International Information System Security of a Global Essay

Total Length: 603 words ( 2 double-spaced pages)

Total Sources: 1

Page 1 of 2

International Information System

Security of a Global Enterprise IT Network

Managing the security for an international network that supports key enterprise applications including marketing, sales, human resources, finance and administration across four continents must be coordinated with a strategic security information systems plan. The intent of this analysis is to show what some of the potential security threats are to managing a diverse IT network across diverse geographic locations, and what strategies or tools can be used to mitigate and even in some cases eliminate these threats altogether.

Analysis of Global IT Strategic Planning

There are a myriad of potential threats that could impact a global IT infrastructure, especially one distributed across four nations, supporting several key enterprise applications. The most common and potentially lethal threat is the network's perimeter is compromised through access of a corporate server at a firewall location. Hacking through authentication proxy servers has become commonplace with packet-impersonation devices and programs (Chang, Wang, 2011).

Stuck Writing Your "International Information System Security of a Global" Essay?

This threat is beyond the scope of common phishing and individual productivity-based attacks. The approach taken with these strategic threats is to impersonate the packet on a company network down to the TCP/IP registration level so it is imperceptible to packet sniffing technologies and firewalls (Chang, Wang, 2011). This type of security threat can quickly infiltrate throughout an entire network, creating a platform for future access at any time. In conjunction with this treat is the evolving nature of packet redirection transaction-based workflows throughout an organization. This often occurs within Enterprise Resource Planning (ERP) systems that have e-commerce front-ends or electronic storefronts that can easily be hacked and have specific codes embedded in their front-end applications (Gillies, 2011). The hacking of an ERP system will in turn provide access to catalog management, order management, pricing and services costing across a very wide spectrum….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"International Information System Security Of A Global" (2013, February 08) Retrieved July 5, 2025, from
https://www.aceyourpaper.com/essays/international-information-system-security-85773

Latest MLA Format (8th edition)

Copy Reference
"International Information System Security Of A Global" 08 February 2013. Web.5 July. 2025. <
https://www.aceyourpaper.com/essays/international-information-system-security-85773>

Latest Chicago Format (16th edition)

Copy Reference
"International Information System Security Of A Global", 08 February 2013, Accessed.5 July. 2025,
https://www.aceyourpaper.com/essays/international-information-system-security-85773