This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

ERP System and Information Security

This essay is written by:

Louis PHD Verified writer

Finished papers: 5822

4.75

Proficient in:

Psychology, English, Economics, Sociology, Management, and Nursing

You can get writing help to write an essay on these topics
100% plagiarism-free

Hire This Writer

 

ERP System and Information Security

An ERP is a more centralized system that businesses and organizations use to provide integration with most significant enterprises. The EPR, therefore, uses databases in different business process intending to reduce labor and also simplifying business workflows that are already existing. The systems, therefore, contain the dashboards that the users can use real-time data that may be collected across many businesses to measure profitability and productivity.

Benefits of ERP

The EPR software has few benefits to the market and the society in different ways that include the following. Reduces the operation cost of the business; thus, the company gains some profits after the implementation stage of the system. It, therefore, increases the efficiency and the cooperation of the business enterprises. It helps in instant data access since the employee’s data can be accessed in just a few minutes as compared with other systems (Greasley, & Wang, 2017). The system could, therefore, work better for busy department managers and energetic executives that may require quick data. ERP also creates a defined planning process, therefore easy to understand the business aims, objectives as well as the targets for the business.

Sample software examples used.

SAP ERP. Based in Germany, and the most popular product associated with is the SAP ERP software. It serves the purpose of collection and combination of that data collected to ensure accurate resource planning in the enterprises (Ociepa-Kubicka, 2017). The main modules associated include the asset accounting as well as the financial accounting, management of the human resources, among other modules.

Info LN. It is a software company based in New York, and its solutions are designed to automate the processes in different companies with high technology manufacturing and also in others that deal with the logistic systems (Ociepa-Kubicka, 2017). The main modules associated with the software include human resource, manufacture, and inventory management, as well as pure product technology.

Oracle ERP Cloud. Base in the United States and is used in project management, finance, risk management, and other business activities such as procurement (Ociepa-Kubicka, 2017). Developers using this software use standard technologies to create extensions like the Java Server as well as the JAX-WS web.

Challenges experienced include

  • Selection problem. That is because the system choice may predefine different strategies that the company uses and would be inappropriate to be used for quite an extended period, like over five years.
  • Data quality issues. Old data integration at different times within the company is a problem, especially since it may bring to the question of approximation to the company. it, therefore, accounts to a more significant portion of the common issues in most companies’
  • Changes in the philosophy of the business. That is because different systems bring along different philosophies that may not be in line with the ethos of the business enterprise.
  • The shift in mindset issues. It may be quite possible and easy to forget that success f the software implementation depends on the users since it is a nonliving thing.
  • Technical issues. Unless a cloud ERP is conducted, other hardware and servers will have to be revised and new ones to be ordered and installed.

Question 2

Stuxnet is a worm or a virus created by hackers to give them access to information in different networks and computers and steal. Most businesses, therefore, depend on the secret information relay for their business to thrive. Reports are given shows that a group of hackers seeks to take control of the world activities both in trade and insecurity. Economic survival depends on the ability of the parties to conquer the warfare created by hackers. A country can be involved in different types of trade partnerships as well as production and consumption within the nation at different levels (Ali & Miller, 2017). For instance, what motivates the hackers to use the Stuxnet is to gain the power to overcome the competition posed by other compatriots. If there is a piece of the necessary information about the production of different products that is essential to the industry, then most hackers may, therefore, try to keep secrecy in the event thy have the information. On the other hand, if the enterprise lacks information about the production method, they can do anything by any chance to get what they require even if it means using the hackers.

Consequently, it is essential for any institution, including the government, to maintain a high level of secrecy to classified information. Any leakage of the data by any chance may bring about a change in course and, in other instances, may bring war between different countries. For example, the interruption caused in the Iran nuclear plant may cause political distress between different countries (Ali & Miller, 2017). Cyber capabilities also enhance power struggles that disadvantages the weaker opponents while benefiting the stronger. Moreover, cyber capabilities also create a complexity of weaponization, making the defense more feasible and less secure. It is also suggested that the operations may significantly blunt the potential of revolution due to technical uncertainties.

There are several ways in which can be used to control Stuxnet that includes embracing a data-centric strategy, employee training, employment of an appropriate cloud, among others. Mobile data and cloud has dissolved boundaries on a network that is more holistic and strategic (Paté‐Cornell, Kuypers, Smith, & Keller, 2018). To breach the information is thus close to impossible since the encryption is done in the right manner. Data recovery also should be employed to protect the information from hackers as well as regular password changes.

 

 

 

 

 

 

 

 

 

References

Ali, M., & Miller, L. (2017). ERP system implementation in large enterprises–a systematic literature review. Journal of Enterprise Information Management.

Greasley, A., & Wang, Y. (2017). Integrating ERP and enterprise social software. Business Process Management Journal.

Ociepa-Kubicka, A. (2017). Advantages of using enterprise resource planning systems (ERP) in the management process. World Scientific News89, 237-243.

Paté‐Cornell, M. E., Kuypers, M., Smith, M., & Keller, P. (2018). Cyber risk management for critical infrastructure: a risk analysis model and three case studies. Risk Analysis38(2), 226-241.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask