SECURITY is one of the most important issues for an organization. Knowledge of enemy plans has been critical in influencing the course of human history. In classical business operation, just as an governmental and military operations, there have long been security issues concerned with physical protection.
This physical protection could be of human access to buildings and information stored in critical rooms in much the way as banks are secured. With the advent of computer systems this security expanded to data.
Computer systems involve a new level of detailed complexity, providing many opportunities to obtain key competitive information. This is stored on computers and with the advent of networks, is in most cases accessible by networks. There are many threats to the security of information found on ERP systems. Threats across all three forms of access include theft, damage, copying, unauthorized access to information, natural disasters or accidents, sabotage, etc.
The traditional forms of physical spying can still be applied. This can include any forms of unauthorized access to information. The most common forms of security threats to ERP are those made possible because of computer technology, including invasive electronic entry through some form of tapping or hacking. In addition to these security risk faced by all computer systems, two aspects of security are critical to ERP. One aspect concerns the quality of data generated and housed on the ERP.
The other aspect is control over who can access data. One major benefit of a Web delivered system is the flexibility afforded to users through the ability to log on to the ERP system from any terminal. One difficulty is that providers use forms of caching to improve performance. There is a serious risk arising software designed to turn off caches once the need for them has gone. Another form of control is a log-in page showing only those applications that the user is authorized to view. A digital certificate sign-on can act as one security measure with log-on to a directory protocol permitting access to authorized ERP applications. The ability to maintain ERP security in a Web environment is mandatory, given that majority of ERP vendors are responding to demand to provide Web products.
We invite our readers to contribute their views and opinion on ERP. Articles which is suitable for publication will be featured in erppandit.com. You may post your views here email@example.com