Analyse information security vulnerabilities and threats and

Assignment Help Basic Computer Science
Reference no: EM13341840

Assignment 2 – Practical report using SAP 100 15% 5th September 2014 

The key concepts and frameworks covered in modules 1–4 are particularly relevant for this assignment. Assignment 2 relates to the specific course learning objectives 1, 2 and 3: 

1. analyse information security vulnerabilities and threats and determine appropriate controls that can be applied to mitigate the potential risks 

2. demonstrate an ability to communicate effectively both written and orally about the management of information security in organisations 

And assesses the following graduate skills: The Academic & Professional Literacy and Written & Oral Communication at level 2. 

Assignment 2 requires you to cover two specific tasks regarding SAP security. Your Assignment 2 report must be professionally structured, worded and presented for readability and appropriate for the intended audience. 

Your assignment 2 must be structured as follows: 

? Cover page for your assignment 2 

? Table of contents 

? Body of report – main section for each task with appropriate use of subsections for 

each task sub report 

? Task 1 – with appropriate sub section headings for each report (include excel spreadsheet or Access database with your task 1 submission of Assignment 2 report) 

? Task 2 – with appropriate sub section headings for each report 

Task 1 Specifications – Analyze SAP Security Audit Log Data. 

You are provided with a data file – Userdata.xls. 

Userdata.xls is a summarized record of user activity on a client’s SAP system. Each record contains the following fields: 

USERID 

YYYYMM 

TCODE 

TEXT 

TCODESTAT 

TCD 

TSTATUS 

TCOUNT 

TTEXT 

YYYYMM describes when the user action took place. YYYYMM is useful for summarising user activity by month. TCODE refers to the transaction (option on the menu) performed by the user. TEXT describes the outcome of the action, including its success or failure. Some tcodes are blank. Accordingly, TCODESTAT is an invented transaction code for each action indicating whether the action was successful (-0) or failed (-1). TCD is the same as TCODESTAT, except there is no -0 or -1. TSTATUS indicates whether the action was successful or not (0/1). TCOUNT is the number of times the user has performed this action, with this outcome, in the month YYYYMM. TTEXT is the narrative description of the TCODE. 

Task 1 Requirements 

You can use software of your choice (spreadsheet, database, statistical package etc) to analyze the provided SAP security audit log data (Userdata.xls), generate appropriate reports and provide an analysis of your findings (hint this assignment 2 task 1 can be done using excel pivot tables or Microsoft Access database SQL queries). Of particular interest are the following reports: 

1. Alphabetic list of all actions and their frequency by any selected user, e.g. USER-040. 

2. List of users performing unsuccessful activities. 

3. List of transaction codes performed, with their frequency by each user. 

4. List of users engaging in security-related actions. 

5. Top 10 users in terms of frequency of activity. 

6. List of users who are dormant – in the range USER-001 to USER-050. 

7. You should also produce at least 3 reports/charts/plots based on any of the above previous reports that summarise activity over time using YYYYMM. 

TASK 2 Specifications – Analyze SAP System-Wide Security Settings. 

You are required to review the system-wide security settings on our SAP system. The data file RSPARAM contains an extract from the client’s system (Note you should open this file using excel spreadsheet to view the system-wide security settings with the fields aligned correctly. Hint you can use the search function to locate the appropriate SAP system wide security settings and their related values in the data file RSPARAM.txt. 

You required to produce a report for Task2 of Assignment 2 summarizing the current user settings, default settings and recommended settings based on the RSPARAM.txt file. 

Your report will consist of a written evaluation of the current settings highlighting any weaknesses, with explanations, and recommendations (1000 words approx.). The report should take the following form: 

ACME DISTRIBUTION COMPANY 

SAP System-Wide Security Settings 

System Setting Value User Default Value Recommended 

Value Actual Value 

No auto user SAP* 

Failed logins to end 

Failed logins to lock 

Auto failed unlock 

Min password length 

Password expiry (days) 

Idle logout (seconds) 

No check on Tcodes 

Default login client 

Note: Submission of your assignment 2 report documents (two documents a word document, and an excel spreadsheet for task 1 if you use a spreadsheet for task1 or an Access database if you use a database for task 1) will be via Ease Assignment 2 submission link

Reference no: EM13341840

Questions Cloud

Metrology as a whole : Write a paper discussing what you have learned from the text over the course of this class. Tell me what you think about metrology as a whole. Take some time a describe some of the more interesting aspects, tools, or approaches to metrology that you ..
What is the net ionic equation for the reaction : A buffer solution is made that is 0.334 M in HCN and 0.334 M in NaCN. (1) If Ka for HCN is 4.0E-10, what is the pH of the buffer solution. (2) Write the net ionic equation for the reaction that occurs when 0.100 mol HI is added to 1.00 L of the bu..
Enron off-balance sheet accounting fraud : Enron off-balance sheet accounting fraud would have been allowed to happen under IFRS - Apply Enron case study
Review the income statement for uden supply company : Review the income statement for Uden Supply Company and Describe the purpose of analytical procedures performed in the planning stage of the audit.
Analyse information security vulnerabilities and threats and : Analyse information security vulnerabilities and threats and determine appropriate controls that can be applied to mitigate the potential risks
Define a balanced chemical equation for the reaction : Which of the available reagent(s), if any, will oxidize Fe(s) while leaving Cu(s) unreacted? If none of the available reagents can be used for this purpose, then identify another reagent from the table that could be used. For each reagent you've i..
Describe deeply self-concept and four selves of self concept : Describe deeply self-concept and four selves of self concept
Define the net ionic equation for the reaction : A buffer solution is made that is 0.378 M in HClO and 0.378 M in KClO. (1) If Ka for HClO is 3.5E-8, what is the pH of the buffer solution. (2) Write the net ionic equation for the reaction that occurs when 0.082 mol KOH is added to 1.00 L of the ..
Find the direction of the total momentum of the two-object : Object A has a mass of mA = 16.8 kg and an initial velocity of = 8.97 m/s, due east. Object B, however, has a mass of mB = 28.8 kg and an initial velocity of = 4.15 m/s, due north.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write a commented c++ program to re-format dates

Write a commented C++ program to re-format dates. Prompt the user to input a date in the form: Sunday, January 2, 2010. Display the date in each of the following formats: January 2 was a Sunday in 2010 Sun, Jan 2 '10 2010-01-02

  Write a command to do an alphabetical sort on the third fiel

Write the command to run the file called 'process' assuming it is in your current directory, has execute permission, but that your current directory is not in the standard path command search list:

  Multimedia application between two multimedia applications

If your running memory intensive multimedia application on the computer which has 128 MB RAM installed and computer is momentarily stopping when you switch between two multimedia applications.

  Determine the maximum period obtainable from lcg

Determine the maximum period obtainable from following LCG? Xn+1 = aXn (mod 24). What must be the value of a?

  Designing a program before you create it is beneficial

Why do you think designing a program before you create it is beneficial?

  Distribute music on the internet.

an architecture for a system (such as iTunes) that is used to sell and distribute music on the Internet. What architectural patterns did you use as the basis for this architecture? Why are these patterns appropriate?

  Which structure would be the best for the storyboard created

He would like his recipes to be displayed in very simple, step by step pages. Which structure would be the best for the storyboard created for one of his recipes?

  Determine slas are necessary and identify monitoring points

Determine if internal service-level agreements (SLAs) are necessary, and identify the monitoring points and levels for an SLA

  Scrum vs plan-based software development strategies

Scrum vs. Plan-Based Software Development Strategies

  What do the terms syntactic sugar and syntactic salt mean

What do the terms "syntactic sugar" and "syntactic salt" mean? From your knowledge of the C# programming language, list at least five syntactic sugar and salt features.

  Process for information systems management for organization

Describe the process for Information Systems Management for any organization using clear example.

  Write a program to input the month and day of the birthday

Write a program to input the Month and Day of the birthday then use case statements to output the birthstone, and month. You can use if statements for the horoscope sign. You should use a function to test the Date and be sure it is valid.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd