{"title":"一个强大的ERP系统的十个安全实践","authors":"Shivang Maheshwari, Charul Sharma","doi":"10.1109/ICSSS.2014.7006193","DOIUrl":null,"url":null,"abstract":"Enterprise Resource Planning (ERP) systems are designed in order to fasten communication between various departments within an organization and empower its employees in making better business decisions with the help of data. The mined data and systems being encroached by unauthorized entities can prove to be lethal to an organization causing them to lose millions in revenues and shaking their entire foundation. The common trend dictates that the complexity and volume of data produced by any organization increases by every passing year. In the age of ERP system on cloud it has become more and more challenging to secure systems from malicious intentions from both inside and outside the organization. In order to attain the goal of a formidable system, continuously evolving techniques and methods need to be implemented. This research paper mainly deals with qualifying the security breaches which an organization is liable to face while supporting an in production ERP system and what practices you put in use to overcome these obstacles whilst creating a secure environment under which ERP system and its upstream and downstream applications can operate without any security threat.","PeriodicalId":354879,"journal":{"name":"2014 International Conference on Smart Structures and Systems (ICSSS)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Ten security practices to a formidable ERP system\",\"authors\":\"Shivang Maheshwari, Charul Sharma\",\"doi\":\"10.1109/ICSSS.2014.7006193\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Enterprise Resource Planning (ERP) systems are designed in order to fasten communication between various departments within an organization and empower its employees in making better business decisions with the help of data. The mined data and systems being encroached by unauthorized entities can prove to be lethal to an organization causing them to lose millions in revenues and shaking their entire foundation. The common trend dictates that the complexity and volume of data produced by any organization increases by every passing year. In the age of ERP system on cloud it has become more and more challenging to secure systems from malicious intentions from both inside and outside the organization. In order to attain the goal of a formidable system, continuously evolving techniques and methods need to be implemented. This research paper mainly deals with qualifying the security breaches which an organization is liable to face while supporting an in production ERP system and what practices you put in use to overcome these obstacles whilst creating a secure environment under which ERP system and its upstream and downstream applications can operate without any security threat.\",\"PeriodicalId\":354879,\"journal\":{\"name\":\"2014 International Conference on Smart Structures and Systems (ICSSS)\",\"volume\":\"59 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 International Conference on Smart Structures and Systems (ICSSS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSSS.2014.7006193\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Smart Structures and Systems (ICSSS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSSS.2014.7006193","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Enterprise Resource Planning (ERP) systems are designed in order to fasten communication between various departments within an organization and empower its employees in making better business decisions with the help of data. The mined data and systems being encroached by unauthorized entities can prove to be lethal to an organization causing them to lose millions in revenues and shaking their entire foundation. The common trend dictates that the complexity and volume of data produced by any organization increases by every passing year. In the age of ERP system on cloud it has become more and more challenging to secure systems from malicious intentions from both inside and outside the organization. In order to attain the goal of a formidable system, continuously evolving techniques and methods need to be implemented. This research paper mainly deals with qualifying the security breaches which an organization is liable to face while supporting an in production ERP system and what practices you put in use to overcome these obstacles whilst creating a secure environment under which ERP system and its upstream and downstream applications can operate without any security threat.