Fill out the it system connection table

Assignment Help Management Information Sys
Reference no: EM131971350

Assignment: IT System Connection Table

When securing the modern enterprise, consider that IT systems do not operate alone. Securing them involves securing their interfaces with other systems as well. It is important to know the different interconnections each system may have.

Fill out the following table for four different IT systems.

• Note two enterprise systems they connect with and their connection type.
• Note two security vulnerabilities the connection may have and two to four ways each vulnerability could be potentially exploited.

Additional Comments:

• An example row has been entered into the table in blue. This is only an example and should not limit what you do.

• Keep in mind that enterprise systems cover a certain task in the enterprise (HR, CRM, Identity Management, etc.). They are not the components of a system (such as servers).

• Connections can often be a direct connection/pipe, a file, a common database, or something else.

• The vulnerability is what would make the connection vulnerable to an attack.

• The related risk is an attack that could target the weakness.

IT System

Target System

Connection Type

Possible Security Vulnerability

Related Risk

EXAMPLE:  HR System

Identity Management System

Feeder File

File could be modified.

User rights might not be correctly updated.

 

1.
2.

1.
2.

1.
2.

1.
2.
3.
4.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Reference no: EM131971350

Questions Cloud

Write a business report on developing business idea : Write a business report on Developing Business Idea - hink of these as roughly a page each when you are writing. You may choose to reduce or elaborate on some
Create a six router network : Routing and Switching Assignment - Create a 6 router network where 3 routers are connected to OSPF AREA 0 (Classroom) via Ethernet switch
Struggling writing my reflection paper : Struggling writing my reflection paper. Any advice on getting started?
What are some contemporary films : What are some contemporary films that still portraying stereotypes, especially in the american cinema?
Fill out the it system connection table : Fill out the IT System Connection Table. Note two security vulnerabilities connection may have and four ways each vulnerability could be potentially exploited.
What will the defendant argue in this case : The evidence shows that the driver was not using a shoulder harness, did not lock the door, and was intoxicated at the time of the accident.
Australopithecusand paranthropus : Should there be one genus (Australopithecus) or two different genera (Australopithecusand Paranthropus)? Why?
Interest in reviving classical subjects and ideals : How did artists of the renaissance reflect the spirit of humanism and interest in reviving classical subjects and ideals?
State board of nursing and the american nurses association : What is the functional difference between the state board of nursing and the american nurses association

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd