Special Edition Using SAP R/3, Third Edition
Special Edition Using SAP R/3, Third Edition
Special Edition Using SAP R/3, Third Edition
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
<strong>Special</strong> <strong>Edition</strong> <strong>Using</strong> <strong>SAP</strong> R/3, <strong>Third</strong> <strong>Edition</strong> - CH 3 - Exploring R/3 Architecture Page 25 of 26<br />
CAUTION<br />
The confidentiality of the data and the applications must be strictly maintained by a<br />
structure of authorizations. No data or software code must be altered or corrupted, either<br />
intentionally or by accident.<br />
Functionality of the Software<br />
The first consideration when assessing the capability of a piece of software to do the job intended,<br />
completely and exclusively, must be the methods used to design and build it.<br />
However extensive the testing of software, it is unlikely that all problem situations are encountered,<br />
so there must be a degree of doubt as to the absolute reliability of the package. This degree of<br />
uncertainty can be made as small as possible by extending the scope of the prerelease testing. Many<br />
legacy computer programs have generated maintenance expenses many times their development cost,<br />
because they were not fully specified in the first instance and not thoroughly elaborated at the design<br />
stage. Several chapters in this book are devoted to the <strong>SAP</strong> tools for designing and developing<br />
reliable and efficient programs.<br />
Security Levels and Confidentiality<br />
The security of the data and software in the R/3 system and applications must be addressed at several<br />
levels:<br />
Desktop presentation system level<br />
Application level<br />
Database level<br />
Operating system level<br />
Network level<br />
The <strong>SAP</strong> approach to managing the security of a complex system across all these levels is to establish<br />
a set of internal and external security services:<br />
R/3 internal security services, which concern the desktop systems, application servers, database<br />
servers, and network communications at the application level<br />
Database security services, which are provided by the database computer<br />
System security services, which are assisted by the ease with which the R/3 system can be<br />
reconfigured without a loss of services if any subsystem comes offline<br />
Network security services<br />
Reliability and Availability Through Support<br />
file://J:\prodinfo\MEMBERS\MA\ir057.html 3/23/01