Cryptography:
Suppose User X Requested some Sensitive Business data from user Y.
But User R who is in the same network,using data collector techniques hacks this sensitive Business data and uses it for his own purpose.
Solution:
To avoid the above situation,we have cryptography Encryption methods in SAP:
There are 3 types of Encryption methods:
1. Symmetric key encryption.
2.Asymmetric key encryption.
3. Combinning symmetric & Asymmetric key encryption.
No comments:
Post a Comment