It is important to know the different interconnections each system has. IT systems do not operate alone in the modern enterprise, so securing them involves securing their interfaces with other systems as well.
Complete the University of Phoenix Material: IT System Connection Table for four different IT systems. The table is located on your student website.
- Note two systems they connect with and their connection type.
- Note two security vulnerabilities the system may have and 2 to 4 ways each vulnerability could be potentially exploited.