Report on the Security of Enterprise Systems and Mitigation Strategies

Verified

Added on  2022/08/21

|10
|824
|15
Report
AI Summary
This report delves into the realm of enterprise systems security, offering a comprehensive overview of their advantages, disadvantages, and the various threats they face. It begins by highlighting the benefits of enterprise systems, such as easy data access, improved reporting, workforce efficiency, and enhanced data security. However, it also acknowledges the drawbacks, including high implementation costs, integration challenges, and the need for specialized expertise. The report then identifies and analyzes the common threats to enterprise systems, such as phishing, CEO spoofing, insider threats, and the lack of senior management support. It emphasizes the importance of timely system updates, access control, employee training, and adherence to security compliances to mitigate these risks. The report also touches upon the automation of trust in cloud-based systems and the benefits of single-step authentication procedures. In conclusion, the report underscores the growing significance of enterprise systems and the need for robust security measures to protect them from emerging threats, providing a foundation for understanding and addressing the challenges in securing these critical business tools. The report provides a detailed analysis and offers various security measures to protect the enterprise systems.
Document Page
SECURITIES OF ENTERPRISE
SYSTEMS.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
INTRODUCTION
Enterprise Systems provision with a helping hand to business all
around the world with enhancement.
These are a set of software applications that allow the businesses
with a single individual platform for all business activities (Almeida
et al. 2019).
Enterprise Systems also allow the business organizations to
enhance their base of customers.
Document Page
ADVANTAGES OF ENTERPRISE
SYSTEMS
Easy access to all of the data belonging to the respective business
organization.
Enterprise Systems provisions the organizations with reporting as
well as planning capabilities within their relative business
procedures.
The systems enable the organizations with the possession of a
higher amount of workforce efficiency (Chibvongodze 2018).
The company enables the organizations with a greater security as
well as quality of the company data.
The business organizations are provisioned with scalability,
potential savings as well as customization (Chorafas 2016).
Document Page
DISADVANTAGES OF ENTERPRISE
SYSTEMS
High cost for implementing the same along with the maintenance
of the system.
Adapting to hardware is difficult for the system.
Provisioning all the employees with training to use the enterprise
system (Dawson 2017).
Integrating the same into other applications is a required activity
for the enterprise.
Inflexibility belonging to the system since the already existing
system is generic.
Residing of lower number of experts within the field of ERP.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
THREATS OF ENTERPRISE SYSTEMS
Phishing emails and other common methods of hacking.
CEO Spoofing that is considered to be a similar form of phishing
attack posed against the enterprise systems.
Insider threats that have potential to hamper the normal working
of the enterprise systems (Gharaibeh et al. 2017).
Lack of support from the senior management.
Insufficient training provisioned to the employees.
Lacking of ability to retain the qualified systems.
Document Page
SECURITIES OF ENTERPRISE
SYSTEMS
Delayed updates can lead to an improper functioning of various
functions of the enterprise systems. Hence, updating the entire
system from time to time is necessary (Kurniawan and Hiererra 2016).
Full access rights to only individuals having the requirement of the
same.
Proper training to be provided to the employees new to the enterprise
system.
Meeting of the security compliances in regards to the enterprise
systems (Kholkar, Sunkle and Kulkarni 2016).
Avoiding the usage of illegal or unauthorized enterprise systems
within the business organizations.
Document Page
SECURITIES OF ENTERPRISE
SYSTEMS (contd.)
Automation of trust upon the cloud based enterprise systems.
Single step authentication procedure (Khuen and Rehman 2017).
Weighing the variously associated benefits of the enterprise
systems.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CONCLUSION
Enterprise systems have been rising in reference to its usage
within majority of the organizations.
Enterprise systems enhance the business proceedings within the
organizations and increase their net output as a part of the
business.
The systems comprises of various threats as a growing part of its
utilization within the business organizations.
The threats have been efficiently mitigated with the help of the
various secure measures.
Document Page
REFERENCES
Almeida, R., Teixeira, J., Mira da Silva, M. and Faroleiro, P., 2019. A conceptual model for enterprise risk
management. Journal of Enterprise Information Management, 32(5), pp.843-868.
Chibvongodze, R., 2018. The impact of Enterprise Risk Management on firm value: evidence from
Johannesburg Securities Exchange (Doctoral dissertation).
Chorafas, D.N., 2016. Enterprise architecture and new generation information systems. CRC Press.
Dawson, M., 2017. Hyper-connectivity: Intricacies of national and international cyber securities (Doctoral
dissertation, London Metropolitan University).
Gharaibeh, A., Salahuddin, M.A., Hussini, S.J., Khreishah, A., Khalil, I., Guizani, M. and Al-Fuqaha, A., 2017.
Smart cities: A survey on data management, security, and enabling technologies. IEEE Communications
Surveys & Tutorials, 19(4), pp.2456-2501.
Kholkar, D., Sunkle, S. and Kulkarni, V., 2016. From Natural-language Regulations to Enterprise Data using
Knowledge Representation and Model Transformations. In ICSOFT-PT (pp. 60-71).
Khuen, C.W. and Rehman, M., 2017, June. A maturity model for implementation of enterprise business
intelligence systems. In International Conference on Mobile and Wireless Technology (pp. 445-454). Springer,
Singapore.
Kurniawan, Y. and Hiererra, S.E., 2016, May. Information systems design for sustainability financial services
company using enterprise architecture framework: A case study approach. In 2016 4th International
Conference on Information and Communication Technology (ICoICT) (pp. 1-6). IEEE.
Document Page
THANK YOU
chevron_up_icon
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]