Abstract:
There is a growing tendency in the security of an ERP systems. This has resulted in security issues when an implementing an ERP system. Despite many researchers have discovered various solution for the improve ERP system implementation security there are lack ofsolutions to analysis security issues ofMicrosoft Dynamics Navision ERP system. The solution take various inputs parameters related to the ERP systems. Having giving the input system will be analysis the security threats related to ERP system. After the analysis phase system will produce a report; it consists a list of security issues, suggestions and solutions for those identified issues. This solution can be useful to; ERP systems security auditors, ERP systems own organizations, ERP systems implementation organizations or anyone who interested to investigate the ERP system implementation security issues. System modules are developed using Open Source technology by using Apache as web server, MySQL as a database server and PHP/Perl/Python as scripting language. System uses existing Open Source libraries and security scanning tools to perform security analysis. The over system has been designed to work in platform independent manner. System can be accessible using any modem web browser also the users can access the system by hosting the application on they own or rented LAMP or WAMP server. Based on the identified security issues online survey questionnaire was design to understand what target audience are really thinking about the ERP systems security. After the statistically analyzing collected data it shows that those identified issues are significant to the ERP systems security. After development ofthe security analysis tool, it was tested by the target audience by using the test cases. The results show that our solution can evaluated the ERP systems related security issues. In summary, the proposed security analysis tool offers unique features necessary forthe security of Microsoft Dynamics Navision ERP systems. It also overcomes the limitations associated with existing security approaches and enables the protection of the three major components; people, policy and technology.