Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Student name: When securing the modern enterprise, consider that IT systems do not operate alone. Securing them involves securing their interfaces with other systems as

Student name:

When securing the modern enterprise, consider that IT systems do not operate alone. Securing them involves securing their interfaces with other systems as well. It is important to know the different interconnections each system may have.

Fill out the table below for four IT systems. Include the following:

  • Note two enterprise systems they connect with and their connection type.
  • Note two security vulnerabilities the connection may have and 2 to 4 ways each vulnerability could be potentially exploited.

Consider the following as you build your table:

  • Two example rows have been entered into the table.
  • Keep in mind that enterprise systems cover a certain task in the enterprise (HR, CRM, identity management, etc.). They are not the components of a system (such as servers).
  • Connections can often be a direct connection/pipe, a file, a common database or something else.
  • The vulnerability is what would make the connection vulnerable to an attack.
  • The related risk is an attack that could target the weakness.

IT System

Target System

Connection Type

Possible Security Vulnerability

Related Risk

Example HR System

Identity Management System

Feeder File

File could be modified.

User rights might not be correctly updated.

Example

Customer Relationship

Management (CRM)

1. Sensitive Data

2. System Data

Web communications (https)

  1. TCP/IP (denial-of-service attacks)
  2. Cross-site scripting (XSS or CSS)
  1. Mail bombs
  2. Temporarily cease operation
  3. Theft of data and information
  4. Content spoofing
  5. Not to be in compliance
  6. Control of user browser
  7. Deliver malware or warm
  8. Execute arbitrary commands
  9. Control of user account on vulnerable web application

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Spatio Temporal Database Management International Workshop Stdbm 99 Edinburgh Scotland September 10 11 1999 Proceedings Lncs 1678

Authors: Michael H. Bohlen ,Christian S. Jensen ,Michel O. Scholl

1999th Edition

3540664017, 978-3540664017

More Books

Students also viewed these Databases questions

Question

What is job rotation ?

Answered: 1 week ago

Question

=+ d. a professor deciding how much to prepare for class

Answered: 1 week ago