Computer_System Connection Table
NEED THIS DONE TONIGHT 9 PM
ONLY NEED TO FILL IN THE GIVEN TABLE
It is important to know the different interconnections each system has. IT systems do not operate alone in the modern enterprise, so securing them involves securing their interfaces with other systems as well. Complete the IT System Connection Table for four different IT systems. The table is uploaded. Note two systems they connect with and their connection type. Â Note two security vulnerabilities the system may have and 2 to 4 ways each vulnerability could be potentially exploited