Bridging the Gap: Analyzing Emerging Threats in SAP Cyber security for Enterprise Landscapes

Authors

  • Saranya Independent Researcher, India. Author

DOI:

https://doi.org/10.56472/ICCSAIML25-145

Keywords:

SAP cyber security, Emerging threats, Enterprise landscapes, AI-Driven detection, Landscapes

Abstract

SAP and other enterprise resource planning (ERP) systems have become prominent for integration into organizations following the era of digital transformation. SAP environments are mission critical systems and they attract elevated levels of cybersecurity threats that leverage on misconfigurations, interface, and other customizations. Therefore this paper aims at filling this gap by identifying new threats, implementation analysis and providing the appropriate mitigation measures in SAP landscapes IT security. We consider threats as unauthorized access, code injection, and ransomware attacks and focus on their operational and financial consequences. Furthermore, we assess the potential of new and advanced solutions like threat detection on the base of artificial intelligence and blockchain-based data protection in the context of SAP cybersecurity models. In this paper, we utilize theoretical and empirical approaches, correlate case studies and threats and use them to develop an ideal SAP cybersecurity model. The findings clearly indicate reduced vulnerability exposure levels and the effectiveness against complex threats. Risk management and security on enterprise SAP landscapes are a critical matter of concern for enterprises, and this paper concludes by arguing for an active approach to threat mitigation, as well as constant vigilance

Downloads

Download data is not yet available.

References

[1] Markandeya, S., Roy, K., Markandeya, S., & Roy, K. (2014). ERP and SAP overview. SAP ABAP: Hands-On Test Projects with Business Scenarios, 1-20.

[2] Animesh Kumar, “AI-Driven Innovations in Modern Cloud Computing”, Computer Science and Engineering, 14(6), 129-134, 2024.

[3] Bhagath Chandra Chowdari Marella, “From Silos to Synergy: Delivering Unified Data Insights across Disparate Business Units”, International Journal of Innovative Research in Computer and Communication Engineering, vol.12, no.11, pp. 11993-12003, 2024.

[4] Dalal, A., & Mahjabeen, F. (2014). Enhancing SAP Security in Cloud Environments: Challenges and Solutions. Revista de Inteligencia Artificial en Medicina, 5(1), 1-19.

[5] Marella, B.C.C., & Kodi, D. (2025). “Fraud Resilience: Innovating Enterprise Models for Risk Mitigation”. Journal of Information Systems Engineering and Management, 10(12s), 683–695.

[6] Alwaheidi, M. K., & Islam, S. (2022). Data-driven threat analysis for ensuring security in cloud enabled systems. Sensors, 22(15), 5726.

[7] L. N. R. Mudunuri, V. M. Aragani, and P. K. Maroju, "Enhancing Cybersecurity in Banking: Best Practices and Solutions for Securing the Digital Supply Chain," Journal of Computational Analysis and Applications, vol. 33, no. 8, pp. 929-936, Sep. 2024.

[8] RK Puvvada . “SAP S/4HANA Finance on Cloud: AI-Powered Deployment and Extensibility” - IJSAT-International Journal on Science and …16.1 2025 :1-14.

[9] Missbach, M., Staerk, T., Gardiner, C., McCloud, J., Madl, R., Tempes, M., & Anderson, G. (2016). SAP on the Cloud (pp. 7-8). Heidelberg: Springer.

[10] P. K. Maroju, "Empowering Data-Driven Decision Making: The Role of Self-Service Analytics and Data Analysts in Modern Organization Strategies," International Journal of Innovations in Applied Science and Engineering (IJIASE), vol. 7, Aug. 2021.

[11] Yeboah-Ofori, A., & Islam, S. (2019). Cyber security threat modeling for supply chain organizational environments. Future internet, 11(3), 63.

[12] Kirti Vasdev. (2025). “Churn Prediction in Telecommunications Using Geospatial and Machine Learning Techniques”. International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences, 13(1), 1–7. https://doi.org/10.5281/zenodo.14607920

[13] Sahil Bucha, “Integrating Cloud-Based E-Commerce Logistics Platforms While Ensuring Data Privacy: A Technical Review,” Journal Of Critical Reviews, Vol 09, Issue 05 2022, Pages1256-1263.

[14] Aragani, Venu Madhav and Maroju, Praveen Kumar and Mudunuri, Lakshmi Narasimha Raju, “Efficient Distributed Training through Gradient Compression with Sparsification and Quantization Techniques” (September 29, 2021). Available at SSRN: https://ssrn.com/abstract=5022841 or http://dx.doi.org/10.2139/ssrn.5022841

[15] A High Gain DC-DC Converter with Maximum Power Point Tracking System for PV Applications - Sree Lakshmi Vineetha Bitragunta, Lakshmi Triveni Mallampati, Vijayavani Velagaleti - IJSAT Volume 10, Issue 2, PP- 1-2, April-June 2019. DOI 10.5281/zenodo.14473958

[16] Patel, Z., Senjaliya, N., & Tejani, A. (2019). AI-enhanced optimization of heat pump sizing and design for specific applications. International Journal of Mechanical Engineering and Technology (IJMET), 10(11), 447-460.

[17] Venu Madhav Aragani, 2025, “Implementing Blockchain for Advanced Supply Chain Data Sharing with Practical Byzantine Fault Tolerance (PBFT) Alogorithem of Innovative Sytem for sharing Suppaly chain Data”, IEEE 3rd International Conference On Advances In Computing, Communication and Materials.

[18] Xu, S. (2020, November). The cybersecurity dynamics way of thinking and landscape. In Proceedings of the 7th ACM Workshop on Moving Target Defense (pp. 69-80).

[19] Lakshmi Narasimha Raju Mudunuri, Pronaya Bhattacharya, “Ethical Considerations Balancing Emotion and Autonomy in AI Systems,” in Humanizing Technology With Emotional Intelligence, IGI Global, USA, pp. 443-456, 2025.

[20] King, N. J., & Raja, V. T. (2012). Protecting the privacy and security of sensitive customer data in the cloud. Computer Law & Security Review, 28(3), 308-319.

[21] Muniraju Hullurappa, Mohanarajesh Kommineni, “Integrating Blue-Green Infrastructure Into Urban Development: A Data-Driven Approach Using AI-Enhanced ETL Systems,” in Integrating Blue-Green Infrastructure Into Urban Development, IGI Global, USA, pp. 373-396, 2025.

[22] S. Panyaram, "Automation and Robotics: Key Trends in Smart Warehouse Ecosystems," International Numeric Journal of Machine Learning and Robots, vol. 8, no. 8, pp. 1-13, 2024.

[23] Senjaliya, N., & Tejani, A. (2020). Artificial intelligence-powered autonomous energy management system for hybrid heat pump and solar thermal integration in residential buildings. International Journal of Advanced Research in Engineering and Technology (IJARET), 11(7), 1025-1037.

[24] Pulivarthy, P., & Whig, P. (2025). Bias and fairness addressing discrimination in AI systems. In Ethical dimensions of AI development (pp. 103–126). IGI Global. Available online: https://www.igi-global.com/chapter/bias-and-fairness-addressing-discrimination-in-ai-systems/359640 (accessed on 27 February 2025).

[25] B. C. C. Marella, “Streamlining Big Data Processing with Serverless Architectures for Efficient Analysis,” FMDB Transactions on Sustainable Intelligent Networks., vol.1, no.4, pp. 242–251, 2024.

[26] Nandy, T., Idris, M. Y. I. B., Noor, R. M., Kiah, L. M., Lun, L. S., Juma’at, N. B. A., & Bhattacharyya, S. (2019). Review on security of internet of things authentication mechanism. IEEE Access, 7, 151054-151089.

[27] Kirti Vasdev. (2021). “Drones Technology in GIS for Telecom Cell Tower Maintenance”. International Journal on Science and Technology, 12(3), 1–9. https://doi.org/10.5281/zenodo.14474403

[28] Puvvada, R. K. "The Impact of SAP S/4HANA Finance on Modern Business Processes: A Comprehensive Analysis." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11.2 (2025): 817-825.

[29] Praveen Kumar Maroju, "Optimizing Mortgage Loan Processing in Capital Markets: A Machine Learning Approach, " International Journal of Innovations in Scientific Engineering, 17(1), PP. 36-55 , April 2023.

[30] Kodi, D. (2023). “A Pythonic Approach to API Data Management: Fetching, Processing, and Displaying Data for Business Intelligence”. International Journal of Emerging Research in Engineering and Technology, 4(2), 33–42. https://doi.org/10.63282/3050-922X/IJERET-V4I2P104

[31] Bitragunta SLV. High Level Modeling of High-Voltage Gallium Nitride (GaN) Power Devices for Sophisticated Power Electronics Applications. J Artif Intell Mach Learn & Data Sci 2022, 1(1), 2011-2015. DOI: doi.org/10.51219/JAIMLD/sree- lakshmi-vineetha-bitragunta/442

[32] Mohanarajesh Kommineni. (2022/9/30). Discover the Intersection Between AI and Robotics in Developing Autonomous Systems for Use in the Human World and Cloud Computing. International Numeric Journal of Machine Learning and Robots. 6. 1-19. Injmr

[33] Kiran Nittur, Srinivas Chippagiri, Mikhail Zhidko, “Evolving Web Application Development Frameworks: A Survey of Ruby on Rails, Python, and Cloud-Based Architectures”, International Journal of New Media Studies (IJNMS), 7 (1), 28-34, 2020.

[34] R. Daruvuri, "Automating repetitive tasks in cloud-based AI systems: A deep learning perspective," International Journal of Computer Science and Mechatronics, vol. 11, no. 1, pp. 1-7, 2025.

[35] Khan, S., AlQahtani, S.A., Noor, S. et al. “PSSM-Sumo: deep learning based intelligent model for prediction of sumoylation sites using discriminative features”. BMC Bioinformatics 25, 284 (2024). https://doi.org/10.1186/s12859-024-05917-0.

[36] Settibathini, V. S., Virmani, A., Kuppam, M., S., N., Manikandan, S., & C., E. (2024). Shedding Light on Dataset Influence for More Transparent Machine Learning. In P. Paramasivan, S. Rajest, K. Chinnusamy, R. Regin, & F. John Joseph (Eds.), Explainable AI Applications for Human Behavior Analysis (pp. 33-48). IGI Global Scientific Publishing. https://doi.org/10.4018/979-8-3693-1355-8.ch003

Published

2025-05-18

How to Cite

1.
Saranya. Bridging the Gap: Analyzing Emerging Threats in SAP Cyber security for Enterprise Landscapes. IJETCSIT [Internet]. 2025 May 18 [cited 2025 Sep. 13];:372-8. Available from: https://ijetcsit.org/index.php/ijetcsit/article/view/276

Similar Articles

21-30 of 219

You may also start an advanced similarity search for this article.