Enterprise Systems ePortfolio: Business Analyst Coursework

Verified

Added on  2022/08/25

|3
|938
|15
Portfolio
AI Summary
This ePortfolio presents a comprehensive analysis of Enterprise Systems, reflecting the learning outcomes of a Business Analyst course. The portfolio synthesizes information from multiple sources, including journal articles, to evaluate security frameworks, implementation strategies, and the role of Enterprise Systems within larger IT infrastructures. The analysis covers security metrics, vulnerability assessments, and the importance of risk management in enterprise environments. The ePortfolio also examines the impact of Enterprise Systems on business processes, emphasizing how these systems can enhance business growth, address data management challenges, and provide a competitive edge. The content highlights the significance of IoT security, multi-layered architectures, and asset-centric security assurance frameworks. The portfolio provides a coordinated and coherent exposition of knowledge and ideas related to Enterprise Systems, demonstrating an understanding of the relevant considerations in the implementation of these systems. The ePortfolio showcases an understanding of security considerations in the design and implementation of enterprise systems.
Document Page
Team member 1:
Article 1: Alshammari, B. (2017). Enterprise Architecture Security Assessment
Framework (EASAF). JCS, 13(10), 558-571.
Design security principles such as the security metrics, securing the weakest link and
least privilege principle must be incorporated in security systems to detect the networking
vulnerabilities in a commercial establishment. Security Architecture Development Method
(SADM) is very much important regarding the creation of a security. The architectural layers
required in the framework can be understood with the help of the method. Thus, the paper
was very much useful as it provided a detailed description of the usefulness of a framework
which can be very much useful to deal with the threat coming from network security threats.
Article 2: Li, S., Tryfonas, T., & Li, H. (2016). The Internet of Things: a security point
of view. Internet Research, 26(2), 337-359.
IoT devices are increasingly used across numerous industries and complex projects all
ver the world. The challenges of IoT can be addressed in the first place with the help of the
ES. The four layer framework of IoT can be very much useful to manage the sensing layer,
network layer, and application layer. The importance of setting new technical standards can
be understood from this journal as well. Multi layered architecture is very much significant to
deal with the security issues of the IoT devices. Security design of the IoT devices must be
selected in such a manner so that each fundamental unit of the IoT devices are secured from
the diverse categories of threats.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1SECURITY OF ENTERPRISE SYSTEMS
Article 3: Tabatabaei, M., & Harris, J. K. (2019). A MODEL GRADUATE
ENTERPRISE SECURITY COURSE. Issues in Information Systems, 20(3).
The business procedures of a corporporate environment can be enhanced in the first
place with the help of the ES. These ES are very much significant for the business growth of
the organization and address the complications and issues faced by the organizations such as
dealing with the bulk volume of data. The journal was very much useful to identify how ES
helps in dealing with the changes in a business or deal with threats like ransomware. At the
same, time the journal reflected how ES can provide a business competitive edge over the
other similar organizations. Risk management procedure is very much important for the
incorporation of an ES.
Team member 2:
Article 1: Luburić, N., Sladić, G., Milosavljević, B., & Kaplar, A. (2018). Demonstrating
Enterprise System Security Using an Asset-Centric Security Assurance Framework. In
8th International Conference on Information Society and Technology (p. 16).
Securities of the ES have to be maintained in the first place so that the effectives of
the system can be enjoyed by the end users. This journal helped in understanding that Internet
of Toys can be very significant to enhance the cognitive ability of the ESs. Security of the
components of the architectural model of IoToys has to be secured in order to deal with the
security issues. The future IoToys framework of this journal involves different categories of
people in different stages unlike the previous models and this framework can be very much
useful to deal with the cloud security issues.
Document Page
2SECURITY OF ENTERPRISE SYSTEMS
Article 2: Appelbaum, D., Kogan, A., Vasarhelyi, M., & Yan, Z. (2017). Impact of
business analytics and enterprise systems on managerial accounting. International
Journal of Accounting Information Systems, 25, 29-44.
There are diverse categories of management accounting challenges which have a
direct impact on the business such as the management of the recording and reporting of the
financial information, management of the diverse categories of cost such as the labor costs
and operational costs. The introduction of business analytics and ES can be very much useful
to deal with these challenges. Thus, it can be said that security of ES has to be prioritized so
that these systems help to enhance the net profitability of the business. The data security
weakness of an organization can also be reduced or managed in the first place with the help
of the ESs.
Article 3: Pendleton, M., Garcia-Lebron, R., Cho, J. H., & Xu, S. (2016). A survey on
systems security metrics. ACM Computing Surveys (CSUR), 49(4), 1-35.
The scales of metrics which must be considered for the selection of a framework are
nominal set, ordinal set, interval set, ratio analysis, and inherent uncertainity. The attack
defense interactions have to be focused while selecting the security metrics such as the
situation metrics, defense metrics, attack metrics and vulnerability metrics. The susceptibility
assignment which has to be considered while improving the security of an ES are malware
susceptibility and phishing susceptibility. The vulnerability metrics which can be considered
in the creation of a framework securing are historical vulnerability metric, future exploited
vulnerability matric and tend to be exploited metric.
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]