In this lesson, you will get familiar with the fundamental concepts of computer security, such as security threats and safeguards. Also, you will find out how to categorize security measures to secure the system environment.
Objective
In this lesson, you will get familiar with the fundamental concepts of computer security, such as security threats and safeguards. Also, you will find out how to categorize security measures to secure the system environment.
Security is the state of being protected or safe from potential harm, danger, or threats.
In technology, security refers to measures taken to protect information, systems, and networks from unauthorized access, breaches, and attacks. It encompasses a range of concepts, including safeguards, threats, and security goals, all of which are interlinked.
Threats compromise specific security goals, whereas safeguards protect systems against certain threats. As a result, when implementing security, one must consider the safeguards in relation to the goals and the threats.
The stringent security requirements in SAP systems have various reasons. These include compliance with industry regulations, protecting sensitive data, safeguarding intellectual property, and maintaining the organization's reputation and trust.
Optimizing administrative processes is essential to ensuring the effective implementation of security measures. This can be achieved through regular security audits, user training, implementing the principle of least privilege, and keeping systems and software up to date.
As an SAP System administrator, you are involved directly in providing and optimizing security processes using measures such as:
Understanding the concepts of security, the interplay between safeguards, threats, and security goals, and recognizing the reasons for security requirements are fundamental to maintaining the integrity and confidentiality of data within SAP systems. Let’s explore these concepts further.
A security goal is a specific objective or outcome that an organization or individual aims to achieve to protect their assets, information, and resources from unauthorized access, theft, damage, or other security threats.
In detail, these goals entail the following:
A security system threat is any potential danger or risk to its effectiveness or integrity. It can include physical threats such as burglaries or vandalism and digital threats such as hacking or malware attacks.
Threats to security systems can compromise the safety and protection of people and property and the confidentiality and privacy of sensitive information. Assessing and addressing security system threats is crucial to prevent and mitigate potential risks.
Technology is evolving quickly, as are the security threats. Read below an updated list of the most critical threats:
Due to the open and exposed communication architecture, client/server communication is vulnerable to attacks.
The client communicates with the server across the network, where attackers can eavesdrop, capture, and manipulate data. At the backend system, applications and the operating system contain security holes that attackers can exploit.
Discover the different types of threats and where they act in the following figure.
Threats in the digital world are as dangerous as the ones in the real world. What makes them even more dangerous is that these attacks can be automated, executed remotely, and performed by people with little knowledge of technology.
Security system safeguards are the measures and technologies used to protect a physical location or digital system from security threats.
The safeguards run against the threats to achieve the organization's security goals.
Security safeguards can be categorized as follows:
There are measures available for most of the threats that you discovered earlier.
The figure does not represent all the possible threats and measures. It shows an example of using security measures against various potential threats.
An important aspect of technical security is to regularly install security patches for applications and operating systems that are provided by vendors. Even though many security lapses can be fixed, customers and users still must update their systems regularly.
When you are involved in planning and implementing a security policy for an organization, we recommend performing the following:
Over the following several units and lessons, you discover the different security concepts that apply to SAP and the various tools and services that SAP offers.
Security of the IT infrastructure is a crucial concept. Safeguards are adopted to protect systems against threats. This achieves the security goals.
As you embark on your journey to becoming a proficient SAP system security administrator, you must grasp these concepts and optimize administrative processes to ensure the security and reliability of your organization's IT infrastructure. Let's dive into the fascinating world of computer security and learn how to keep your SAP systems safe and secure.
Log in to track your progress & complete quizzes