Information Technology (IT) Security Assignment

Added on - May 2020

Trusted by 2+ million users,
1000+ happy students everyday
Showing pages 1 to 4 of 20 pages
Running head: IT SECURITY
IT Security
Name of the Student
Name of the University
Author’s Note
1
IT SECURITY
Executive Summary
This report discusses about the various limitation of the modern software in the business
organization. In this case, the ERP software has been discussed. The importance of the ERP
software in the business organization has been discussed in the report. The deficiency and
limitations of the ERP software has been focused in the report. There are various failure cases
discussed in the report. There are recommendation provided in the report regarding mitigation of
the challenges in the ERP software.
2
IT SECURITY
Table of Contents
Introduction......................................................................................................................................3
Background of the research.............................................................................................................3
Project Objectives............................................................................................................................4
Enterprise Resource Planning (ERP)...............................................................................................4
ERP Software vendors.....................................................................................................................5
Purpose of the cyber-attacks............................................................................................................6
Challenges in implementing ERP....................................................................................................6
Reports based on ERP disasters:......................................................................................................9
Recommendations..........................................................................................................................14
Conclusion.....................................................................................................................................14
References......................................................................................................................................16
3
IT SECURITY
Introduction
The IT security in the business organization has been an important sector in the market.
The security and privacy of the data and information in the organization has been first priority
for the company.
This report discusses about the deficiency in the modern software including ERP. The
limitations of the ERP software has been depicted in the report.
This report outlines the basic properties of the ERP and the limitations implemented in
the software for its use in various conditions. There are some recommendation provided in the
report for mitigating the issues in the use of the ERP system in the company.
Background of the research
IT security concerns to various attacks in the network server of the company. The attacks
can be performed by the hackers in order to breach into the personal and legal information of the
company (1). This includes various consequences in the privacy of the private data and
information of the company. The ERP system of any company helps in maintain the data and
information of the company in the market. Different big and small business organization have
been using the ERP systems in the market (2). The use of the ERP system has been popular in
the market that helps in mitigating the security and data storage problems in the company.
There are various advantages of the ERP system in the company. The ERP system helps
in channelizing the data and information of the company in a proper way that helps in
maintaining transparency in the workflow of the employees (3). The use of the ERP system has
helped in prioritized the workflow of various departments in the company. On the other hand,
there are various failures in the ERP software system of any company in the market. The major
Desklib Logo
You are reading a preview
Upload your documents to download or

Become a Desklib member to get access