Security and Enterprise Systems – Term Paper Example

Download full paperFile format: .doc, available for editing

The paper “ Security and Enterprise Systems” is an affecting variant of term paper on information technology. Over the last two decades, the global business environment has undergone numerous changes technologically. As expected, security and other processes have become more demanding with this evolution. For instance, the 21st century has been plagued with a plethora of concerns in the ear of the internet. Many organizations have therefore cited struggles in trying to manage the security issue, therefore labeling it as imperative in any contemporary organization. Governments have embarked on activities aimed at protecting the integrity of their people’ s assets.

As such, they have instituted strict control measures over various companies to adopt strategies and structures that foster the absolute protection of data on individuals. Companies that fail to meet these established standards are forced to the edge and eventually become recessive. To maintain competitive advantage, organizations have engaged themselves in moves that seek to protect their assets aggressively, instituting technologies known as enterprise security systems to thwart off any potential threats. This report will embark on the issue of Security and Enterprise Systems, outlining the background of the practice as well as the basics of enterprise systems.

Thereafter, it will focus on an in-depth analysis of the various security and enterprise systems available in the modern world. Later, it will focus on issues with the systems that have successfully been implemented the schemes of their operations. The successes of the methods identified will then be harnessed to come up with viable recommendations pertaining to how enterprises can be effectively protected using the analyzed mechanisms. Finally, a comprehensive conclusion will be made. BackgroundWith the onset of E-business, security became a major concern for organizations.

In this case, e-business is defined as any commercial activity that utilizes internet technology to help businesses streamline processes, improve productivity, and increase efficiencies. The once peaceful mindset that we as human beings had placed in our thoughts has become increasingly vague, as threats arise on a daily basis. Businesses increasingly faced new demands from the challenges posed to their existence. According to the Cambridge English Dictionary, security is defined as the ability to avoid being harmed by any risk, danger, or threat.

This is deemed as an unmanageable task especially in the 21st century. Due to these limitations, it is then required that organizations and institutions install the security that they need the most. Security systems have evolved from simple manual systems to sophisticated virtual systems with inherent capabilities that require in-depth training of the organizational staff. It has reached a point where security requires a heightened level of awareness in all branches of the organization. This requires physical as well as virtual measures. However, it has become imperative to consider that the security of enterprise systems must be balanced with usability.

In other terms, the security practices in the business enterprise should be useful to the purpose for which they were established. This is represented below: Optimumi. e. Most protected = uselessMost useful= Unprotected Security for business enterprise should be cost-effective. Hartman et al. (2002) assert that the best security systems are those that are most cost-effective. The cost of the security system will depend upon the assets to be protected, the dangers that the businesses are currently facing, the magnitude of the loss in case of an event, costs of the possibilities, and the cost of the prevention of the events.        


Bayuk, J., 2009. Enterprise Security for the Executive: Setting the Tone from the Top: Setting the Tone from the Top. Cremona Dr, Goleta, CA: ABC-CLIO.

Bertino, E. & Takahashi, K., 2011. Identity Management: Concepts, Technologies, and Systems. First ed. London: Artech House.

Birch, D. G. W., 2007. Digital Identity Management: Perspectives on Technological, Business, and Social Implication. illustrated ed. Gower Publishing, Ltd.: Farnham.

Bostrom, N. & Sandberg, A., 2011. The Future of Identity, Oxford: Oxford University Faculty of Philosophy.

Capel, V., 1999. Security Systems and Intruder Alarms. 1st ed. London: Newnes.

Caputo, A. C., 2010. Digital Video Surveillance and Security. Oxford: Butterworth-Heinemann.

Hartman, B., Flinn, D. J. & Beznosov, K., 2002. Enterprise Security with EJB and CORBA. New York: Wiley and Sons.

Nilsson, F. & Axis-Communications, 2008. Intelligent Network Video: Understanding Modern Video Surveillance Systems. 1st ed. Boca Raton: CRC Press.

Page, S., 2014. Security Camera System Buying Guide: CCTV Surveillance for Home & Business. 1st ed. London: JS Books.

Simpson, M. T., 2012. Hands-On Ethical Hacking and Network Defense. Boston: Cengage Learning.

Stets, J. E. & Burke, P. J., 2002. A Sociological Approach to Self and Identity*. In: M. Leary & J. Tangney, eds. Handbook of Self and Identity. London: Guilford Press, pp. 1-44.

Tipton, H. F. & Krause, M., 2007. Information Security Management Handbook, Sixth Edition. Boca Raton: CRC Press.

Download full paperFile format: .doc, available for editing
Contact Us