complete a IT System Connection Table for four different IT systems

Instructions for Assignment #1:

 

I need someone to complete a IT System Connection Table for four different IT systems, which is attached below. The table consists of a 1 page document in which you must list 4 different modern enterprise systems and secure them as well as their interfaces. The assignment must be in APA format with no words that end in “ed”, everything must be in future or present tense. Work must be 100% original and will be checked for plagiarism before the final payment is made.. Assignment must have at least 2 references.

Note: the attached table has more information and an example of how it should be done.

  1. click here for more information on this paper

Assignment Instructions.

It is important to know the different interconnections each system has. IT systems do not operate alone in the modern enterprise, so securing them involves securing their interfaces with other systems as well.

 

 

 

The top line of the table is an example but of the data that goes into the table but each of the four systems must have a least 2 examples of Target System, Connection Type, Possible Security Vulnerability and at least 4 Related Risk

 

 

  1. click here for more information on this paper

 

 

Complete the University of Phoenix Material: IT System Connection Table for four different IT systems. The table is located on your student website.

 

  • Note two systems they connect with and their connection type.
  • Note two security vulnerabilities the system may have and 2 to 4 ways each vulnerability could be potentially exploited.

 

University of Phoenix Material

 

IT System Connection Table

 

When securing the modern enterprise, consider that IT systems do not operate alone. Securing them involves securing their interfaces with other systems as well. It is important to know the different interconnections each system may have.

 

Fill out the following table for four different IT systems.

 

  • Note two enterprise systems they connect with and their connection type.
  • Note two security vulnerabilities the connection may have and 2 to 4 ways each vulnerability could be potentially

 

Some Comments:

  • An example row has been entered into the table. This is only an example and should not limit what you do.
  • Keep in mind that enterprise systems cover a certain task in the enterprise (HR, CRM, Identity Management, etc.). They are not the components of a system (such as servers).
  • Connections can often be a direct connection/pipe, a file, a common database or something else.
  • The vulnerability is what would make the connection vulnerable to an attack.
  • The related risk is an attack that could target the weakness.

 

  1. click here for more information on this paper

 

Student Name:  ________________________

 

IT System Target System Connection Type Possible Security Vulnerability Related Risk
EXAMPLE 

HR System

Identity Management System Feeder File File could be modified. User rights might not be correctly updated.
1.

  1. 1.
1.2. 1.2.

3.

4.

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Hi there! Click one of our representatives below and we will get back to you as soon as possible.

Chat with us on WhatsApp