It system connection table

Assignment Help Management Information Sys
Reference no: EM13806795

IT System Connection Table

When securing the modern enterprise, consider that IT systems do not operate alone. Securing them involves securing their interfaces with other systems as well. It is important to know the different interconnections each system may have.

Fill out the following table for four different IT systems.

  • Note two enterprise systems they connect with and their connection type.
  • Note two security vulnerabilities the connection may have and 2 to 4 ways each vulnerability could be potentially exploited.

Some Comments:

  • An example row has been entered into the table. This is only an example and should not limit what you do.
  • Keep in mind that enterprise systems cover a certain task in the enterprise (HR, CRM, Identity Management, etc.). They are not the components of a system (such as servers).
  • Connections can often be a direct connection/pipe, a file, a common database or something else.
  • The vulnerability is what would make the connection vulnerable to an attack.
  • The related risk is an attack that could target the weakness.

IT System

Target System

Connection Type

Possible Security Vulnerability

Related Risk

EXAMPLE

 

HR System

Identity Management System

Feeder File

File could be modified.

User rights might not be correctly updated.

 

1.

2.

1.

2.

1.

2.

1.

2.

3.

4.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Reference no: EM13806795

Questions Cloud

Write a discuss paper about the poem missing you by shu ting : Write a discuss paper about the poems "Missing You" by Shu Ting, "Somnambulist Ballad" by Fredereico Lorca and "A family turn" by William E. Stafford.
Describe the sampling technique : Describe the sampling technique that Jack used. Using the sampling techniques described, which type technique do you think Jack used?
Article job shop quality : Download the Article "Job Shop Quality" Read the article and answer the following questions:
What is the state of the supply and demand for health care : Based on the reading for the week and your independent research. What is the state of the supply and demand for health care professionals in your area
It system connection table : IT System Connection Table- When securing the modern enterprise, consider that IT systems do not operate alone. Securing them involves securing their interfaces with other systems as well
Implementation of a business process re-engineering : Please explain an ethical challenge faced by a manager considering the implementation of a Business Process Re-engineering Program.
Research the pros and cons of six software systems : Use the Internet, course materials and web resources to research the pros and cons of six software systems designed to perform these functions. Then, write a 5 - 7 page Software Recommendations Report that you will submit to the chief executive.
Primary purpose or for the use of a strategy : 1. According to the Business community, What is the primary purpose or for the use of a Strategy:
Business process modeling notation : Business Process Modeling Notation (BPMN) is a method of illustrating business processes in the form of a diagram similar to a flowchart.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd