| ESP Journal of Engineering & Technology Advancements |
| © 2025 by ESP JETA |
| Volume 5 Issue 3 |
| Year of Publication : 2025 |
| Authors : Upendra Kanuru, Odiase Irumudomon |
:10.56472/25832646/JETA-V5I3P107 |
Upendra Kanuru, Odiase Irumudomon , 2025. "Digital Systems Security: Case Study of an IT Consulting firm", ESP Journal of Engineering & Technology Advancements 5(3): 43-53.
This case study looks at Adler Consulting's digital systems security architecture in depth and makes suggestions for how to improve it. Adler Consulting is a well-known organisation that provides IT solutions all around the world. Adler Consulting has more than 20,000 workers and brings in more than $1 billion a year. Because of this, they need to have strong security to deal with new cyber dangers that come up. The study goes into detail on the organization's existing security setup, which includes SIEM/SEM, WAF, and multi-cloud environments. It also points out the most relevant flaws and threats. The plan for making things better involves hiring security engineers who are dedicated to the task and putting up a modern Security Operations Centre (SOC) with a Chief Information Security Officer (CISO) in charge. Important policy ideas have been made around Acceptable Use, Security Awareness and Training, Change Management, Password Management, Remote Access, and Third-Party involvement. The paper also gives ideas for making the decentralised network design stronger, such using Intrusion Detection/Prevention Systems (IDS/IDPS) and always keeping an eye on how well the network is working. Finally, it explains how to have solid procedures for Incident Response and Business Continuity Planning so that the organisation is strong and security incidents don't cause too much trouble.
[1] Ahmed, U., Bhuiya, I. and Rahman, M., (2017). A secure enterprise architecture focused on security and technology-transformation (SEAST), The 12th International Conference for Internet Technology and Secured Transactions, (ICITST-2017), Cambridge, UK, 11–4/12/2017.
[2] Alanazi, T., Anbar, M., Ebad, A., Karuppayah, S., and Al-Ani, A. (2020). Theory-based model and prediction analysis of information security compliance behavior in the Saudi healthcare sector. Symmetry, 12(9), 1544. DOI: 10.3390/sym12091544
[3] Ali, S. S., & Singh, Y. (2018). On Opportunistic Routing in Wireless Sensor Networks. International Journal of Computer Sciences and Engineering, 06(03), 21–25. https://doi.org/10.26438/ijcse/v6si3.2125
[4] Arean, O. (2013). Disaster recovery in the cloud. Network Security, 2013(9), 5–7. https://doi.org/10.1016/s1353-4858(13)70101-6
[5] Bejtlich, R. (2012). The Importance of Security Awareness, Threat Research Blog. FireEye.
[6] Bellovin, S. M. (2009). Security problems in the TCP/IP protocol suite. ACM SIGCOMM Computer Communication Review, 19(2), 32–48. https://doi.org/10.1145/378444.378449
[7] Bishop, M. (2005). Policy and Mechanism | An Overview of Computer Security, Inform IT Informit.com.
[8] Chandran, M., and Vinothramkumar, B. (2018). Crime Intelligent Security Control Robot Investigation System. International Journal of Computer Sciences and Engineering, 06(08), 114–124. https://doi.org/10.26438/ijcse/v6si8.114124
[9] Chapple, M. (2016). Can ISO 27002 be used as a standalone guide for security management? Search Security.
[10] Cohn, S., and Simon, C. (2019). Britain's Phoenix to buy Swiss Re's ReAssure business for $4.1 billion. Reuters – via www.reuters.com.
[11] Dahiya, B. P., Rani, S., & Singh, P. (2018). Performance Analysis of Swarm Intelligence Techniques to improve lifetime of Wireless Sensor Networks. International Journal of Computer Sciences and Engineering, 6(9), 885–895. https://doi.org/10.26438/ijcse/v6i9.885895
[12] Dandotiya, N., Singh Dandotiya, A., & Gupta, S. (2019). Impact of Software Defined Networking for Wireless Sensor Networks. International Journal of Computer Science and Engineering, 6(4). https://doi.org/10.14445/23488387/ijcse-v6i4p102
[13] Danchev, D. (2003). Building and Implementing a Successful Information Security Policy. WindowSecurity.com
[14] Dhillon, G. & Backhouse, J. (2001) “Current directions in IS security research: towards socio-organisational perspectives”, Information Systems Journal, 11, pp 127-153.
[15] Ebad, S. (2018). The influencing causes of software unavailability: A case study from the industry. Software Practice and Experience, 48(5), 1056–76. DOI: 10.1002/spe.2569.
[16] Ebad, S. (2018). An exploratory study of ICT projects failure in emerging markets. Journal of Global Information Technology Management, 21(2), 139–60. DOI: 10.1080/1097198X.2018.1462071
[17] Esa, F.; Yusof, Y. (2016). Implementing overall equipment effectiveness (OEE) and sustainable competitive advantage: A case study of hicom diecastings SDN. BHD. (HDSB). ARPN J. Eng. Appl. Sci.
[18] Fulford, H. and Doherty, N. (2003). The application of information security policies in large UK‐based organizations: an exploratory investigation. Info Mngmnt& Comp Security, 11(3), pp.106-114.
[19] Gandecha, D. T. (2022). A Review on Cloud Computing Technology, Cloud Deployment, and Service Delivery Models. International Journal for Research in Applied Science and Engineering Technology, 10(1), 1238–1245. https://doi.org/10.22214/ erased.2022.40022
[20] Gupta, A. and Hammond, R. (2005). Information systems security issues and decisions for small businesses. Info Mngmnt& Comp Security, 13(4), pp.297-310.
[21] Hashizume, K., Rosado, G., Fernández-Medina, E., and Fernandez, B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(5), n/a. DOI: 10.1186/1869-0238-4-5.
[22] Ibrahim, R.; Jamal, M., Esmaeel, I., Zakuan, N, Mohd, N. (2018). C Trade-off Costing models for capacity optimization between used capacity and operational efficiency of business performance from the perspective manufacturing strategies: ScienceDirect
[23] Jewliya, S. (2017). Analysis of Web Application Security. International Journal of Computer Sciences and Engineering, 5(9). https://doi.org/10.26438/ijcse/v5i9.215220
[24] Ju, H. (2014). Intelligent disaster recovery structure and mechanism for cloud computing network. International Journal of Sensor Networks, 16(2), 70. https://doi.org/10.1504/ isn’t.2014.065860
[25] Kent, S. (2008). Comments on “security problems in the TCP/IP protocol suite.” ACM SIGCOMM Computer Communication Review, 19(3), 10–19. https://doi.org/10.1145/74674.74675
[26] Pardon, G., Pautasso, C., and Zimmermann, O. (2018). Consistent Disaster Recovery for Microservices: the BAC Theorem. IEEE Cloud Computing, 5(1), 49–59. https://doi.org/10.1109/mcc.2018.011791714
[27] Sustainable Manufacturing: Metrics, Standards, and Infrastructure—Workshop summary. Proceedings of the 2010 IEEE International Conference on Automation Science and Engineering, Toronto, ON, Canada.
[28] Sayeed, R., Miller, R., and Sayeed, Z. (2016). Throughput Prediction Across Heterogeneous Boundaries in Wireless Communications. Journal of Cyber Security and Mobility, 4(4), 233–258. https://doi.org/10.13052/jcsm2245-1439.441
[29] Schaefer, R. (2014). A usenet for a new age. ACM SIGSOFT Software Engineering Notes, 39(1), 7. https://doi.org/10.1145/2557833.2557863
[30] Singh, R. (2018). Evaluation of Energy Saving Medium Access Control Protocol for Wireless Sensor Networks. International Journal of Computer Sciences and Engineering, 6(6), 514–520. https://doi.org/10.26438/ijcse/v6i6.514520
[31] Soni, M., Singh, D., & Kumar, S. (2019). Wireless Sensor Network Performance with Energy-Efficient Approaches: A Review. International Journal of Computer Sciences and Engineering, 7(5), 1532–1537. https://doi.org/10.26438/ijcse/v7i5.15321537
[32] Upendra, Kanuru. (2025). Enterprise Security Strategy Framework for Electronic Health Record Organizations. International Journal of Advanced Research in Computer and Communication Engineering, 14(5), 1-8. https://doi.org/10.17148/IJARCCE.2025.14501
Digital Systems Security, Enterprise Security Plan, Enterprise Security Strategy Framework, Risk Management, Security Policies, Network Security, Incident Response, Business Continuity Planning, Cloud Security, SIEM, SOC, Cyber Threat, and more.