CMGT 430 Week 1 Individual: IT Systems Connection Table | eBooks | Education

CMGT 430 Week 1 Individual: IT Systems Connection Table

CMGT 430 Week 1 Individual: IT Systems Connection Table PLDZ-259 Instant Download Price
In Stock
$ 6.99 USD
UopTutorialStore
Buy and Download Description

CMGT 430 Week 1 Individual: IT Systems Connection Table

https://uoptutorialstore.com/category/cmgt-430/

 

CMGT 430 Week 1 Individual: IT Systems Connection Table

 

Enterprise systems consist of multiple IT systems.  It is important to know the different interconnections each system may have.  IT systems do not operate alone in the modern enterprise, so securing them will involve securing their interfaces with other systems, as well as the system itself.

Complete the University of Phoenix Material: IT System Connection Table for four different IT systems. The table is located in the Materials section to the right.

Complete the directions within the document.  They are as follows:

 

 

 

    • Note two systems they connect with and their connection type.

 

 

    • Note two security vulnerabilities the system may have and two to four ways each vulnerability could be potentially exploited.

 

 

 

Submit your assignment to the Assignment Files tab above.

IT System Connection Table

 

When securing the modern enterprise, consider that IT systems do not operate alone. Securing them involves securing their interfaces with other systems as well. It is important to know the different interconnections each system may have.

 

Fill out the following table for four different IT systems.

 

 

 

 

    • Note two enterprise systems they connect with and their connection type.

 

 

    • Note two security vulnerabilities the connection may have and two to four ways each vulnerability could be potentially

 

 

 

 

Additional Comments:

 

 

 

    • An example row has been entered into the table in blue. This is only an example and should not limit what you do.

 

 

    • Keep in mind that enterprise systems cover a certain task in the enterprise (HR, CRM, Identity Management, etc.). They are not the components of a system (such as servers).

 

 

    • Connections can often be a direct connection/pipe, a file, a common database, or something else.

 

 

    • The vulnerability is what would make the connection vulnerable to an attack.

 

 

  • The related risk is an attack that could target the weakness.

 

 

CMGT 430 Week 1 Individual: IT Systems Connection Table https://uoptutorialstore.com/category/cmgt-430/ CMGT 430 Week 1 Individual: IT Systems Connection Table Enterprise systems consist of multiple IT systems. It is important to know the d
Recent Reviews Be the first to Review this product!
0 0 0 0 reviews