Advanced Network Security Report: STP Limited Information System
VerifiedAdded on 2020/05/11
|15
|3496
|46
Report
AI Summary
This report, prepared for STP Limited in Wollongong, proposes the development of a new information system to enhance the company's competitive advantage and align with its business goals. The system is designed to record product sales and customer details, improving efficiency and exceeding sales records. The report outlines the project's background, scope, and goals, with a strong emphasis on data security, including securing data, mobile devices, and the hardware required. It covers hardware purchases, business continuity planning, and risk management strategies to protect against unauthorized access and potential threats. The report emphasizes the importance of encryption, regular backups, and user authorization to ensure data integrity. Furthermore, it addresses the security concerns of mobile device access and suggests measures to mitigate risks. The report also discusses the need for a business continuity plan and risk management to ensure the information system's success, including potential risks, and recovery strategies.

Running head: ADVANCED NETWORK SECURITY
Advanced Network Security
Name of the Student
Name of the University
Author’s Note
Advanced Network Security
Name of the Student
Name of the University
Author’s Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1
ADVANCED NETWORK SECURITY
Executive Summary
The report is prepared for STP limited located in Wollongong for the expansion of the company
and gain competitive advantage in the current marketplace of the organization. As an information
system manager a new project is proposed for development of the information system for the
organization. The information system is developed aligning the goals of the business of the
organization and exceeding the sales record of the organization. The information system is
designed to record all the records of the products sold by the company and the details of the
customers for increasing the efficiency of the system. The report is prepared to describe the
background of the project, scope and the goals of the project. The security of the information is
the main concern for the development of the project according to the requirement. The data used
by the information system should be secured from illegal access and the device connecting with
the information system should also be secured for removal of the risk associated with the
development of the system. The hardware required for the development of the project are listed
and the steps that should be performed for the development of the information system are given
in the document.
ADVANCED NETWORK SECURITY
Executive Summary
The report is prepared for STP limited located in Wollongong for the expansion of the company
and gain competitive advantage in the current marketplace of the organization. As an information
system manager a new project is proposed for development of the information system for the
organization. The information system is developed aligning the goals of the business of the
organization and exceeding the sales record of the organization. The information system is
designed to record all the records of the products sold by the company and the details of the
customers for increasing the efficiency of the system. The report is prepared to describe the
background of the project, scope and the goals of the project. The security of the information is
the main concern for the development of the project according to the requirement. The data used
by the information system should be secured from illegal access and the device connecting with
the information system should also be secured for removal of the risk associated with the
development of the system. The hardware required for the development of the project are listed
and the steps that should be performed for the development of the information system are given
in the document.

2
ADVANCED NETWORK SECURITY
Table of Contents
1. Project Background.........................................................................................................3
1.1. Project background...................................................................................................3
1.2. Project Scope............................................................................................................3
1.3. Project Goals.............................................................................................................3
1.4. Strategic alignment of the project.............................................................................4
2. Network Security.............................................................................................................4
2.1. Securing Data............................................................................................................4
2.2. Mobile device security..............................................................................................5
3. Plan for hardware purchases............................................................................................6
4. Business continuity..........................................................................................................7
5. Risk management.............................................................................................................8
6. Conclusions......................................................................................................................9
7. Recommendations..........................................................................................................10
Bibliography......................................................................................................................12
ADVANCED NETWORK SECURITY
Table of Contents
1. Project Background.........................................................................................................3
1.1. Project background...................................................................................................3
1.2. Project Scope............................................................................................................3
1.3. Project Goals.............................................................................................................3
1.4. Strategic alignment of the project.............................................................................4
2. Network Security.............................................................................................................4
2.1. Securing Data............................................................................................................4
2.2. Mobile device security..............................................................................................5
3. Plan for hardware purchases............................................................................................6
4. Business continuity..........................................................................................................7
5. Risk management.............................................................................................................8
6. Conclusions......................................................................................................................9
7. Recommendations..........................................................................................................10
Bibliography......................................................................................................................12

3
ADVANCED NETWORK SECURITY
1. Project Background
1.1. Project background
The main purpose of the project is to develop a network for the information system for
the STP and secure the information system from unauthorized access. The information system is
developed according the goals of the business for supporting the future growth of the
organization. The information system should be developed for improvement of the business
goals of the organization and the privacy of the organization should be kept confidential for
securing the organizational data. The growth of the business should be kept in mind for
management of the employees of the organization. The information system should be developed
for increasing the efficiency of the business process of the organization and decrease the
response or waiting time of the users.
1.2. Project Scope
The scope of the project is to include the different functionality of the business process in
the information system for increasing the efficacy of the business. The manual process of the
organization can be automated with the development of the information system. The cost of
operation of the current business process should be minimized with the implementation of the
information system. New equipment’s and technology should be implemented for improvement
of the business process and report should be generated from the information system to show the
current sales record and the stocks available in the warehouse of the organization.
1.3. Project Goals
The main goals of the project are listed as follows:
ADVANCED NETWORK SECURITY
1. Project Background
1.1. Project background
The main purpose of the project is to develop a network for the information system for
the STP and secure the information system from unauthorized access. The information system is
developed according the goals of the business for supporting the future growth of the
organization. The information system should be developed for improvement of the business
goals of the organization and the privacy of the organization should be kept confidential for
securing the organizational data. The growth of the business should be kept in mind for
management of the employees of the organization. The information system should be developed
for increasing the efficiency of the business process of the organization and decrease the
response or waiting time of the users.
1.2. Project Scope
The scope of the project is to include the different functionality of the business process in
the information system for increasing the efficacy of the business. The manual process of the
organization can be automated with the development of the information system. The cost of
operation of the current business process should be minimized with the implementation of the
information system. New equipment’s and technology should be implemented for improvement
of the business process and report should be generated from the information system to show the
current sales record and the stocks available in the warehouse of the organization.
1.3. Project Goals
The main goals of the project are listed as follows:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4
ADVANCED NETWORK SECURITY
To develop the information system to meet the current requirement of the
organization and comply with the regulations.
The network administrator is responsible for monitoring the progress of the
project and each of the module should be developed for including the
functionality
The project should increase the efficiency of the current work process and reduce
the workload and complexity of the employees working in the organization.
To increase the return of investment and the information system should be
developed for facilitating employees to get real time monitoring of the sales report
and develop the customer relationship.
1.4. Strategic alignment of the project
The project should aligned with the current business process to view the sales and the
stock record and monitor the records at a real time for the increasing the efficiency of the current
workplace of the organization. The account manager is responsible to maintain the sales record
and the information system should be developed to automatically record the sales of the product
sold by the sales representatives and record in the database to generate a sales report. The
database of the information system should be encrypted with the application of encryption
algorithm and provide permission to the users. Read / write permission should be provided for
reducing the risk of illegal access.
ADVANCED NETWORK SECURITY
To develop the information system to meet the current requirement of the
organization and comply with the regulations.
The network administrator is responsible for monitoring the progress of the
project and each of the module should be developed for including the
functionality
The project should increase the efficiency of the current work process and reduce
the workload and complexity of the employees working in the organization.
To increase the return of investment and the information system should be
developed for facilitating employees to get real time monitoring of the sales report
and develop the customer relationship.
1.4. Strategic alignment of the project
The project should aligned with the current business process to view the sales and the
stock record and monitor the records at a real time for the increasing the efficiency of the current
workplace of the organization. The account manager is responsible to maintain the sales record
and the information system should be developed to automatically record the sales of the product
sold by the sales representatives and record in the database to generate a sales report. The
database of the information system should be encrypted with the application of encryption
algorithm and provide permission to the users. Read / write permission should be provided for
reducing the risk of illegal access.

5
ADVANCED NETWORK SECURITY
2. Network Security
2.1. Securing Data
The data residing in the database of the information system should be stored in different
tables and the tables should be normalized such that it can be joined to provide an appropriate
result of the querry (Sousa and Oz 2014). The database should be regularly backed up to
ensuring the protection of the database and password should be used for the access of the data.
Authorization should be added for removal of the risk of access of the content by the employees
and accidental damage of the files. A secure connection is required to be established between the
database and the interface of the information system for increasing the efficiency of the
information system (Rouhani, Ghazanfari and Jafari 2012). The standalone system present in
different branches of the organization should be replaced with the information system and the
interfaces are required to be hosted on a web platform and connected with a central database
server for storing the information generated and inputted into the system.
2.2. Mobile device security
The information system should be connected using mobile devices to increase the
flexibility of the system and allow the user to access it from remote locations. The mobile device
should be encrypted and antivirus program should be installed for the reducing the risk of virus
and corruption of the database of the information system (Oseni et al. 2014). The theft or lost of
the mobile phones that is connected with the information system can compromise the security of
the information system and make it vulnerable for the attackers to exploit the contents of the
information system. The mobile device can be used as an intermediate device to access the
content of the information system. The encryption of the data in the mobile phone can use of
strong password can reduce the risk of illegal access of the cell phone for accessing the resources
ADVANCED NETWORK SECURITY
2. Network Security
2.1. Securing Data
The data residing in the database of the information system should be stored in different
tables and the tables should be normalized such that it can be joined to provide an appropriate
result of the querry (Sousa and Oz 2014). The database should be regularly backed up to
ensuring the protection of the database and password should be used for the access of the data.
Authorization should be added for removal of the risk of access of the content by the employees
and accidental damage of the files. A secure connection is required to be established between the
database and the interface of the information system for increasing the efficiency of the
information system (Rouhani, Ghazanfari and Jafari 2012). The standalone system present in
different branches of the organization should be replaced with the information system and the
interfaces are required to be hosted on a web platform and connected with a central database
server for storing the information generated and inputted into the system.
2.2. Mobile device security
The information system should be connected using mobile devices to increase the
flexibility of the system and allow the user to access it from remote locations. The mobile device
should be encrypted and antivirus program should be installed for the reducing the risk of virus
and corruption of the database of the information system (Oseni et al. 2014). The theft or lost of
the mobile phones that is connected with the information system can compromise the security of
the information system and make it vulnerable for the attackers to exploit the contents of the
information system. The mobile device can be used as an intermediate device to access the
content of the information system. The encryption of the data in the mobile phone can use of
strong password can reduce the risk of illegal access of the cell phone for accessing the resources

6
ADVANCED NETWORK SECURITY
of the information system (Jouini, Rabai and Aissa 2014). The operating system of the mobile
phones used by the employees to connect with the information system should be kept updated for
protecting it from harmful software.
3. Plan for hardware purchases
Different hardware are required for the development of the information system and they
are categorized as follows:
Input devices- This are the devices that takes the input from the users of the information
system and it can be mouse, keyboard or touch panels. The choice of the input device that is used
for providing input to the information system depends upon the users and the data should be
entered on different scales. The information system can be based on several features and it may
require different input device.
Processing devices- The processing device is required for processing the data residing in
the database of the information system and different function of the modules developed. The
increasing the processing power of the cpu used for the management of the information system
increases the efficiency of the system (Fragkiadakis, Tragos and Askoxylakis 2013). The clock
speed of the cpu is used for determination of the number of instruction that is required to be
processed per second.
Memory- the memory of the computer can be divided into internal and external memory
and the data that is held on the memory can be stored in the external device for increasing the
flexibility of the system. The running process are stored in the computer memory and the size of
the memory depends on the handling of the queue (Bernroider, Wong and Lai 2014). The size of
ADVANCED NETWORK SECURITY
of the information system (Jouini, Rabai and Aissa 2014). The operating system of the mobile
phones used by the employees to connect with the information system should be kept updated for
protecting it from harmful software.
3. Plan for hardware purchases
Different hardware are required for the development of the information system and they
are categorized as follows:
Input devices- This are the devices that takes the input from the users of the information
system and it can be mouse, keyboard or touch panels. The choice of the input device that is used
for providing input to the information system depends upon the users and the data should be
entered on different scales. The information system can be based on several features and it may
require different input device.
Processing devices- The processing device is required for processing the data residing in
the database of the information system and different function of the modules developed. The
increasing the processing power of the cpu used for the management of the information system
increases the efficiency of the system (Fragkiadakis, Tragos and Askoxylakis 2013). The clock
speed of the cpu is used for determination of the number of instruction that is required to be
processed per second.
Memory- the memory of the computer can be divided into internal and external memory
and the data that is held on the memory can be stored in the external device for increasing the
flexibility of the system. The running process are stored in the computer memory and the size of
the memory depends on the handling of the queue (Bernroider, Wong and Lai 2014). The size of
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7
ADVANCED NETWORK SECURITY
the memory used for processing the queue of the information system is dependent on the
controlling and the processing power of the information system.
Output devices- The output devices the screen of the information system and the
monitors used for getting the output of the results of each of the querry. The printer can also be
called as an output device because it is used for printing out the report.
Mainframe- The mainframe are used for processing the large scale of data and it is used
for recognition of the existing processes and meet the needs of the organization and implement a
change over ion the organization.
4. Business continuity
To maintain a continuity in the business the information system should increase the
customer relationship management of the organization. A business continuity plan is important
for the success of the business and a strategy is required for the recognition of the threats acting
on the information system. The potential risk acting on the information system and their effect
are evaluated for the creation of the business continuity plan and the plan should be periodically
reviewed for bringing in the changes in the organization and mitigation of the risk (Acemoglu,
Malekian and Ozdaglar 2016). The operational risk such as the human errors and the sudden
change in the organizational culture should be included in the plan for creation of a fully
functional plan. The areas of improvement of the information system and the dependency of the
internal and the external factors such as the decision from the management or higher authorities
are seen as higher cost and the human interaction should be minimized for minimizing the risk.
The recovery of the system and the interruption should be avoided and a proper risk
management is necessary for the implementation of the business continuity plan in the
ADVANCED NETWORK SECURITY
the memory used for processing the queue of the information system is dependent on the
controlling and the processing power of the information system.
Output devices- The output devices the screen of the information system and the
monitors used for getting the output of the results of each of the querry. The printer can also be
called as an output device because it is used for printing out the report.
Mainframe- The mainframe are used for processing the large scale of data and it is used
for recognition of the existing processes and meet the needs of the organization and implement a
change over ion the organization.
4. Business continuity
To maintain a continuity in the business the information system should increase the
customer relationship management of the organization. A business continuity plan is important
for the success of the business and a strategy is required for the recognition of the threats acting
on the information system. The potential risk acting on the information system and their effect
are evaluated for the creation of the business continuity plan and the plan should be periodically
reviewed for bringing in the changes in the organization and mitigation of the risk (Acemoglu,
Malekian and Ozdaglar 2016). The operational risk such as the human errors and the sudden
change in the organizational culture should be included in the plan for creation of a fully
functional plan. The areas of improvement of the information system and the dependency of the
internal and the external factors such as the decision from the management or higher authorities
are seen as higher cost and the human interaction should be minimized for minimizing the risk.
The recovery of the system and the interruption should be avoided and a proper risk
management is necessary for the implementation of the business continuity plan in the

8
ADVANCED NETWORK SECURITY
organization. The stakeholders included in the business process and their potential to cause harm
to the information system should be identified and the permission for accessing the resources of
the organization should be defined to them for reducing the impact of the threat and reducing the
complexity of the management of the risk associated with the information system (Golriz and
Jaber 2015). The recovery point and the time required for the recovery of the information system
in case of failure should be analyzed and maximum tolerable data loss should be ensured for the
recovery of the critical functions and maintaining a continuity in the current business process.
5. Risk management
Risk management is an important process for the success of the information system and it
should be able to automate the different business process and minimize the cost of the
development and running of the information system. The supply chain of the products should be
managed and the information of the supplier and the customer should be recorded for minimizing
the loss of data that may occur at one end of the information system (Harmon 2014). The
information system should record the data according to different departments and the
accessibility of the data should be given to the manager of the department for improvement of
the current business process of the organization. An architecture of the information system
should be created for the access right should be provided to the users and a maintenance log
should be maintained for storage of the evidence of the illegal activity (Kale 2014). The risk can
be categorized into different types such as physical security, hardware security, communication
security and data storage security.
Physical security of the information system- The data storage rooms and the server
rooms should be kept under lock and key and entry of the unauthorized persons should be
restricted. The physical access of the servers can make the system vulnerable and the data may
ADVANCED NETWORK SECURITY
organization. The stakeholders included in the business process and their potential to cause harm
to the information system should be identified and the permission for accessing the resources of
the organization should be defined to them for reducing the impact of the threat and reducing the
complexity of the management of the risk associated with the information system (Golriz and
Jaber 2015). The recovery point and the time required for the recovery of the information system
in case of failure should be analyzed and maximum tolerable data loss should be ensured for the
recovery of the critical functions and maintaining a continuity in the current business process.
5. Risk management
Risk management is an important process for the success of the information system and it
should be able to automate the different business process and minimize the cost of the
development and running of the information system. The supply chain of the products should be
managed and the information of the supplier and the customer should be recorded for minimizing
the loss of data that may occur at one end of the information system (Harmon 2014). The
information system should record the data according to different departments and the
accessibility of the data should be given to the manager of the department for improvement of
the current business process of the organization. An architecture of the information system
should be created for the access right should be provided to the users and a maintenance log
should be maintained for storage of the evidence of the illegal activity (Kale 2014). The risk can
be categorized into different types such as physical security, hardware security, communication
security and data storage security.
Physical security of the information system- The data storage rooms and the server
rooms should be kept under lock and key and entry of the unauthorized persons should be
restricted. The physical access of the servers can make the system vulnerable and the data may

9
ADVANCED NETWORK SECURITY
be access by the people or virus can be implanted in the server to make the information system
unavailable for the users.
Security of the hardware- Proper air conditioning should be used routers and the servers
and the firmware of the software versions should be upgraded with recent patch and updates to
protect the information system from sabotage attacks.
Communication - The client relationship management employees must be included for
taking criticism about the necessity of the system. A self-appraisal polls is utilized that helps the
group to distinguish the hazard related with the framework (Jouini, Rabai and Aissa 2014). The
eHealth security strategy is dissected by the security group and they are recorded and lined up
with the present framework arrangements for checking on. Meetings were led with the distinctive
partners for understanding the framework and approve the assembled data in regards to the
framework
Data storage security- There are different testing tools available and it should be used for
accessing the vulnerability of the network and the configuration should be reviewed for
protecting the data center and increasing the efficiency of the information system.
6. Conclusions
The report expresses the present status of the STP in executing new PC framework and
new advances for dealing with the general population customer. The task is contrasted and the
sound undertaking administration practices and proposal is given to close the project. Facilitate
proposal for the change of the STP future administration rehearse is likewise given in the report.
The aptitudes that a task administrator should have to legitimately deal with the undertaking are
examined in the report and in conclusion some guidance is given to the CEO for dealing with the
ADVANCED NETWORK SECURITY
be access by the people or virus can be implanted in the server to make the information system
unavailable for the users.
Security of the hardware- Proper air conditioning should be used routers and the servers
and the firmware of the software versions should be upgraded with recent patch and updates to
protect the information system from sabotage attacks.
Communication - The client relationship management employees must be included for
taking criticism about the necessity of the system. A self-appraisal polls is utilized that helps the
group to distinguish the hazard related with the framework (Jouini, Rabai and Aissa 2014). The
eHealth security strategy is dissected by the security group and they are recorded and lined up
with the present framework arrangements for checking on. Meetings were led with the distinctive
partners for understanding the framework and approve the assembled data in regards to the
framework
Data storage security- There are different testing tools available and it should be used for
accessing the vulnerability of the network and the configuration should be reviewed for
protecting the data center and increasing the efficiency of the information system.
6. Conclusions
The report expresses the present status of the STP in executing new PC framework and
new advances for dealing with the general population customer. The task is contrasted and the
sound undertaking administration practices and proposal is given to close the project. Facilitate
proposal for the change of the STP future administration rehearse is likewise given in the report.
The aptitudes that a task administrator should have to legitimately deal with the undertaking are
examined in the report and in conclusion some guidance is given to the CEO for dealing with the
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

10
ADVANCED NETWORK SECURITY
project. The data framework is intended to record every one of the records of the items sold by
the organization and the points of interest of the clients for expanding the proficiency of the
framework. The report is set up to depict the foundation of the undertaking, scope and the
objectives of the task. The security of the data is the principle worry for the advancement of the
project as per the necessity. The information utilized by the data framework ought to be secured
from illicit access and the gadget interfacing with the data framework ought to likewise be
secured for evacuation of the hazard related with the improvement of the framework.
7. Recommendations
The following recommendations n are made for the improvement of the efficiency of the
information system deployed in the organization.
Increasing the availability of the information – All the organizational information such
as the stocks available, shipment details, invoice, payment records, customer information should
be recorded in the database of the information system such that it can be used for generating
report and reduce the chances of the human errors.
Inclusion of accurate information – A proper validation should be used and the
development of the data entry page using drop down list or check box reduces the chances of
wrong entry of data in the information system. The information provided should have the option
of modification such that the user go back to the previous stage for solving the errors.
Checking the compatibility of the application software – The external software used in
the information system should be checked if it is compatible and works according to the
requirement because a flaw in the application software can cause a loop hole in the information
ADVANCED NETWORK SECURITY
project. The data framework is intended to record every one of the records of the items sold by
the organization and the points of interest of the clients for expanding the proficiency of the
framework. The report is set up to depict the foundation of the undertaking, scope and the
objectives of the task. The security of the data is the principle worry for the advancement of the
project as per the necessity. The information utilized by the data framework ought to be secured
from illicit access and the gadget interfacing with the data framework ought to likewise be
secured for evacuation of the hazard related with the improvement of the framework.
7. Recommendations
The following recommendations n are made for the improvement of the efficiency of the
information system deployed in the organization.
Increasing the availability of the information – All the organizational information such
as the stocks available, shipment details, invoice, payment records, customer information should
be recorded in the database of the information system such that it can be used for generating
report and reduce the chances of the human errors.
Inclusion of accurate information – A proper validation should be used and the
development of the data entry page using drop down list or check box reduces the chances of
wrong entry of data in the information system. The information provided should have the option
of modification such that the user go back to the previous stage for solving the errors.
Checking the compatibility of the application software – The external software used in
the information system should be checked if it is compatible and works according to the
requirement because a flaw in the application software can cause a loop hole in the information

11
ADVANCED NETWORK SECURITY
system and open path for the hackers to intrude into the information system and get the access of
the data.
Identification of the authorization – The person who are given the full control of the
information system should be listed and the improvement can be made in the authorization for
making recommendation and taking appropriate action to revise the organization policy and
procedures and ensuring that the policy are followed by the group of employees working on the
organization.
Submission of the proposal – A proposal regarding the problems and the actions that is
required to be performed for the improvement of the information system should be submitted by
the stakeholders involved in the development and using the information system for the removal
of the constraints and increasing the efficiency of the system.
ADVANCED NETWORK SECURITY
system and open path for the hackers to intrude into the information system and get the access of
the data.
Identification of the authorization – The person who are given the full control of the
information system should be listed and the improvement can be made in the authorization for
making recommendation and taking appropriate action to revise the organization policy and
procedures and ensuring that the policy are followed by the group of employees working on the
organization.
Submission of the proposal – A proposal regarding the problems and the actions that is
required to be performed for the improvement of the information system should be submitted by
the stakeholders involved in the development and using the information system for the removal
of the constraints and increasing the efficiency of the system.

12
ADVANCED NETWORK SECURITY
Bibliography
Acemoglu, D., Malekian, A. and Ozdaglar, A., 2016. Network security and contagion. Journal
of Economic Theory, 166, pp.536-585.
Bernroider, E.W., Wong, C.W. and Lai, K.H., 2014. From dynamic capabilities to ERP enabled
business improvements: The mediating effect of the implementation project. International
Journal of Project Management, 32(2), pp.350-362.
Chang, J.F., 2016. Business process management systems: strategy and implementation. CRC
Press.
Drumm, O., Lutz, B., Palmin, A. and Wolf, G., Siemens Aktiengesellschaft, 2016. Planning and
Engineering Method, Software Tool and Simulation Tool for an Automation Solution. U.S. Patent
Application 15/083,525.
Fragkiadakis, A.G., Tragos, E.Z. and Askoxylakis, I.G., 2013. A survey on security threats and
detection techniques in cognitive radio networks. IEEE communications surveys and
tutorials, 15(1), pp.428-445.
Galy, E. and Sauceda, M.J., 2014. Post-implementation practices of ERP systems and their
relationship to financial performance. Information & Management, 51(3), pp.310-319.
Golriz, A. and Jaber, N., 2015, October. A High Assurance Firewall in a Cloud Environment
Using Hardware and Software. In International Telemetering Conference Proceedings.
International Foundation for Telemetering.
Harmon, P., 2014. Business process change. Morgan Kaufmann.
ADVANCED NETWORK SECURITY
Bibliography
Acemoglu, D., Malekian, A. and Ozdaglar, A., 2016. Network security and contagion. Journal
of Economic Theory, 166, pp.536-585.
Bernroider, E.W., Wong, C.W. and Lai, K.H., 2014. From dynamic capabilities to ERP enabled
business improvements: The mediating effect of the implementation project. International
Journal of Project Management, 32(2), pp.350-362.
Chang, J.F., 2016. Business process management systems: strategy and implementation. CRC
Press.
Drumm, O., Lutz, B., Palmin, A. and Wolf, G., Siemens Aktiengesellschaft, 2016. Planning and
Engineering Method, Software Tool and Simulation Tool for an Automation Solution. U.S. Patent
Application 15/083,525.
Fragkiadakis, A.G., Tragos, E.Z. and Askoxylakis, I.G., 2013. A survey on security threats and
detection techniques in cognitive radio networks. IEEE communications surveys and
tutorials, 15(1), pp.428-445.
Galy, E. and Sauceda, M.J., 2014. Post-implementation practices of ERP systems and their
relationship to financial performance. Information & Management, 51(3), pp.310-319.
Golriz, A. and Jaber, N., 2015, October. A High Assurance Firewall in a Cloud Environment
Using Hardware and Software. In International Telemetering Conference Proceedings.
International Foundation for Telemetering.
Harmon, P., 2014. Business process change. Morgan Kaufmann.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

13
ADVANCED NETWORK SECURITY
HassabElnaby, H.R., Hwang, W. and Vonderembse, M.A., 2012. The impact of ERP
implementation on organizational capabilities and firm performance. Benchmarking: An
International Journal, 19(4/5), pp.618-633.
Jouini, M., Rabai, L.B.A. and Aissa, A.B., 2014. Classification of security threats in information
systems. Procedia Computer Science, 32, pp.489-496.
Kale, V., 2014. Implementing SAP® CRM: The Guide for Business and Technology Managers.
CRC Press.
Kumar, M., Kaur, N., Kaur, S. and Singh, R., 2016. Different Security Threats and its Prevention
in Computer Network. International Journal of Advanced Research in Computer Science, 7(6).
Oseni, T., Rahim, M.M., Smith, S.P. and Foster, S., 2014. An initial empirical evaluation of the
influence of erp post-implementation modifications on business process optimisation.
Parvizi, R., Oghbaei, F. and Khayami, S.R., 2013, May. Using COBIT and ITIL frameworks to
establish the alignment of business and IT organizations as one of the critical success factors in
ERP implementation. In Information and Knowledge Technology (IKT), 2013 5th Conference
on (pp. 274-278). IEEE.
Pearlson, K.E., Saunders, C.S. and Galletta, D.F., 2016. Managing and Using Information
Systems, Binder Ready Version: A Strategic Approach. John Wiley & Sons.
Rouhani, S., Ghazanfari, M. and Jafari, M., 2012. Evaluation model of business intelligence for
enterprise systems using fuzzy TOPSIS. Expert Systems with Applications, 39(3), pp.3764-3771.
Schniederjans, D. and Yadav, S., 2013. Successful ERP implementation: an integrative
model. Business Process Management Journal, 19(2), pp.364-398.
ADVANCED NETWORK SECURITY
HassabElnaby, H.R., Hwang, W. and Vonderembse, M.A., 2012. The impact of ERP
implementation on organizational capabilities and firm performance. Benchmarking: An
International Journal, 19(4/5), pp.618-633.
Jouini, M., Rabai, L.B.A. and Aissa, A.B., 2014. Classification of security threats in information
systems. Procedia Computer Science, 32, pp.489-496.
Kale, V., 2014. Implementing SAP® CRM: The Guide for Business and Technology Managers.
CRC Press.
Kumar, M., Kaur, N., Kaur, S. and Singh, R., 2016. Different Security Threats and its Prevention
in Computer Network. International Journal of Advanced Research in Computer Science, 7(6).
Oseni, T., Rahim, M.M., Smith, S.P. and Foster, S., 2014. An initial empirical evaluation of the
influence of erp post-implementation modifications on business process optimisation.
Parvizi, R., Oghbaei, F. and Khayami, S.R., 2013, May. Using COBIT and ITIL frameworks to
establish the alignment of business and IT organizations as one of the critical success factors in
ERP implementation. In Information and Knowledge Technology (IKT), 2013 5th Conference
on (pp. 274-278). IEEE.
Pearlson, K.E., Saunders, C.S. and Galletta, D.F., 2016. Managing and Using Information
Systems, Binder Ready Version: A Strategic Approach. John Wiley & Sons.
Rouhani, S., Ghazanfari, M. and Jafari, M., 2012. Evaluation model of business intelligence for
enterprise systems using fuzzy TOPSIS. Expert Systems with Applications, 39(3), pp.3764-3771.
Schniederjans, D. and Yadav, S., 2013. Successful ERP implementation: an integrative
model. Business Process Management Journal, 19(2), pp.364-398.

14
ADVANCED NETWORK SECURITY
Seo, G., 2013. Challenges in implementing enterprise resource planning (ERP) system in large
organizations: similarities and differences between corporate and university
environment (Doctoral dissertation, Massachusetts Institute of Technology).
Sousa, K.J. and Oz, E., 2014. Management information systems. Nelson Education.
Teittinen, H., Pellinen, J. and Järvenpää, M., 2013. ERP in action—Challenges and benefits for
management control in SME context. International Journal of Accounting Information
Systems, 14(4), pp.278-296.
ADVANCED NETWORK SECURITY
Seo, G., 2013. Challenges in implementing enterprise resource planning (ERP) system in large
organizations: similarities and differences between corporate and university
environment (Doctoral dissertation, Massachusetts Institute of Technology).
Sousa, K.J. and Oz, E., 2014. Management information systems. Nelson Education.
Teittinen, H., Pellinen, J. and Järvenpää, M., 2013. ERP in action—Challenges and benefits for
management control in SME context. International Journal of Accounting Information
Systems, 14(4), pp.278-296.
1 out of 15
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.