student name:
When securing the modern enterprise, consider that IT systems do not operate alone. Securing them involves securing their interfaces with other systems as well. It is important to know the different interconnections each system may have.
Fill out the table below for four IT systems. Include the following:
Consider the following as you build your table:
IT System |
Target System |
Connection Type |
Possible Security Vulnerability |
Related Risk |
Example HR System |
Identity Management System |
Feeder File |
File could be modified. |
User rights might not be correctly updated. |
Example Customer Relationship Management (CRM) |
1. Sensitive Data 2. System Data |
Web communications (https) |
|
|
Please type your answer
IT System | Target System | Connection Type | Possible Security Vulnerability | Related Risks |
Employee Management System | Identity Management System | Database Connection | Misconfiguration | System unavailability |
Home Systems | Home desktops or Laptops | External Drives | No antivirus or firewalls | Loss of data |
Data Warehouses | Information Management System | Web communications (https) | Denial of service or Man in the middle | Unavailability of statistics and data |
Enterprise Resource Planning System | Management System | Feeder File | File could be modified. | Access rights might not be correctly updated. |
Get Answers For Free
Most questions answered within 1 hours.