Report: Analysis of SAP Weaknesses for Advanced Topologies

Verified

Added on  2022/08/30

|5
|834
|15
Report
AI Summary
This report analyzes the security awareness program (SAP) of Advanced Topologies, identifying two key weaknesses: lack of leadership support and limited resources. The report highlights that the absence of strong backing from organizational leaders and a lack of experienced network designers hinder the program's effectiveness. To address these issues, the report proposes the implementation of SAP (Systems, Applications & Products in Data Processing). SAP can improve the flexibility of the existing security awareness program, enhance financial transactions, reduce risk management costs, and deploy security awareness programs across business units. Moreover, SAP can improve resource management, enhance worker productivity and increase transparency in business procedures. The report references several academic sources to support its findings and recommendations.
Document Page
Running head: ANALYSIS OF SAP OF ADVANCED TOPOLOGIES
Analysis of SAP of Advanced Topologies
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1ANALYSIS OF SAP OF ADVANCED TOPOLOGIES
Table of Contents
Explanation of two weaknesses:................................................................................................2
SAP implementation to deal with the identified weaknesses.....................................................3
References..................................................................................................................................4
Document Page
2ANALYSIS OF SAP OF ADVANCED TOPOLOGIES
Explanation of two weaknesses:
There two types of weakness related with the security awareness program of Advanced
topologies are as followings:
Lack of leadership support: This program is created with the help of the network
administrators of Advanced Topologies. There is no real support coming from the leaders or
the steering committee of this organization and it is expected to have the maximum impact on
the existing security awareness program. The main reason behind stating lack of leadership as
the maximum impact on the security awareness program is the presence of the cyber
security policies (Bada, Sasse & Nurse, 2019). The funding activities of the security
awareness programs required the support coming from the organizational leaders of this
organization. The morale of the stakeholders who are involved in the creation of the
security program or the future security programs might get affected due to the lack of any
type of support from the organizational leaders. The capability of the resources to work in
collaboration with the other departments such as the quality assurance can also get disrupted
due to the lack of support coming from the organizational leaders.
Limited resources: The experience of the network engineers from ATI is very
much on the lower side. The role and responsibilities of the project manager is very much
significant for the creation of a security awareness program and there is only one project
manager who understands the importance of the network engineers (Sabillon, Serra-Ruiz &
Cavaller, 2019). There are no experienced network designers who work in this commercial
establishment as a result the existing security policies are created in a generalized mode.
Document Page
3ANALYSIS OF SAP OF ADVANCED TOPOLOGIES
SAP implementation to deal with the identified weaknesses
The incorporation of SAP can be very much useful to improve the flexibility of the
existing security awareness program. Financial transactions of this business can be
enhanced if SAP is successfully incorporated.
On the other hand, the incorporation of SAP can be very much useful in this business
as it can help to reduce the diverse categories of costs involved in the risk management
procedure in terms of the selection of resources like network engineer. The security
awareness programs can be deployed across each business units if SAP is enacted in a
systemized manner in this organization (Syaiful & Gunawan, 2017). The cost of the training
sessions can be managed with the help of SAP as well. Thus, it can be said that the issue of
lack of financial resource can be addressed in an organized manner with the help of the
SAP.
The incorporation of SAP is also very much useful to enhance the management of this
company and control over the utilization of available resources. It can be said that the
engagement of the management with the other labors can be enhanced if SAP is introduced
in the market which can ultimately lead to enhancement of the productivity of each and
every worker of Advanced Topologies (Wang, Syaiful & Nurul 2017). The organizational
leaders can start declaring their opinion about the creation of the security awareness
program if SAP is enacted in this organization as it can enhance the transparency of each of
the business procedures related with the security awareness program such as the recruitment
of the resources.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4ANALYSIS OF SAP OF ADVANCED TOPOLOGIES
References
Bada, M., Sasse, A. M., & Nurse, J. R. (2019). Cyber security awareness campaigns: Why do
they fail to change behaviour?. arXiv preprint arXiv:1901.02672.
Sabillon, R., Serra-Ruiz, J., & Cavaller, V. (2019). An Effective Cybersecurity Training
Model to Support an Organizational Awareness Program: The Cybersecurity
Awareness TRAining Model (CATRAM). A Case Study in Canada. Journal of Cases
on Information Technology (JCIT), 21(3), 26-39.
Syaiful, B., & Gunawan, W. (2017, January). Assessing Leading ERP-SAP Implementation
in Leading Firms in Indonesia. In Journal of Physics: Conference Series (Vol. 801,
No. 1, p. 012032). IOP Publishing.
Wang, G., Syaiful, B., & Nurul, F. A. (2017, September). Assessing the ERP-SAP
implementation strategy from cultural perspectives. In IOP Conference Series:
Materials Science and Engineering (Vol. 237, No. 1, p. 012020). IOP Publishing.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]