FOR COMPLETE AND CUSTOMIZED ESSAY CLICK ORDER NOW!

Enterprise Resource Planning Systems

ORDER NOW!

Many business enterprises in the world today use the famous Enterprise Resource Planning (ERP) system SAP as the main application to execute their daily activities and monitor trends. (TeraData 2003) With the SAP system, the enterprises can manage finances, accounting, Human resource, Manufacturing, logistics, sales and distribution. This Applications system has various components including data warehousing component, a user interaction and applications managing component.

ORDER NOW!

 FOR COMPLETE AND CUSTOMIZED ESSAY CLICK ORDER NOW!

COMPUTER FORENSIC

ORDER NOW!

Computer forensics entails the process of applying scientific and analytical skills to computer operating systems and file structures in order to determine the applicability of evidence for court ruling. It obviously takes scientific knowledge and a lot of skills in computer systems’ structures in order to validate the evidence, whether image files, digital signatures or malware planted by the attacker in the victims system. In trying to protect companies’ and organizations Information systems, investment is usually done in IT department for computer forensics. In order to back up and speed the processes involved in forensics, or at least have the evidence in order to analyze it, records of network usage needs to be kept and patterns established. Intrusion Detection Systems are software tools used for the purposes of keeping track of network usage patterns and identifying suspicious strange patterns in order to raise an alarm on a possible intrusion. By keeping these IDS tools running on the network, there are high chances of identifying and storing the identification of the attacker by either digital signatures or virus and malware type.  In General view, when dealing with evidence from a computer system issue, whether illegal remote access of information or placement of codes in a system, it will be of utmost importance to identify the threat occurrence in order to investigate it. IDS are therefore vital for computer forensics. In a real world case, Alan Neville (2003) presented a case where analysis of IDS logs aided in establishing how a network intrusion was done on a Sun Solaris server in a production network. The information from the logs of server access in a Snort binary file provided the basics of the analysis on the access information. The intruder had used a “buffer overflow vulnerability to gain remote root access to the system”. From the analysis, the forensics provided some knowledge on when the access happened, the commands executed and the access point, all from the identification of the patterns using some IDS tools like Snort and Ethereal, which help analyze packets from live networks or a previously save log.  The outcome of the analysis was successful because the data analyzed revealed how the access was gained and what commands were run using a tool whose source code was output and recognized. The fact that details on the source code were captured meant that the person who actually wrote the codes and used them could be identified and charged in a court of law. The fact that forensics on data in hard drives is limited to the existence of the data on the hard drive means that IDS tools are much more important when the hacker is much more careful and skilled enough to remove any data that was initially put on the drive. The only other places to monitor therefore become logs created and network caches, all but the results of using IDS.

ORDER NOW!

 FOR COMPLETE AND CUSTOMIZED ESSAY CLICK ORDER NOW!

Internet Regulatory Principles: Security

ORDER NOW!

Internet security is based on Regulation which is hard to implement because of several factors. First, regulation cannot stop the determined crooks that are anti-regulation. It will only ensure that the regular people using internet conform to the regulatory rules. In the past, the emergent of new technology has always left the courts, judges and lawmen confused because of its nature. There is always the difficulty of covering all areas of technology when posing a regulatory rule and this is proven by the existence of many regulatory methods, some introduced after others fail to cope with major problems. For example, when copyright fail, trademark is introduced because of length of applicability time.

ORDER NOW!