Zharkov G.V., Pshenichnyy S.V., Ozhiganova M.I. Analysis of ERP-Systems Protection Methods

ANALYSIS OF ERP-SYSTEMS PROTECTION METHODS

Grigoriy V. Zharkov

Student,

Volgograd State University

This email address is being protected from spambots. You need JavaScript enabled to view it.

Prosp. Universitetsky, 100, 400062 Volgograd, Russian Federation

Sergey V. Pshenichnyy

Assistant, Department of Information Security,

Volgograd State Uinversity

This email address is being protected from spambots. You need JavaScript enabled to view it.

Prosp. Universitetsky, 100, 400062 Volgograd, Russian Federation

Marina I. Ozhiganova

Candidate of Sciences (Engineering),

Associate Professor of Department of Information Security,

Sevastopol State University

This email address is being protected from spambots. You need JavaScript enabled to view it.

Kurchatova St., 7, 299015 Sevastopol, Russian Federation

Abstract. The ERP is an organizational strategy of integration of production and operations, human resources management, financial management and asset management, focused on continuous balancing and optimization of enterprise resources through a specialized integrated software application package that provides a common model of data and processes for all areas of activity. An ERP system is a specific software package that implements the ERP strategy.

Today, many modern companies use ERP-systems as an effective means of automation and acceleration of business processes. Most ERP-systems have impressive functionality such as maintenance of design and technological specifications, demand management and formation of sales and production plans, material requirements planning, inventory and procurement management, production capacity planning, financial functions, project management functions. However, due to the fact that the ERP-system combines almost all information processes of the enterprise and carries out storage, processing and transmission of data, the risk of information threats increases, which in turn entails large losses for the company. After analyzing the structure of the ERP-system, the following protection methods can be identified: protection of network infrastructure; database protection; application server protection. Based on the above, we can conclude that the complexity of the ERP-system increases the risk of information leaks. To ensure the information security of the ERP system, it is necessary to apply a large number of methods and means of protection, which in turn means an increase in costs and a decrease in the productivity of the enterprise. Therefore, one of the main tasks of the company at any level is to maintain a balance between safety and performance.

Key words: protection methods, safety, ERP-system, security, risk.

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Attachments:
Download this file (4_Gharkov_i_dr.pmd.pdf) 4_Gharkov_i_dr.pmd.pdf
URL: https://ti.jvolsu.com/index.php/en/component/attachments/download/602
474 DownloadsUpdate this file (4_Gharkov_i_dr.pmd.pdf)