Security Management for Erp

OPERATING SYSTEMS SECURITY ARCHITECTURE MODEL AND DATA HIDING METHODOLOGIES
With the advent of new technologies and broader use of internet, Information security is facing unprecedented challenges, and effective information security and integrity management is one of the major concerns for most of the organization in the business world. In this part we will discuss various tools deployed and strategies and concerns involved in securing windows server 2003 one of the highly used operating systems in various business environments. There are various features deployed and integrated within the system to achieve this like authentication, access control, auditing, Active Directory, data protection, network data protection, public key infrastructure (PKI), and trusts.
A good security model should also have arrangements for Incident Response Planning, what it means in general is a plan that defines what a breach of security is and the steps that are to be followed for any incident that calls for a breach in security. An IRP plan discusses how information is passed to the concerned department in order to provide assistance for minimizing the damage caused and establish procedures for the possibilities of implementing a policy that would protect the organizations key resources from foreign intrusions.
Analysis of Security for an ERP System  
In past, database system was considered as a core of Information Technology with all the major application programs of companies surrounded to it. But with the advent of ERP systems, companies have targeted ERP to solve their IT problems. The main purpose of ERP implementation was to consolidate and integrate the information across the entire organization. The flow of information at cross organizational level is managed by the centralized database system. So in order to ensure the integrity and confidentiality of the data it becomes very important for the companies to evaluate and audit the security policy for ERP systems. The...