Need help with some examples. Need 4-5 to fill the table. It is important to kno
ID: 3570990 • Letter: N
Question
Need help with some examples. Need 4-5 to fill the table.
It is important to know the different interconnections each system has. IT systems do not operate alone in the modern enterprise, so securing them involves securing their interfaces with other systems as well.
IT System Connection Table for four different IT systems. The table is located on your student website.
Note two systems they connect with and their connection type.
Note two security vulnerabilities the system may have and 2 to 4 ways each vulnerability could be potentially exploited.
IT System Connection Table
IT System
Target System
Connection Type
Possible Security Vulnerability
Related Risk
EXAMPLE
HR System
Identity Management System
Feeder File
File could be modified.
User rights might not be correctly updated.
1.
2.
1.
2.
1.
2.
1.
2.
3.
4.
IT System
Target System
Connection Type
Possible Security Vulnerability
Related Risk
EXAMPLE
HR System
Identity Management System
Feeder File
File could be modified.
User rights might not be correctly updated.
1.
2.
1.
2.
1.
2.
1.
2.
3.
4.
Explanation / Answer
target nachines: developer machines, database relaetd to them
connection type feeder file, remote connection
file can modified or deleted
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.