Network Security Evaluation and Threat Assessments in Enterprise Systems

Network Security Evaluation and Threat Assessments in Enterprise Systems

Sam Goundar (The University of the South Pacific, Fiji), Abraham Colin Chongkit (The University of the South Pacific, Fiji), Shalvendra Kumar (The University of the South Pacific, Fiji) and Akashdeep Bhardwaj (University of Petroleum and Energy Studies, India)
DOI: 10.4018/978-1-7998-2367-4.ch009

Abstract

Companies have realized the need to have the competitive edge over their rivals. Enterprise systems provide this competitive edge. But with implementing enterprise system software (ESS), companies have to invest in the networking of their various business offices to interconnect to ESS. This chapter investigates the various ways two companies in Fiji do this and the various disadvantages they face from lack of knowledge of ESS to infrastructure limitations and issues faced in a developing country like Fiji. This chapter focuses on the network security issues of enterprise systems deployed in two companies in Fiji. It compares the information gathered to published papers on network infrastructure, network security issues, and threat assessments. It also proposes solutions to mitigate the security issues faced by enterprise systems networks.
Chapter Preview
Top

Research Survey

The authors performed research that includes Literature Survey and Face-to-Face Interviews regarding the issues and concepts on Enterprise systems network. The research was done on three companies enterprise systems; i.e. Bizxxe, Sage. Interviews and questionnaires were done with IT managers and staffs to find out the security issues faced by the Enterprise Applications. We have used both qualitative and quantitative approach to collect data. Conceptual framework is used to complete our research and quantitative analysis is done with the data gathered. Face to face interviews was held and information was gathered on the security issues faced by organizations on managing ERP applications and their on their network. In addition, the security was analyzed according to different modules of the ERP application. As this research was based on the core application of the enterprise and their network, management did not fully reveal full information on the security breaches due to privacy. However, result gathered was sufficient to complete our research.

Complete Chapter List

Search this Book:
Reset