Preview

Supply Chain Management and Security Vulnerability Related

Satisfactory Essays
Open Document
Open Document
312 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Supply Chain Management and Security Vulnerability Related
University of Phoenix Material

IT System Connection Table

When securing the modern enterprise, consider that IT systems do not operate alone. Securing them involves securing their interfaces with other systems as well. It is important to know the different interconnections each system may have.

Fill out the following table for four different IT systems.

Note two enterprise systems they connect with and their connection type.
Note two security vulnerabilities the connection may have and 2 to 4 ways each vulnerability could be potentially exploited.

Some Comments:
An example row has been entered into the table. This is only an example and should not limit what you do.
Keep in mind that enterprise systems cover a certain task in the enterprise (HR, CRM, Identity Management, etc.). They are not the components of a system (such as servers).
Connections can often be a direct connection/pipe, a file, a common database or something else.
The vulnerability is what would make the connection vulnerable to an attack.
The related risk is an attack that could target the weakness.

Student Name: __

IT System
Target System
Connection Type
Possible Security Vulnerability
Related Risk
EXAMPLE

HR System
Identity Management System
Feeder File
File could be modified.
User rights might not be correctly updated.
Accounting System
1.Enterprise resource planning
2. Supply Chain Management
1. Integrated Modules
2. File
1.Inside attacks
2.External attacks
1.Confidential information can be obtained
2.internal fraud
3.supply chain performance
4.theft
Finance Systems
Enterprise resource planning
Supply management chain
Common database
File
Hacking
Crimes
Not being able to perform periodic reviews
Distrust
Leaking of confidential information
Manufacturing System
Customer Relationship Management
Enterprise Resource planning
Common Customer Database
Integrated modules
Improper management change
Data being exposed

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 5 Assignment 1

    • 1348 Words
    • 6 Pages

    4. The server accept the connection and to send the data from server to client and vice…

    • 1348 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    3220 final review

    • 655 Words
    • 4 Pages

    4. Name a connection-oriented protocol that operates at the transport layer of the OSI model and supports reliable connections?65, 69…

    • 655 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Unit 9 Assg 1

    • 2071 Words
    • 7 Pages

    Internet. Which of the following is true about the Internet connections that must exist so that the…

    • 2071 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    The purpose of this paper is to explore and assess computer security as it relates to Aircraft Solutions. Aircraft Solutions provides products and services to a range of companies that require highly specialized skills. Information is accessed by internal and external users via their Business Process Management system.…

    • 1345 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    CMGT 430 Complete Class

    • 2190 Words
    • 12 Pages

    It is important to know the different interconnections each system has. IT systems do not operate alone in the modern enterprise, so securing them involves securing their interfaces with other systems as well.…

    • 2190 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    The main two methods for Enterprise-Level implementation are Internet systems and Client Server Network systems. There is significant difference in the design of between these two types of systems because of architecture.…

    • 404 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    References: Kim, D., & Solomon, M. (2012). Fundamentals of information systems security. Sudbury, MA: Jones and Bartlett.…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Good Essays

    Projects

    • 781 Words
    • 4 Pages

    It will connect to a network that will go to an outside NSF File server.…

    • 781 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Data

    • 1644 Words
    • 7 Pages

    According to the network infrastructure diagram, we can see that there are 5 servers, 2 routers, 1 switcher, and 1 firewall. Each one of those servers is operate by a specific department, and all of those servers are connected to the main database server.The connection between each department’s server to the main database server take…

    • 1644 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Supply Chain Management

    • 1645 Words
    • 7 Pages

    In the San Diego distribution center (DC) information flow example, dealers not being notified automatically of order status would be classified as which of the following information flow dimensions:…

    • 1645 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Lets start by defining what vulnerability is. In computer security, vulnerability is a weakness which allows an attacker to reduce a system 's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. (http://en.wikipedia.org/wiki/Vulnerability(computing).…

    • 534 Words
    • 3 Pages
    Good Essays
  • Good Essays

    IS3220 Assignment 3

    • 980 Words
    • 4 Pages

    In the interest of business continuity, remote access will be utilized. User wishing access to internal network assets will only be able to access said assets with the use of a company issued laptop. We will make use of MAC address filtering to allow remote users access to the internal network via VPN. Each of the remote access laptops will have been loaded with VPN and have the MAC address added to the list on the MAC address filter. Users will be able to login to the VPN by using their local username and password. By making use of a VPN connection, users should be able to easily access the network assets. VPN connections are protected by SSL encryption which provides communication security over the internet. Each of the remote access laptops will be encrypted with McAfee safeboot encryption and all local data will remain encrypted until a valid login is entered. McAfee safeboot encryption requires additional login information to access the IDI internal network.…

    • 980 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    theory matrix

    • 503 Words
    • 2 Pages

    Connection through the internet can alter patterns in many ways making the system more open.…

    • 503 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Enterprise system is a broad term and includes Enterprise resource planning (ERP), Supply Chain Management (SCM) and Customer Relationship Management (CRM). Enterprise systems are usually built on, software platforms like Oracle’s Fusion and SAP Net Weaver and is typically, a relational database. There are many benefits of employing an enterprise system in an organization. The two benefits of using ES systems are;…

    • 789 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Supply Chain Management

    • 10566 Words
    • 43 Pages

    Little, P. D. and M. J. Watts (eds) (1994) Living under contract: contract farming and agrarian transformation in sub-Sahara Africa. Wisconsin: University of Wisconsin Press. van der Meer, C. (2000) Public-private cooperation: examples from agricultural research in the Netherlands. Washington, D.C.: World Bank. Newton, D. (2000) Supply chain learning for Australian agribusiness, chain reversal and shared learning for global competitiveness. Canberra: Department of Agriculture, Fisheries & Forestry. Oyejide, A., I. Elbadawi, P. Collier (eds) (1997) Regional integration and trade liberalization in sub-Saharan Africa. Vol. 1: framework, issues and methodological perspectives. Houndmills: Macmillan. van Roekel, J., R. Kopicki, J. E. Broekmans and D. M. Boselie (2002) Building agri-supply chains: issues and guidelines. In: A guide to developing agricultural markets and agroenterprises edited by Daniele Giovannucci. Washington, D.C.: World Bank. Silver, E. A. and D. F. Pyke, R. Peterson (1998) Inventory management and production planning and scheduling. Chichester: John Wiley & Sons. Unnevehr, L.J., and H.H. Jensen (1999) The Economic Implications of Using HACCP as Food Safety Regulatory Standard, Food Policy 24 (6): 625-635. Vieira, L. F. and F. Hartwich (forthcoming) Approaching public-private partnerships for agroindustrial research: a methodological framework. The Hague/San José: International Service for National Agricultural Research. Watts, M. J. (1994) Life under contract: contract farming, agrarian restructuring and flexible accumulation. In: Living under contract, contract farming and agrarian transformation in sub-Sahara Africa edited by P. D. Little and M. J. Watts. Wisconsin: University of Wisconsin Press. Zylbersztajn, D., and E.M.M.Q. Farina (1999) Strictly co-ordinated food-systems: exploring the limits of the Coasian firm, International Food and Agribusiness Management Review, Vol. 2 (2): 249-265.…

    • 10566 Words
    • 43 Pages
    Good Essays