{"id":60119,"date":"2019-06-13T10:51:09","date_gmt":"2019-06-13T08:51:09","guid":{"rendered":"http:\/\/e3mag.com\/?p=60119"},"modified":"2020-02-09T00:25:57","modified_gmt":"2020-02-08T23:25:57","slug":"i-love-you","status":"publish","type":"post","link":"https:\/\/e3mag.com\/en\/i-love-you\/","title":{"rendered":"I love You"},"content":{"rendered":"<p>There is not much to discuss, Oswald said: The R\/3 system is controlled via Abap tables and viruses would not stand a chance there. For the I-Love-You virus, this may be true.<\/p>\n<p>Last week, I once again discussed the topic of \"security\" at an NTT Security event in Frankfurt. My \"provocative\" argument: digital intrusion, viruses, Trojans and data theft in an SAP system come to nothing because a classic ERP is sustainably complex, so that the entire \"data treasure\" will always remain a closed book to an outsider, even as plain text.<\/p><div id=\"great-3051834550\" class=\"great-fullsize-content-en\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6yfv7eho3Gc\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"Fullsize\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150.jpg\" alt=\"Fullsize\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div>\n<p>I speak from experience, because we have an SAP Business One system running at our publishing house. But you don't have to steal the data right away - encrypting it and demanding a ransom is also sufficient. And if you can hack in between the server and the client, you can quickly see what's going on in plain text - without having to tear apart Abap tables.<\/p>\n<p>NTT Security gave an impressive two-day theoretical and practical demonstration in Frankfurt of what can happen today under the catchword \"cybercrime\". Unfortunately, there were no specific presentations for existing SAP customers, because security awareness in the SAP community is still capable of development.<\/p>\n<p>Professor Hasso Plattner even addressed a minor security scandal at this year's Sapphire in Orlando, where he warned that people should not speculate about the lack of security in the SAP system when even ten-year-old security patches have not yet been applied.<\/p>\n<p>This was also another insight from the NTT Security event: If you keep your system up-to-date with all patches and updates, you have already paid half the rent in terms of \"security\".<\/p>","protected":false},"excerpt":{"rendered":"<p>Older semesters may still remember the first global virus with the friendly e-mail signature \"I Love You\". A short time later, I spoke with Gerd Oswald, then a member of the SAP Executive Board, at a European Sapphire in Nice, France, about the virus threat in SAP systems.<\/p>","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[27840],"tags":[28324,31057,8857,1516,3863],"coauthors":[27825],"class_list":["post-60119","post","type-post","status-publish","format-standard","hentry","category-chefredakteur-blog","tag-chefredaktion","tag-cybercrime","tag-datendiebstahl","tag-security","tag-trojaner","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":"","thumbnail":"","medium":"","medium_large":"","large":"","image-100":"","image-480":"","image-640":"","image-720":"","image-960":"","image-1168":"","image-1440":"","image-1920":"","1536x1536":"","2048x2048":"","trp-custom-language-flag":"","bricks_large_16x9":"","bricks_large":"","bricks_large_square":"","bricks_medium":"","bricks_medium_square":"","profile_24":"","profile_48":"","profile_96":"","profile_150":"","profile_300":""},"post_excerpt_stackable_v2":"<p>\u00c4ltere Semester werden sich vielleicht noch an den ersten globalen Virus mit der freundlichen E-Mail-Signatur \u201eI Love You\u201c erinnern. Kurze Zeit sp\u00e4ter sprach ich mit dem damaligen SAP-Vorstand Gerd Oswald auf einer europ\u00e4ischen Sapphire in Nizza, Frankreich, \u00fcber die Virengefahr in SAP-Systemen.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/en\/category\/editor-in-chief-blog\/\" rel=\"category tag\">Chefredakteur-Blog<\/a>","author_info_v2":{"name":"Peter M. F\u00e4rbinger, E3 Magazine","url":"https:\/\/e3mag.com\/en\/author\/peter-m-faerbinger-e-3-magazin\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/60119","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/comments?post=60119"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/60119\/revisions"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media?parent=60119"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/categories?post=60119"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tags?post=60119"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/coauthors?post=60119"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}