Background documentationNetwork and Communication Security Locate this document in the navigation structure


The database system consists of several components that can be located on different computers and in different networks. Data is transferred between these components as well as between database system and database application (for example an SAP system).

  • Data is intercepted

    Unauthorized persons intercept data while it is being transferred between computers.

  • Unauthorized access to the database computer via the network

    Unauthorized persons exploit security gaps in other programs to gain access to the database computer via a network connection.