Principles of information security, Computer Network Security

The key concepts and frameworks covered in modules 1-4 are particularly relevant for this assignment. Assignment 2 relates to the specific course learning objectives 1, 2 and 3:

1. have a strong understanding of the vulnerabilities and threats relating to information systems and the controls which can be implemented to mitigate their effect

2. understand the need for information systems security

3. describe various network related threats and controls as covered in this course

And assesses the following graduate skills: The Academic & Professional Literacy and Written & Oral Communication at level 2.

Assignment 2 requires you to cover two specific tasks regarding SAP security. Your Assignment 2 must be professionally structured, worded for readability and appropriate for the intended audience. Your assignment 2 must be structured as follows:

? Cover page for your assignment 2

? Table of contents

? Body of report - main section for each task with appropriate use of subsections for

each task sub report

? Task 1 - with appropriate sub section headings for each report

? Task 2 - with appropriate sub section headings for each report

Task 1 Specifications - Analyze SAP Security Audit Log Data.

You are provided with a data file - Userdata.xls.

Userdata.xls is a summarized record of user activity on a client's SAP system. Each record contains the following fields:

USERID

YYYYMM

TCODE

TEXT

TCODESTAT

TCD

TSTATUS

TCOUNT

TTEXT

YYYYMM describes when the user action took place. YYYYMM is useful for summarising user activity by month. TCODE refers to the transaction (option on the menu) performed by the user.  TEXT describes the outcome of the action, including its success or failure. Some tcodes are blank. Accordingly, TCODESTAT is an invented transaction code for each action indicating whether the action was successful (-0) or failed (-1). TCD is the same as TCODESTAT, except there is no -0 or -1. TSTATUS indicates whether the action was successful or not (0/1). TCOUNT is the number of times the user has performed this action, with this outcome, in the month YYYYMM. TTEXT is the narrative description of the TCODE.

Posted Date: 3/1/2013 1:12:48 AM | Location : United States







Related Discussions:- Principles of information security, Assignment Help, Ask Question on Principles of information security, Get Answer, Expert's Help, Principles of information security Discussions

Write discussion on Principles of information security
Your posts are moderated
Related Questions
Question: (a) A string of ciphertext was enciphered using an a±ne transformation of single letters in a 28-letter alphabet consisting of A to Z, a blank and a?, where A to Z ha

For this assessment, students must research and analyse two different scenarios. The two scenarios must be chosen from those described below and submitted as one Microsoft PowerPoi

doing coursework in Network Security to present a possible solution to the problem at hand by creating a prototype of the new network security infrastructure. This new design shou

Describe the salient features of the multimedia. Also explain the applications of it. Multimedia can be understood as follows: Multimedia is on the whole a media which makes

IPV6 DATAGRAM FORMAT It is given in the figure below:

QUESTION: (a) Briefly explain the steps involved in Network Simplex Method. (b) What data structures you would expect in the Network Simplex Method. Show the data struct

Question 1 Explain any two types of security policies Question 2 What is security attack? Explain with examples Question 3 Explain different characteristics that i

Network security has become much more complex than ever before. New types and sources of network security threats, always-on high-speed Internet connections, wireless networking, a

Question 1 a) What is a NMS? Question 2 Explain about Structure of Management Information Question 3 A)In which UDP port number does a protocol entity receive message?

Improving domain blacklisting: Current domain blacklisting techniques are not very effective as spammers keep replacing blacklisted domains with newly registered domains. Also