Entering content frame

Background documentation Network and Communication Security Locate the document in the library structure

The database system consists of several components that can be located on different computers and in different networks. Data is transferred between these components as well as between database system and database application (for example an SAP system).

Hazards

·        Data is intercepted

Unauthorized persons intercept data while this is being transferred between computers.

·        Unauthorized access to database computer via the network

Unauthorized persons exploit security gaps in other programs in order to gain access to the database computer via a network connection.

Activities

·        Securing Communication Channels

·        Using the MaxDB X Server Behind a Firewall

·        Using Web Tools Behind a Firewall

See also:

Technical System Landscape

 

Leaving content frame