Something of The Book

PDF EPUB Library of e-Books

Leveraging SAP Grc in the Fight Against Corruption and Fraud

Leveraging SAP Grc in the Fight Against Corruption and Fraud

Author: Maxim Chuprunov

Publisher: Espresso Tutorials

ISBN: 3960126603

Category:

Page: 226

View: 917

Download BOOK »
In many companies, GRC is predominantly used to help ensure the correctness of external financial reporting. This book shows you how you can also use GRC components to detect and prevent corruption and fraud. Walk through an overview on the solutions available in the SAP GRC Suite, as well as the new SAP applications for Assurance and Compliance. You will learn how to benefit from SAP HANA in Big Data scenarios and obtain guidelines on how to set up detection scenarios in SAP Fraud Management. The author expertly shows readers that the key to a successful GRC initiative does not lie in the features and functions of a specific software product. Understand the drivers for efficiency and the multi-layered added value of automating. In addition, you will learn the basics to provide a tool-independent foundation for the automation of a group-wide anti-corruption initiative. - Risk management and internal control systems - Design and implement an anti-corruption initiative - Automated drivers and added value GRC - Detection scenarios using SAP Fraud Management and SAP HANA

A Practical Guide to Cybersecurity in SAP

A Practical Guide to Cybersecurity in SAP

Author: Julie Hallett

Publisher: Espresso Tutorials GmbH

ISBN: 9783960125372

Category: Computers

Page: 151

View: 612

Download BOOK »
SAP environments are internally integrated with, and through, cloud and hybrid cloud solutions. This interconnection, both within and external to the firewall, creates a level of vulnerability that, if exploited, could compromise a company’s intellectual property, employee and supplier information, and trade secrets. This book breaks down the application of cybersecurity, as it applies to SAP, into actionable items that can be communicated and implemented into existing security frameworks. You will understand why cybersecurity applies to SAP, how it integrates with cybersecurity Initiatives within an organization, and how to implement a security framework within SAP. This expertly written guide provides a targeted cybersecurity education for SAP managers, architects, and security practitioners. The author explores the technical aspects of implementing cybersecurity policies and procedures using existing tools and available SAP modules. Readers will gain a solid understanding of what a cybersecurity program does, what security frameworks are used for, how to assess and understand risk, and how to apply mitigating controls. By using practical examples, tips, and screenshots, this book covers: - Cyber risk in the SAP landscape - How to harden security - Cybersecurity risk management programs in SA - Risk mitigation for threats

Securing SAP S/4HANA

Securing SAP S/4HANA

Author: Bert Vanstechelman

Publisher: Espresso Tutorials GmbH

ISBN: 9783960129912

Category:

Page: 190

View: 938

Download BOOK »
Explore how to protect and defend your SAP S/4HANA applications, Fiori, Gateway, and the SAP HANA database platform. Learn how to create a consistent cross-system authorization concept and translate the technical specifics for each system into a comprehensive and consistent security model. Explore technical security aspects such as privileges and roles, authentication and encryption, and monitoring for S/4HANA. Compare and contrast SAP S/4HANA applications to the SAP ERP security model and identify what has changed. This book is up to date for SAP HANA 2.0! Dive into SAP S/4HANA authorizations and gain an understanding of the impact on the new front-end and database security setup, and why the different levels need to be consistent. Get best practices for SAP Fiori and Gateway. Find out why it is important to secure SAP HANA from an application layer point of view, as well as a database point of view. Take an in-depth look at how to secure the SAP Application Server, database, operating system, and the network infrastructure. - Effectively secure SAP S/4HANA, Fiori, and Gateway - Privileges and roles, authentication, encryption, and monitoring - Mobile access and SSO considerations - Cross-system authorization concepts and implementation

Practical Guide to Auditing SAP Systems

Practical Guide to Auditing SAP Systems

Author: Martin Metz

Publisher: Espresso Tutorials GmbH

ISBN: 9783960129653

Category:

Page: 291

View: 902

Download BOOK »
What do I need to do to successfully complete an SAP system audit? Get expert guidance on the top 12 controls that should be included in your audit activities, including accounts and authorizations, the changeability settings of tables, clients, and entire systems, change logs, and security configuration settings. Written with SAP administrators and security consultants in mind, this book expertly answers these questions and explores the techniques needed to quickly determine the high-level security status of an SAP system. Walk through a standard control framework you can use to improve and strengthen the security position of your SAP system. Get an overview of the impact of SAP HANA, mobile, and cloud on SAP audits. - Basic principles of the audit function - Common SAP system audit issues - SAP tools and functionality auditors can use, including pre-defined reports - Top 12 controls that should be included in your audit activities

Cybersecurity Best Practices

Cybersecurity Best Practices

Author: Michael Bartsch

Publisher: Springer-Verlag

ISBN: 9783658216559

Category: Computers

Page: 644

View: 757

Download BOOK »
Das Thema Cybersecurity ist so aktuell wie nie, denn im Cyberspace lassen sich nur schwer Grenzen in Bezug auf den Zugang zu Informationen, Daten und Redefreiheit setzen. Kriminelle nutzen die Lücken oft zu ihrem Vorteil aus. Die Vielzahl der IT-Systeme, ihre unterschiedlichen Nutzungsarten und ihre Innovations- und Lebenszyklen haben zu hohen Sicherheitsrisiken für Unternehmen und staatliche Einrichtungen geführt. Diese Risiken werden sich auch langfristig nicht so einfach aus der Welt schaffen lassen. Daher müssen Institutionen Strategien und Lösungen zu ihrem Selbstschutz entwickeln. Dieses Buch beschreibt Lösungsansätze und Best Practices aus den unterschiedlichsten Bereichen, die nachweislich zu einer höheren Resilienz gegenüber Cyberangriffen führen. Weltweit renommierte IT-Sicherheitsexperten berichten in 40 Beiträgen, wie sich staatliche Institutionen, unter anderem das Militär (Cyber Defence), Behörden, internationale Organisationen und Unternehmen besser gegen Cyberangriffe schützen und nachhaltige Schutzstrategien entwickeln können. Die Autoren widmen sich den Gründen und Zielen, die ihren jeweiligen Strategien zugrunde liegen, sie berichten, wie Unternehmen auf konkrete Cyberattacken reagiert haben und wie einzelne staatliche Institutionen angesichts nationaler Cyberstrategien agieren. In weiteren Kapiteln zeigen Wissenschaftler auf, was bei der Abwehr von Cyber-Attacken bereits heute möglich ist, welche Entwicklungen in Arbeit sind und wie diese in Zukunft eingesetzt werden können, um die Cyber-Sicherheit zu erhöhen. Im letzten Kapitel berichten Hersteller, Anwenderunternehmen und Dienstleister welche Best Practices sie in ihren Unternehmen eingeführt haben und wie andere Unternehmen ihrem Beispiel folgen können. Das Buch richtet sich an IT-Verantwortliche und -Sicherheitsbeauftragte in Unternehmen und anderen Organisationen, aber auch an Studierende in den verschiedenen IT-Studiengängen.

Kulturen der Weltwirtschaft

Kulturen der Weltwirtschaft

Author: Werner Abelshauser

Publisher: Vandenhoeck & Ruprecht

ISBN: 9783525364246

Category: Business & Economics

Page: 306

View: 205

Download BOOK »
Was sind Wirtschaftskulturen, und welche Rolle spielen sie auf dem Weltmarkt?