Comprehensive Report: Security of Enterprise Systems and Threats

Verified

Added on  2022/08/21

|4
|574
|21
Report
AI Summary
This report focuses on the security of enterprise systems, detailing the threats they face and the mitigation strategies employed. It begins by defining enterprise systems and their importance in modern business, highlighting their role in managing various organizational activities. The report then identifies key threats across the network, presentation, and application layers, emphasizing the vulnerabilities that can disrupt business operations. It also explores the impacts of these threats on enterprise systems and the corresponding mitigation techniques. Furthermore, the report uses IBM as a case study to illustrate how companies implement security measures to protect data and ensure business continuity. The analysis covers the importance of safeguarding customer information and maintaining a robust security posture. The report emphasizes the critical need for businesses to understand and address these security challenges to ensure the smooth functioning of their enterprise systems.
Document Page
Running head: - SECURITIES OF ENTERPRISE SYSTEMS
SECURITIES OF ENTERPRISE SYSTEMS
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1SECURITIES OF ENTERPRISE SYSTEMS
Table of Contents
Summary....................................................................................................................................2
Document Page
2SECURITIES OF ENTERPRISE SYSTEMS
Summary
Enterprise systems have been playing a major within the field of business in regards
to the organizations that carry out certain activities of business related procedures on a daily
basis. Business organizations are in charge of multiple activities as a part of their business
proceedings and make use of different software applications for carrying out the differently
existing activities as a part of their business. This has led to the increase in usage of enterprise
systems for majority of the business organizations opting for the same as a reason of
enhancing their regular activities. The enterprise systems have a set of procedures as well as
methods that provision the respective organizations with the allowance to manage all of their
business related activities at the same place. As a result, researches have placed forward the
fact that usage of enterprise systems have been increasingly in demand by majority of the
enterprises. In this regard, the initial part of the report briefly introduces the entire topic by
explaining the norms of an enterprise system and where do they find the particular usage
within the organizations in the present times. However, the report also clearly identifies the
shared existence of a number of threats that are currently posed towards the businesses that
might lead to a complete blockage of the regular activities of the organization and might
hamper the manufacturing procedure of the same. The report states that, the threats affect the
enterprise systems in three primary categories namely, network layer, presentation as well as
the application layer. The communication that takes place between the customer and that of
the enterprise system with the usage of business components placed at different venues refer
to the threat that is posed towards the network layer, which can only be solved by experts
within the field of network security. In addition to this, the presentation layer refers to the
user interface and the underlying threats of the same that can be solved by the ERP experts
themselves. Lastly, the application layer is the third primary category of the enterprise system
that can effectively get attacked and potentially harmed in the same manner. Following this,
Document Page
3SECURITIES OF ENTERPRISE SYSTEMS
the report also clearly states the variously existing impacts of the threats that causes a direct
harm upon the enterprise system and in turn, the business organization. Such impacts have
again been well received with proper methods of mitigation techniques that acts as a great
helping hand towards the business related organizations to stay safe and secure against such
threats carrying the potential capability to hamper the daily proceedings of the same. Lastly,
IBM has been taken as an example to briefly demonstrate the implementation of security
techniques against all of such threats that might potential hamper the normal working of the
enterprise systems. IBM has been stated as a company that has been serving its customers
with IT related solutions for a long time, and prioritizes the data security of customer
information to stay longer within the relative field of business and to keep their base of
customers intact.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]