Evaluating the Effectiveness of Cybersecurity Protocols in SAP System Upgrades
  • Author(s): Zahoor Ali Syed ; Gloria T Mapfaza ; Emmanuel Dapaah ; Tichaona Remias ; Munashe Naphtali Mupa
  • Paper ID: 1706115
  • Page: 129-154
  • Published Date: 07-08-2024
  • Published In: Iconic Research And Engineering Journals
  • Publisher: IRE Journals
  • e-ISSN: 2456-8880
  • Volume/Issue: Volume 8 Issue 2 August-2024
Abstract

This paper investigates the effectiveness of cybersecurity protocols during SAP system upgrades, focusing on both administrative and technical perspectives. As SAP systems are integral to numerous industries and increasingly targeted by sophisticated cyber threats, robust cybersecurity measures are essential during system upgrades to protect data integrity, confidentiality, and availability. The study begins by outlining the evolution of SAP systems and their significance in managing business processes and data across various organizational functions. It then delves into the critical role of administrators in planning, risk assessment, and stakeholder communication, highlighting their responsibilities in ensuring secure upgrades. From a technical standpoint, the paper addresses challenges such as software updates, data protection, and system integration. Technical solutions like encryption, data masking, and advanced authentication mechanisms are explored to safeguard sensitive information. The importance of intrusion detection systems and continuous monitoring is emphasized for real-time threat detection and response. Case studies illustrate both successful and breached SAP system upgrades, underscoring the necessity of comprehensive cybersecurity strategies. Successful upgrades, like those of Kenya Pipeline Company and Petroleum Development Oman, demonstrate the effectiveness of stakeholder engagement and rigorous security measures. Conversely, case studies involving breaches, such as the SolarWinds hacking incident, highlight vulnerabilities and the need for robust security protocols. The comparative analysis of administrative and technical perspectives reveals their complementary roles in managing SAP upgrades. Administrators focus on strategic planning and compliance, while technical teams implement and maintain security measures. The paper concludes with recommendations for a holistic approach to cybersecurity, integrating administrative policies with technical solutions to protect against evolving threats. Future research should focus on advancements in AI, machine learning, and quantum-safe encryption to enhance SAP system security.

Citations

IRE Journals:
Zahoor Ali Syed , Gloria T Mapfaza , Emmanuel Dapaah , Tichaona Remias , Munashe Naphtali Mupa "Evaluating the Effectiveness of Cybersecurity Protocols in SAP System Upgrades" Iconic Research And Engineering Journals Volume 8 Issue 2 2024 Page 129-154

IEEE:
Zahoor Ali Syed , Gloria T Mapfaza , Emmanuel Dapaah , Tichaona Remias , Munashe Naphtali Mupa "Evaluating the Effectiveness of Cybersecurity Protocols in SAP System Upgrades" Iconic Research And Engineering Journals, 8(2)