Security of Enterprise Systems: A Comprehensive Analysis

Verified

Added on  2022/10/15

|8
|1622
|439
Report
AI Summary
This report provides a comprehensive analysis of Enterprise Systems security. It begins by defining enterprise systems and their importance in modern business, highlighting the critical need for robust security measures. The report delves into various security issues, including managing software updates, the deficiency of employee training, insufficient authentication, and network structure vulnerabilities. It then proposes resolutions such as protection strategies, the importance of trained employees, and improved management practices. A case study on a Turkish health organization is presented to illustrate real-world challenges and solutions. The report concludes by emphasizing the significance of proper planning, network structure, employee training, and customer satisfaction in maintaining a secure and efficient enterprise system. The references cited support the arguments and provide further reading on the subject.
Document Page
Running head: SECURITY OF ENTERPRISE SYSTEMS
SECURITY OF ENTERPRISE SYSTEMS
Name of the Student:
Name of the University:
Author Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1SECURITY OF ENTERPRISE SYSTEMS
Table of Contents
Introduction:-...................................................................................................................................2
Discussion:-.....................................................................................................................................2
Security Issues:-...........................................................................................................................2
Managing Software Updates:-.................................................................................................3
Deficiency of Employee training:-..........................................................................................3
Insufficient Authentication:-....................................................................................................3
Network structure:-..................................................................................................................3
Resolution:-..................................................................................................................................4
Protection:-..............................................................................................................................4
Trained employee:-..................................................................................................................4
Improve Management:-...........................................................................................................4
Case study:-.................................................................................................................................5
Conclusion:-.....................................................................................................................................5
References:-.....................................................................................................................................7
Document Page
2SECURITY OF ENTERPRISE SYSTEMS
Introduction:-
Enterprise systems are the one types of software which delivers explanations to a modern
business administration. The standard ERP are oracle, SAP and E-business. By the using of
enterprise systems, any business organization can be generating their business strategy (Giachetti
,2016). Some well-known ERP modules are supply chain management, price configuration,
knowledgebase services, Financial accuracy etc. Security of the enterprise system is the one
structure where any business authority can protect their ERP. Some renowned security issues are
like network vulnerabilities, application problem and error of operating systems (Shen, Chen &
Wang, 2016). If any business analyst should maintain the security structure of any enterprise
planning, then they quickly create a remarkable impact on an industrial market.
Discussion:-
Enterprise resource planning is very much essential to create a good impact on any
business. Enterprise systems are very much valuable for reducing business risks and
vulnerabilities. Every business administration creates innovative planning for business
improvement. So it is vital to secure this system because the rival company can manipulate the
confidential business strategy.
Security Issues:-
Enterprise resource planning information is very much crucial for the business. Suppose
the unethical person hacks this information then it is very much dangerous for the company. So,
first of all, identify the security issues and then resolve this immediately.
Document Page
3SECURITY OF ENTERPRISE SYSTEMS
Managing Software Updates:-
If any business authority cannot update their ERP software, then it should be affected by
junk files and viruses. If the business security analysts handle the critical information without the
maintenance of system up-gradation, then hackers are easily hacked this data. It is correct that
most of the software update processes are time-consuming, but still, it is essential for the
business.
Deficiency of Employee training:-
If the business employees are not so much trained and well experienced, then it is very
much problematic for the business structure. If the employee not so much useful for modern
technology, then these are the failure of the business. ERP system is not a complicated thing, but
an untrained employee cannot handle this system correctly.
Insufficient Authentication:-
There are one of the issues of business security. Every day the business analyst update the
system software, but they cannot modify the password. Password cracking technique is very
much standard process for the hacker (Bhatt, Manadhata & Zomlot, 2014). They quickly break
the password. Hacking is not only occurred in business software. If the hackers are targeting one
particular employer systems, then they hacked this and observed the business activity without
knowing this employee.
Network structure:-
Consumer business relationship, supply chain management is an essential part of the
Enterprise system. Secure customer data is one of the necessary components of this system
management (Shvaiba ,2018). So proper network modelling is valuable for the business.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4SECURITY OF ENTERPRISE SYSTEMS
Network safety is connecting in enterprises, organizations. If the unethical hacker observes any
types of customer financial information, so they created the most significant vulnerabilities. So
without the proper network protection business, resource planning is not complete.
Resolution:-
After preventing security issues, the business analyst tries to resolve these issues
immediately; then, they follow some basic structure.
Protection:-
If the system password is updated timely and also update the system software, then it is
difficult to hack these systems by the hacker (Feng, Wang & Li, 2014). The security official of
any business administrator quickly observes the system progress method. If the protection
process is perfect, then the ERP information is very much helpful for the association.
Trained employee:-
If the business employee is absorbed modern technology, then it is good for the future of
business. The trained and technical employee knows the method of individual system protection.
Suppose the unethical person sent any types of blank message or mail the employee easily relate
this and block this as soon as possible (Antonova & Georgiev, 2019). The business employee
also maintains the security for the customer. Some of the financial data or personal information
should not spread in the market, so they try to keep this data.
Improve Management:-
Supply chain management is the goods and services flow management process. This
technique is comprising of all procedures that alter raw materials into ultimate products. So the
supply process is perfect, then the business profit is enhancing (Stepanov et al. , 2018). The
Document Page
5SECURITY OF ENTERPRISE SYSTEMS
supply chain process always depends on the accurate and secure database. Supply chain
management is one of the necessary procedure of enterprise systems. In this management, the
database official can manage the business information and quickly improve their storing
capacity.
Case study:-
This case study is related to the threat assessment for a turkey’s health organization.
Information security assessments and approaches techniques are used to examine the enterprise's
maturity level. These can regulate the possible explanations for enterprise information systems.
Information systems of one of the big scale turkey’s medical organizations which were evaluated
via a universal assessment tool that is modifying to Turkish authorized guidelines. The outcome
obtained over the assessment tool (Eroğlu & Çakmak , 2018). This tool delivers health care's
development level and mentions opinions. This opinion should be upgrading for the safety of
Critical components and information systems like risks, IT processes and peoples. The Turkish
health organization are suffering from some issues like large scale agencies, upgraded
technological incapability. The Turkish hospital organization are unable to create the proper
network structure, business policies. If they can resolve the network structure, then this health
organization quickly increase their business efficiency.
Conclusion:-
The outcome of this assignment is that proper planning is very much essential to create
the right image for business. In the business sector, there is a vast number of enterprise resources
storing in a database. If the business analyst cannot secure the database, then an unethical person
is easily hacked this. First of all, it creates a different network structure and updates this system
Document Page
6SECURITY OF ENTERPRISE SYSTEMS
daily. The trained business employee, then they easily keep their systems for many types of junk
and malicious files. Last part is customer satisfaction, and without the proper security, any
business clients cannot be satisfied. Adequate business strategy is essential, and ERP helps to
build an appropriate business policy. Turkish health organization cannot focus their system
structure and then they faced some most significant business issues.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7SECURITY OF ENTERPRISE SYSTEMS
References:-
Antonova, R., & Georgiev, G. (2019). ERP Security, Audit and Process Improvement. In Smart
Technologies and Innovation for a Sustainable Future (pp. 103-110). Springer, Cham.
Bhatt, S., Manadhata, P. K., & Zomlot, L. (2014). The operational role of security information
and event management systems. IEEE security & Privacy, 12(5), 35-41.
Eroğlu, Ş., & Çakmak, T. (2018). Information as an organizational asset: assessment of a public
organization’s capabilities in Turkey. Information Development, 0266666918811004.
Feng, N., Wang, H. J., & Li, M. (2014). A security risk analysis model for information systems:
Causal relationships of risk factors and vulnerability propagation analysis. Information
sciences, 256, 57-73.
Giachetti, R. (2016). Design of enterprise systems: Theory, architecture, and methods. CRC
Press.
Shen, Y. C., Chen, P. S., & Wang, C. H. (2016). A study of enterprise resource planning (ERP)
system performance measurement using the quantitative balanced scorecard approach.
Computers in Industry, 75, 127-139.
Shvaiba, D. (2018). Structural stability and socio-economic security of the hierarchical system.
Stepanov, L. V., Parinov, A. V., Korotkikh, L. P., & Koltsov, A. S. (2018, May). Approach to
estimation of level of information security at enterprise based on genetic algorithm. In
Journal of Physics: Conference Series (Vol. 1015, No. 3, p. 032141). IOP Publishing.
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]