Ju/’Hoansi

The Ju'/hoansi started as a food foraging society, a mode of subsistence involving some combination of hunting, fishing, and gathering wild plant foods. During the early days, these people would travel long distances within a restricted territory and make seasonal moves to tap into naturally available food sources. Men and women were both equally important in work as well as necessary for survival. Although the men were usually the hunters and women the gatherers, it was not out of character for both sexes to do both jobs. Women were able to share the food they collected with whomever they wanted.Men on the other hand had different rules and constraints they had to go by in distribution of meat. The sharing was done in units of 25 people rather than just one family, they didn't have to share with everyone but no one went hungry within the unit. One way of preserving large amounts of meat was to make jerky. When hunting and killing an elephant would bring many pounds of meat, it would be stored by drying it out in long strips and could be packed easily as they moved to the next camp. In the 1970's the Ju'/hoansi were taken from their homeland, which caused a social change in their people.Jobs were given and paid for with monies. Men were given more jobs then women, which caused a significant change in the economy. Women were given welfare by the government and were isolated at their homes with nothing to do. Their purpose was diminished and they had too much time on their hands. Disease hit the people causing many deaths and tragedy. The South African Government came bringing liquor and many men fought each other, killing off their own people. The change brought to the Ju'/hoansi was a tragedy, they were not accustomed to this new way of life, nor had they been brought up by this kind of culture to be able to adjust.Some of the people went back to their homeland, never to be the same as the early days of foraging for food. They tried to shift to agriculture whic h called for a different understanding than what they were used to. Pre-planning and organization was needed for agriculture. The people had been hunting and gathering, which they did while traveling without planning. It was a different way of life, although some success came for a few, it was not common. Like many others of their kind, they were edged out of their traditional habitats and the foraging cultures have nearly disappeared.

Sunday, November 10, 2019

Important of Learning Foreign Language

Important of learning foreign language Language is systemic sounds or symbol in order to communicate with other people. In a world that increasingly interdependent, we can no longer afford to remain monolingual. Success depends in large measure on ability of an individual to function as members of global village whose members speak a variety of foreign language. Learning language is no longer past time but it is necessity. Learning more than one language is benefits to us because learning foreign languages can help us in working or business, able to travel to a foreign country, foreign language as a secret communication.One major part of learning foreign language is learning foreign languages can help us in working or business. If our work involves regular contact with speakers of foreign language, being able to talk to them with foreign language can help us communicate with them. It may also help us to make sales and negotiate secure contracts. Knowledge of learning foreign language can increase our chances of finding a new job, getting a promotion or transfer overseas, or of going on foreign business trips.Many English-speakers do not bother to learn foreign language because they believe that most of people they do business with foreign countries can speak English, and if they do not able to speak English, interpreters can be used. Lack of knowledge of foreign language puts the English-speakers at disadvantages. In a meeting, for an example, the people on the other side discuss things amongst themselves in their own languages without the English-speakers understanding. Interpreters slow down everything.In any socializing after meeting, the locals will feel more comfortable using their own language rather than English. The reason of learning foreign language is often being able to travel to a foreign country. Being able to speak native language with the locals has benefits in and of ourselves. Many English speakers seem to believe that wherever they go on holi day they can get by speaking English, so there's no point in learning any other languages. If people don't understand you all you have to do is speak slowly and turn up the volume. However, by putting forth the effort to speak with people in their own languages it shows the travelers are doing their best to take care of themselves in different environment. The locals can see their effort and willing to help the travelers. It also good because they can go restaurant, speak with the locals without help of friends or translator. Speaking to the locals is often highlight of many people’s trips. It gives insight on a new way of life and develops a new friendships. The another reason of learning foreign language is we can keep foreign language as a secret communication.The student has study it with a friend, both of you can converse without others knowing what you are saying. This is something that can be immensely helpful when speaking to family about private matters while out in public, or making important decisions in public. For example, a person may be making a large purchase, such as a car, and want to discuss some of its issues but you don’t want to have others eavesdropping. In this situation you could use your other language, especially if it is a language that not many people study, to talk to whoever came along with you.Eavesdropping is something that everyone does, but also something that everyone hates. This problem is easily avoided if the student studies a language that not many people study. Another way to help this is if you can find someone to study with. That, in and of itself, is encouragement. It keeps you accountable and learning with a friend is much more enjoyable. In a conclusion, learning foreign language is important around the world and it helps us in our daily life.The reason that we need to learn foreign language because learning foreign languages can help us in working or business, able to travel to a foreign country, for eign language as a secret communication. Whatever may be the reasons to learn a foreign language the bottom line is an incredible experience, with incredible benefits, this learning process is one of the most satisfying ones because we can use it on our day to day activities, not only for understanding what a block of text says but it makes you aware of other cultures and other people.

Friday, November 8, 2019

How to Write a Literacy Narrative

How to Write a Literacy Narrative I first learned to read at the age of three while sitting on my grandmother’s lap in her high-rise apartment on Lake Shore Drive in Chicago, IL. While flipping casually through Time magazine, she noticed how I took a keen interest in the blur of black and white shapes on the page. Soon, I was following her wrinkled finger from one word to the next, sounding them out, until those words came into focus, and I could read. It felt as though I had unlocked time itself. What Is a â€Å"Literacy Narrative?† What are your strongest memories of reading and writing? These stories, otherwise known as â€Å"literacy narratives,† allow writers to talk through and discover their relationships with reading, writing, and speaking in all its forms. Narrowing in on specific moments reveals the significance of literacy’s impact on our lives, conjuring up buried emotions tied to the power of language, communication, and expression. To be â€Å"literate† implies the ability to decode language on its most basic terms, but literacy also expands to one’s ability to read and write the world - to find and make meaning out of our relationships with texts, ourselves, and the world around us. At any given moment, we orbit language worlds. Soccer players, for example, learn the language of the game. Doctors talk in technical medical terms. Fishermen speak the sounds of the sea. And in each of these worlds, our literacy in these specific languages allows us to navigate, participate and contribute to the depth of knowledge generated within them. Famous writers like Annie Dillard, author of The Writing Life, and Anne Lammot, Bird by Bird, have penned literacy narratives to reveal the highs and lows of language learning, literacies, and the written word. But you don’t have to be famous to tell your own literacy narrative - everyone has their own story to tell about their relationships with reading and writing. In fact, the Digital Archive of Literacy Narratives at the University of Illinois at Urbana-Champaign offers a publicly accessible archive of personal literacy narratives in multiple formats featuring over 6,000 entries. Each shows the range of subjects, themes, and ways into the literacy narrative process as well as variations in terms of voice, tone, and style. How to Write Your Own Literacy Narrative Ready to write your own literacy narrative but don’t know where to begin? Think of a story linked to your personal history of reading and writing. Perhaps you want to write about your favorite author or book and its impact on your life. Maybe you remember your first brush with the sublime power of poetry. Do you remember the time you first learned to read, write or speak in another language? Or maybe the story of your first big writing project comes to mind. Make sure to consider why this particular story is the most important one to tell. Usually, there are powerful lessons and revelations uncovered in the telling of a literacy narrative.Wherever you begin, picture the first scene that comes to mind in relation to this story, using descriptive details. Tell us where you were, who you were with, and what you were doing in this specific moment when your literacy narrative begins. For example, a story about your favorite book may begin with a description of where you were when the book first landed in your hands. If you’re writing about your discovery of poetry, tell us exactly where you were when you first felt that spark. Do you remember where you were when you first learned a new word in a second language? Continue from there to explore the ways in which this experience had meaning for you. What other memories are triggered in the telling of this first scene? Where did this experience lead you in your writing and reading journey? To what extent did it transform you or your ideas about the world? What challenges did you face in the process? How did this particular literacy narrative shape your life story? How do questions of  power or knowledge come into play in your literacy narrative? Writing Toward a Shared Humanity Writing literacy narratives can be a joyful process, but it can also trigger untapped feelings about the complexities of literacy. Many of us carry scars and wounds from early literacy experiences. Writing it down can help us explore and reconcile these feelings in order to strengthen our relationship with reading and writing. Writing literacy narratives can also help us learn about ourselves as consumers and producers of words, revealing the intricacies of knowledge, culture, and power bound up in language and literacies. Ultimately, telling our literacy stories brings us closer to ourselves and each other in our collective desire to express and communicate a shared humanity.​ Amanda Leigh Lichtenstein is a poet, writer, and educator from Chicago, IL (USA) who currently splits her time in East Africa. Her essays on arts, culture, and education appear in Teaching Artist Journal, Art in the Public Interest, Teachers Writers Magazine, Teaching Tolerance, The Equity Collective, AramcoWorld, Selamta, The Forward, among others.

Wednesday, November 6, 2019

A-team case Essays

A-team case Essays A-team case Essay A-team case Essay The A-Team was established under a threat from Chinese companies as well as because of the declining demand for premium-priced bicycles In world markets. Under pressure, the cohesion of a group tends to be stronger. Thus Clans and Merriam Industry Co. Ltd (Merriam) decided to put aside their business competition and brought their suppliers together to develop a solution and to regain the reputation of Taiwan bicycle industry. Moreover, although these firms were competitors, the founder of Giant and the founder of Merriam were old friends and both led the bicycle industry in Taiwan. 2. Is there some relevance that the firms were all Taiwanese firms The Corporate Synergy Development Center (CDC), a semi-government agency, was created to assist Taiwanese firms in establishing production networks. It was characterized as a system of production in firms that were simultaneously specialized in a particular task but flexible in serving a wide range of market demands. 3. What kind of activities/mechanisms contributed to the mutual learning among A-Team members Firstly, the coaching team, which composed from Giant, CDC and Toyota Motors, had both the expertise needed and legitimacy. The team was helpful to Introduce TIPS and SIRS. Secondly, an Internal A-Team was formed by each member company to work with other members. It promoted mutual learning. Thirdly, in 2004, more learning and sharing activities were designed for co- development of innovative and high-value bicycles and parts. Thus those activities can teach most Taiwanese firms to learn how to work with others in developing new products. Fourthly, the e-platform was established for all members could work getter as well as the A-Team members and clients to exchanges Information and manage development projects. Finally, A-Team members engaged In monthly visits by consultants from Toyota Motors, discussion sessions, visiting members with good performance in TIPS and presentation by each member every five months. These activities can increase the interaction between individuals in member firms. 4. Is cooperating with a direct competitor (such as between Merriam and Giant) a viable prospect for the A-Team In the long term The Initial success of the A-Team shows hat how companies working together can enhance their competitiveness to counter external threats. The companies In the bicycle Industry in Taiwan know that there Is strong domestic and international demand for their high-end products. This is an implication for companies in other industries and these companies may potentially imitate the moves of the A-Team. 5. Is it okay if one partner gains more from the alliance than others That is okay. If the members gain more knowledge, skills and techniques form the alliance or others, they will be asked to contribute more own quenches and knowledge to others.

Sunday, November 3, 2019

Interpersonal and Intercultural Paper Essay Example | Topics and Well Written Essays - 1250 words

Interpersonal and Intercultural Paper - Essay Example The senior management must be willing to tolerate dissent in order to ensure informed and responsible decision-making in appointing effective departmental management heads. Richard Johanneson (2002) concluded that ethical issues that arise in human behavior have a significant impact on other people when the behavior entails conscious choice of means and ends, and when the behavior is judged by standards of right and wrong. According to utilitarian ethics, interpersonal communication ethics must aim at benefiting all parties and should focus on the consequences of the decisions or actions. On the other hand, virtue ethics requires the communicators to respect the moral character and dignity of a person during communication and avoid unethical practices such as deception, coercion, tapping telephones and inappropriate jokes.The current changes in departmental management heads have shifted the perceptions of power in the hospital thus leading to conflicts. The event has generated power imbalances and misuse of power thus hindering effective communication and interpersonal relationships in the hospital. The junior staff members perceive the new departmental heads as very powerful due to the position power attached to their title in the hospital. The new management of the department has excess informational power and have hindered effective horizontal communication in the hospital.Conflicts at the hospital can lead to hostility and resentment thus hurting interpersonal relationships between the employees.

Friday, November 1, 2019

Ethical Legal Dilemma Advanced Practice Nursing Case Study I Week 3 Assignment

Ethical Legal Dilemma Advanced Practice Nursing Case Study I Week 3 - Assignment Example Though it may seem callous to say, the main objective is to draw a line that crosses both an ethical and a legal aspect of such a scenario in order to negate any sort of liability that may befall the hospital should anything happen (Grant & Ballard, 2011). Physician Assisted Suicide (PAS) is a very controversial subject with both sides holding strong arguments on why it should or should not be accepted. On one hand its seen as the simple and outright killing of another individual yet on the other it can be said that such an act cannot be considered to be murder as it involves the willing participation of the so called victim (Lachman, 2010). What can be considered to be the best option as a result is the creation of a strong outline for the circumstances under which PAS is allowed for an individual (Calandrillo, 1998). This is due to the fact that in some cases an individual who is bound to die in the end is simply being given a choice of suffering through out till the end or choosing to go in a more peaceful manner but earlier than would have been the case. An individual should have the right to be able to make such a decision for themselves (Lachman,