08.10.2013 Views

Special Edition Using SAP R/3, Third Edition

Special Edition Using SAP R/3, Third Edition

Special Edition Using SAP R/3, Third Edition

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Special</strong> <strong>Edition</strong> <strong>Using</strong> <strong>SAP</strong> R/3, <strong>Third</strong> <strong>Edition</strong> - CH 3 - Exploring R/3 Architecture Page 25 of 26<br />

CAUTION<br />

The confidentiality of the data and the applications must be strictly maintained by a<br />

structure of authorizations. No data or software code must be altered or corrupted, either<br />

intentionally or by accident.<br />

Functionality of the Software<br />

The first consideration when assessing the capability of a piece of software to do the job intended,<br />

completely and exclusively, must be the methods used to design and build it.<br />

However extensive the testing of software, it is unlikely that all problem situations are encountered,<br />

so there must be a degree of doubt as to the absolute reliability of the package. This degree of<br />

uncertainty can be made as small as possible by extending the scope of the prerelease testing. Many<br />

legacy computer programs have generated maintenance expenses many times their development cost,<br />

because they were not fully specified in the first instance and not thoroughly elaborated at the design<br />

stage. Several chapters in this book are devoted to the <strong>SAP</strong> tools for designing and developing<br />

reliable and efficient programs.<br />

Security Levels and Confidentiality<br />

The security of the data and software in the R/3 system and applications must be addressed at several<br />

levels:<br />

Desktop presentation system level<br />

Application level<br />

Database level<br />

Operating system level<br />

Network level<br />

The <strong>SAP</strong> approach to managing the security of a complex system across all these levels is to establish<br />

a set of internal and external security services:<br />

R/3 internal security services, which concern the desktop systems, application servers, database<br />

servers, and network communications at the application level<br />

Database security services, which are provided by the database computer<br />

System security services, which are assisted by the ease with which the R/3 system can be<br />

reconfigured without a loss of services if any subsystem comes offline<br />

Network security services<br />

Reliability and Availability Through Support<br />

file://J:\prodinfo\MEMBERS\MA\ir057.html 3/23/01

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!