| ESP Journal of Engineering & Technology Advancements |
| © 2022 by ESP JETA |
| Volume 2 Issue 1 |
| Year of Publication : 2022 |
| Authors : Kalam Kiran Kumar Reddy, Gunupati Kamalakar |
: 10.56472/25832646/ESP-V2I1P117 |
Kalam Kiran Kumar Reddy, Gunupati Kamalakar, 2022. "Bridging the Gap: Analyzing Emerging Threats in SAP Cybersecurity for Enterprise Landscapes", ESP Journal of Engineering & Technology Advancements, 2(1): 147-156.
SAP and other enterprise resource planning (ERP) systems have become prominent for integration into organizations following the era of digital transformation. SAP environments are mission critical systems and they attract elevated levels of cybersecurity threats that leverage on misconfigurations, interface, and other customizations. Therefore this paper aims at filling this gap by identifying new threats, implementation analysis and providing the appropriate mitigation measures in SAP landscapes IT security. We consider threats as unauthorized access, code injection, and ransomware attacks and focus on their operational and financial consequences. Furthermore, we assess the potential of new and advanced solutions like threat detection on the base of artificial intelligence and blockchain-based data protection in the context of SAP cybersecurity models. In this paper, we utilize theoretical and empirical approaches, correlate case studies and threats and use them to develop an ideal SAP cybersecurity model. The findings clearly indicate reduced vulnerability exposure levels and the effectiveness against complex threats. Risk management and security on enterprise SAP landscapes are a critical matter of concern for enterprises, and this paper concludes by arguing for an active approach to threat mitigation, as well as constant vigilance.
[1] Markandeya, S., Roy, K., Markandeya, S., & Roy, K. (2014). ERP and SAP overview. SAP ABAP: Hands-On Test Projects with Business Scenarios, 1-20.
[2] Dalal, A., & Mahjabeen, F. (2014). Enhancing SAP Security in Cloud Environments: Challenges and Solutions. Revista de Inteligencia Artificial en Medicina, 5(1), 1-19.
[3] Linkies, M., & Off, F. (2006). SAP Security and Authorizations. Galileo Press.
[4] Alwaheidi, M. K., & Islam, S. (2022). Data-driven threat analysis for ensuring security in cloud enabled systems. Sensors, 22(15), 5726.
[5] Missbach, M., Staerk, T., Gardiner, C., McCloud, J., Madl, R., Tempes, M., & Anderson, G. (2016). SAP on the Cloud (pp. 7-8). Heidelberg: Springer.
[6] Yeboah-Ofori, A., & Islam, S. (2019). Cyber security threat modeling for supply chain organizational environments. Future internet, 11(3), 63.
[7] Patel, Z., Senjaliya, N., & Tejani, A. (2019). AI-enhanced optimization of heat pump sizing and design for specific applications. International Journal of Mechanical Engineering and Technology (IJMET), 10(11), 447-460.
[8] Xu, S. (2020, November). The cybersecurity dynamics way of thinking and landscape. In Proceedings of the 7th ACM Workshop on Moving Target Defense (pp. 69-80).
[9] King, N. J., & Raja, V. T. (2012). Protecting the privacy and security of sensitive customer data in the cloud. Computer Law & Security Review, 28(3), 308-319.
[10] Bechara, F. R., & Schuch, S. B. (2021). Cybersecurity and global regulatory challenges. Journal of Financial Crime, 28(2), 359-374.
[11] Pacella, J. M. (2016). The cybersecurity threat: Compliance and the role of whistleblowers. Brook. J. Corp. Fin. & Com. L., 11, 39.
[12] Thaw, D. (2013). The efficacy of cybersecurity regulation. Ga. St. UL Rev., 30, 287.
[13] Linkies, M., & Karin, H. (2011). SAP security and risk management. Galileo Press.
[14] Sengupta, S., Kaulgud, V., & Sharma, V. S. (2011, July). Cloud computing security--trends and research directions. In 2011 IEEE World Congress on Services (pp. 524-531). IEEE.
[15] Kunitsyna, N., Britchenko, I., & Kunitsyn, I. (2018). Reputation risks, value of losses and financial sustainability of commercial banks.
[16] Dawoud, W., Takouna, I., & Meinel, C. (2010, March). Infrastructure as a service security: Challenges and solutions. In 2010 the 7th International Conference on Informatics and Systems (INFOS) (pp. 1-8). IEEE.
[17] Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in cybersecurity. Journal of computer and system sciences, 80(5), 973-993.
[18] Talluri, S., Kull, T. J., Yildiz, H., & Yoon, J. (2013). Assessing the efficiency of risk mitigation strategies in supply chains. Journal of Business logistics, 34(4), 253-269.
[19] Senjaliya, N., & Tejani, A. (2020). Artificial intelligence-powered autonomous energy management system for hybrid heat pump and solar thermal integration in residential buildings. International Journal of Advanced Research in Engineering and Technology (IJARET), 11(7), 1025-1037.
[20] Nandy, T., Idris, M. Y. I. B., Noor, R. M., Kiah, L. M., Lun, L. S., Juma’at, N. B. A., & Bhattacharyya, S. (2019). Review on security of internet of things authentication mechanism. IEEE Access, 7, 151054-151089.
SAP cybersecurity, Emerging threats, Enterprise landscapes, AI-Driven detection, Landscapes.