Resource : Overview of Information Systems and Technology Paper assignment from Week One Review the information selected for the Overview of Information Systems and Technology Paper assignment from...

1 answer below »


Resource: Overview of Information Systems and Technology Paper assignment from Week One



Reviewthe information selected for the Overview of Information Systems and Technology Paper assignment from Week One.



Exploreyour system’s vulnerabilities, and address the nature of potential internal and external threats and natural or unintended events that may jeopardize it.



Determinewhat levels of security are appropriate to secure the information system while allowing a maximum amount of uninterrupted workflow.



Writea 1,400- to 2,100-word paper that describes principles of risk management as they pertain to the chosen system and its associated technology.


Attention "paper must be in APA FORMAT"



Answered Same DayDec 22, 2021

Answer To: Resource : Overview of Information Systems and Technology Paper assignment from Week One Review the...

Robert answered on Dec 22 2021
122 Votes
System’s vulnerabilities of SAP
SAP system is subject to various vulnerabilities that are related to programming flaws or
improper configuration of any resource. Now days SAP system are web enabled which connects
large group of customers across the world. Companies are implementing sec
urity measures and
other measures to protect these resources by installing antivirus, firewalls, encryptions, password
protection, hardening operating systems, hardening network operating systems, hardening
network devices etc. [layersevensecurity.com]
Internals threats
An internal threats consist of attack occur when SAP system has so many programming
flaws or testing issues. For example, attack occurs due to poor code of system which
leads the hacker to run cross side scripting, SQL injection etc. SQL injection is the
process by which hacker attack on database through website.
How to Protect SAP system from internal threats
The method to avoid such type of internal threat such as SQL injection attack is by using store
procedure while developing the application.
External threats
Viruses: viruses are the software programs that interfere with SAP operation such as record,
corrupt or delete data and spread themselves to other SAP system and throughout the Internet. It
also slows down the system and causes problem in opening the items. Viruses are sometimes
confused with worms and Trojan horses which are technically different. Worms are usually
programs which are capable of replicating itself but one of the things which they can’t do is, they
will not be able to attach themselves to programs. While a Trojan horse is a program that appears
harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a
information system's data or performance.
Worms: Worm is a sub-class of virus and by design it is very similar to virus. Worms spread
from one system to websites or vice versa but unlike a typical virus it has the power to transfer or
travel with any actions being initiated manually or by human. Worms travel unaided, by using
file or information transport features on your system. Worms itself replicates and even you are
completely unaware about its actions which it performs, it usually replicates itself and try to
transfer more than hundreds or thousands of files from your computer. [www.webopedia.com]
Trojan: Trojan again comes under virus threats or vulnerabilities; it may harm your computer
and in the same way as other virus do. Its first purpose is to create additional files on your system
and then put advertisements in undesirable places, such as on desktop or open popup windows. It
gets installed into the system or even any hacker can try to put some files which will initiate such
Trojans on your system. It usually destroys the computer storage and user with internet access.
Trojans may harm your...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here