Description of this paper

CMGT/430 Version 5




IT System Connection Table;When secur ing the modern enterprise, consider that IT systems do n o t operate alone. S ecuring them involves securing their interfaces with other systems as well. I t is important to know the different interconnections each system may have.;Fill out the following table for four different IT systems.;? Note two enterprise systems they connect with and their connection type.;? Note two security vulnerabilities the connection may have and 2 to 4 ways each vulnerability could be potential ly exploited.;Some Comments;? An example row has been entered into the table. This is only an example and should not limit what you do.;? Keep in mind that enterprise systems cover a certain task in the enterprise (HR, CRM, Identity Management, etc.). They are not the components of a system (such as servers).;? Connections can often be a direct connection/pipe, a file, a common database or something else.;? The vulnerability is what would make the connection vulnerable to an attack.;? The related risk is an attack that could target the weakness.;Student Name


Paper#71449 | Written in 18-Jul-2015

Price : $27