Analyse information security vulnerabilities and threats

Assignment Help Computer Network Security
Reference no: EM13819311 , Length:

The key concepts and frameworks

1. Analyse information security vulnerabilities and threats and determine appropriate controls that can be applied to mitigate the potential risks

2. demonstrate an ability to communicate effectively both written and orally about the management of information security in organisations

Task 1 Specifications - Login to SAP System using your student SAP userid and password and Complete System/User Profile/Own Data fields as specified below

590_Analyze SAP Security Audit Log Data.png

Complete and save the following fields

Title, Last name, First name, Function, Department, Room Number, Floor and Building and provide a screen capture of completed fields in System/User Profile/Own Data

Task 2 Specifications - Analyze SAP Security Audit Log Data.

Userdata.xls is a summarized record of user activity on a client's SAP system. Each record contains the following fields:

USERID
YYYYMM
TCODE
TEXT
TCODESTAT
TCD
TSTATUS
TCOUNT
TTEXT

YYYYMM describes when the user action took place. YYYYMM is useful for summarising user activity by month. TCODE refers to the transaction (option on the menu) performed by the user. TEXT describes the outcome of the action, including its success or failure. Some tcodes are blank. Accordingly, TCODESTAT is an invented transaction code for each action indicating whether the action was successful (-0) or failed (-1). TCD is the same as TCODESTAT, except there is no -0 or -1. TSTATUS indicates whether the action was successful or not (0/1). TCOUNT is the number of times the user has performed this action, with this outcome, in the month YYYYMM. TTEXT is the narrative description of the TCODE.

Task 2 Requirements

You can use software of your choice (spreadsheet, database, statistical package etc) to analyze the provided SAP security audit log data (Userdata.xls), generate appropriate reports and provide an analysis of your findings (hint this assignment 2 task 2 can be done using excel pivot tables or Microsoft Access database SQL queries). Of particular interest are the following reports:

1. Alphabetic list of all actions and their frequency by any selected user, e.g. USER-040.
2. List of users performing unsuccessful activities.
3. List of transaction codes performed, with their frequency by each user.
4. List of users engaging in security-related actions.
5. Top 10 users in terms of frequency of activity.
6. List of users who are dormant - in the range USER-001 to USER-050.
7. You should also produce at least 3 reports/charts/plots based on any of the above previous reports that summarise activity over time using YYYYMM date format.

TASK 3 Specifications - Analyze SAP System-Wide Security Settings.

You are required to review the system-wide security settings on our SAP system. The data file RSPARAM contains an extract from the client's system (Note you should open this file using excel spreadsheet to view the system-wide security settings with the fields aligned correctly. Hint you can use the search function to locate the appropriate SAP system wide security settings and their related values in the data file RSPARAM.txt.

You required to produce a report for Task 3 of Assignment 3 summarizing the current user settings, default settings and recommended settings based on the RSPARAM.txt file.

Your report will consist of a written evaluation of the current settings highlighting any weaknesses, with explanations, and recommendations (1000 words approx.). Note some relevant resources on SAP security will be provided for Tutorials and Assignment 2 discussion forum. The report should take the following form:

ACME DISTRIBUTION COMPANY

SAP System-Wide Security Settings

System Setting Value

User   

Default Value

Recommended

Value

Actual Value

No auto user SAP*    

 

 

 

 

Failed logins to end

 

 

 

 

Failed logins to lock

 

 

 

 

Auto failed unlock

 

 

 

 

Min password length

 

 

 

 

Password expiry (days)

 

 

 

 

Idle logout (seconds)

 

 

 

 

No check on Tcodes

 

 

 

 

Default login client    

 

 

 

 

Reference no: EM13819311

Questions Cloud

Primary and secondary target markets for your company : Determine the primary and secondary target markets for your company. Next, analyze the primary and secondary target markets that you identified for your company. Be sure to cover the 4Ps, 5Cs and STP
Explain the consumption patten of consumers : Using the marginal utility theory explain the consumption patten of consumers
Analyze the impact that culture exerts on recruitment : Hofstede's study is an important contribution to cross-culture management research. Analyze the impact that culture exerts on recruitment and selection, training and development, compensation, and task distribution.
Analyse information security vulnerabilities and threats : Analyse information security vulnerabilities and threats and determine appropriate controls that can be applied to mitigate the potential risks and demonstrate an ability to communicate effectively both written and orally about the management of..
About uml diagrams : UML Diagrams
Key attributes of supply chain management : Any system must have components in order to be successful. The supply chain system is no different. What are four key attributes of supply chain management and how do they impact logistics
Primary competitive forces impacting us steel producers : What is the primary competitive forces impacting U.S. steel producers? Do you believe these competitive forces negatively or positively impact the steel industry's competitive structure? Why or why not?
Explain aspects of culture that impact leadership behaviors : Determine the key aspects of culture that impact leadership behaviors, attributes, and other cross-cultural organizational practices that are generally accepted and effective. Provide a rationale for your response.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Security management

Choose a topic from your major field of study. For example, if you pursuing a degree in education, your topic will come from the education field.

  Finding decryption function and recovered plaintext

If you receive the ciphertext message YPHDCRPBEQTAA, decrypt to recover the plaintext. What is the decryption function, and the recovered plaintext? What type of cipher is this?

  Critique the transition process performed by the dms

Critique the transition process performed by the DMS in the case study. Then, recommend two (2) alternatives to the IP infrastructure or applications not already mentioned in the case study.

  Define intellectual property in cyberspace

Develop a one-page poster in Word or PowerPoint for a public service campaign to educate people about intellectual property rights of cyberspace for some aspect in your readings from this week.

  Security testing differs from ordinary functionality testing

Describe how security testing differs from ordinary functionality testing. What artifacts (such as documents) would each produce. What results would each produce? How would you protect programs from malicous code, what should you look for.

  Explain advantages about solution of type of key

At ABC Institute, researchers are unsure about type of key (Asymmetric or Symmetric) to be used. Formulate possible solution and explain advantages and disadvantages of any solution employed.

  Find at least four sites that offer malware listings

Search a number of antivirus companies websites and find at least four sites that offer malware listings and compare their latest malware lists

  Choose a recent technical article from a referred journal

please choose a recent technical article from a referred journal or conference proceedings on the topic of threats and

  How system derive secret key for des from user-s password

Known risks of the UNIX password system, it has been recommended that the system be replaced by an alternative system that uses public key cryptography, RSA for example. How might the system derive the secret key for DES from the user's login pas..

  System enforcing bibas strict integrity policy

Consider the system enforcing Biba's strict integrity policy for a software vendor - defined integrity levels for an access class are released

  Root certificate authority and an intermediate ca

Is a cryptographic hash function/digest considered encryption - explain three vulnerabilities from the latest Open Web Application Security Project (OWASP).

  Problem on network security planning

Securing a large internetwork remains a daunting challenge. Cloud computing and social networks add to this complexity. In two to three (2-3) pages, and using the CISCO SAFE reference architecture.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd