School of Information Systems

Ethical and Security Management in ERP Systems

About Ethics and Security Management

Ethics and security management has been a growing concern within the information systems community for years as the number of users is increasing daily, the authors of different types, academics, and professionals. Therefore IT & Database team must do the right thing regarding information and technology ethics. This ongoing debate often addresses viruses, spam, malware, and file sharing. Therefore Implementing an Ethics and security Management in ERP causes a massive change that needs to be carefully managed to reap the benefits of an ERP solution. It can protect an individual or consumer from negligent errors and prevent intentional manipulation of data by organizations.

Ethics and Security Necessary in ERP Systems

Security management is critical because ERP systems are closely linked to the world of the Internet when we implement a system. When a company uses an ERP system, all the advantages and disadvantages are exposed. So we must ensure that our data is safe and that no bad people are doing the wrong things. And if your security has any weaknesses, it is a very high risk that will significantly affect your business, which can suffer huge losses. However, protecting your system is not easy and requires something that must be satisfied. Securing an ERP system is complex and requires good technical skills and communication, and awareness. ERP implementation teams must ensure that information stored in the databases about employees, customers, and other partners is accessible only to those who have the right to see and use this information. Adequate security and controls must be in place within the ERP system to prevent unauthorized access.

There are several steps to protect from bad things happening:

  • User ID and Password

User ID or passwords are essential to maintain confidentiality. Aim for IDs and passwords that are difficult for many people to guess and that others may not even know. This step has undoubtedly been implemented in many ways. However, many people still use weak passwords, so it is still risky. For example, hacking can steal your data, but a difficult password can prevent that risk.

  • Physical Hardware Security

Not only can we manage accounts or IDs and passwords that we can access, but hardware access is required. So how do we prepare for double security to protect our confidentiality?

  • Network Security

Network security is one of the most important things because the network is connected to the world of the Internet, which is rich in information and has significant risks. Uses such as VPNs or websites with low security can also pose a high-security risk.

  • Interference Detection

Real-time intrusion detection When multiple people who want to do evil can be tracked and get complete information about the people trying to commit these crimes.

Burhanudin Aqil Baiquni, Marisa Karsen