Describe what is special about the default user account sap

Assignment Help Computer Network Security
Reference no: EM13945036

Research Report

Task 1 Research and write a critical analysis of the following SAP System Security Parameters

Task 1.1 Discuss how the user master record in SAP plays an important role in ensuring assignment of appropriate rights, activity groups / roles and authorisations for individual users. (About 500 words)

Task 1.2.1 SAP R/3 creates a number of default accounts which deserve special attention. Describe what is special about the default user account SAP*. (About 250 words)

Task1.2.2 As it is not possible to delete the SAP* user account describe two suggested controls to secure this account from misuse. (About 250 words)

Task 2 Ethical Behaviour for an Information Security Professional

Review the Wikipedia Link for Professional Ethics and ACS Code of Professional Practice and provided with the Assignment 3 and consider the following two case studies as an Information Security Professional:

Task 2.1 Helen the IT Consultant - Summary of case

Three years ago Helen started her own consulting business. She has been so successful that she now has several people working for her and many clients. Their consulting work included advising on how to set up corporate intranets, designing database management systems, and advising about security.

Presently she is designing a database management system for the personnel office of a medium-sized company. Helen has involved the client in the design process, informing the CEO, the director of computing, and the director of personnel about the progress of the system.

It is now time to make decisions about the kind and degree of security to build into the system. Helen has described several options to the client. Because the system is going to cost more than they planned, the client has decided to opt for a less secure system.

She believes the information they will be storing is extremely sensitive. It will include performance evaluations, medical records for filing insurance claims, salaries, and so forth. With weak security, employees working on client machines may be able to figure out ways to get access to this data, not to mention the possibility of on-line access from hackers.

Helen feels strongly that the system should be much more secure. She has tried to explain the risks, but the CEO, director of computing and director of personnel all agree that less security will do. What should she do? Should she refuse to build the system as they request?

Task 2.1.1 Identify and describe the key ethical concerns raised in this case study? (About 250 words)

Task 2.1.2 Identify and describe how specific values of ACS Code of Professional Practice would provide guidance on how to deal with key ethical concerns raised by Helen in a recent consultancy job (About 250 words)

Task 2.2 Fred in the State Department - Summary of case

Fred works in a large state department of alcoholism and drug abuse. The agency administers programs for individuals with alcohol and drug problems, and maintains a huge database of information on the clients who use their services. Some of the data files contain the names and current addresses of clients. Fred has been asked to take a look at the track records of the treatment programs. He is to put together a report that contains the number of clients seen in each program each month for the past five years, length of each client's treatment, number of clients who return after completion of a program, criminal histories of clients, and so on. In order to put together this report, Fred has been given access to all files in the agency's mainframe computer. After assembling the data into a file that includes the clients' names, he downloads it to the computer in his office. Under pressure to get the report finished by the deadline, Fred decides he will have to work at home over the weekend in order to finish on time. He burns the information onto a CD and takes it home. After finishing the report he leaves the CD at home and forgets about it.

Task 2.2.1 Identify and describe key ethical concerns raised by Fred's actions outlined in this case study? (About 250 words)

Task 2.2.2 Identify and describe how specific values of ACS Code of Professional Practice would provide guidance on how to deal with key ethical concerns raised by Fred's action (About 250 words)

Task 3 Research the Top Ten OSWASP Vulnerabilities and one Zero Day Software vulnerability

Review the OWASP Top Ten Web Application Vulnerabilities and then identify, research and write a critical analysis of a recent Zero Day Software Vulnerability in the context of the OWASP Top Ten Web Applications Vulnerability Framework and the possible consequences for an organisation if compromised by this Zero Day Software vulnerability (About 500 words).

Reference no: EM13945036

Questions Cloud

Define packet switching and the benefits of packet switching : In the context of a communication system, define what a protocol is. Briefly discuss each of the following operating problems that protocols solve regarding framing, error control, and sequence control.
Is online education proving to be successful : Is online education proving to be successful? Your task is to provide a critical review of the current market for online education as well as providing an overview and definition of what online education is and how it works.
What are the positive and negative aspects of nafta : What are the positive and negative aspects of NAFTA? (Be sure and consider the perspectives of people in different economic sectors and participant nations)
Find the duration of each activity and network diagram : Find the Duration of each activity - Network Diagram, Slack for each activity and critical Path of the project.
Describe what is special about the default user account sap : creates a number of default accounts which deserve special attention. Describe what is special about the default user account SAP*.
Interest for study needs great care and forethought : Most applied research begins by selecting an everyday problem, interest, or concern for further study. Selecting an interest for study needs great care and forethought. As the opening quote says: "Hoe in haste, harvest in tears." Selecting a suita..
Conduct a pest analysis for the organisation : Conduct a PEST Analysis for the organisation? Give four examples of external causes of change in an organisation. For each example give at least one potential impact.
Strength and weakness of orgasation delopment plan : Review a given organisation development plan. Analyse the streanth and weakness of this orgasation delopment plan and prepare written report of finding. Answer all qustion
Investigating the cost of maintaining patients : A business manager in a health-care facility has been investigating the cost of maintaining patients within its plan. A sample of 15 cases (different from those in WQ2) for the last month reported the following:

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explain your method of attack and operation of the law

Explain your method of attack and operation within reasonable parameters of the law. Discuss specific malware, social engineer, or any other type of attacks you would deploy to achieve your desired goals.

  Federal government regulates labels

The federal government regulates labels, warranties, and consumer products. Without government regulation, what abuses are likely to occur?

  Network security fundamentals

The Chief Executive Officer (CEO) and other business staff have no knowledge of network security or the threats they face. They have an open position for a Chief Information Security Officer (CISO), but have yet to fill it. Thus, they hire you for..

  Decrypt the ciphertext message uw dm nk qb ek which was

decrypt the ciphertext message uw dm nk qb ek which was encrypted using the digraphic cipher that sends the plaintext

  Concept of subletting in v6

small package routing is more efficient in IPV6 than in IPV4, increase the hacking factor, network security model (NSM), ACL, VLAN, war dialing

  Fms attack and chopchop attack

[Wireless LAN Security-WEP] What is the main difference between the FMS attack and Chopchop attack? Clearly explain your answer

  Largest threats against network security

Research and discuss what you believe are the largest threats against network security, and what measures should be taken to protect against such intrusions.

  Security goal if someone modifies critical information

If an attacker breaks into a corporate database, modifies some information and deletes critical files, against what security goal or goals is this attack aimed?

  Define end-user access controls

Use the Web to conduct research on User Domain Security Policy and Access Management. Write a report which describes and differentiates the following: End-User Access Controls, Administrator Access Controls

  Describe the four types of network testing

Describe the four types of network testing typically performed. What is regression testing? Why is regression testing usually an important part of network testing

  How the user master record in sap plays an important role

Discuss how the user master record in SAP plays an important role in ensuring assignment of appropriate rights, activity groups / roles and authorisations for individual users.

  Symmetric encryption algorithms

block cipher and a stream cipher, Caesar cipher, cryptanalytic attacks, mono alphabetic cipher and a poly alphabetic cipher, Mix Columns, Add Round key, PGP services, traffic padding, contrast link and end-to-end encryption

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd