logo

Systems of Information Technology Assesment

   

Added on  2022-09-07

5 Pages1210 Words18 Views
 | 
 | 
 | 
Running head: ENTERPRISE SYSTEMS
ENTERPRISE SYSTEMS
Name of the Student
Name of the University
Author Note
Systems of Information Technology Assesment_1

1ENTERPRISE SYSTEMS
Literature Review
Student 1
According to (Singhal & Ou, 2017) the systems of information face attacker that are
sophisticated that integrate multiple vulnerabilities in order to infiltrate the networks with
large impacts. The entire network security of enterprise cannot be set on by including the
number of weaknesses that are present. In order to precisely examine the enterprise systems
security, a person should know how the vulnerabilities could be integrated and utilised in
order to attack an enterprise system. The composition of the weaknesses can be modelled
utilising graphs of probabilistic attack that show the various paths of attack and allow
penetration of incremental network. The likelihoods of attack are propagated using the attack
graphs thus yielding an important way in order to measure the threats of security of the
enterprise systems. This research paper focuses on the analysis of risk mitigation and it is
utilised in order to increase the enterprise systems security. The methodology that is based on
the graphs that are probabilistic can be utilised to examine and build up the whole enterprise
systems security
According to (Tabatabaei & Harris, 2019) the importance of security in very
important and this is specifically true with the widespread and advancement of technology.
The enterprise systems that are used have gained popularity in the past years. These
enterprise systems are changing organizations and it has introduces many benefits and
challenges in the organizations that consists of integration and getting competitive advantage.
Nevertheless, these complicated enterprises systems need to have plans of security that are
extensive. Therefore, a very good understanding of the risk management and security has
become important for the enterprises and the managers. The main aim of this research paper
Systems of Information Technology Assesment_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security Challenges in VANET: A Comprehensive Survey
|23
|4698
|107

Information Security Paper on Cloud Computing
|6
|1514
|84

Security Challenges in Healthcare Networks
|3
|2735
|83

Threats, Attacks and Malware in IT Security: A Review of Recent Academic Articles
|8
|2420
|129

System Management : Discussions
|4
|604
|25

Security Challenges in IoT Platforms | Article
|4
|805
|19