Principles of information security, Computer Network Security

Assignment Help:

The key concepts and frameworks covered in modules 1-4 are particularly relevant for this assignment. Assignment 2 relates to the specific course learning objectives 1, 2 and 3:

1. have a strong understanding of the vulnerabilities and threats relating to information systems and the controls which can be implemented to mitigate their effect

2. understand the need for information systems security

3. describe various network related threats and controls as covered in this course

And assesses the following graduate skills: The Academic & Professional Literacy and Written & Oral Communication at level 2.

Assignment 2 requires you to cover two specific tasks regarding SAP security. Your Assignment 2 must be professionally structured, worded for readability and appropriate for the intended audience. Your assignment 2 must be structured as follows:

? Cover page for your assignment 2

? Table of contents

? Body of report - main section for each task with appropriate use of subsections for

each task sub report

? Task 1 - with appropriate sub section headings for each report

? Task 2 - with appropriate sub section headings for each report

Task 1 Specifications - Analyze SAP Security Audit Log Data.

You are provided with a data file - Userdata.xls.

Userdata.xls is a summarized record of user activity on a client's SAP system. Each record contains the following fields:

USERID

YYYYMM

TCODE

TEXT

TCODESTAT

TCD

TSTATUS

TCOUNT

TTEXT

YYYYMM describes when the user action took place. YYYYMM is useful for summarising user activity by month. TCODE refers to the transaction (option on the menu) performed by the user.  TEXT describes the outcome of the action, including its success or failure. Some tcodes are blank. Accordingly, TCODESTAT is an invented transaction code for each action indicating whether the action was successful (-0) or failed (-1). TCD is the same as TCODESTAT, except there is no -0 or -1. TSTATUS indicates whether the action was successful or not (0/1). TCOUNT is the number of times the user has performed this action, with this outcome, in the month YYYYMM. TTEXT is the narrative description of the TCODE.


Related Discussions:- Principles of information security

Fragmentation and path mtu, FRAGMENTATION AND PATH MTU IPv6 source is ...

FRAGMENTATION AND PATH MTU IPv6 source is responsible for fragmentation. Routers simply drop datagrams bigger than network MTU. So source have to fragment datagram to arrive d

Csma/ca, CSMA/CA Wireless needs collision avoid ness rather than colli...

CSMA/CA Wireless needs collision avoid ness rather than collision checking. Transmitting computer puts very short codes to receiver. Receiver responds with short message getti

What do you understand by the concept web of trust, Question: a) Name ...

Question: a) Name a method to allow a person to send a confidential email to another person, without risks of a third-party reading the email. Describe briefly the operations

Explain authentication process in a synchronous token system, Question: ...

Question: (a) Explain briefly the PCI Control Objectives which enterprises must meet to be compliant with the Payment Card Industry Data Security Standard (PCI DSS). Specify a

SNORT, Detect each visit to www.google.com that is made by the machine. o S...

Detect each visit to www.google.com that is made by the machine. o Send an alert when an activity relating to network chat is detected. o Send an alert when an attempt is made for

Star topology, In Star topology all computers are connected using a cen...

In Star topology all computers are connected using a central device known as hub. Star networks are one of the most general computer network topologies. In its simplest way, a

Illustrate the label switching procedure in an mpls network, QUESTION ...

QUESTION a) Explain the terms traffic engineering, class-based queuing, shaping and grooming in an MPLS network. b) Using an example topology, illustrate the label swi

Linux, Discuss the risks of having a single root user

Discuss the risks of having a single root user

Fragment identification, FRAGMENT IDENTIFICATION: IDENT field in every...

FRAGMENT IDENTIFICATION: IDENT field in every fragment matches IDENT field in real datagram. Fragments from different datagrams may arrive out of order and still be saved out.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd