Global, Ethics AND Security Management
Global, Ethics AND Security Management
AND
SECURITY
MANAGEMENT
Group Five
• ADRIKO DEBO JOEL 2015/U/ISM/001/G
• ENZEBO EMMANUEL 2015/U/ISM/048/G
• ECONIA RACHEAL 2015/U/ISM/005/G
• KICONCO RACHEAL 2015/U/ISM/011/G
• KYANIKA JAMES 2015/U/ISM/017/G
• OREE DENISH 2015/U/ISM/045/G
• EREMU THOMAS 2015/U/ISM/049/P
Learning objectives
• Global
o Outsourcing
o Offshoring
o Saas
• Ethics
o Framework
o Legal issues
o Software licensing
• Security management
o Frameworks
o Measures
o Disaster recovery and BCP
Outsourcing
Definition
Is when a company decides to subcontract its business
processes or functions to another company.
Components of ERP outsourcing
Application hosting
Application management
Helpdesk outsourcing
Outsourcing relationship
Benefits of outsourcing
Cost effective
Market Agility
Breadth of Skills
Technical Expertise
Multiple Feedback Points
Best Practices
Scalability
Process- Oriented
Solution centric
Limitations of outsourcing
Lack of Expertise
Misaligned Expectations
Culture Clash
Hidden Costs
Loss of Vision
Security and Control
Offshoring
Definition
Is when a company selects an outsourcing partner from another
country.
Stockholder Theory
Protects the interest of the investors or owners of the company
at all costs. This is the ultimate implementation of the free
market concept, where the responsibility of management is to
maximize profits with legal and nonfraudulent methods.
Stakeholder Theory.
Protects the interests of everyone having a stake in the
company success; namely, owners amd stockholders, employees,
customers, vendors, and other partners.
Management using this theory has to balance the interest of
these various groups while making organizational decisions.
The second group is the actual users of the systems. They must be
aware of the reasons why security is in place as well as the
consequences if they breach the security.
According to Martins the people component
can be divided into nine aspects:
Benchmarking
Guidelines on information security processes can be promoted
in the organisation through benchmarking.
This will enable the organisation to compare itself to other similar
organisations and to international standards
Risk analysis
Through risk analysis, threats to organisational assets and security
measures can be identified to develop the information security
policy.
Budget
A financial plan is necessary to implement the issues concerning
an information security culture.
For instance, employees need training, technical controls need
to be implemented and teams need to be enabled to assess the
security of network.
Management
Management is responsible for information security.
Management develops an organisation’s vision and strategy,
which are required to protect information assets and which are
implemented in the organisation.
Trust
Information security is important in instilling trust in an IT
environment.
It is easier to implement new procedures and guide employees
through changes of behaviour regarding information security if
management and employees trust one another.
Awareness
Since the effectiveness of information security controls depends
on the people who are implementing and using them, .
employees need to be enabled through awareness and training to
behave according to what is expected of them to ensure the
security of information assets.
Ethical conduct
Good practices form part of the culture established throughout
the organisation.
Employees need to incorporate ethical conduct or behaviour
relating to information security as part of their everyday life in
the organisation.
Change
Technology changes involve challenges to ensure secure
communication and secure use.
These changes need to be managed and accepted positively in the
organisation.
Implementing an information security policy could also mean that
employees need to change their working practices to ensure the
effective implementation of information security
.
NB:These nine aspects form the basis of the people component and
are comprehensive enough to address all people related issues within
an ERP system
Policy Component
Various methods are available to an organisation to make
information security part of corporate governance such as
international standards that include
CobiT,
ITIL and
ISO 17799.
CobiT
CobiT is an IT governance control framework and maturity
model that ensures that IT resources are aligned with the
organizational vision and strategies.
CobiT does not, however, include control guidelines or
practices which are the next level of detail nor the process steps
and tasks because it is a control framework rather than a
process framework.
CobiT focuses on what organisations need to do, not how to do
it.
ITIL
ITIL describes and defines key processes such as problem,
change and configuration management. It also provides a
framework for managing the processes.
By forcing a focus toward aligning and defining a specific
process, the IT department can identify opportunities for
improvements in efficiency which can result in the improved
ability to better manage service delivery and support
ISO 17799 – ISO 17799
is a de facto international standard that provides guidelines and
recommendations for security management.
ISO 17799 is divided into 10 modules that are used to
implement security.
Technology Component
The technology component of information security can be broken
down into five pillars
1. Identification and authentication
2. Authorizations
3. Identification and authentication
4. Identification and authentication
5. Non-repudiation
Technology Component
1. Identification and authentication
The first responsibility of information security within an ERP
system is to ensure that the ERP system is only accessed by
legitimate, authorized users
2. Authorization
One of the most critical aspects to consider within ERP security is
to restrict the access rights and actions of the users within the
ERP system
The access rights of a user are controlled by the authority
assigned to the user ID.
Confidentiality
Protecting the confidentiality of data implies the assurance
that only authorized people are able to view specific data sets
Integrity
Integrity means that only authorized users can modify the data
of the ERP system.
Modification refers to the update, deletion and creating of data
within the ERP system.
Non-repudiation
The organization ensures that a transaction that is done is
legitimate and can be proven as such in case of a query or
dispute.
Organizations can make use of digital signatures or public key
encryption to enforce valid and legal transactions.
ERP security measures (security plan)
Overview
Today's ERP systems are largely Web browser-based meaning
they can be accessed anytime and anywhere.
Worms, viruses, and Trojan horses are common, and hackers are now
using a variety of other methods to capture information to gain access
to systems
Network security
There are likely many people doing a wide variety of illegal activities
on the internet.
Operating systems need the latest patches and virus software needs
to be updated regularly with anti-spyware installed to prevent
further access.
First, ensure that users are aware of security risks (e.g., writing down or
choosing simple passwords).
Audit logs will reveal any unusual transactional activity and help to
minimize revenue loss due to fraud or hacking.
Encryption
Encryption involves using a key, usually a very long prime number
that is difficult to guess or program, to scramble at one end and
unscramble at the other end.
One way hackers gain access to systems is through the monitoring
data of passing through a network. If it is unscrambled, the process
with the right tools and knowledge is relatively simple.
Customers and users are sending and storing confidential data (e.g.,
credit card numbers and social security numbers) over the network.