Information Systems Security at Dell Term Paper by scribbler

Information Systems Security at Dell
A look at the reasons and safeguards for security protection at Dell.
# 152050 | 954 words | 6 sources | APA | 2012 | US


$19.95 Buy and instantly download this paper now

Description:

This paper provides an analysis of the safeguards in place for Dell Computer Corporations' Enterprise Resource Planning (ERP) system. It also includes the reasons for protection of this specific system and the consequences of inadequate security. The paper also includes a diagram of the Dell ERP System.

Outline:
Introduction
Global Enterprise Resource Planning (ERP) systems at Dell
Reasons for Protection
Consequences of Inadequate Security

From the Paper:

''As can be seen from Figure 1, the Dell ERP system forms the foundation of the global supply chain, manufacturing, selling and service networks for the company. If just one integration point is compromised or hacked into, the entire network becomes vulnerable. For example if the Electronic Data Interchange (EDI) link between the distributors and the Dell ERP system is comprised, hackers could steal Dell's pricing tables and schedules, product delivery and potentially new product plans shared with distributors. All of this information, if stolen, could be debilitating to the channel strategies of the company. A failure of the EDI link between distributors and the Dell ERP system would compromise the sales by each member of their distribution channel and the gross margins earned. In other words anyone getting this information would know exactly down to the penny how much it costs Dell to manufacture a given system, how much gross margin or profit they made on it, and how much incentives were given to distributors. Within the extranets that are integrated to suppliers, Dell has been piloting Web Services applications based on the XML communications standard (Ash, Burn, 2003). This approach to providing Web-based applications across the Internet also has a number of risks associated with it. The first is that secured XML connections can be potentially impersonated across the Internet and entire order history of suppliers compromised through the XML connections (Brehm, Gomez, 2005). A second factor is that in the customization of the ERP systems there could potentially be weak integration point that could enable easier break-ins and potential theft of data and entire supplier histories (Rothenberge, Srite, 2009). A third factor is the authentication of Web Services is often impersonated (Allen, 2008). All of these factors illustrate why Dell must be vigilant to the information systems security requirements their systems present globally.''

Sample of Sources Used:

  • Allen, V. (2008). ERP Security Tools. The Internal Auditor, 65(1), 25.
  • C G Ash, & J M Burn. (2003). A strategic framework for the management of ERP enabled e-business change. European Journal of Operational Research, 146(2), 374-387.
  • Nico Brehm, & Jorge Marx Gomez. (2005). Secure Web service-based resource sharing in ERP Networks. Journal of Information Privacy & Security, 1(2), 29-48.
  • Kraemer, Kenneth L., Jason Dedrick, and Sandra Yamashiro (2000). Dell Computer: refining and extending the business model with IT, The Information Society, 16: 5-21.
  • Rothenberger, M., & Srite. (2009). An Investigation of Customization in ERP System Implementations. IEEE Transactions on Engineering Management,56(4), 663.

Cite this Term Paper:

APA Format

Information Systems Security at Dell (2012, November 25) Retrieved December 14, 2019, from https://www.academon.com/term-paper/information-systems-security-at-dell-152050/

MLA Format

"Information Systems Security at Dell" 25 November 2012. Web. 14 December. 2019. <https://www.academon.com/term-paper/information-systems-security-at-dell-152050/>

Comments