220 likes | 234 Views
Learn why ERP security is crucial in protecting vital business data like employee & customer information from cyber threats. Understand legal considerations, authentication, encryption, unauthorized access prevention, auditing, monitoring, RFID technology, and disaster recovery planning.
E N D
Security in ERP Systems By Jason Rhodewalt & Marcel Gibson
Why is ERP Security Important? All of the business's vital data Employee/customer personal data Social Security Numbers Credit Card Numbers Addresses
Background of Security Problem • Hacking began in the ‘70s • Simple wiretaps or “blue boxes” • Today, complex malicious programs • Estimated that 1 and 4 US computers infected with a virus • Signs that viruses are becoming professionally made for monetary/ political incentives
Legal Considerations Sarbanes-Oxely CEO liability External tampering Internal tampering Auditing
Legal Considerations – cont. California Civil Act SB 1386 Companies must notify customers of compromised data Applies even to companies not incorporated in California Notification must be in a timely matter
Legal Considerations – cont. McLaren v Microsoft Corp (1999) Suspended employee has personal data on work machine and password protected Microsoft access files – employee sues for right to privacy Employee looses Work computer and work email are Microsofts property
ERP System Authentication Not only employees need access Customers, suppliers, and 3rd party software developers Local and remote access
Passwords User names and passwords Don't use SSN! Custom user names are like 2nd password Strong passwords Combination of uppercase/lower case words and numbers
Encryption Algorithms Encrypting data protects it from unauthorized viewing Blowfish Algorithm (1993) RC4 Algorithm(1987)
Unauthorized Access Easiest method: Guess a password Use random user names and strong passwords Try all the combinations Limit log on attempts Only allow access from certain IP addresses Tough to implement with remote access Phishing Educate the end users
Unauthorized Access – cont. Phishing Educate end-users Key-logging software Limit installation privileges on public machines
Auditing and Monitoring • Authorization and authentication protocols allow ERP systems to keep a detailed account of system events • Auditing required by statute • Can be very costly and time consuming.
Auditing and Monitoring –cont. Steps to prepare for audits: Ask the auditors what they are looking for before an audit. Ask them for their audit objectives, if any pre-audit checklists. Make sure to list perceived risks. Sort them in descending order with the highest risks at the top, along with the controls you created to mitigate them. Document your preventative controls, and have detective controls in place to show they work. Document the change management process. Keep a current and accurate asset inventory of hardware and software. Document all internal audit procedures.
RFID Technology Used to track parts and products through supply chain Passive electronics Included in shipments and/or product packaging
Using RF ID Data Immediate decisions Will we be on time this week? Executive decisions Should we build this part first? Should we build this product? Cash-To-Cash time
What to do in case of a breach!!! • Asses the situation/ level of breach • Report the breach to proper authorities • FBI • Management • Person effected • Track/ investigate the breach • Seal breach and rectify the problem
Disaster Recovery • The purpose of disaster recovery is to ensure that in the event of a disaster, all business operations can continue relatively smoothly, including security. • Plan ahead: a good plan might save the entire company.
Disaster Recovery –cont. Setup a secondary site Mirror content in real time at secondary site Implement Disaster Recovery Plan Test, rehearse, and test some more Continuously update plan Be aware, disasters will happen!
Image Reference Enron picture http://www.ba.metu.edu.tr/~adil/BA-web/enron1.jpg RF ID http://www.uktelematicsonline.co.uk/html/rfid.html Phishing http://wearecentralpa.com/content/community/callforaction Encryption http://www.yessoftware.com/products/features.php?product_id=1