Enterprise Information Systems and Security Concerns
Enterprise Information Systems and Security Concerns
Let’s simplify the above definition by breaking down the crucial words:
Business processes and functions
The main business processes and functions common to most enterprises are:
● Accounting and Finance
● Production and Manufacturing
● Marketing
● Human Resources
● Customer Support
● Logistics and Inventory
Information System
An Information System is a collection of different components working together to
collect, process, store and distribute data and information. The 5 main
components of an Information System are:
1. Hardware
2. Software
3. Data
4. Networks
5. People and Procedures
1. Islands of Information
2. Mission-critical data from the Legacy Systems
1. Islands of Information
There are multiple Departments in an organization. For example Production,
Accounting, Marketing, Supplier Management, Customer Support, etc. All of these
Departments produce a large volume of information independently. In such cases,
the Information from each Department is isolated from each other. This forms
Islands of Information or Information Island.
Information Islands are problematic for organizations. The Data needs to be shared
among the Departments on a regular basis. And this sharing is done by Enterprise
Systems.
● SAP
● Oracle NetSuite
● Salesforce
● Datapine
● Microsoft Dynamics
Besides, organizations can achieve Data Security, Enhanced Data Quality, Employee
Satisfaction, and Increased Loyalty from the Customers. These benefits certainly
lead to Competitive Advantages.
It integrates the data from all the Departments in an organization into a Central
Database thus streamlining the business processes and making data sharing
easier.
Before answering Why do organizations use or need ERP software, let’s see a
typical business process in an organization.
He is Mr. John.
4. The Purchase and Finance Departments work together to Procure the Raw
Materials from the Vendor.
5. As the Purchase Department makes the Raw Materials available to the
Production Department, it manufactures the Products and informs the Inventory
Department. Inventory now gets back to the Sales Department.
6. The Sales Department now fulfills the order of Mr. John.
Revisiting the above process, we can see how complicated things could get if the
Data is not integrated in real-time among the Departments.
With the above approach, the following are the major problems:
● The customer satisfaction is low due to the delay. The customer may even
cancel his order.
● The cost of the business process is higher due to manual communication.
● Inconsistent and Duplicated data in multiple departments due to lack of
Real-time Updates.
Let’s see another scenario where our company Dhangadhi Unicorn Enterprises is
using an ERP and there is a Shared Integrated Database.
Unlike the previous system, the Business Processes are Streamlined here. The
presence of the “Central Shared Database” makes the Business Processes
Smoother and Faster. This Centralized Database is also referred to as the “Single
Source of Truth”.
If Mr. John makes an order to the Sales Department, they can check the ERP’s
Central Database directly instead of going through the hassle of contacting other
Departments. If the ordered Products are not available, they can create a
requirement in the Central Database which is immediately visible to the Production
Department. The Production Department will now immediately notify the Purchase
and Finance Department through the same Central Database. The required Raw
Materials will be procured through the Vendor who is again connected to the ERP’s
Integrated Database. This makes the business process Streamlined and Faster.
Benefits of ERP
● Streamlining of Enterprise’s Daily Operations.
● Automation of Business Processes.
● Reduction in Erroneous and Inconsistent Data.
● Increased Accuracy, Efficiency, and Productivity.
● Optimized Purchase, Sales, and Production.
● Reduction in Operational Cost.
● Higher Customer Satisfaction.
● Better Planning for Manufacturing and Other Departments.
● Reporting and Data Analysis which helps in Decision Making.
● Data and Network Security.
● Competitive Advantages.
Disadvantages of ERP
Initially, the Implementation is Difficult and Costly.
Change Management: Transition from older to a new system.
The benefits of SCM have long been recognized in business, government, and the
military. In today's competitive business environment, efficient, effective supply
chains are critical to survival and fully dependent on SCM software, which depends
on up-to-date and accurate data. If the network goes down or data is outdated,
those managing the supply chain are mostly working blind.
The use of RFID in the supply chain provides a major opportunity to reduce costs
and increase operating efficiencies. RFID can improve the efficiency of a supply
chain by improving data quality.
Figure: How RFID tags provide the data needed to manage the supply chain.
SCM Journey
The journey that a product travels, starting with raw material suppliers, then to
manufacturers or assemblers, then forward to distributors and retail sales shelves,
and ultimately to customers, is its supply chain. The supply chain is like a pipeline
composed of multiple companies that perform any of the following functions:
● Procurement of materials
● Transformation of materials into intermediate or finished products
● Distribution of finished products to retailers or customers
● Recycling or disposal in a landfill
Supply chain links are managed. Think of the chain in terms of its links because the
entire chain is not managed as a single unit. A company can only manage the links
it actually touches. That is, a company will manage only partners who are one-back
and one-up because that's the extent of what a company can manage.
According to management guru Peter Drucker, "Those companies who know their
customers, understand their needs, and communicate intelligently with them will
always have a competitive advantage over those that don't." For most types of
companies, marketing effectiveness depends on how well they know their
customers; specifically, knowing what their customers want, how best to contact
them, and what types of offers they are likely to respond to positively. According to
the loyalty effect, a 5 percent reduction in customer attrition can improve profits by
as much as 20 percent. Customer-centric business strategies strive to provide
products and services that customers want to buy. One of the best examples is the
Apple iPhone and iPod - devices that customers were willing to camp out on
sidewalks to buy to guarantee to get one on the day of their release. In contrast,
companies with product-centric strategies need to create demand for their
products, which is more expensive and may fail.
CRM IS MULTICHANNEL
CRM is implemented across multiple sales channels.
Dell Computer uses direct mail, e-mail, media advertising, and the Internet in
combination with personal contacts by sales representatives and special intranet
Web sites for large Dell accounts to stay connected with its customers.
Barnes & Noble's (BN.com) multichannel strategy allows customers to browse and
buy products at any of its stores or online. The "Readers Advantage" loyalty
program offers customers additional discounts and benefits. 1-800-FLOWERS.com
uses e-mail, Web sites, telephone, retail stores, and catalogs to deploy its
multichannel marketing strategies. The company's customer-centric focus has
enabled it to achieve up to 35 percent growth for several years.
eCRM
There's one key advancement created by Web 2.0 that organizations must force
themselves to recognize: "Your customers have the technology, too, and if you
don't deliver a customer experience that's of value to them, they will let the
community know."
CRM has been practiced manually by corporations for generations. However, since
the mid-1990s, various types of information technologies have enhanced CRM. CRM
technology is an evolutionary response to changes in the business environment,
making use of new IT devices and tools. The term e-CRM (electronic CRM) was
coined in the mid-1990s when businesses started using Web browsers, the Internet,
and other electronic touchpoints (e-mail, POS terminals, call centers, and direct
sales) to manage customer relationships. E-CRM covers a broad range of topics,
tools, and methods, ranging from the proper design of digital products and services
to pricing to loyalty programs.
Through Internet technologies, data generated about customers can be easily fed
into marketing, sales, and customer service applications for analysis. Electronic
CRM also includes online applications that lead to segmentation and
personalization. The success of these efforts can be measured and modified in
real-time, further elevating customer expectations. In a world connected by the
Internet, e-CRM has become a requirement for survival, not just a competitive
advantage.
Loyalty programs are programs that recognize customers who repeatedly use the
services (products) offered by a company. A well-known example is the airlines'
frequent-flyers program. Casinos use their players' clubs to reward their frequent
players. Many supermarkets use some kind of program to reward frequent
shoppers, as do many other companies. These programs include some kind of
database (or data warehouse) to manage the accounting of the points collected and
the rewards. Analytical tools such as data mining are then used to explore the data
and learn about customer behavior.
● Failure to identify and focus on specific business problems that the CRM can
solve.
● Lack of active senior management (non-IT) sponsorship.
● Poor user acceptance. This can occur for a variety of reasons, such as unclear
benefits - that is, CRM is a tool for management, but it may not help a rep sell
more effectively - and usability problems.
● An attempt to automate a poorly defined business process in the CRM
implementation.
● Be absolutely clear about how the CRM application will add value to the sales
process.
● Determine if and why salespeople are avoiding CRM.
● Provide incentives for the sales team to adopt CRM.
● Find ways to simplify the use of the CRM application.
● Adjust the CRM system as business needs change.
Justifying e-CRM
One of the biggest problems in CRM implementation is the difficulty of defining and
measuring success. Additionally, many companies say that when it comes to
determining value, intangible benefits are more significant than tangible cost
savings. Yet companies often fail to establish quantitative or even qualitative
measures in order to judge these intangible benefits.
A formal business plan must be in place before the e-CRM project begins - one that
quantifies the expected costs, tangible financial benefits, and intangible strategic
benefits, as well as the risks. The plan should include an assessment of the
following:
Risk assessment
The risk assessment is a list of all of the potential pitfalls related to the people,
processes, and technology that are involved in the e-CRM project.
Having such a list helps to lessen the probability that problems will occur. And, if
they do occur, a company may find that, by having listed and considered the
problems in advance, the problems are more manageable than they would have
been otherwise.
On-Demand CRM
Like several other enterprise systems, CRM can be delivered in two ways:
on-premises and on-demand. The traditional way to deliver such systems was
on-premises - meaning users purchased the system and installed it on site. This
was very expensive, with a large upfront payment. Many SMEs (small and
medium-sized enterprises) could not justify it, especially because most CRM
benefits are intangible.
The solution to the situation is to lease the software. Salesforce.com pioneered the
concept for its several CRM products, including supporting salespeople, under the
name of On-Demand CRM, offering the software over the Internet. The concept of
on-demand is known also as utility computing or software-as-a-service (SaaS).
On-demand CRM is basically a CRM hosted by a vendor on the vendor's premises,
in contrast to the traditional practice of buying the software and using it on site.
On-demand CRM must be weighed against the following implementation problems:
KNOWLEDGE
Having knowledge implies that it can be used to solve a problem, whereas having
information does not. The ability to act is an integral part of being knowledgeable.
For example, two people in the same context with the same information may not
have the same ability to use the information with the same degree of success.
There is a difference in the human capability to add value. The differences in ability
may be due to different experiences, different training, different perspectives, and
other factors.
Whereas data, information, and knowledge may all be viewed as assets of an
organization, knowledge provides a higher level of meaning about data and
information. It conveys meaning and tends to be much more valuable, yet more
ephemeral.
In the IT context, knowledge is very distinct from data and information. Whereas
data is a collection of facts, measurements, and statistics, information is organized
or processed data that is timely and accurate. Knowledge is information that is
contextual, relevant, and actionable.
KM Systems Cycle
A functioning KMS follows six steps in a cycle. The system is cyclical because
knowledge is acquired and refined over time. The cycle works as follows:
Create knowledge. Knowledge is created as people determine new ways of doing
things or develop know-how. Sometimes external knowledge is brought in.
Capture knowledge
New knowledge must be identified as valuable and be represented in a reasonable
way.
Refine knowledge
New knowledge must be placed in context so that it is actionable. This is where
human insights (tacit qualities) must be captured along with explicit facts.
Store knowledge
Useful knowledge must then be stored in a reasonable format in a knowledge
repository so that others in the organization can access it.
Manage knowledge
Like a library, the knowledge must be kept current. It must be reviewed to verify
that it is relevant and accurate.
Disseminate knowledge
Knowledge must be made available in a useful format to anyone in the organization
who needs it, anywhere and anytime.
Information security
Information security (infosec, for short) is about the risk to data, information
systems, and networks. These incidents create business and legal risks.
Network security
● Firewalls
● Encryption
● Antivirus
● Antispam
● Anti-spyware
Besides technology defenses, protecting data and business operations involves all
of the following:
Like the prior list shows, business policies, procedures, training, and disaster
recovery plans, as well as technology all, play a critical role in IT security. IT security
covers the protection of information, communication networks, and traditional and
e-commerce operations to assure their confidentiality, integrity, availability, and
authorized use.
IT Security Terms
Term Definition
Internal Threats
Threats from employees, referred to as internal threats, are a major challenge
largely due to the many ways an employee can carry out malicious activity. Insiders
may be able to bypass physical security (e.g., locked doors) and technical security
(e.g., passwords) measures that organizations have in place to prevent
unauthorized access. Why? Because defenses such as firewalls, intrusion detection
systems (IDS), and locked doors mostly protect against external threats. As you
have read, incidents that cause the greatest damages or losses are those carried
out by insiders. Despite the challenges, insider incidents can be minimized with a
layered defense strategy consisting of security procedures, acceptable use policies,
and technology controls.
Unintentional Threats
● Human errors can occur in the design of the hardware or information
system. They can also occur during programming, testing, or data entry. Not
changing default passwords on a firewall or failing to manage patches create
security holes. Human errors also include untrained or unaware users
responding to phishing or ignoring security procedures. Human errors
contribute to the majority of internal control and infosec problems.
● Environmental hazards include volcanoes, earthquakes, blizzards, floods,
power failures or strong fluctuations, fires (the most common hazard),
defective air conditioning, explosions, radioactive fallout, and
water-cooling-system failures. In addition to the primary damage, computer
resources can be damaged by side effects, such as smoke and water. Such
hazards may disrupt normal computer operations and result in long waiting
periods and exorbitant costs while computer programs and data files are
re-created.
● Computer systems failures can occur as the result of poor manufacturing,
defective materials, and outdated or poorly maintained networks.
Unintentional malfunctions can also happen for other reasons, ranging from
lack of experience to inadequate testing.
Intentional Threats
Theft of data
Inappropriate use of data
Data tampering
DoS/DDoS attacks
Viruses, worms, and Trojan horses
Theft of mainframe computer time
Theft of equipment and/or programs
Labor strikes, riots, or sabotage
Malicious damage to computer resources
Destruction from viruses and similar attacks
And miscellaneous computer abuses and Internet fraud
Crime can be divided into two categories depending on the tactics used to carry it
out:
1. Violent
2. Nonviolent
FRAUD
Occupational fraud refers to the deliberate misuse of the assets of one's
employer for personal gain. Internal audits and internal controls are essential to
the prevention and detection of occupation fraud. High-profile cases of
occupational fraud committed by senior executives.
his Fraud
Fraud Financial Characteristics
ents?
DEFENSE STRATEGY
The defense strategy and controls that should be used depend on what needs to be
protected and the cost-benefit analysis. That is, companies should neither
underinvest nor overinvest. The SEC(Securities and Exchange Commission) and
FTC(Federal Trade Commission) impose huge fines for data breaches to deter
companies from underinvesting in data protection. The following are the major
objectives of defense strategies:
1. Prevention and deterrence. Properly designed controls may prevent errors
from occurring, deter criminals from attacking the system, and, better yet,
deny access to unauthorized people. These are the most desirable controls.
2. Detection. As with a fire, the earlier an attack is detected, the easier it is to
combat and the less damage is done. Detection can be performed in many
cases by using special diagnostic software, at a minimal cost.
3. Containment (contain the damage). Containment minimizes or limits
losses once a malfunction has occurred. It is also called damage control. This
can be accomplished, for example, by including a fault-tolerant system that
permits operation in a degraded mode until full recovery is made. If a
fault-tolerant system does not exist, a quick and possibly expensive recovery
must take place. Users want their systems back in operation as fast as
possible.
4. Recovery. A recovery plan explains how to fix a damaged information
system as quickly as possible. Replacing rather than repairing components is
one route to fast recovery.
5. Correction. Correcting the causes of damaged systems can prevent the
problem from occurring again.
6. Awareness and compliance. All organization members must be educated
about the hazards and must comply with the security rules and regulations.
A defense strategy also requires several controls. General controls are established
to protect the system regardless of the specific application. For example, protecting
hardware and controlling access to the data center is independent of the specific
application. Application controls are safeguards that are intended to protect
specific applications. In the next two sections, we discuss the major types of these
two groups of information systems controls.
GENERAL CONTROLS
The major categories of general controls are physical controls, access controls,
biometric controls, administrative controls, application controls, and endpoint
controls.
Physical Controls Physical security refers to the protection of computer facilities
and resources. This includes protecting physical property such as computers, data
centers, software, manuals, and networks. It provides protection against most
natural hazards as well as against some human hazards. Appropriate physical
security may include several controls, such as the following:
● Appropriate design of the data center; for example, ensuring that the data
center is noncombustible and waterproof
● Shielding against electromagnetic fields
● Good fire prevention, detection, and extinguishing systems, including
sprinkler systems, water pumps, and adequate drainage facilities
● Emergency power shutoff and backup batteries, which must be maintained
in operational condition
● Properly designed, maintained, and operated air-conditioning systems
● Motion detector alarms that detect physical intrusion
Access Controls Access control is the management of who is and is not authorized
to use a company's hardware and software. Access control methods, such as
firewalls and access control lists, restrict access to a network, database, file, or data.
It is the major defense line against unauthorized insiders as well as outsiders.
Access control involves authorization (having the right to access) and
authentication, which is also called user identification (proving that the user is who
he or she claims to be).
Application Controls Sophisticated attacks are aimed at the application level, and
many applications were not designed to withstand such attacks. For better
survivability, information-processing methodologies are being replaced with agent
technology. Intelligent agents, also called softbots or knowbots, are highly
adaptive applications. The term generally means applications that have some
degree of reactivity, autonomy, and adaptability - as is needed in unpredictable
attack situations. An agent is able to adapt itself based on changes occurring in its
environment.
In the next section, the focus is on the company's digital endpoints and the
perimeter—the network. We discuss the security of wireline and wireless networks
and their inherent vulnerabilities.
Endpoint Security and Control Many managers underestimate the business risk
posed by unencrypted portable storage devices, which are examples of endpoints.
Business data is often carried on thumb drives, smartphones, and removable
memory cards without IT's permission, oversight, or sufficient protection against
loss or theft. Handhelds and portable storage devices put sensitive data at risk.
According to market research firm Applied Research-West, three of four workers
save corporate data on thumb drives. According to their study, 25 percent save
customer records, 17 percent store financial data, and 15 percent store business
plans on thumb drives, but less than 50 percent of businesses routinely encrypt
those drives and even less consistently secure data copied onto smartphones.
Portable devices that store confidential customer or financial data must be
protected no matter who owns it - employees or the company. If there are no
security measures to protect handhelds or other mobile/portable storage, data
must not be stored on them because it exposes the company to liability, lawsuits,
and fines. For smaller companies, a single data breach could bankrupt the
company.
IT risk management
IT risk management includes securing corporate systems while ensuring their
availability; planning for disaster recovery and business continuity; complying with
government regulations and license agreements; maintaining internal controls; and
protecting the organization against an increasing array of threats such as viruses,
worms, spyware, and other forms of malware. In general, risk management is both
expensive and inconvenient. Many users, for instance, complain about being forced
to use strong passwords (i.e., at least 10 characters and must contain a digit and
special character) that aren't easy to remember.
Managers have a fiduciary responsibility (legal and ethical obligation) to protect the
confidential data of the people and partners that they collect, store and share. To
comply with international, federal, state, and foreign laws, companies must invest
in IT security to protect their data, other assets, the ability to operate, and net
income. Losses and disruptions due to IT security breaches can seriously harm or
destroy a company both financially and operationally. As the effectiveness of the
technology and tactics used by cybercriminals—people who commit crimes using
the Internet—increases, so do the costs (and inconveniences) of staying ahead of
deliberate attacks, viruses, and other malware infections, and unintentional errors.
Network Security
There are thousands of forces trying to access or alter the confidential data being
transferred from one system to another. Data security means protecting such data
from those evil forces.
Data and message security make sure our data is prevented from unauthorized
users and thus protects it from any harmful actions.
● When people perform banking and other financial transaction by PCs over a
network the data should remain confidential.
● Hacking techniques like packet sniffing is a major threat to data security.
● Unauthorized people are constantly trying to access the data over a network.
Firewall
A firewall is a network security system, either hardware- or software-based, that
uses rules to control incoming and outgoing network traffic.
A firewall acts as a barrier between a trusted network and an untrusted network. A
firewall controls access to the resources of a network through a positive control
model. This means that the only traffic allowed onto the network is defined in the
firewall policy; all other traffic is denied.
Types of firewalls
Packet firewalls
The earliest firewalls functioned as packet filters, inspecting the packets that are
transferred between computers on the Internet. When a packet passes through a
packet-filter firewall, its source and destination address, protocol, and
destination port number are checked against the firewall's ruleset. Any
packets that aren't specifically allowed onto the network are dropped (i.e., not
forwarded to their destination). For example, if a firewall is configured with a rule to
block Telnet access, then the firewall will drop packets destined for TCP port
number 23, the port where a Telnet server application would be listening.
Stateful firewalls
In order to recognize a packet's connection state, a firewall needs to record all
connections passing through it to ensure it has enough information to assess
whether a packet is the start of a new connection, a part of an existing
connection, or not part of any connection. This is what's called "stateful packet
inspection."
This additional information can be used to grant or reject access based on the
packet's history in the state table, and to speed up packet processing; that way,
packets that are part of an existing connection based on the firewall's state table
can be allowed through without further analysis. If a packet does not match an
existing connection, it's evaluated according to the rule set for new
connections.
Application-layer firewalls
As attacks against Web servers became more common, so too did the need for a
firewall that could protect servers and the applications running on them, not
merely the network resources behind them. Application-layer firewall technology
first emerged in 1999, enabling firewalls to inspect and filter packets on any OSI
layer up to the application layer.
The key benefit of application-layer filtering is the ability to block specific content,
such as known malware or certain websites, and recognize when certain
applications and protocols -- such as HTTP, FTP, and DNS -- are being misused.
Proxy firewalls
Firewall proxy servers also operate at the firewall's application layer, acting as an
intermediary for requests from one network to another for a specific network
application. A proxy firewall prevents direct connections between either side of the
firewall; both sides are forced to conduct the session through the proxy, which can
block or allow traffic based on its ruleset. A proxy service must be run for each type
of Internet application the firewall will support, such as an HTTP proxy for Web
services.
Cryptography
Cryptography is the study of hiding information, and it is used when
communicating over an untrusted medium such as the internet, where information
needs to be protected from other third parties.
4) Authentication (the sender and receiver can confirm each other’s identity and
the origin/destination of the information)
IT managers need to estimate how much spending is appropriate for the level of
risk an organization is willing to accept.
Auditing a Website is a good preventive measure to manage legal risk. Legal risk
is important in any IT system, but in Web systems, it is even more important due to
the content of the site, which may offend people or be in violation of copyright laws
or other regulations (e.g., privacy protection). Auditing e-commerce is also more
complex since, in addition to the Web site, one needs to audit order taking, order
fulfillment, and all support systems.