Skip to main content

13+ Real Ways to Destroy Business by Breaking Company’s SAP Applications

  • Conference paper
  • First Online:
ISSE 2014 Securing Electronic Business Processes
  • 852 Accesses

Abstract

This paper endeavours to highlight vulnerabilities in ERP systems to lend a helping hand to SAP owners and info-security officers; it also contains some examples from the real life incidents and situations. This is also an effort to address key and typical problems of popular Business Systems like SAP, CRM, SRM, PLM and some others. The threats mentioned in this document are broadly classified as Espionage, Sabotage and Frauds with reference to key ERP Business Applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Association of Certified Fraud Examiners – Key Findings and Highlights – http://www.acfe.com/rttn-highlights.aspx

  2. SAP – Analysis of 3000 vulnerabilities in SAP Systems – http://erpscan.com/wp-content/uploads/2014/06/3000-SAP-notes-Analysis-by-ERPScan.pdf

  3. Forbes – Companies are falling to detect financial fraud in SCM – http://www.forbes.com/sites/robertbowman/2014/04/16/companies-are-failing-to-detect-financial-fraud-in-supply-chainsdeloitte/

  4. .NBC news – UK businessman charged with fraud over bomb detectors sold to Iraq – http://worldnews.nbcnews.com/_news/2012/07/12/12696895-uk-businessman-charged-with-fraudover-bomb-detectors-sold-to-iraq?lite

  5. SAP Product Lifecycle Management (PLM) – http://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=26764

  6. Trend Micro – AutoCAD Malware Leaves Victims Hackable http://blog.trendmicro.com/trendlabs-security-intelligence/autocad-malware-leaves-victims-hackable/

  7. FDA Recalls Tracheostomy Tubes After 1,200 Complaints, 3 Deaths http://www.rightinginjustice.com/news/2010/04/26/fda-recalls-tracheostomy-tubes-after-1200-complaints-3-deaths/

  8. IKEA – IKEA Product Recalls http://www.ikea.com/ms/en_US/about_ikea/press/product_recalls/

  9. The Daily Mail – Toyota recalls 2.27million cars over defective airbag that could explode – and Honda and Nissan could be affected too http://www.dailymail.co.uk/news/article-2654899/Toyota-recalls-ANOTHER-650-000-cars-defective-airbag-explode-Honda-Nissan-affected-too.html

  10. U.S. Department of Health and Human Services – http://www.fda.gov/

  11. U.S. Consumer Product Safety Commission – http://www.cpsc.gov/en/Recalls/

  12. Product Safety Recalls Australia https://www.recalls.gov.au/content/index.phtml/item-Id/1056827

  13. U.S. Department of Energy- Office of Inspector General, Office of Audits and Inspections Special Report – The Department of Energy’s July 2013 Cyber Security Breach http://energy.gov/sites/prod/files/2013/12/f5/IG-0900.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alexander Polyakov .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Fachmedien Wiesbaden

About this paper

Cite this paper

Polyakov, A. (2014). 13+ Real Ways to Destroy Business by Breaking Company’s SAP Applications. In: Reimer, H., Pohlmann, N., Schneider, W. (eds) ISSE 2014 Securing Electronic Business Processes. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-06708-3_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-658-06708-3_5

  • Published:

  • Publisher Name: Springer Vieweg, Wiesbaden

  • Print ISBN: 978-3-658-06707-6

  • Online ISBN: 978-3-658-06708-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics