Principles of information security, Computer Network Security

The key concepts and frameworks covered in modules 1-4 are particularly relevant for this assignment. Assignment 2 relates to the specific course learning objectives 1, 2 and 3:

1. have a strong understanding of the vulnerabilities and threats relating to information systems and the controls which can be implemented to mitigate their effect

2. understand the need for information systems security

3. describe various network related threats and controls as covered in this course

And assesses the following graduate skills: The Academic & Professional Literacy and Written & Oral Communication at level 2.

Assignment 2 requires you to cover two specific tasks regarding SAP security. Your Assignment 2 must be professionally structured, worded for readability and appropriate for the intended audience. Your assignment 2 must be structured as follows:

? Cover page for your assignment 2

? Table of contents

? Body of report - main section for each task with appropriate use of subsections for

each task sub report

? Task 1 - with appropriate sub section headings for each report

? Task 2 - with appropriate sub section headings for each report

Task 1 Specifications - Analyze SAP Security Audit Log Data.

You are provided with a data file - Userdata.xls.

Userdata.xls is a summarized record of user activity on a client's SAP system. Each record contains the following fields:










YYYYMM describes when the user action took place. YYYYMM is useful for summarising user activity by month. TCODE refers to the transaction (option on the menu) performed by the user.  TEXT describes the outcome of the action, including its success or failure. Some tcodes are blank. Accordingly, TCODESTAT is an invented transaction code for each action indicating whether the action was successful (-0) or failed (-1). TCD is the same as TCODESTAT, except there is no -0 or -1. TSTATUS indicates whether the action was successful or not (0/1). TCOUNT is the number of times the user has performed this action, with this outcome, in the month YYYYMM. TTEXT is the narrative description of the TCODE.

Posted Date: 3/1/2013 1:12:48 AM | Location : United States

Related Discussions:- Principles of information security, Assignment Help, Ask Question on Principles of information security, Get Answer, Expert's Help, Principles of information security Discussions

Write discussion on Principles of information security
Your posts are moderated
Related Questions
In broadcast topology there are further two types 1) SATELLITE\RADIO 2) RING TOPOLOGY In a radio or satellite topology every computers are connected to each other via radio o

Q. Develop a completely secure WSN based on the triple key? Wireless network is the most vulnerable type of network to security attack. Unauthorized access to wireless network

Question: (a) What is the use of digital certificate? (b) What is meant by a hierarchical trust model in a Public Key Infrastructure? How does the Pretty Good Privacy (PG

QUESTION (a) Illustrate the term file carving. (b) What are the basic three main techniques for image steganography? (c) Distinguish between vector graphics and raster

Unguided Media This is the wireless media that transfer electromagnetic waves without using a physical media. Waves are broadcast through the air. This is performing through r

Question: (a) What is the major problem with public key encryption when compared to symmetric key encryption? (b) Consider the following protocol for communication between t

Problem (a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. The second screen capture is from the data portion of the frame.

QUESTION (a) FTP is a protocol used for the delivery of files across networks. Explain how FTP works (support your answer with a diagram). (b) How does TCP perform the gi

Attacker's Motives behind the Cyber Attack Before adapting the necessary measures to deal with the problem, understanding and evaluating the blogger's psyche and his motivation

QUESTION (In this question, you will need to use the ISO 27001:2005 and ISO 27002:2005 standards) For each of the situations below, comment on the following: 1. Mention