Analyze the provided sap security audit log file

Assignment Help Other Subject
Reference no: EM131174795

Assignment - SAP Practical Written Report

The key concepts and frameworks covered in modules 1-4 are particularly relevant for this assignment.

1. Analyse information security vulnerabilities and threats and determine appropriate controls that can be applied to mitigate the potential risks.

2. Demonstrate an ability to communicate effectively both written and orally about the management of information security in organizations.

Assignment consists of three specific tasks regarding SAP R/3 System Security.

 Task 1 - Login to SAP System Student Account and Complete and Save System/User Profile/Own Data Fields

Task 2 - Eight reports as specified (include an Excel spreadsheet or Access database) with your submission of Assignment report

Task 3 - SAP System Security Settings

Task 1

Task 1 Specifications - Login to SAP R/3 System using your student SAP userid and password and Complete System/User Profile/Own Data fields.

Task 1 Requirements - Complete and save following fields in your SAP R/3 Student Account User Profile Title, Last name, First name, Function, Department, Room Number, Floor and Building and provide a screen capture of completed fields in System/User Profile/Own Data Screen in your SAP R/3 Assignment Report

Task 2

Task 2 Specifications - Analyze SAP Security Audit Log Data.

Userdata.xls is a spreadsheet log file containing summarized records of user activity on a client's SAP R/3 system. Each record contains the following fields:

Task 2 Requirements

Use a software of your choice (spreadsheet, database, statistical package etc) to analyze the provided SAP Security Audit Log File (Userdata.xls), and generate the required eight user activity reports listed below and provide a brief description for each user activity report (About 500 words in total for all eight required reports/graphs) (hint this assignment 2 task 2 is best done using MS Excel pivot tables or Microsoft Access database SQL queries). The required eight user activity reports are:

1. Alphabetic list of all actions and their frequency by any selected user, e.g. USER-040.

2. List of users performing unsuccessful activities.

3. List of transaction codes performed, with their frequency by each user.

4. List of users engaging in security-related actions.

5. Top 10 users in terms of frequency of activity.

6. List of users who are dormant - in the range USER-001 to USER-050.

7. You should also produce at least 2 reports or charts based on any of the above previous reports that summarise user activity over time using YYYYMM date format.

Task 3-

TASK 3 Specifications - Analyze and discuss SAP System-Wide Security Settings.

You are required to review the system-wide security settings on a SAP R/3 system. The data file SAP_RSPARAM_Basis.xlsx contains an extract from the client's system. Note you should open this file using an excel spreadsheet to view the system-wide security settings so the fields are aligned correctly. Hint you can use the search function to locate the appropriate SAP system wide security settings and their related values in the data file SAP_RSPARAM_Basis.xlsx. Note you will need to research the relevant SAP System Security literature in order to determine what are recommended values for each SAP System Security Setting.

Task 3 Requirements complete the following task:

a) For each SAP System Security Setting listed in Table 1 complete the User Defined Value, System Default Value and Recommended Value based on your analysis of the SAP_RSPARAM_Basis.xlsx file and the relevant SAP System Security Literature.

Attachment:- Assignment.rar

Reference no: EM131174795

Questions Cloud

Design a full-page magazine advertisement : Design a full-page magazine advertisement for a new brand of soft drink. The name of the new drink, as well as package design, is at the discretion of the student. On a separate sheet, specify the benefits stressed or appeals made in the advertise..
Determine the feasibility of a research project : What factors determine the feasibility of a research project? Why should management address these factors?
Ownership and company structure : Please write a two page description of the company which is PET PARADISE COMPANY  and should be a new business and discuss the following,
What is the difference between gdp and gnp : What is the difference between GDP and GNP? How did GNP change from 2013? What caused these changes? What does National Income tell us? What is the difference between GNP and NI? How did NI change from 2013?
Analyze the provided sap security audit log file : Use a software of your choice (spreadsheet, database, statistical package etc) to analyze the provided SAP Security Audit Log File (Userdata.xls), and generate the required eight user activity reports listed below and provide a brief description f..
Write an essay on the given topic angina pectoris unstable : Write an essay on the given topic "Angina (Angina pectoris) unstable"
What is inflation and what are the causes of inflation : What is inflation? What are the causes of inflation? Is inflation desirable and what can be done to control inflation in a market economy?
Global business strategies : Describe some of the technological advances in telecommunications and transportation that have impacted global business in the last decade?
Discuss the federal reserves use of open-market operations : n your answer, discuss the Federal Reserve's use of open-market operations to influence the money supply and the respective consequences of such actions.

Reviews

Write a Review

Other Subject Questions & Answers

  What are the different levels of control

What are the different levels of control? What are the relationships between the different levels?

  Brief industry analysis including look at closest competitor

This should be an original idea including a thorough discussion of the basic business model with a focus on Internet marketing as applied to the customer value proposition within your company. Include a brief industry analysis including a look at ..

  Attribute utility function for reliability and support

What are the values for kX and kY? Write out the decision maker's full two-attribute utility function for reliability and support. Are the two attributes substitutes or complements? Explain, both intuitively and on the basis of kX andkY.

  Non-security personnel in emergency plan-disaster response

What role should non-security personnel play in an emergency plan and disaster response? Should these roles be included in a procedures manual? Why or why not? How can a company or organization balance safety and liability issues with the use of non-..

  What is the highest concentration of dissolved fluoride

A water supply has very hard water with calcium ion (Ca2+) concentration of 200 mg/L. With such hard water, what is the highest concentration of dissolved fluoride (in mg/L) that could be provided in the finished water if no softening is performed..

  The observational evidence that space is expanding

The observational evidence that space is expanding is (are) the

  Death penalty case

Suppose that you were a member of a congressional or other type of committee that has as its mandate determining the type of crime that could be considered to be punishable by death. What kinds of cases, if any, would you put on the list and why?

  Analyze the membership of the somali pirate groups

Membership/leadership/structure and motivation. Please analyze the membership of the Somali pirate groups and their leadership. How are they structured. What is their motivation for belonging to the group

  You are at a retirement party for attorney howe of dewey

you are at a retirement party for attorney howe of dewey cheatham and howe. you learn that attorney howe is leaving

  Cognition and neuroscience

Cognition and neuroscience are two vastly different schools. Why do you think it is beneficial to explain behavior and conditioning by combining the two?

  Compares secular nationalism and islamic fundamentalism

Write an essay that compares and contrasts secular nationalism, Islamic fundamentalism, and democratic reform in Iran and Egypt from 1945 to the present

  What are your views on casual sex?

What are your views on casual sex? Do you feel men are given a "free pass" when it comes to casual sex whereas women are judged more harshly?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd