It system connection table

Assignment Help Management Information Sys
Reference no: EM13806795

IT System Connection Table

When securing the modern enterprise, consider that IT systems do not operate alone. Securing them involves securing their interfaces with other systems as well. It is important to know the different interconnections each system may have.

Fill out the following table for four different IT systems.

  • Note two enterprise systems they connect with and their connection type.
  • Note two security vulnerabilities the connection may have and 2 to 4 ways each vulnerability could be potentially exploited.

Some Comments:

  • An example row has been entered into the table. This is only an example and should not limit what you do.
  • Keep in mind that enterprise systems cover a certain task in the enterprise (HR, CRM, Identity Management, etc.). They are not the components of a system (such as servers).
  • Connections can often be a direct connection/pipe, a file, a common database or something else.
  • The vulnerability is what would make the connection vulnerable to an attack.
  • The related risk is an attack that could target the weakness.

IT System

Target System

Connection Type

Possible Security Vulnerability

Related Risk

EXAMPLE

 

HR System

Identity Management System

Feeder File

File could be modified.

User rights might not be correctly updated.

 

1.

2.

1.

2.

1.

2.

1.

2.

3.

4.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Reference no: EM13806795

Questions Cloud

Write a discuss paper about the poem missing you by shu ting : Write a discuss paper about the poems "Missing You" by Shu Ting, "Somnambulist Ballad" by Fredereico Lorca and "A family turn" by William E. Stafford.
Describe the sampling technique : Describe the sampling technique that Jack used. Using the sampling techniques described, which type technique do you think Jack used?
Article job shop quality : Download the Article "Job Shop Quality" Read the article and answer the following questions:
What is the state of the supply and demand for health care : Based on the reading for the week and your independent research. What is the state of the supply and demand for health care professionals in your area
It system connection table : IT System Connection Table- When securing the modern enterprise, consider that IT systems do not operate alone. Securing them involves securing their interfaces with other systems as well
Implementation of a business process re-engineering : Please explain an ethical challenge faced by a manager considering the implementation of a Business Process Re-engineering Program.
Research the pros and cons of six software systems : Use the Internet, course materials and web resources to research the pros and cons of six software systems designed to perform these functions. Then, write a 5 - 7 page Software Recommendations Report that you will submit to the chief executive.
Primary purpose or for the use of a strategy : 1. According to the Business community, What is the primary purpose or for the use of a Strategy:
Business process modeling notation : Business Process Modeling Notation (BPMN) is a method of illustrating business processes in the form of a diagram similar to a flowchart.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Idea of papers organization and structure

Write a summary that is well written and has a clear idea of paper's organization and structure and

  Erp1 how does the selection of sap modules change the

erp1. how does the selection of sap modules change the overall implementation project as defined in the asap

  Until recently hur jae-hoon could end debate with junior

until recently hur jae-hoon could end debate with junior staff members just by declaring that the discussion was over.

  What is difference between business and systems integration

Explain why it is important for managers at all levels to be involved with decisions regarding the use and implementation of information system.

  Research the key terms applications software

Research the key terms "Applications Software", "Application Design", "Software Design"; find a journal publication pertaining to the subject, and write a 1-2 pages APA format report, summarizing the paper.

  Implementation of a bi crm or bom applicationusing the

implementation of a bi crm or bom applicationusing the information gathered in the group project put together the

  Analisys of problemwe have large regional company with at

analisys of problemwe have large regional company with at network that supplies goods to cafeterias grocery stores and

  What should be your decision strategy for isurf

ou are a marketing manager for a newly developed tablet computer - ISurf. You are considering whether your company needs to produce this product or not. You estimate that the market for ISurf will be either strong or weak. What should be your deci..

  Operational aspects of l''oreal corporation

your impressions of the operational aspects of L'oreal Corporation and Identify opportunities for innovation or improvement. Explain.

  What is the mindset required to properly protect

what is the mindset required to properly protect information? what role does reasoned paranoia play in the minded and

  Managing accounting what are the limitations extensions of

what are the limitations amp extensions of the burns amp scapens framework for studying management accounting

  Various types of information systems

Investment in IT has the potential to give your organization a competitive edge. Discuss this statement in the light of what you learned in chapters 1,2&3?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd