logo

Security of Enterprise Software

   

Added on  2022-08-25

20 Pages4603 Words27 Views
 | 
 | 
 | 
Running head: SECURITY OF ES
Security of ES
Name of the Student
Name of the University
Author Note
Security of Enterprise Software_1

SECURITY OF ES
1
Table of Contents
1. Introduction............................................................................................................................2
1.1 Background of the system................................................................................................2
1.2 Overall plan of enacting ES.............................................................................................3
2. Analyzing Enterprise System.................................................................................................4
2.1 Deep analysis of the issues...............................................................................................5
3. Larger IT infrastructure of large scale organizations.............................................................6
4. Relevant considerations in the implementation of Enterprise Systems.................................8
5. Communication skills for dealing with Enterprise Systems..................................................9
6. Case study 1: Improvement of financial security in Telstra using ES...................................9
6.1 Advantages.......................................................................................................................9
6.2 Analysis:.........................................................................................................................10
6.2 Case study 2: Security Metrics and Risk Analysis for Enterprise Systems.......................11
6.2.1 Improving cyber security program..........................................................................12
6.2.2 Challenges...............................................................................................................12
6.2.3 Enterprise security management.............................................................................12
6.3.1 Common Vulnerability Scoring System (CVSS)........................................................13
7. Conclusion............................................................................................................................14
8. References............................................................................................................................16
Security of Enterprise Software_2

SECURITY OF ES
2
1. Introduction
There are diverse categories of security issues related with the enterprise systems
which are used in our society as well as in commercial establishments such as the delayed
updates, weighing up the benefits, only one authentication technique, getting the full
access control, numerous unauthorized systems which are related with Enterprise
Software (ES), and inadequate training sessions, failure to comply.
There are other security issues related with the use of ES like the selection of the
exact ES, technical issues of ES, data quality issues, mind shift issues and changes in the
business philosophy (Singhal, 2017). Each of these challenges has to be understood and
addressed in the first place before these systems are considered in a business.
The role of a business analyst is very much significant for the growth and
development of a commercial business as it helps in assisting a business case, monitor and
plan any type of projects, understanding the exact business requirements of the business,
managing the business procedures, managing the communication among the business
stakeholders and requirement analysis. The notable determination of this assignment is to
create an e-portfolio which can reflect the learning of a short enterprise systems course. The
data of the e-portfolio shall be available to each member of the organization where I work as
a business analyst.
1.1 Background of the system
ES can be defined as the type of computer software which is treated as business
oriented tools in commercial business establishments. This tool can be very much useful to
enhance the flexibility of the daily business processes, the productivity of the resources in a
commercial establishment can be enhanced using ES (Tabatabaei & Harris, 2019). The entire
Security of Enterprise Software_3

SECURITY OF ES
3
business plan of this organization can be supported using this tool. Clarity in the business
procedure is also maintained with the help of ES. Record keeping ability of the commercial
organization can be enhanced using this tool as well (Simpson & Foltz, 2017). Addressing
the compliance issues is one of the most significant challenges faced in the commercial
organizations which can be addressed in the first place with the help of ES. There are diverse
categories of costs involved in business organizations which can also be reduced with the
help of ES. The detailed plan of incorporating an ES can be understood from the ensuing
segment of this report.
1.2 Overall plan of enacting ES
Understand corporate strategy: Strategic direction of the environment where this
system is going to be installed. The purchasing decisions have to be finalized in the
finalized with the help of the corporate strategy as well.
Business process strategy: New operational strategies have to be selected with the
help of the strategic planners. Shared business service processes have to be
understood using the business process strategy.
Technology: Organizational change initiative has to be introduced as there are
numerous changes regarding the outline of new software.
Strategic KPI: Strategic levels of performance have to be maintained using the help
of the key perform indicators such as the flow efficiency, automation procedures
and code coverage.
Return on investment: The payback period of the project has to be understood in
the first place using cost benefit analysis (Popplewell et al.2019). The yearly return
of investment can be identified with the help of the ROI calculation as well.
Security of Enterprise Software_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security of Enterprise Systems - Presentation
|12
|835
|18

Security of Enterprise Systems
|3
|938
|15

Challenges of running overseas manufacturing operations Assignment 2022
|8
|1636
|11

Operations of E-commerce website
|12
|1284
|14

International Young Scientists Forum
|7
|4872
|16

Information System Development Methods.
|18
|4587
|22