Nagy, 2023 - Google Patents
Improving Cybersecurity for SAP: A Quick Guide to Adopting the NIST Cybersecurity Framework.Nagy, 2023
- Document ID
- 12688815661648187164
- Author
- Nagy C
- Publication year
- Publication venue
- ISSA Journal
External Links
Snippet
The article focuses on the importance of cybersecurity for enterprise applications, particularly those running on the SAP platform. Topics discussed include the adoption of the NIST Cybersecurity Framework, mapping its controls to SAP operations using tools like SAP …
- 238000001514 detection method 0 abstract description 6
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US8176158B2 (en) | Information technology governance and controls methods and apparatuses | |
| EP3067817B1 (en) | Dynamic data masking for mainframe application | |
| Ezingeard et al. | A Model of Information Assurance Benefits. | |
| Peltier | Risk analysis and risk management | |
| Kinkela | Practical and ethical considerations on the use of cloud computing in accounting | |
| Politou et al. | The “right to be forgotten” in the GDPR: implementation challenges and potential solutions | |
| Sabale et al. | Maintaining data safety and accuracy through data integrity (DI): A comprehensive review | |
| Ibrar et al. | Econnoitering Data Protection and Recovery Strategies in the Cyber Environment: A Thematic Analysis | |
| Chen et al. | System Quality Requirements Engineering (SQUARE) Methodology: Case Study on Asset Management System | |
| Nagy | Improving Cybersecurity for SAP: A Quick Guide to Adopting the NIST Cybersecurity Framework. | |
| Wright | How cyber security can protect your business: A guide for all stakeholders | |
| US10095220B1 (en) | Modifying user tools to include control code for implementing a common control layer | |
| Lambert et al. | Delineating Responsibilities for COBIT 2019 IT Control Activities Between Cloud Service Providers and Cloud Service Users | |
| Laili et al. | AN ANALYSIS OF THE USE OF ACCOUNTING SYSTEM ON CLOUD: A CASE STUDY IN ABBAZ ADVISORY | |
| Anturaniemi | Information Security Plan for SAP HCM | |
| Salingros | Guidelines for the management of digitalised systems in laboratories accredited to ISO/IEC 17025 | |
| Chuprunov | IT general controls in SAP ERP | |
| Dacey | Federal Information System Controls Audit Manual (FISCAM) | |
| Chapple et al. | ISC2 CCSP Certified Cloud Security Professional Official Practice Tests | |
| Mandal et al. | Automating information security policy compliance checking | |
| Shingornikar et al. | Proactive Early Threat Detection and Securing Oracle Database with IBM QRadar, IBM Security Guardium Database Protection, and IBM Copy Services Manager by Using IBM FlashSystem Safeguarded Copy | |
| Pirta et al. | Assessing the need of information technology control environment establishment | |
| Gwara et al. | A Framework for Assessing Cloud Computing Security for Cloud Adoption in Microfinance Banks | |
| Hanrahan | Directors' legal responsibilities: An excerpt | |
| Shekar | Bitbucket Server to Bitbucket Cloud migration |