3. Outline
• Major business Information System
• Most common vulnerabilities
• recommendations for stopping
different kind of threats against
them
Add a footer 3
4. FR
Introduction
• Significant portion of security vulnerabilities as new
products are continually introduced in the market.
• Business operations are carried out through technology.
• As businesses become more flexible, “computer
security” becomes “information security”.
Add a footer 4
5. FR
Review of enterprise systems
E nterp rise Resou rc e Plan n in g Systems
Enterprise Resource Planning Systems
ERP systems integrate information about different business units and processes
into one organization, providing a highly centralized and always up-to-date look
at key areas such as sales, manufacturing, finance/accounting, human resources
management and others ERP systems represent the business critical
infrastructure of the world.
Add a footer 5
6. FR
From a technical point of view, the system can
be divided into the following layers
1. Layer of the operating system
2. Database layer
3. Business infrastructure layer,
4. business logic layer
Add a footer 6
Source: https://www.omniaccounts.co.za/the-meaning-of-erp/
7. FR
Add a footer 7
Custom Relationship Management Systems
The purpose of customer relationship
management (CRM) is to identify,
acquire and retain clients.
CRM software or systems include sales,
customer service and support, call
centers, sales automation systems and
order management
Source: https://fitsmallbusiness.com/crm-process/
8. FR
Add a footer 8
Supply Chain Management Systems
SCM is the management of the flow of goods, data and finances related to a product or
service, from the purchase of raw materials to the delivery of the product to its final
destination.
Business Information System Type
Source: https://www.datalytics.it/supply-chain-management/
9. FR
Add a footer 9
Knowledge Management Systems
A knowledge management system is
defined as information systems designed
specifically to facilitate the classification,
collection, integration and dissemination
of organizational knowledge.
Source: https://monday.com/blog/project-management/knowledge-
management-system/
10. FR
E nterp rise Resou rc e Plan n in g ( E R P)
Vu ln erab ilities
Add a footer 10
Vulnerabilities of Enterprise Applications
1. Lack of competent specialists;
2. Lack of security audit tools;
3. Traffic Capture and Modification
4. Protocol vulnerabilities
5. Web application vulnerabilities
11. FR
Cu stom Relation sh ip Man agement Systems
Add a footer 11
CRM Vulnerabilities
1. Denial of service
2. Intrusion into sales automation
systems and customer database
3. Identity Theft
4. Malware attacks
12. FR
S u p p ly Ch ain Man agement Systems
Add a footer 12
SCM Vulnerabilities
1. Cybersecurity threats in the supply
chain
2. Improper management of cloud
access
3. Third party data trust
4. IoT compromise
5. Physical device tampering
13. FR
Kn owled ge Man agement Systems
Add a footer 13
KM Vulnerabilities
1. must take cyber-attacks
into account
2. accessibility and reliability
3. browser security
4. data security and privacy
issues
15. FR
solu tion s
Add a footer 15
ERP Security
1. Double and triple check your system configurations
2. Update your ERP software regularly
3. Set up an ERP system administrator
4. Full access rights
5. Create strong protection against Ransomware/Malware
6. Reduce internal human errors
7. Failure to comply
16. FR
Cu stom Relation sh ip Man agement Systems
Add a footer 16
CRM Security
1. Counteracting DoS attacks
2. Protect your data
3. Choose a reliable CRM provider
4. Educate your employees
17. FR
S u p p ly Ch ain Man agement Systems
Add a footer 17
SCM Security
1. Cyber security compliance
requirements in the supply
chain
2. Supply Chains and Cloud
3. Monitoring for threats and new
technologies
18. FR
Kn owled ge Man agement Systems
Add a footer 18
KM Security
Businesses, every time they use the
services of cloud providers, must
implement the ISO/IEC 27002
framework, which consists of three
broad categories:
1. organizational infrastructure,
2. technical infrastructure and
3. information security,
19. BIS
Business
Information System
Conclusion
The complete security of corporate applications is a
multi-step procedure that businesses must consider.
And each stage is critical as creating a safe
environment is similar to constructing a wall: if a
component is lacking, it might topple with the slightest
movement.