CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Vulnerability Management for an Enterprise Resource Planning System

by Shivani Goel, Ravi Kiran, Deepak Garg
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 53 - Number 4
Year of Publication: 2012
Authors: Shivani Goel, Ravi Kiran, Deepak Garg
10.5120/8409-2043

Shivani Goel, Ravi Kiran, Deepak Garg . Vulnerability Management for an Enterprise Resource Planning System. International Journal of Computer Applications. 53, 4 ( September 2012), 19-22. DOI=10.5120/8409-2043

@article{ 10.5120/8409-2043,
author = { Shivani Goel, Ravi Kiran, Deepak Garg },
title = { Vulnerability Management for an Enterprise Resource Planning System },
journal = { International Journal of Computer Applications },
issue_date = { September 2012 },
volume = { 53 },
number = { 4 },
month = { September },
year = { 2012 },
issn = { 0975-8887 },
pages = { 19-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume53/number4/8409-2043/ },
doi = { 10.5120/8409-2043 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:53:16.165917+05:30
%A Shivani Goel
%A Ravi Kiran
%A Deepak Garg
%T Vulnerability Management for an Enterprise Resource Planning System
%J International Journal of Computer Applications
%@ 0975-8887
%V 53
%N 4
%P 19-22
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Enterprise resource planning (ERP) systems are commonly used in technical educational institutions(TEIs). ERP systems should continue providing services to its users irrespective of the level of failure. There could be many types of failures in the ERP systems. There are different types of measures or characteristics that can be defined for ERP systems to handle the levels of failure. Here in this paper, various types of failure levels are identified along with various characteristics which are concerned with those failures. The relation between all these is summarized. The disruptions causing vulnerabilities in TEIs are identified . A vulnerability management cycle has been suggested along with many commercial and open source vulnerability management tools. The paper also highlights the importance of resiliency in ERP systems in TEIs.

References
  1. Patriciu, V. V. , Priescu, I. and Nicolaescu, S. 2006. Security metrics for Enterprise Information System. Journal of Applied Quantitative Analysis. 1 (2), 151-159.
  2. Berkes, F. 2007. Understanding uncertainty and reducing vulnerability: lessons from resilience thinking, Nat Hazards. 41, 283–295.
  3. Christopher, M. and Peck, H. 2004. Building Resilient Supply Chain. International Journal of Logistics Management. 15, 1-13.
  4. Sheffi, Y. and Rice, Jr. J. B. 2005. A Supply Chain View of the Resilient Enterprise, MIT Sloan Management Review. 47(1), 41-48.
  5. Hollnagel, E. , Woods, D. D. and Levesson, N. 2006. Resilience engineering: Concepts and precepts, Hampshire: Ashgate.
  6. Erol, O. , Monsouri, M. and Sauser, B. 2009. A framework for Enterprise Resilience Using Service Oriented Architecture Approach. IEEE SysCon 2009 —3rd Annual IEEE International Systems Conference Vancouver Canada (March 23–26), 2009.
  7. Carpenter, S. , Walker, B. , Anderies, J. M. and Abel, N. 2001. From Metaphor to Measurement: Resilience of What to What? Ecosystems. 4, 765–781.
  8. Morello, D. 2001. The Blueprint for the Resilient Virtual Organization, Gartner January 2001.
  9. Avizienis, J. Laprie, Randell, B. and Landwehr, C. 2004. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable Secure Computing. 1 (1), 11–33.
  10. Fiksel, J. 2006. Sustainability and Resilience: Toward a Systems Approach, Sustainability: Science, Practice, & Policy. 2, 14- 21.
  11. Helaakoski, H. , Iskanius, P. and Peltomaa, I. 2007. Agent-based Architecture For Virtual Enterprirses To Support Agility, in Establishing the Foundation of Collaborative Networks, 243, L. Camarinha-Matos, H. Afsarmanesh, P. Novais and C. Analide, Eds. : Boston: Springer, 2007, 299–306.
  12. Haimes, Y. Y. , Crowther, K. and Horowitz, B. M. 2008. Homeland Security Preparedness: Balancing Protection with Resilience in Emergent Systems, Systems Engineering. 11, 287-308.
  13. Zhang, W. J. and Lin, Y. 2010. On the principle of design of resilient systems - application to enterprise information systems. Enterprise Information Systems. 4(2), 99-110.
  14. Wu, B. and Wang, A. D. N. 2011. A Multi layer tree model for enterprise vulnerability management. SIGITE'11, (October 20–22), West Point New York USA, 257-262.
  15. Rose and Liao, S. 2005. Modeling regional economic resilience to disasters: A computable general equilibrium analysis of water service disruptions. Journal of Regional Science. 45, 75-112.
  16. Hu, Y. , Li, J. and Holloway, E. L. 2008. Towards Modeling of Resilience Dynamics in Manufacturing Enterprises: Literature Review and Problem Formulation, in 4th IEEE Conference on Automation Science and Engineering Washington DC: IEEE, 279-284.
Index Terms

Computer Science
Information Sciences

Keywords

Enterprise resource planning disruptions resilience vulnerability management tools