Discuss what is a transaction code

Assignment Help Computer Engineering
Reference no: EM131207620 , Length: word count:3000

Task 1 Research and write a critical analysis of the following SAP System Security Parameters

Task 1.1 Discuss what is a transaction code and its main purpose in the SAP R/3 System. Research the following related SAP Transaction Codes SM19 and SM20 and explain how you would use these two related SAP Transaction codes to under- take a security audit of an organisation's SAP R/3 System (About 500 words)

Task 1.2.1 Discuss how the user master record in SAP plays an important role in ensuring assignment of appropriate rights, activity groups / roles and authorisations for individual users. (About 500 words)

Task1.2.2 As it is not possible to delete the SAP* user account describe two suggested controls to secure this account from misuse. (About 250 words)

Task 2 Ethical Behaviour for an Information Security Professional

Review the Wikipedia Link for Professional Ethics and ACS Code of Professional Practice and provided with the Assignment 3 and consider the following two case studies as an Information Security Professional:

Task 2.1 Security hole in Distributed Record Management System used by Company X and Company Y - Summary of case
Company X has just signed a business agreement with Company Y, which entitles both of them to access each other clients' records. Faisal, a software programmer at Company Z, was assigned the task of developing a software program that handles the access and retrieval of records from each Company's database system into the other. A first run of the software on real data indicated that the work was well within the state of the art, and no difficulties were found or anticipated.

Several weeks later and during a normal test on the software developed, Faisal discovered a serious ‘security hole' in the database system of Company Y by which hackers can easily obtain confidential information about clients. He was convinced that while the software he developed could correctly accomplish the task, the code in Company Y's database system could not be trusted as the security hole posed a threat even on Company X's database system. Faisal told his manager about the problem and explained its significance. The manager's response was, "That's not our problem; let's just be sure that our software functions properly." Faisal is not sure what to do. Refusing to work on the project means disobeying his manager's orders. Continuing to work on the project, means disobeying one of God's commands, which requires him to be truthful and sincere in his dealings.

Task 2.1.1 Identify and describe the key ethical concerns raised in this case study? (About 250 words)

Task 2.1.2 Identify and describe how specific values of ACS Code of Professional Practice would provide guidance on how to deal with key ethical concerns raised by Faisal in a recent distributed Records Management system project (About 250 words)

Task 2.2 - Carol Fraudulent Member of ACS Branch Summary of case Carol is a popular person who has worked hard in the ICT industry. She is currently a team leader of a group of software developers in a large company providing outsourced services to the Federal government. She is a Member of the ACS and decides to contribute to her profession by playing an active role in the local branch of the Society, and is elected Treasurer. Carol has some financial problems, and forges signatures on cheques to embezzle $5,000 from the branch's reserves to pay for medical treatment for her child. When she is inevitably found out she returns the money, and her membership of the ACS is terminated, but she continues in her job. Several members of her team are also ACS members. How should they treat their team leader?

Task 2.2.1 Identify and describe key ethical concerns raised by Carol's actions outlined in this case study? (About 250 words)

Task 2.2.2 Identify and describe how specific values of ACS Code of Professional Practice would provide guidance on how to deal with key ethical concerns raised by Carol's actions in this case study (About 250 words)

Task 3 Research the following advanced network attack type - the Advanced Persistent Attack

Research the concept of an advanced network attack known as an Advanced Persistent Attack. Explain what is meant by the concept of an Advanced Persistent Attack and describe the steps, resources and activities that would need to be under-taken by a hacker to mount such as attack on an organisation and the possible consequences for an organisation if compromised by an Advanced Persistent Attack (About 500 words)

Reference no: EM131207620

Questions Cloud

How each boundary and boundary inadequacy manifests itself : Identify which boundary is best described by each family in the scenario above. Identify which boundary inadequacies are present in each family, if applicable. Explain how each boundary and boundary inadequacy manifests itself.
Explain why the cost of health care : Explain why the cost of health care appears to be increasing. What, in your opinion, would be the best way to control the cost of health care, giving evidence to back up your opinion?
Difference between soft and hard skills : Describe the difference between soft and hard skills. Why are both skill sets necessary and beneficial for all health care professionals?
Electronic medical records : What are the advantages and disadvantages involved in using electronic medical records? What are some ways to improve the quality and insure the privacy of these types of medical records?
Discuss what is a transaction code : CIS52005 Assignment - Discuss what is a transaction code and its main purpose in the SAP R/3 System. Research the following related SAP Transaction Codes SM19 and SM20 and explain how you would use these two related SAP Transaction codes to under-..
Identify event and issues surrounding the security breach : Identify the event and the issues surrounding the security breach. Explain how it impacted the organization, and describe, in detail, what the organization did to address the breach.
What should happen to the exchange rate : Based on PPP (purchasing power parity) and the quantity theory of money, if Japan's real income rises relative to real income in the US, there should be a(n): _________________ (justify your answer).
Assignment on branding characteristics : In order to increase sales and engender customer loyalty you read that it was important to establish a strong brand in the minds of the customer through integrated marketing communications.
How business decision support systems have evolved : Write a 2 to 3 page essay describing how business decision support systems have evolved over the past several decades as computer and data capabilities have grown.

Reviews

len1207620

9/15/2016 6:53:13 AM

Australian student, 2750 words, rest need it as per the guidelines. Harvard Style, it is a research report and all references put on harvard style

Write a Review

Computer Engineering Questions & Answers

  Problem 1 designing a solution to the problem and

problem 1. designing a solution to the problem and implementing the design using principles of correct syntax layout

  What is a best way to address issues

What is the best way to address issues and concerns in a Real network management system (NMS) as it pertains to the processes that take place through out network discovery and mapping of the network.

  How disaster protocols will mitigate threats to organization

How the disaster response protocols will mitigate the threats to and vulnerabilities of the organization. Support your justification with information assurance research and best practices.

  Investigate the effectiveness of business information system

Investigate the effectiveness of business information systems of the given case study. To do this, you are required to submit a complete report which includes an analysis of functionality.

  Make a method to calculate the value of entire inventory

Modify the Inventory Program so the application can handle multiple items. Use an array to store the items. The output should display the information one product at a time, including the item number, the name of the product, the number of units in..

  Information technology evolves rapidly and businesses must

information technology evolves rapidly and businesses must stay abreast of that evolution in order to remain

  Exact evaluation for each of the given sums

Given an exact evaluation for each of the given sums. E=summation, I already have the solution I just need explanations

  Find sql statements and screenshots of the result

Any other information you would like to retrieve from the database.

  Develop an incident-response policy which covers the growth

gem infosys a small software company has decided to better secure its computer systems after a malware attack shut down

  State diagram for coffee machine controller

Raw behavioural specs utilizing the state diagram for the coffee machine controller explained as follow. State events, State actions.

  Draw a graph satisfying the given criteria

For each of the following, either draw a graph satisfying the given criteria or explain why it cannot be done. Your graphs should be simple, i.e. not having any multiple edges or self-loops.

  Find out all doctors who went to harvard

Did the SQL programmer enforce the constraint that every doctor practices in a unique hospital? If so, how? If not, how do you know, and how, if at all, might this constraint have been implemented.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd