Unit 04
Unit 04
Names of Sub-Units
Meaning and Evolution of EAI, Application Security: Basic Issues, Understanding Web
Services in the Context of EAI, Business Drivers for Enterprise Application Integration,
Application Communication Through EAI, Role of Web Services in Enterprise Application
Integration, Security Complexities and Complications Due to Enterprise Application
Integration. Electronic Mail system mechanism, Security Threats Posed by Electronic Mails,
Countermeasures to Protect from Threats Posed Through E-Mails, Governance for
Electronic Mail Systems
Overview
Learning Objectives
Learning Outcomes
Not Provided
The solution to the lack of communication between enterprise apps is enterprise application
integration (EAI), the implementation of technologies that facilitate communication between
enterprise applications. Enterprise application integration establishes a middleware
framework that helps data flow freely between applications without significant changes to
database configurations or the applications themselves, leading to a streamlined process
and increased data availability.
2
UNIT 4 : Business Application Security: An EAI Perspective JGI JAIN
DEEM ED-T O-BE UNI VE R SITY
3
JGI JAIN
DEEM ED-T O-BE UNI VE R SITY UNIT 4 : Business Application Security: An EAI Perspective
➢ If important data is captured in a given application, it must be manually entered into
other applications
➢ If important data is modified in a given application, the changes will not be reflected in
other applications - the changes must be entered manually
➢ If an application needs data that exists in another application, a user must manually
search for that data
These inefficiencies may result in poor access to information, administrative delays, and
slower business processes.
As an enterprise organization deploys more types of applications, the presence and impact
of information silos within the business can increase exponentially. Some of the most
common enterprise application types include:
➢ Accounting systems
➢ Automated billing systems
➢ Business analytics and intelligence platform
➢ Business continuity planning (BCP)
➢ Content management system
➢ Customer relationship management (CRM) tools
➢ Email marketing platform
➢ Enterprise resource planning (ERP)
➢ Enterprise messaging systems
➢ Payment processing
➢ Service desk application
There are 3 enterprise needs that are driving the adoption of enterprise application
integration:
a. Data integration - Enterprise organizations that deploy many externally and internally
facing applications need to integrate data from across those applications, ensuring that
4
UNIT 4 : Business Application Security: An EAI Perspective JGI JAIN
DEEM ED-T O-BE UNI VE R SITY
databases are synchronized and streamlining data access and availability throughout the
entire organization.
1. Information Sharing: With EAI, you can consolidate all the data across individual
systems to create a single access point. It not only saves time in searching for information
from various methods but it also allows users from different departments to access updated
data. Another advantage of EAI is that it helps improve collaboration between individuals
from multiple departments. Learn how synchronization of legacy ERP systems with
Salesforce.com helped one of the leading healthcare products providers enhance their
productivity and collaboration across the teams.
2. Centralized Flows: Earlier the companies had to develop application-specific
interfaces and connect them point-to-point as required. The result was a complex network,
challenging to maintain and evolve. With EAI, all interfaces converge to a central server (hub)
that processes and redistributes flows to registered applications.
3. Process Automation: The EAI platform helps improve the automation of business
processes and provide timely and accurate information to users and customers. Further, it
bridges the gap between two different systems so that data can flow smoothly between
applications. It eventually improves business processes as well as enhances the transparency
of financial workflows.
5
JGI JAIN
DEEM ED-T O-BE UNI VE R SITY UNIT 4 : Business Application Security: An EAI Perspective
4. Increased Efficiency: By streamlining the business processes, enterprise application
integration benefits the organization’s overall efficiency. It helps to make communication
easier, reduces their time and effort with better functionality, and improved control. Further,
it could even help companies to address the change in market trends, managing their
reputation, and issues related to disruptions in the supply chain and more. For instance, if
you are in the retail industry, you may particularly benefit from integrating your sales
channels, eCommerce and ERP platforms to drive revenue and encourage consumers to
interact with their favorite retail brands. Read more here on how integrating eCommerce
portal with ERP helped improve retail management.
5. Reduced Time: EAI helps in significant reduction in the time needed to integrate new
data or redesign processes. It makes the information system responsive to the company’s
operational or strategic requirements. Moreover, it establishes a link between two or more
platforms. Thus, the data from one platform are accessed by the other platforms meant to
be integrated.
6. Complete Control: One of the key advantages of implementing EAI is that it allows
controlling the information flow. It provides universal access and sharing of all data and
components of the information system, whether standardized or asynchronous. The
different mechanisms in EAI will give full knowledge of the integration that facilitates
complete control of the company.
7. Minimize Errors: EAI provides consistent master data for all applications used. It leads
to a significant reduction of errors that may occur due to incorrect information accessed by
different users. Further, it helps in the immediate elimination of repetitive tasks, errors, and
possible bottlenecks in business processes.
8. Increased Agility: Real-time data, updates, delivered according to established
business rules, significantly improve the efficiency and speed of decision-making processes
in management. It helps businesses to respond to new opportunities and make the most
out of them.
The integration and customization of applications are critical to an organization’s growth
plan. They can add new customers to our system without having to mobilize administrative
resources. Enterprise application integration solutions help to enhance the performance of
organizations, which is in-line with their business goals. As an offshore enterprise application
development company, Rishabh Software can help you modernize your applications. Our
teams combine best practices to support synchronizing of multiple platforms, providing a
central access point to your data.
6
UNIT 4 : Business Application Security: An EAI Perspective JGI JAIN
DEEM ED-T O-BE UNI VE R SITY
EAI has consistently presented a difficulty for organisations over the years. However, because
businesses used technologies to function and operate, it changed across several
generations. The four generations of EAI are the classic integration strategy, the centralized-
based integration approach, the standard-based integration approach, and the cloud-based
integration approach.
Several generations of EAI has undergone a protracted evolution and overcame numerous
obstacles. Research from various sources indicates that Enterprise Service Bus (ESB) is the
most practical integration strategy so far, and as Integration-Platform-as-a-Service (IPaaS)
is still relatively new to the market, more research must be done to fully understand it. Given
the scattered nature of contemporary IT businesses, which include distributed information
systems, networks, and platforms, IPaaS has the potential to be the appropriate solution for
EAI in the future. In the upcoming years, various research companies like Granter anticipate
that the IPaaS industry would increase significantly.
Today, EAI is evolving with new emerging technologies in IT like IoT, Blockchain and AI. It is
anticipated that these technologies will alter EAI. EAI is facing new difficulties as a result of
the nature of IoT services and equipment. These features include the processing of a sizable
volume of data and the widespread graphical dissemination of IoT devices. In addition, IoT
device services lack standardised descriptions and have inadequate context awareness.
However, the integration of Business Process Management (BPM) in several sectors,
including healthcare, supply chain, insurance, and energy management, has a significant
deal of room for improvement. Block chain technology and business process management
(BPM) can work together to increase trust between various parties and devices, cut costs by
doing away with middlemen, and automate transactions.
7
JGI JAIN
DEEM ED-T O-BE UNI VE R SITY UNIT 4 : Business Application Security: An EAI Perspective
4.3.1 Types of EAI
EAI can be done at different levels, depending on many factors including company size and
industry, integration and/or project complexity, and budget.
➢ Data Level- Data Level EAI is a database-centric approach that consists of extracting
data from one database and updating it in another. Sometimes the extracted data can
be transformed before entering it into the target database, for example, to apply
specific business rules.
➢ Application Interface Level- This EAI level of integration consists of leveraging the
interfaces provided by custom or packaged applications to access business processes
and simple information.
➢ Method Level- Method-level integration is similar to application interface level but at
a lower level of granularity. The idea here is not to share business functions (as in
application interface level), but to share directly the different methods used to compose
a given business function. All other enterprise applications needing to implement the
same methods can use them without having to rewrite it.
➢ User Interface Level- User interface-level EAI is also commonly called "Refacing" and
consists of replacing existing text-based user interfaces of legacy systems and graphical
interfaces of PCs by a standardized interface, typically browser-based.
When there were numerous disparate applications covering business processes in the early
1990s, the necessity for integration grew difficult (the applications wanted to talk to each
other). Data adapters, message brokering, and other forms of middleware developed as a
result of EAI technology. Point-to-point integration is the goal of EAI-based technology, and
the applications that exchange messages are tightly connected (ie. the interaction is specific
to the two parties interacting). The number of point-to-point connections rises as more
parties participate, making management challenging.
Web services developed as a solution to this problem. Integration issues can be handled
uniformly via web services. Through the use of web services, the provider merely exposes
application functionality in a uniform manner that any consumer may use. EAI (Enterprise
8
UNIT 4 : Business Application Security: An EAI Perspective JGI JAIN
DEEM ED-T O-BE UNI VE R SITY
Application Integration) is, in essence, a notion for integrating many applications (with
various languages and platforms), and Web services provide a method for doing so.
4.4.1 Salient Differences between Traditional EAI Solutions and Web Services
A few essential differences between traditional EAI solutions and Web Services are, as
follows:
Simple: There is no doubt that Web Services are much simpler to design, develop, maintain,
and use as compared to a typical EAI solution which may involve distributed technology
such as DCOM and CORBA. Once the framework of developing and using Web Services is
ready, it will be relatively easy to automate new business processes spanning across multiple
applications.
Open Standards: Unlike proprietary EAI solutions, Web Services are based on open
standards such as UDDI, SOAP, HTTP and this is probably the single most important factor
that would lead to the wide adoption of Web Services. The fact that they are built on existing
and ubiquitous protocols eliminates the need for companies to invest in supporting new
network protocols.
Flexible: Since EAI solutions may require point-to-point integration, changes made at one
end have to be propagated to the other end, making them very rigid and time consuming
in nature. Web Services based integration is quite flexible, as it is built on loose coupling
between the application publishing the services and the application using those services.
Cheap: EAI solutions, such as message brokers, are very expensive to implement. Web
Services, in the future, may accomplish many of the same goals - cheaper and faster.
Scope: EAI solutions, such as message brokers, integrate applications treating them as single
entities, whereas Web Services allow companies to break down big applications into small
independent logical units and build wrappers around them. For example, a company can
write wrappers for different business components of an ERP application such as order
management - purchase order acceptance, status of order, order confirmation, accounts
receivable, and accounts payable.
Efficient: As mentioned in the previous point, Web Services allow applications to be broken
down into smaller logical components, which makes the integration of applications easier
9
JGI JAIN
DEEM ED-T O-BE UNI VE R SITY UNIT 4 : Business Application Security: An EAI Perspective
as it is done on a granular basis. This makes Web Services solutions for EAI much more
efficient than traditional EAI solutions.
The most typical types of business initiatives driving integration requirements today include
reducing business cycle times to increase efficiency and competitiveness, improving
customer satisfaction, mergers and acquisitions, and regulatory compliance. Some of these
initiatives are strategic and some tactical. Different business requirements call for different
types of integration technologies
➢ Value – the most frequently used criteria for classifying information is the value of data.
If the information is so valuable that their loss could create significant organizational
problems, it needs to be classified.
➢ Age – if the value of certain information declines over time, the classification of the
information may be lowered.
➢ Useful Life – if the information is available to make desired changes as and when
needed, it can be labeled ‘more useful’.
➢ Personal Association – information that is linked to specific individuals or is addressed
by privacy law needs to be classified.
10
UNIT 4 : Business Application Security: An EAI Perspective JGI JAIN
DEEM ED-T O-BE UNI VE R SITY
become a necessity because those companies that use the technology will gain clear
competitive advantage.
Mergers and acquisitions inevitably result in redundant and incompatible systems, leaving
companies with just a few choices:
11
JGI JAIN
DEEM ED-T O-BE UNI VE R SITY UNIT 4 : Business Application Security: An EAI Perspective
➢ Choosing one system over the other and a large data conversion project
➢ Leaving the systems in place and integrating them
➢ Implementing an entirely new system, then converting or integrating both
A combination of approaches may also be used. Integration projects resulting from a merger
or acquisition are usually treated as tactical projects or one-time conversions. However,
companies seeking to improve business efficiency through the merger and acquisition
should also consider business processes integration and management across all business
units, regardless of where they are located or the technology the systems use. This
undoubtedly will require a higher initial investment, but it also offers the highest
potential ROI.
The first thing that may come to everyone's mind taking into consideration this kind of
architecture using a central engine is the fact that there is a single point of failure, as all the
messages between the applications are passing through it.
In addition to this, being the central engine, it can become a bottleneck for messages due
to multiple applications passing the messages to the same point, each consuming a certain
amount of resources. So there is also a need for specific resources on the system where the
Integration stands.
Also, there might be the case that various systems that should be linked together reside on
different operating systems, involving other technologies from different vendors, or even
legacy systems that might be outdated and no longer supported.
Today, in the field of enterprise applications development, the need to be flexible and
respond instantly to changes is especially acute. Although the work of analysts and system
architects, based on forecasting and analysis, is still vital for the enterprise’s work, you need
to be prepared to make changes literally in the midair, because what seemed like a
reasonable decision yesterday may lose its relevance today. In such conditions, the only right
decision is a course on flexibility and customization at all levels.
12
UNIT 4 : Business Application Security: An EAI Perspective JGI JAIN
DEEM ED-T O-BE UNI VE R SITY
This applies both to the choice of flexible development methodologies, and the willingness
of the development team to quickly restructure their work in response to changes in
business requirements.
Enterprise information system is a complex structure, which combines the various services
necessary for the functioning of the company. This structure is constantly changing — new
elements appear, the configuration of existing ones changes. As the system grows, ensuring
information security and protecting business-critical resources is becoming increasingly
difficult. The risk rate is high for an enterprise leaking corporate documentation, customer
data and bank account data.
A cyberattack can cost large companies millions of dollars, and it threatens small and
medium-sized businesses with bankruptcy. It is vital to improve the security system from a
technical point of view. Standard tips for preventing cyberattacks include:
➢ Encrypt data.
➢ Use special anti-malware and authorization tools.
➢ Use hack detection tools.
➢ Back up data.
➢ Restrict access to confidential information.
The task of the developers, in this case, is to provide a technical opportunity for each of the
points above.
The amount of data that companies generate daily is enormous. Even simple storing of all
this information, not to mention analyzing it, is itself a daunting task. Most of this data is not
structured, which makes it difficult to find and analyze.
As part of enterprise applications development, companies have two options for storing
data: locally on their own or leased servers or in the cloud e.g. in the network. Both options
have their advantages and disadvantages.
Local data storage gives companies the freedom not to depend on external servers and
manage all data autonomously. Such an enterprise application is acquired once, and then
13
JGI JAIN
DEEM ED-T O-BE UNI VE R SITY UNIT 4 : Business Application Security: An EAI Perspective
all data is stored on its own servers. This option is somewhat more expensive, but then
everything belongs to the enterprise. The solution is especially suitable for sensitive
customer data as it lends itself to subtle customization.
A reasonable alternative for enterprise applications these days are cloud databases. With
cloud computing, only a license is purchased from the software manufacturer. Then the data
remains on the manufacturer’s servers and can be found online at any time from any end
device. This option is cheaper and makes it possible to work with enterprise applications
from anywhere. Here companies also can make individual changes, but only to a certain
extent.
When using several business applications at the enterprise, it is often necessary to ensure
their interaction and integration into the corporate information environment. System
integration is a great way to optimize performance, as it provides the ability to view and
update relevant information in real time.
Some enterprises still use "monolithic" systems. Monolithic architecture means that all
functionally distinguishable aspects, such as data input and output, data processing, error
handling and user interface, are all interwoven, and do not contain architecturally separate
components. If a business is heavily dependent on these systems, integration becomes a
problem due to the size and complexity of the application. Testing and coding should cover
both the new application and the full integration testing plan every time some changes are
made.
If the corporate application does not work even for several minutes, it directly affects the
income and productivity of the business. Thus, in case of an application failure, it is crucial
that the software company can detect and fix the problem in hours, or even better in
minutes.
Finding specialists with skills that meet current needs is the main task for companies that
need enterprise applications.
14
UNIT 4 : Business Application Security: An EAI Perspective JGI JAIN
DEEM ED-T O-BE UNI VE R SITY
In the case of software “out of the box” everything is simple. As a rule, the development
company is not interested in meeting the particular needs of a particular enterprise.
Therefore, the product is assembled with a maximum of possible functions that you may
never need. In this case, it doesn’t matter whether the developers has experience in a
particular industry. However, it was mentioned above, that companies need custom
solutions, and the presence of specialists with experience in your niche is especially
important.
Users read, compose, send, and store their e-mail using mail clients. Mail is formatted and
sent from the mail client via the network infrastructure to a mail server. The mail server is
the computer that delivers, forwards, and stores e-mail messages. All components-the mail
servers, the mail clients, and the infrastructure that connects and supports them-must be
protected.
Voluntary industry standards (e.g., SMTP, ESMTP, POP, IMAP) for formatting, processing,
transmitting, delivering, and displaying e-mail ensure interoperability among the many
different mail client and server solutions.
E-mail security relies on principles of good planning and management that provide for the
security of both the e-mail system and the IT infrastructure. With proper planning, system
management, and continuous monitoring, organizations can implement and maintain
effective security.
15
JGI JAIN
DEEM ED-T O-BE UNI VE R SITY UNIT 4 : Business Application Security: An EAI Perspective
4.7.1 Security Threats posed by Electronic Mails
Not everyone in the organization needs to know how to secure the e-mail service, but
anyone who handles patient information must understand e-mail’s vulnerabilities and
recognize when a system is secure enough to transmit sensitive information.
E-mail messages are generally sent over untrusted networks-external networks that are
outside the organization’s security boundary. When these messages lack appropriate
security safeguards, they are like postcards that can be read, copied, and modified at any
point along these paths.
Because e-mail is widely deployed, well understood, and used to communicate with
untrusted, external organizations, it is frequently the target of attacks. Attackers can exploit
e-mail to gain control over an organization, access confidential information, or disrupt IT
access to resources.
16
UNIT 4 : Business Application Security: An EAI Perspective JGI JAIN
DEEM ED-T O-BE UNI VE R SITY
c. Social engineering. Rather than hack into a system, an attacker can use e-mail to gather
sensitive information from an organization’s users or get users to perform actions that
further an attack. A common social engineering attack is e-mail spoofing, in which one
person or program successfully masquerades as another by falsifying the sender information
shown in e-mails to hide the true origin.
d. Entities with malicious intent. Malicious entities may gain unauthorized access to
resources elsewhere in the organization’s network via a successful attack on a mail server.
For example, once the mail server is compromised, an attacker could retrieve users’
passwords, which may grant the attacker access to other hosts on the organization’s
network.
e. Unintentional acts by authorized users. Not all security threats are intentional.
Authorized users may inadvertently send proprietary or other sensitive information via e-
mail, exposing the organization to embarrassment or legal action.
Management, operational, and technical safeguards are necessary to ensure that the
confidentiality, integrity, and availability needs of the mail system, its supporting
environment, and the data handled by it are addressed.
The National Institute of Standards and Technology is a nonregulatory agency within the
Department of Commerce. Its Information Technology Laboratory recommends that
organizations employ the following guidelines in planning, implementing, and maintaining
secure e-mail systems.
17
JGI JAIN
DEEM ED-T O-BE UNI VE R SITY UNIT 4 : Business Application Security: An EAI Perspective
b. Carefully Plan the System Implementation
The most critical aspect of deploying a secure e-mail system is careful planning before
installation, configuration, and deployment. As is often said, security should be considered
from the initial planning stage, at the beginning of the system development life cycle, to
maximize security and minimize costs.
Organizations should install the minimal mail server services required and eliminate any
known vulnerabilities through patches, configurations, or upgrades. If the installation
program installs unnecessary applications, services, or scripts, these should be removed
immediately after the installation process is complete.
Securing the mail server application generally includes patching and upgrading the mail
server; configuring the mail server user authentication and access and resource controls;
configuring, protecting, and analyzing log files; and periodically testing the security of the
mail server application.
In many respects, the client side of e-mail represents a greater risk to security than the mail
server. Providing an appropriate level of security for the mail client requires carefully
considering and addressing numerous issues.
Securely installing, configuring, and using mail client applications generally includes
patching and upgrading the mail client applications; configuring the mail client security
features (e.g., disable automatic opening of messages); enabling antivirus, antispam, and
antiphishing features; configuring mailbox authentication and access; and securing the
client’s host operating system.
Most standard e-mail protocols send, by default, user authentication data and e-mail
content in the clear; that is, unencrypted. Sending data in the clear may allow an attacker to
easily compromise a user account or intercept and alter unencrypted e-mails. At a minimum,
most organizations should encrypt the user authentication session even if they do not
encrypt the actual e-mail data.
18
UNIT 4 : Business Application Security: An EAI Perspective JGI JAIN
DEEM ED-T O-BE UNI VE R SITY
A related control to protect the confidentiality and integrity of the message is to deploy a
secure e-mail solution such as leveraging PKI technology to encrypt and sign the message.
Digital rights management and data leakage prevention systems can be used to prevent the
accidental leakage and exfiltration of sensitive information.
While the mail server and mail clients are the two primary components of an e-mail system,
the supporting network infrastructure is essential to its secure operations. Many times, the
network infrastructure, including such components as firewalls, routers, and intrusion
detection and prevention systems, will provide the first layer of defense between untrusted
networks and a mail server.
It’s a set of guidelines for employees to follow in order to protect their data systems and
files, their personal information, personal details of other employees, business data, sales
information and customer/client information.
An email governance document should include information about your backup and
archiving policies, personal usage policies, prohibited email content and confidentiality
guidelines. As such, email governance can be a way to protect your business from litigation
by protecting the personal and sensitive data of your staff, customers and clients.
Maintaining the security of a mail system is an ongoing process, requiring constant effort,
resources, and vigilance, and usually involves the following actions:
Log files are often an organization’s only record of suspicious behavior. Enabling logging
mechanisms allows the organization to use collected data to detect both failed and
19
JGI JAIN
DEEM ED-T O-BE UNI VE R SITY UNIT 4 : Business Application Security: An EAI Perspective
successful intrusions, initiate alert notifications when further investigation is needed, and
assist in system recovery and post-event investigations.
Organizations require both procedures and tools to process and analyze the log files and
review alert notifications.
One of the most important functions of a mail server administrator is maintaining the
integrity of the data on the mail server. This is important because mail servers are often one
of the most vital and exposed servers on an organization’s network.
The mail administrator should back up the mail server on a regular basis to reduce downtime
in the event of a mail service outage and support compliance with regulations on the backup
and archiving of data and information, including those found in e-mail.
Organizations require malware scanning and spam filtering capabilities at the mail client and
the mail system levels. Organizations should also conduct awareness and training activities
for users, including telecommuters, so that users are better prepared to recognize malicious
mail messages and attachments and handle them appropriately.
Periodic security testing of the mail system confirms that protective measures are
implemented correctly, operating as intended, and producing the desired outcome with
respect to meeting the security requirements of the operational mail system. Organizations
should consider using a combination of techniques, including vulnerability scanning, to
assess the mail system and its supporting environment.
Summary
20
UNIT 4 : Business Application Security: An EAI Perspective JGI JAIN
DEEM ED-T O-BE UNI VE R SITY
➢ The EAI platform helps improve the automation of business processes and provide
timely and accurate information to users and customers. EAI is evolving with new
emerging technologies in IT like IoT, Blockchain and AI.
➢ Four main integration levels of EAI- Data Level, Application Interface Level, Method
Level, User Interface Level.
➢ Point-to-point integration is the goal of EAI-based technology, and the applications
that exchange messages are tightly connected and Web services developed as a
solution to this problem.
➢ An e-mail system is made up of two primary components that reside in an
organization’s IT infrastructure: mail clients and mail servers.
➢ Common threats to e-mail systems include Malware Spam and phishing, Social
engineering, Entities with malicious intent, Unintentional acts by authorized users.
➢ To Protect from Threats- Implement Management Controls, Carefully Plan the System
Implementation, Secure the Mail Server, Secure the Transmission.
➢ Governance for Electronic Mail Systems is business’ protection against business brand
reputation, email compliance and client data security. It’s an internal set of rules and
guidelines written specifically for your company that outlines your email policies and
best practices.
Self-Assessment Questions
Short Questions
1. Where do you use EAI?
2. What is the role of the web services in the Traditional EAI Solutions?
3. Why do we concentrate more on social engineering in the recent times?
4. How do you secure the Mail Server Application?
5. How do you Protect against Malware?
Medium Questions
1. As a security manager, write any two benefits and advantages of Enterprise Application
Integration (EAI).
2. Compare the integration levels ‘Data level’ and ‘Use-interface’ level
3. Justify the need of customer satisfaction in EAI.
4. Mention any five important tips for preventing cyberattacks.
25
JGI JAIN
DEEM ED-T O-BE UNI VE R SITY UNIT 4 : Business Application Security: An EAI Perspective
5. Differentiate ‘Malware’ and ‘Spam’ mails.p
Long Questions
Not Provided
26