By conducting research, select three types of enterprise systems, one of which operates in the cloud. All systems store some confidential data in their data store. One system must store confidential data in a relational database system like Microsoft® SQL Server®. The cloud-based system must use a NoSQL database technology, and the final system, which resides in the Switzerland sales office, must use a proprietary database system. All systems are accessible using a browser, and each enterprise system has a mobile application that can be used to access data from the enterprise system. Describe threats that specifically target confidentiality on the data driven systems and their associated infrastructure that you selected. Determine why the threats you describe exist and determine at least two data/database vulnerabilities. Finally, determine one known malicious software that could confiscate confidential information from one of the enterprise systems.
Your paper should be 5–6 pages of content (exclusive of cover sheet etc.), using Times New Roman font style, 12pt, double-spaced, using correct APA formatting, and include a cover sheet, table of contents, abstract, and reference page(s). Be sure to document your content with proper APA in text citations that match your reference list.
You must support your research and assertions with at least three credible sources. You may use peer-reviewed articles, trade magazine articles or IT research company (Gartner, Forrester, etc.) reports to support your research