Zharkov G.V., Pshenichnyy S.V., Ozhiganova M.I. Analysis of ERP-Systems Protection Methods
ANALYSIS OF ERP-SYSTEMS PROTECTION METHODS
Grigoriy V. Zharkov
Student,
Volgograd State University
This email address is being protected from spambots. You need JavaScript enabled to view it.
Prosp. Universitetsky, 100, 400062 Volgograd, Russian Federation
Sergey V. Pshenichnyy
Assistant, Department of Information Security,
Volgograd State Uinversity
This email address is being protected from spambots. You need JavaScript enabled to view it.
Prosp. Universitetsky, 100, 400062 Volgograd, Russian Federation
Marina I. Ozhiganova
Candidate of Sciences (Engineering),
Associate Professor of Department of Information Security,
Sevastopol State University
This email address is being protected from spambots. You need JavaScript enabled to view it.
Kurchatova St., 7, 299015 Sevastopol, Russian Federation
Abstract. The ERP is an organizational strategy of integration of production and operations, human resources management, financial management and asset management, focused on continuous balancing and optimization of enterprise resources through a specialized integrated software application package that provides a common model of data and processes for all areas of activity. An ERP system is a specific software package that implements the ERP strategy.
Today, many modern companies use ERP-systems as an effective means of automation and acceleration of business processes. Most ERP-systems have impressive functionality such as maintenance of design and technological specifications, demand management and formation of sales and production plans, material requirements planning, inventory and procurement management, production capacity planning, financial functions, project management functions. However, due to the fact that the ERP-system combines almost all information processes of the enterprise and carries out storage, processing and transmission of data, the risk of information threats increases, which in turn entails large losses for the company. After analyzing the structure of the ERP-system, the following protection methods can be identified: protection of network infrastructure; database protection; application server protection. Based on the above, we can conclude that the complexity of the ERP-system increases the risk of information leaks. To ensure the information security of the ERP system, it is necessary to apply a large number of methods and means of protection, which in turn means an increase in costs and a decrease in the productivity of the enterprise. Therefore, one of the main tasks of the company at any level is to maintain a balance between safety and performance.
Key words: protection methods, safety, ERP-system, security, risk.
This work is licensed under a Creative Commons Attribution 4.0 International License.