{"id":131519,"date":"2023-08-10T11:25:41","date_gmt":"2023-08-10T09:25:41","guid":{"rendered":"http:\/\/e3mag.com\/?p=131519"},"modified":"2023-08-22T15:59:00","modified_gmt":"2023-08-22T13:59:00","slug":"cyber-defense-2","status":"publish","type":"post","link":"https:\/\/e3mag.com\/en\/cyber-defense-2\/","title":{"rendered":"Cyber Defense"},"content":{"rendered":"<h2 class=\"wp-block-heading\">Firewall Abap code<\/h2>\n\n\n\n<p>20 years ago, the unknown Abap code and tables of an R\/3 system were certainly sufficient protection against hacker attacks. The ERP world market leader was already successful worldwide with SAP R\/3 at that time, but still out of sight of traditional hackers and cybercriminals who focused on Windows and desktop systems. Abap was a natural boundary protection at the time of \"I love you\".<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Java and Open Source<\/h2>\n\n\n\n<p>While SAP R\/3 was still a black box, ERP\/ECC 6.0 marked the beginning of an opening towards the World Wide Web and compatible competitors. A successful partnership between SAP and Microsoft emerged, and with it the merging of ECC and Office. In addition to the Abap stack, SAP established a Java stack in the NetWeaver middleware, which delighted and motivated many programmers, but also made the systems compatible for hacker attacks. In terms of security, a new era began.<\/p><div id=\"great-3666463568\" class=\"great-fullsize-content-en\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6yfv7eho3Gc\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"Fullsize\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150.jpg\" alt=\"Fullsize\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Security Dashboard<\/h2>\n\n\n\n<p>The DSAG association, German-speaking SAP user group, was one of the first to recognize the dangers and demand a security dashboard for SAP systems. What SAP promised for a long time and still promises today, SAP partners have now realized. In the current E3 cover story of the September 2023 supplement for Manager Magazin, you can read about the options available for protecting an SAP system against cyberattacks. The attack parameters are currently many times greater than they were 25 years ago. Back then, an R\/3 system required only rudimentary protection. A networked S\/4 system in the cloud of a hyperscaler requires considerably more protective mechanisms. Successful cyber defense currently requires a great deal of experience, knowledge and perfect tools. Details can be found in the September supplement of the upcoming Manager Magazine and in advance here on the E3 website.<\/p>","protected":false},"excerpt":{"rendered":"<p>SAP's cryptic programming language Abap is not a protective wall against cyber attacks. The Abap code is well documented and other entry points exist. SAP systems are at risk just like other IT systems.<\/p>","protected":false},"author":2,"featured_media":112731,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[27840],"tags":[453,39128,26082,273,92,1171,506],"coauthors":[27825],"class_list":["post-131519","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-chefredakteur-blog","tag-abap","tag-chefredakteur","tag-cybersicherheit","tag-dsag","tag-java","tag-manager-magazin","tag-open-source","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/03\/ChefredakteurFin.jpeg",1000,450,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/03\/ChefredakteurFin-150x150.jpeg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/03\/ChefredakteurFin.jpeg",400,180,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/03\/ChefredakteurFin-768x346.jpeg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/03\/ChefredakteurFin.jpeg",1000,450,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/03\/ChefredakteurFin-100x45.jpeg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/03\/ChefredakteurFin-480x216.jpeg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/03\/ChefredakteurFin-640x288.jpeg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/03\/ChefredakteurFin-720x324.jpeg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/03\/ChefredakteurFin-960x432.jpeg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/03\/ChefredakteurFin.jpeg",1000,450,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/03\/ChefredakteurFin.jpeg",1000,450,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/03\/ChefredakteurFin.jpeg",1000,450,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/03\/ChefredakteurFin.jpeg",1000,450,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/03\/ChefredakteurFin.jpeg",1000,450,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/03\/ChefredakteurFin.jpeg",18,8,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/03\/ChefredakteurFin.jpeg",1000,450,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/03\/ChefredakteurFin.jpeg",1000,450,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/03\/ChefredakteurFin.jpeg",1000,450,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/03\/ChefredakteurFin.jpeg",600,270,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/03\/ChefredakteurFin.jpeg",600,270,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/03\/ChefredakteurFin-24x24.jpeg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/03\/ChefredakteurFin-48x48.jpeg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/03\/ChefredakteurFin-96x96.jpeg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/03\/ChefredakteurFin-150x150.jpeg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/03\/ChefredakteurFin-300x300.jpeg",300,300,true]},"post_excerpt_stackable_v2":"<p>Die kryptische Programmiersprache Abap von SAP ist kein Schutzwall gegen Cyber-Angriffe. Der Abap-Code ist gut dokumentiert und andere Einfallstore sind vorhanden. SAP-Systeme sind gef\u00e4hrdet wie andere IT-Systeme auch.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/en\/category\/editor-in-chief-blog\/\" rel=\"category tag\">Chefredakteur-Blog<\/a>","author_info_v2":{"name":"Peter M. F\u00e4rbinger, E3 Magazine","url":"https:\/\/e3mag.com\/en\/author\/peter-m-faerbinger-e-3-magazin\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/131519","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/comments?post=131519"}],"version-history":[{"count":1,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/131519\/revisions"}],"predecessor-version":[{"id":131520,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/131519\/revisions\/131520"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media\/112731"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media?parent=131519"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/categories?post=131519"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tags?post=131519"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/coauthors?post=131519"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}