ITEC 6640 Project: Analysis of SAP Implementation and Security

Verified

Added on  2022/08/15

|10
|1426
|13
Project
AI Summary
This project provides a comprehensive analysis of SAP implementation, focusing on the development and execution of a security awareness program for Advanced Topologies Inc. The project begins with the creation of a security awareness matrix, detailing the target audience, delivery methods, and frequency of training materials for various security topics like clean desk policy, BYOD, and social networking dangers. The project then includes a four-page paper, outlining a centralized program management model led by the CIO and IT program manager, responsible for designing and delivering security training materials. It also explains the training rollout process, emphasizing team meetings, initial skill assessments, and feedback collection to ensure employee understanding of their roles and responsibilities. Techniques for providing security awareness messages throughout the organization, such as posters, seminars, and email tips, are also discussed to enhance data security and privacy. The project references key security terms and concepts, demonstrating a strong understanding of SAP implementation and information security best practices.
Document Page
Running head: ANALYSIS OF SAP IMPLEMENTATION
ANALYSIS OF SAP IMPLEMENTATION
Name of student
Name of university
Author’s note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1ANALYSIS OF SAP IMPLEMENTATION
Table of Contents
SAP implementation plan..........................................................................................................2
Security awareness matrix..........................................................................................................2
A summary of the communication model chosen......................................................................6
Explanation of how the training will be rolled out and procedure to ensure all personnel are
aware of their roles and responsibilities.....................................................................................7
Explanation of techniques applied for providing the security awareness messages throughout
the organization..........................................................................................................................7
Document Page
2ANALYSIS OF SAP IMPLEMENTATION
SAP implementation plan
In order to implement SAP, it is important to follow proper strategies. These strategies are the
followings (Junnarkar & Verma, 2017):
First of all extensive analysis will be done regarding organizational existing IT
infrastructure
Then required hardware and software for implementing SAP will be purchased
After implementing SAP, then testing will be done to ensure that features included in
SAP module is according to organizational requirements and there is no issue in SAP
modules which is an important aspect of this SAP implementation as well
Then employees will access different features of SAP module and feedback from
employees will be obtained to ensure features are easy to access and there is no issue
in this context
Then project will be closed after approval from organizational authority and
delivering project closure report to the organization as well
Security awareness matrix
Training
materials
The target
audience
for the
training
material
The role of
the person
to deliver
the
material
The
delivery
method of
the
material
The
frequency
of the
material
delivery
Purpose of
providing
training
materials
Clean desk
policy
(Bada, Sasse
All
employees
working on
Agency
head, CIO,
IT program
On-site and
email
As required to help
employees
identify how to
Document Page
3ANALYSIS OF SAP IMPLEMENTATION
& Nurse,
2019)
this project
including
team leaders
and project
managers
manager and
managers
keep important
organizational
secure so that it
is not easily
accessible by
people not
authorized to
access these
information as
it affects
organizational
privacy and
security as well
Bring your
own device
policy
Employees
who are
allowed to
access their
own devices
including
employees
working
remotely on
this project
Agency
head, CIO,
IT program
manager and
managers
on-site, e-
mail, web-
based
As required How to access
organizational
information
through
personal
devices while
ensuing
security of
organizational
information
Data
management
All
employees
Agency
head, CIO,
on-site, e-
mail, web-
As required To ensure
security of
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4ANALYSIS OF SAP IMPLEMENTATION
(Al-Daeef,
Basir &
Saudi, 2017)
of
organization
s
IT program
manager and
managers
based organizational
information
Removable
media
(Ghazvini &
Shukur,
2017)
All
employees
of
organization
s
Agency
head, CIO,
IT program
manager and
managers
on-site, e-
mail, web-
based
As required To ensure
proper
application of
removable
media such as
external storage
while ensuring
that there are
no issues
regarding data
security,
hardware
failure,
malware
infection along
with the
copyright
infringement
Social
networking
dangers
All
employees
working on
this project
Agency
head, CIO,
IT program
manager and
on-site, e-
mail, web-
based
As required Help
employees
identify how to
apply social
Document Page
5ANALYSIS OF SAP IMPLEMENTATION
including
team leaders
and project
managers
managers media securely
for business
purposes and
provide
information
regarding
security issues
for example
phishing attack
which is
capable of
accessing
important
organizational
data affecting
organizational
security and
privacy as well.
Document Page
6ANALYSIS OF SAP IMPLEMENTATION
A summary of the communication model chosen
The communication model chosen in this context is Centralized Program Management
Model.
CIO is responsible for designing and delivering security training materials. They should work
with managers to ensure that materials are not only properly delivered to the employees but
they are also capable of identifying policies and procedures required for ensuing that
implementation of security training program is effective and efficient as well (Wilson &
Hash, 2003). Not only CIO, program manager are also responsible for designing and
delivering training materials. They along with managers are responsible for ensuring that
materials are properly delivered to the employees and they identifies policies and procedures
for properly implementing security training program as well.
In this communication model, there is one central authority and this central authority consists
of CIO and IT program manager. Training material along with training plan and awareness is
designed by this central authority. There is communication between central authority and
agency appointed for this training program. Agency will communicate policy directives to
central authority for implementing IT security awareness and training program. This
information will then be communicated with organization units and they will implement this
program in accordance with strategies provided to them by the central authority as well. The
organizational units are responsible for providing information as required by central
authority, for example data regarding number of people who have attended this program,
number of people who have obtained training in particular topic and number of people who
are yet to obtain training and awareness program regarding security strategies. Organizational
units will also provide feedback on training program so that it is easier for the central
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7ANALYSIS OF SAP IMPLEMENTATION
authority to identify issues in training program and therefore designing strategies for
enhancing quality of security training program for employees as well.
Explanation of how the training will be rolled out and procedure to ensure all personnel
are aware of their roles and responsibilities
In order to roll out the training first of all team meetings will be arranged with employees and
provide them comprehensive idea regarding purposes and benefits of this training program.
An initial skill assessment will be conducted to identify level of knowledge of employees
regarding organizational security requirements (Bada, Sasse & Nurse, 2019). This will help
in identifying which employees need training in which aspect and provide them training in
that. This will ensure that training is effective and efficient as well.
After training is provided, feedback will be obtained from employees who have taken this
training. This will allow to identify effectiveness of training and also help in identifying if
employees are aware of their roles and responsibilities regarding implementation of security
strategies as well.
Explanation of techniques applied for providing the security awareness messages
throughout the organization
Security training materials that are designed for identifying security issues and strategies for
mitigating those security issues will be provided to employees (Al-Daeef, Basir & Saudi,
2017). There will be posters attached in places where employees meet for conversations to
attract their attention. These posters will describe different security issues and responsibility
of employees to ensure organizational information security. These will help employees to
identify how to access organizational data and strategies that are required for ensuing security
and privacy for organizational data as well (Ghazvini & Shukur, 2017). Along with this,
seminars and workshops will be arranged for enhancing security awareness among
Document Page
8ANALYSIS OF SAP IMPLEMENTATION
employees as well. Security tips will also be provided through emails of employees for easier
reference and this will also help them to analyse these security strategies whenever required
for ensuing that security messages are properly provided throughout the organization to
ensure that implementation of security strategies for enhancing organizational data security is
effective and efficient as well.
Document Page
9ANALYSIS OF SAP IMPLEMENTATION
References:
Al-Daeef, M. M., Basir, N., & Saudi, M. M. (2017, July). Security awareness training: A
review. In Proceedings of the World Congress on Engineering.
Bada, M., Sasse, A. M., & Nurse, J. R. (2019). Cyber security awareness campaigns: Why do
they fail to change behaviour?.
Ghazvini, A., & Shukur, Z. (2017, November). Review of information security guidelines for
awareness training program in healthcare industry. In 2017 6th International
Conference on Electrical Engineering and Informatics (ICEEI) (pp. 1-6). IEEE.
Junnarkar, A. R., & Verma, A. (2017). Study On System Application Product (Sap)–An
Important Enterprise Resourse Planning Tool For Achievement Of Organisational
Vision, Mission And Operational Performance.”.
Wilson, M., & Hash, J. (2003). Building an information technology security awareness and
training program. NIST Special publication, 800(50), 1-39.
chevron_up_icon
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon