SlideShare a Scribd company logo
1 of 3
Title
ABC/123 Version X
1
IT System Connection Table
When securing the modern enterprise, consider that IT systems
do not operate alone. Securing them involves securing their
interfaces with other systems as well. It is important to know
the different interconnections each system may have.
Fill out the following table for four different IT systems.
· Note two enterprise systems they connect with and their
connection type.
· Note two security vulnerabilities the connection may have and
2 to 4 ways each vulnerability could be potentially exploited.
Some Comments:
· An example row has been entered into the table. This is only
an example and should not limit what you do.
· Keep in mind that enterprise systems cover a certain task in
the enterprise (HR, CRM, Identity Management, etc.). They are
not the components of a system (such as servers).
· Connections can often be a direct connection/pipe, a file, a
common database or something else.
· The vulnerability is what would make the connection
vulnerable to an attack.
· The related risk is an attack that could target the weakness.
Student Name: ________________________
IT System
Target System
Connection Type
Possible Security Vulnerability
Related Risk
EXAMPLE
HR System
Identity Management System
Feeder File
File could be modified.
User rights might not be correctly updated.
1.
2.
1.
2.
1.
2.
1.
2.
3.
4.
Copyright © XXXX by University of Phoenix. All rights
reserved.

More Related Content

Similar to TitleABC123 Version X1IT System Connection TableWhe.docx

No-Internal-Controls, LLC is a mid-sized pharmaceutical company .docx
No-Internal-Controls, LLC is a mid-sized pharmaceutical company .docxNo-Internal-Controls, LLC is a mid-sized pharmaceutical company .docx
No-Internal-Controls, LLC is a mid-sized pharmaceutical company .docx
poulterbarbara
 
Write the questions followed by your answers.1.Using the web.docx
Write the questions followed by your answers.1.Using the web.docxWrite the questions followed by your answers.1.Using the web.docx
Write the questions followed by your answers.1.Using the web.docx
rochellwa9f
 
University of the CumberlandsSchool of Computer & Information .docx
University of the CumberlandsSchool of Computer & Information .docxUniversity of the CumberlandsSchool of Computer & Information .docx
University of the CumberlandsSchool of Computer & Information .docx
jolleybendicty
 
Rubric for week 1System model 10 - Provide a scope description .docx
Rubric for week 1System model 10 - Provide a scope description .docxRubric for week 1System model 10 - Provide a scope description .docx
Rubric for week 1System model 10 - Provide a scope description .docx
toddr4
 
Modification data attack inside computer systems: A critical review
Modification data attack inside computer systems: A critical reviewModification data attack inside computer systems: A critical review
Modification data attack inside computer systems: A critical review
CSITiaesprime
 
We use computers and electronic systems to run and store just about .docx
We use computers and electronic systems to run and store just about .docxWe use computers and electronic systems to run and store just about .docx
We use computers and electronic systems to run and store just about .docx
sheronlewthwaite
 
We use computers and electronic systems to run and store just about .docx
We use computers and electronic systems to run and store just about .docxWe use computers and electronic systems to run and store just about .docx
We use computers and electronic systems to run and store just about .docx
co4spmeley
 
Research and identify three IT-related Risk Management Plans and lis.pdf
Research and identify three IT-related Risk Management Plans and lis.pdfResearch and identify three IT-related Risk Management Plans and lis.pdf
Research and identify three IT-related Risk Management Plans and lis.pdf
RBMADU
 

Similar to TitleABC123 Version X1IT System Connection TableWhe.docx (13)

Octav ethreat profiles
Octav ethreat profilesOctav ethreat profiles
Octav ethreat profiles
 
No-Internal-Controls, LLC is a mid-sized pharmaceutical company .docx
No-Internal-Controls, LLC is a mid-sized pharmaceutical company .docxNo-Internal-Controls, LLC is a mid-sized pharmaceutical company .docx
No-Internal-Controls, LLC is a mid-sized pharmaceutical company .docx
 
Cmgt 430 cmgt430
Cmgt 430 cmgt430Cmgt 430 cmgt430
Cmgt 430 cmgt430
 
Write the questions followed by your answers.1.Using the web.docx
Write the questions followed by your answers.1.Using the web.docxWrite the questions followed by your answers.1.Using the web.docx
Write the questions followed by your answers.1.Using the web.docx
 
University of the CumberlandsSchool of Computer & Information .docx
University of the CumberlandsSchool of Computer & Information .docxUniversity of the CumberlandsSchool of Computer & Information .docx
University of the CumberlandsSchool of Computer & Information .docx
 
Addressing Gaps in Your Cyber Security
Addressing Gaps in Your Cyber Security Addressing Gaps in Your Cyber Security
Addressing Gaps in Your Cyber Security
 
Rubric for week 1System model 10 - Provide a scope description .docx
Rubric for week 1System model 10 - Provide a scope description .docxRubric for week 1System model 10 - Provide a scope description .docx
Rubric for week 1System model 10 - Provide a scope description .docx
 
Multi agents system service based platform in telecommunication security inci...
Multi agents system service based platform in telecommunication security inci...Multi agents system service based platform in telecommunication security inci...
Multi agents system service based platform in telecommunication security inci...
 
Modification data attack inside computer systems: A critical review
Modification data attack inside computer systems: A critical reviewModification data attack inside computer systems: A critical review
Modification data attack inside computer systems: A critical review
 
We use computers and electronic systems to run and store just about .docx
We use computers and electronic systems to run and store just about .docxWe use computers and electronic systems to run and store just about .docx
We use computers and electronic systems to run and store just about .docx
 
We use computers and electronic systems to run and store just about .docx
We use computers and electronic systems to run and store just about .docxWe use computers and electronic systems to run and store just about .docx
We use computers and electronic systems to run and store just about .docx
 
Research and identify three IT-related Risk Management Plans and lis.pdf
Research and identify three IT-related Risk Management Plans and lis.pdfResearch and identify three IT-related Risk Management Plans and lis.pdf
Research and identify three IT-related Risk Management Plans and lis.pdf
 
A Secure Software Engineering Perspective
A Secure Software Engineering PerspectiveA Secure Software Engineering Perspective
A Secure Software Engineering Perspective
 

More from edwardmarivel

Deadline 6 PM Friday September 27, 201310 Project Management Que.docx
Deadline 6 PM Friday September 27, 201310 Project Management Que.docxDeadline 6 PM Friday September 27, 201310 Project Management Que.docx
Deadline 6 PM Friday September 27, 201310 Project Management Que.docx
edwardmarivel
 
DEADLINE 15 HOURS6 PAGES UNDERGRADUATECOURSEWORKHARV.docx
DEADLINE 15 HOURS6 PAGES UNDERGRADUATECOURSEWORKHARV.docxDEADLINE 15 HOURS6 PAGES UNDERGRADUATECOURSEWORKHARV.docx
DEADLINE 15 HOURS6 PAGES UNDERGRADUATECOURSEWORKHARV.docx
edwardmarivel
 
De nada.El gusto es mío.Encantada.Me llamo Pepe.Muy bien, grac.docx
De nada.El gusto es mío.Encantada.Me llamo Pepe.Muy bien, grac.docxDe nada.El gusto es mío.Encantada.Me llamo Pepe.Muy bien, grac.docx
De nada.El gusto es mío.Encantada.Me llamo Pepe.Muy bien, grac.docx
edwardmarivel
 
DDBA 8307 Week 4 Assignment TemplateJohn DoeDDBA 8.docx
DDBA 8307 Week 4 Assignment TemplateJohn DoeDDBA 8.docxDDBA 8307 Week 4 Assignment TemplateJohn DoeDDBA 8.docx
DDBA 8307 Week 4 Assignment TemplateJohn DoeDDBA 8.docx
edwardmarivel
 
ddr-.docx
ddr-.docxddr-.docx
ddr-.docx
edwardmarivel
 
DDBA 8307 Week 2 Assignment ExemplarJohn Doe[footnoteRef1] .docx
DDBA 8307 Week 2 Assignment ExemplarJohn Doe[footnoteRef1] .docxDDBA 8307 Week 2 Assignment ExemplarJohn Doe[footnoteRef1] .docx
DDBA 8307 Week 2 Assignment ExemplarJohn Doe[footnoteRef1] .docx
edwardmarivel
 
DBM380 v14Create a DatabaseDBM380 v14Page 2 of 2Create a D.docx
DBM380 v14Create a DatabaseDBM380 v14Page 2 of 2Create a D.docxDBM380 v14Create a DatabaseDBM380 v14Page 2 of 2Create a D.docx
DBM380 v14Create a DatabaseDBM380 v14Page 2 of 2Create a D.docx
edwardmarivel
 
DBA CAPSTONE TEMPLATEThe pages in this template are correctl.docx
DBA CAPSTONE TEMPLATEThe pages in this template are correctl.docxDBA CAPSTONE TEMPLATEThe pages in this template are correctl.docx
DBA CAPSTONE TEMPLATEThe pages in this template are correctl.docx
edwardmarivel
 
DB Response 1I agree with the decision to search the house. Ther.docx
DB Response 1I agree with the decision to search the house. Ther.docxDB Response 1I agree with the decision to search the house. Ther.docx
DB Response 1I agree with the decision to search the house. Ther.docx
edwardmarivel
 
DB Response prompt ZAKChapter 7, Q1.Customers are expecting.docx
DB Response prompt  ZAKChapter 7, Q1.Customers are expecting.docxDB Response prompt  ZAKChapter 7, Q1.Customers are expecting.docx
DB Response prompt ZAKChapter 7, Q1.Customers are expecting.docx
edwardmarivel
 
DB Topic of Discussion Information-related CapabilitiesAnalyze .docx
DB Topic of Discussion Information-related CapabilitiesAnalyze .docxDB Topic of Discussion Information-related CapabilitiesAnalyze .docx
DB Topic of Discussion Information-related CapabilitiesAnalyze .docx
edwardmarivel
 
DAVID H. ROSENBLOOMSECOND EDITIONAdministrative Law .docx
DAVID H. ROSENBLOOMSECOND EDITIONAdministrative Law .docxDAVID H. ROSENBLOOMSECOND EDITIONAdministrative Law .docx
DAVID H. ROSENBLOOMSECOND EDITIONAdministrative Law .docx
edwardmarivel
 

More from edwardmarivel (20)

deadline 6 hours 7.3 y 7.47.4.docx
deadline  6 hours 7.3 y 7.47.4.docxdeadline  6 hours 7.3 y 7.47.4.docx
deadline 6 hours 7.3 y 7.47.4.docx
 
Deadline 6 PM Friday September 27, 201310 Project Management Que.docx
Deadline 6 PM Friday September 27, 201310 Project Management Que.docxDeadline 6 PM Friday September 27, 201310 Project Management Que.docx
Deadline 6 PM Friday September 27, 201310 Project Management Que.docx
 
DEADLINE 15 HOURS6 PAGES UNDERGRADUATECOURSEWORKHARV.docx
DEADLINE 15 HOURS6 PAGES UNDERGRADUATECOURSEWORKHARV.docxDEADLINE 15 HOURS6 PAGES UNDERGRADUATECOURSEWORKHARV.docx
DEADLINE 15 HOURS6 PAGES UNDERGRADUATECOURSEWORKHARV.docx
 
De nada.El gusto es mío.Encantada.Me llamo Pepe.Muy bien, grac.docx
De nada.El gusto es mío.Encantada.Me llamo Pepe.Muy bien, grac.docxDe nada.El gusto es mío.Encantada.Me llamo Pepe.Muy bien, grac.docx
De nada.El gusto es mío.Encantada.Me llamo Pepe.Muy bien, grac.docx
 
DDBA 8307 Week 4 Assignment TemplateJohn DoeDDBA 8.docx
DDBA 8307 Week 4 Assignment TemplateJohn DoeDDBA 8.docxDDBA 8307 Week 4 Assignment TemplateJohn DoeDDBA 8.docx
DDBA 8307 Week 4 Assignment TemplateJohn DoeDDBA 8.docx
 
DDL 24 hours reading the article and writing a 1-page doubl.docx
DDL 24 hours reading the article and writing a 1-page doubl.docxDDL 24 hours reading the article and writing a 1-page doubl.docx
DDL 24 hours reading the article and writing a 1-page doubl.docx
 
DCF valuation methodSuper-normal growth modelApplicatio.docx
DCF valuation methodSuper-normal growth modelApplicatio.docxDCF valuation methodSuper-normal growth modelApplicatio.docx
DCF valuation methodSuper-normal growth modelApplicatio.docx
 
ddr-.docx
ddr-.docxddr-.docx
ddr-.docx
 
DDBA 8307 Week 2 Assignment ExemplarJohn Doe[footnoteRef1] .docx
DDBA 8307 Week 2 Assignment ExemplarJohn Doe[footnoteRef1] .docxDDBA 8307 Week 2 Assignment ExemplarJohn Doe[footnoteRef1] .docx
DDBA 8307 Week 2 Assignment ExemplarJohn Doe[footnoteRef1] .docx
 
DBM380 v14Create a DatabaseDBM380 v14Page 2 of 2Create a D.docx
DBM380 v14Create a DatabaseDBM380 v14Page 2 of 2Create a D.docxDBM380 v14Create a DatabaseDBM380 v14Page 2 of 2Create a D.docx
DBM380 v14Create a DatabaseDBM380 v14Page 2 of 2Create a D.docx
 
DBA CAPSTONE TEMPLATEThe pages in this template are correctl.docx
DBA CAPSTONE TEMPLATEThe pages in this template are correctl.docxDBA CAPSTONE TEMPLATEThe pages in this template are correctl.docx
DBA CAPSTONE TEMPLATEThe pages in this template are correctl.docx
 
DB3.1 Mexico corruptionDiscuss the connection between pol.docx
DB3.1 Mexico corruptionDiscuss the connection between pol.docxDB3.1 Mexico corruptionDiscuss the connection between pol.docx
DB3.1 Mexico corruptionDiscuss the connection between pol.docx
 
DB2Pepsi Co and Coke American beverage giants, must adhere to th.docx
DB2Pepsi Co and Coke American beverage giants, must adhere to th.docxDB2Pepsi Co and Coke American beverage giants, must adhere to th.docx
DB2Pepsi Co and Coke American beverage giants, must adhere to th.docx
 
DB1 What Ive observedHave you ever experienced a self-managed .docx
DB1 What Ive observedHave you ever experienced a self-managed .docxDB1 What Ive observedHave you ever experienced a self-managed .docx
DB1 What Ive observedHave you ever experienced a self-managed .docx
 
DB Response 1I agree with the decision to search the house. Ther.docx
DB Response 1I agree with the decision to search the house. Ther.docxDB Response 1I agree with the decision to search the house. Ther.docx
DB Response 1I agree with the decision to search the house. Ther.docx
 
DB Response prompt ZAKChapter 7, Q1.Customers are expecting.docx
DB Response prompt  ZAKChapter 7, Q1.Customers are expecting.docxDB Response prompt  ZAKChapter 7, Q1.Customers are expecting.docx
DB Response prompt ZAKChapter 7, Q1.Customers are expecting.docx
 
DB Topic of Discussion Information-related CapabilitiesAnalyze .docx
DB Topic of Discussion Information-related CapabilitiesAnalyze .docxDB Topic of Discussion Information-related CapabilitiesAnalyze .docx
DB Topic of Discussion Information-related CapabilitiesAnalyze .docx
 
DB Instructions Each reply must be 250–300 words with a minim.docx
DB Instructions Each reply must be 250–300 words with a minim.docxDB Instructions Each reply must be 250–300 words with a minim.docx
DB Instructions Each reply must be 250–300 words with a minim.docx
 
DB Defining White Collar CrimeHow would you define white co.docx
DB Defining White Collar CrimeHow would you define white co.docxDB Defining White Collar CrimeHow would you define white co.docx
DB Defining White Collar CrimeHow would you define white co.docx
 
DAVID H. ROSENBLOOMSECOND EDITIONAdministrative Law .docx
DAVID H. ROSENBLOOMSECOND EDITIONAdministrative Law .docxDAVID H. ROSENBLOOMSECOND EDITIONAdministrative Law .docx
DAVID H. ROSENBLOOMSECOND EDITIONAdministrative Law .docx
 

Recently uploaded

Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 

Recently uploaded (20)

Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 

TitleABC123 Version X1IT System Connection TableWhe.docx

  • 1. Title ABC/123 Version X 1 IT System Connection Table When securing the modern enterprise, consider that IT systems do not operate alone. Securing them involves securing their interfaces with other systems as well. It is important to know the different interconnections each system may have. Fill out the following table for four different IT systems. · Note two enterprise systems they connect with and their connection type. · Note two security vulnerabilities the connection may have and 2 to 4 ways each vulnerability could be potentially exploited. Some Comments: · An example row has been entered into the table. This is only an example and should not limit what you do. · Keep in mind that enterprise systems cover a certain task in the enterprise (HR, CRM, Identity Management, etc.). They are not the components of a system (such as servers). · Connections can often be a direct connection/pipe, a file, a common database or something else. · The vulnerability is what would make the connection vulnerable to an attack. · The related risk is an attack that could target the weakness.
  • 2. Student Name: ________________________ IT System Target System Connection Type Possible Security Vulnerability Related Risk EXAMPLE HR System Identity Management System Feeder File File could be modified. User rights might not be correctly updated. 1. 2. 1. 2. 1. 2. 1. 2. 3. 4.
  • 3. Copyright © XXXX by University of Phoenix. All rights reserved.