Preview

Supply Chain Management and Security Vulnerability Related

Satisfactory Essays
Open Document
Open Document
312 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Supply Chain Management and Security Vulnerability Related
University of Phoenix Material

IT System Connection Table

When securing the modern enterprise, consider that IT systems do not operate alone. Securing them involves securing their interfaces with other systems as well. It is important to know the different interconnections each system may have.

Fill out the following table for four different IT systems.

Note two enterprise systems they connect with and their connection type.
Note two security vulnerabilities the connection may have and 2 to 4 ways each vulnerability could be potentially exploited.

Some Comments:
An example row has been entered into the table. This is only an example and should not limit what you do.
Keep in mind that enterprise systems cover a certain task in the enterprise (HR, CRM, Identity Management, etc.). They are not the components of a system (such as servers).
Connections can often be a direct connection/pipe, a file, a common database or something else.
The vulnerability is what would make the connection vulnerable to an attack.
The related risk is an attack that could target the weakness.

Student Name: __

IT System
Target System
Connection Type
Possible Security Vulnerability
Related Risk
EXAMPLE

HR System
Identity Management System
Feeder File
File could be modified.
User rights might not be correctly updated.
Accounting System
1.Enterprise resource planning
2. Supply Chain Management
1. Integrated Modules
2. File
1.Inside attacks
2.External attacks
1.Confidential information can be obtained
2.internal fraud
3.supply chain performance
4.theft
Finance Systems
Enterprise resource planning
Supply management chain
Common database
File
Hacking
Crimes
Not being able to perform periodic reviews
Distrust
Leaking of confidential information
Manufacturing System
Customer Relationship Management
Enterprise Resource planning
Common Customer Database
Integrated modules
Improper management change
Data being exposed

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 5 Assignment 1

    • 1348 Words
    • 6 Pages

    4. The server accept the connection and to send the data from server to client and vice…

    • 1348 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    IS3220 Final Exam

    • 700 Words
    • 4 Pages

    4. Which of the following protocols is a connection-oriented protocol that operates at the transport layer of the OSI model and supports reliable connections?…

    • 700 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3220

    • 1161 Words
    • 8 Pages

    4. Which of the following protocols is a connection-oriented protocol that operates at the transport layer of the OSI model and supports reliable connections?…

    • 1161 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 1

    • 4209 Words
    • 17 Pages

    83) Which process is responsible for establishing a connection between the client and the server?…

    • 4209 Words
    • 17 Pages
    Powerful Essays
  • Powerful Essays

    3220 final review

    • 655 Words
    • 4 Pages

    4. Name a connection-oriented protocol that operates at the transport layer of the OSI model and supports reliable connections?65, 69…

    • 655 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Unit 9 Assg 1

    • 2071 Words
    • 7 Pages

    Internet. Which of the following is true about the Internet connections that must exist so that the…

    • 2071 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    The purpose of this paper is to explore and assess computer security as it relates to Aircraft Solutions. Aircraft Solutions provides products and services to a range of companies that require highly specialized skills. Information is accessed by internal and external users via their Business Process Management system.…

    • 1345 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    The main two methods for Enterprise-Level implementation are Internet systems and Client Server Network systems. There is significant difference in the design of between these two types of systems because of architecture.…

    • 404 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    CMGT 430 Complete Class

    • 2190 Words
    • 12 Pages

    It is important to know the different interconnections each system has. IT systems do not operate alone in the modern enterprise, so securing them involves securing their interfaces with other systems as well.…

    • 2190 Words
    • 12 Pages
    Powerful Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    References: Kim, D., & Solomon, M. (2012). Fundamentals of information systems security. Sudbury, MA: Jones and Bartlett.…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Good Essays

    Supply Chain Management

    • 1645 Words
    • 7 Pages

    In the San Diego distribution center (DC) information flow example, dealers not being notified automatically of order status would be classified as which of the following information flow dimensions:…

    • 1645 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Lets start by defining what vulnerability is. In computer security, vulnerability is a weakness which allows an attacker to reduce a system 's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. (http://en.wikipedia.org/wiki/Vulnerability(computing).…

    • 534 Words
    • 3 Pages
    Good Essays
  • Good Essays

    IS3220 Assignment 3

    • 980 Words
    • 4 Pages

    As part of the network security team, we will be proving IDI with a network security plan to mitigate the vulnerabilities that have been discovered. A secure site will be set up with network intrusion detection and network protection systems will be available to access via the internal network. Policies will be presented for remote access and the use of VPN. Also contained within this report will be strategies for hardening the network and mitigating risks. An updated network layout with increased network security to meet the current needs will be included.…

    • 980 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    theory matrix

    • 503 Words
    • 2 Pages

    Connection through the internet can alter patterns in many ways making the system more open.…

    • 503 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Supply Chain Management

    • 10566 Words
    • 43 Pages

    Little, P. D. and M. J. Watts (eds) (1994) Living under contract: contract farming and agrarian transformation in sub-Sahara Africa. Wisconsin: University of Wisconsin Press. van der Meer, C. (2000) Public-private cooperation: examples from agricultural research in the Netherlands. Washington, D.C.: World Bank. Newton, D. (2000) Supply chain learning for Australian agribusiness, chain reversal and shared learning for global competitiveness. Canberra: Department of Agriculture, Fisheries & Forestry. Oyejide, A., I. Elbadawi, P. Collier (eds) (1997) Regional integration and trade liberalization in sub-Saharan Africa. Vol. 1: framework, issues and methodological perspectives. Houndmills: Macmillan. van Roekel, J., R. Kopicki, J. E. Broekmans and D. M. Boselie (2002) Building agri-supply chains: issues and guidelines. In: A guide to developing agricultural markets and agroenterprises edited by Daniele Giovannucci. Washington, D.C.: World Bank. Silver, E. A. and D. F. Pyke, R. Peterson (1998) Inventory management and production planning and scheduling. Chichester: John Wiley & Sons. Unnevehr, L.J., and H.H. Jensen (1999) The Economic Implications of Using HACCP as Food Safety Regulatory Standard, Food Policy 24 (6): 625-635. Vieira, L. F. and F. Hartwich (forthcoming) Approaching public-private partnerships for agroindustrial research: a methodological framework. The Hague/San José: International Service for National Agricultural Research. Watts, M. J. (1994) Life under contract: contract farming, agrarian restructuring and flexible accumulation. In: Living under contract, contract farming and agrarian transformation in sub-Sahara Africa edited by P. D. Little and M. J. Watts. Wisconsin: University of Wisconsin Press. Zylbersztajn, D., and E.M.M.Q. Farina (1999) Strictly co-ordinated food-systems: exploring the limits of the Coasian firm, International Food and Agribusiness Management Review, Vol. 2 (2): 249-265.…

    • 10566 Words
    • 43 Pages
    Good Essays