Evaluation of Cybersecurity Frameworks: Aviation Industry Assets

Verified

Added on  2023/05/30

|6
|860
|112
Report
AI Summary
This report focuses on cybersecurity frameworks applicable to the aviation industry, addressing issues like multitenancy and cloud bursting. It examines Cyber Physical Systems (CPS) and Industrial Control Systems (ICS) as deployment models, and Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) as service models. The analysis includes responsive, detective, and preventative information security protocols, highlighting their advantages and disadvantages. The report also emphasizes the importance of Service Level Agreements (SLAs) in setting performance standards and clarifying stakeholder roles. Finally, it discusses cloud-based vendor requirements, such as supply chain visibility and supplier capacity management, facilitated by platforms like Quick Base. The conclusion emphasizes the active use of cloud computing in aviation business processes and the management of both external and internal threats through cloud-based programs and well-defined SLAs. Desklib provides students access to similar solved assignments and study resources.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
CYBERSECURITY FRAMEWORK
Cybersecurity Framework
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1CYBERSECURITY FRAMEWORK
Table of Contents
Introduction................................................................................................................................2
Discussion..................................................................................................................................2
Deployment models...............................................................................................................2
Service Models.......................................................................................................................2
Information Security Protocols..................................................................................................3
Advantages and disadvantages of the protocols.........................................................................3
Service Level Agreements.........................................................................................................3
Cloud based vendor requirement...............................................................................................3
Conclusion..................................................................................................................................4
Reference....................................................................................................................................5
Document Page
2CYBERSECURITY FRAMEWORK
Introduction
The prime determination of this paper is to focus on the issues of multitenancy and
cloud bursting which arises in the businesses which use these aspects of cloud computing.
Two deployment models and two service models used for the protection of assets in the
aviation industry will be stated in this paper. The paper will also be focusing on the
advantages and disadvantages of the IS security protocol along with the paper will also be
focusing on the service level agreements and contracts. The cloud based vendor requirements
will also be stated in this paper.
Discussion
The issues associated with the multitenancy are capacity optimization, data security, a
huge amount of loads to the service. The challenges associated with the cloud bursting are
managing the configurations, communication latency and the method by which it handles the
security measures are the prime issues associated to the cloud bursting.
Deployment models
Considering the cyber security framework, the two different types of deployment
models used for maintaining the information asset of the aviation industry are the Cyber
Physical Systems (CPS) and the Industrial Control Systems (ICS) (Bagheri et al., 2015).
Service Models
The two type of service models which are used in the aviation industry are
considering the security of the assets in the aviation industry are Infrastructure as a Service
(IaaS) and Platform as a Service (PaaS).
Document Page
3CYBERSECURITY FRAMEWORK
Information Security Protocols
The three different types of information security controls which provide security
during the s-supply and the business processes are Responsive, Detective and Preventative.
Advantages and disadvantages of the protocols
The advantages different information security controls are its ability to deal with the
malicious attacks, deletion of the existing malicious attacks, prevention of the unauthorized
access to the network and securing the confidential data from the external threats (Benaroch,
2018). The drawbacks associated with the information security controls are its strict
regulations, difficulty to working for non-technical users, need of constant monitoring,
effective management of the resources (Ab Rahman & Choo, 2015). These advantages and
disadvantages should be highly considered during the transitional developmental phase of the
aviation industry.
Service Level Agreements
SLA or Service Level Agreements are very much important in the aviation industry,
as it sets boundaries and expectations of the data center service. A clear standard of
performance is maintained with the help of the SLA which states the role of each stakeholder
associated with the aviation industries (Oktadini & Surendro, 2014). These type of contracts
helps to bring clarity among the different stakeholders of this industry. Customer
commitments are maintained with the help of these documented agreements. Prevention of
the threats can be accomplished with the help of these types of contracts.
Cloud based vendor requirement
The performance of the supplier, supply chain visibility, material visibility, supplier
capacity demand and the supply chain management in the aviation industry can be managed
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4CYBERSECURITY FRAMEWORK
with the help of cloud based programs such as Quick Base which deploys SaaS in the
aviation industry.
Conclusion
From the above paper, it can be concluded that cloud computing can be actively used
in the business processes of the aviation industry. It can be also concluded that the external
threats associated with the assets of the industry can also be managed with the help of the
cloud based programs such as the Quick Base and the internal threats can be handled with the
help of the SLA’s which states the level of responsibilities and accountabilities of the threats.
Document Page
5CYBERSECURITY FRAMEWORK
Reference
Ab Rahman, N. H., & Choo, K. K. R. (2015). A survey of information security incident
handling in the cloud. computers & security, 49, 45-69.
Bagheri, B., Yang, S., Kao, H. A., & Lee, J. (2015). Cyber-physical systems architecture for
self-aware machines in industry 4.0 environment. IFAC-PapersOnLine, 48(3), 1622-
1627.
Benaroch, M. (2018). Real Options Models for Proactive Uncertainty-Reducing Mitigations
and Applications in Cybersecurity Investment Decision Making. Information Systems
Research.
Oktadini, N. R., & Surendro, K. (2014, November). SLA in cloud computing: Improving
SLA's life cycle applying six sigma. In Information Technology Systems and
Innovation (ICITSI), 2014 International Conference on (pp. 279-283). IEEE.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]