Preventing Vulnerabilities in HANA-Based Deployments

Preventing Vulnerabilities in HANA-Based Deployments

WEareTROOPERS via YouTube Direct link

Architecture

12 of 29

12 of 29

Architecture

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Preventing Vulnerabilities in HANA-Based Deployments

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Agenda
  3. 3 Company overview
  4. 4 Our background
  5. 5 Different types of vulnerabilities
  6. 6 HANA adoption
  7. 7 HANA security vulnerabilities
  8. 8 ACP Cyber Security Study
  9. 9 HANA Consulting
  10. 10 Research
  11. 11 Internals
  12. 12 Architecture
  13. 13 User Privilege
  14. 14 How to discover a HANA
  15. 15 Technical details
  16. 16 HTTP interface
  17. 17 SQL interface
  18. 18 TRex Net
  19. 19 TRex Host
  20. 20 TRex Communications
  21. 21 TLS or SSL
  22. 22 Critical vulnerabilities
  23. 23 What happened
  24. 24 How do we protect
  25. 25 Is it possible
  26. 26 Admin credentials
  27. 27 Solution
  28. 28 Securing HANA
  29. 29 Conclusions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.