Principles of information security, Computer Network Security

Assignment Help:

The key concepts and frameworks covered in modules 1-4 are particularly relevant for this assignment. Assignment 2 relates to the specific course learning objectives 1, 2 and 3:

1. have a strong understanding of the vulnerabilities and threats relating to information systems and the controls which can be implemented to mitigate their effect

2. understand the need for information systems security

3. describe various network related threats and controls as covered in this course

And assesses the following graduate skills: The Academic & Professional Literacy and Written & Oral Communication at level 2.

Assignment 2 requires you to cover two specific tasks regarding SAP security. Your Assignment 2 must be professionally structured, worded for readability and appropriate for the intended audience. Your assignment 2 must be structured as follows:

? Cover page for your assignment 2

? Table of contents

? Body of report - main section for each task with appropriate use of subsections for

each task sub report

? Task 1 - with appropriate sub section headings for each report

? Task 2 - with appropriate sub section headings for each report

Task 1 Specifications - Analyze SAP Security Audit Log Data.

You are provided with a data file - Userdata.xls.

Userdata.xls is a summarized record of user activity on a client's SAP system. Each record contains the following fields:

USERID

YYYYMM

TCODE

TEXT

TCODESTAT

TCD

TSTATUS

TCOUNT

TTEXT

YYYYMM describes when the user action took place. YYYYMM is useful for summarising user activity by month. TCODE refers to the transaction (option on the menu) performed by the user.  TEXT describes the outcome of the action, including its success or failure. Some tcodes are blank. Accordingly, TCODESTAT is an invented transaction code for each action indicating whether the action was successful (-0) or failed (-1). TCD is the same as TCODESTAT, except there is no -0 or -1. TSTATUS indicates whether the action was successful or not (0/1). TCOUNT is the number of times the user has performed this action, with this outcome, in the month YYYYMM. TTEXT is the narrative description of the TCODE.


Related Discussions:- Principles of information security

Systems development life cycle security-information security, The Role of t...

The Role of the Investigation The first phase, investigation is the most significant. What problem is the system being developed to solve? During investigation phase, objectives

Briefly explain the contents of the needs analysis, QUESTION (a) Brief...

QUESTION (a) Briefly explain the contents of the Needs Analysis, which is step in the process of network design. (b) Describe on the three ways of improving the performan

Discuss the influence the commercial operations, Question: A regional p...

Question: A regional police force has the following corporate objectives: ? to reduce crime and disorder; ? to promote community safety; ? to contribute to delivering just

Ipv6 addressing, IPv6 ADDRESSING IPv6 has 128-bit addresses. A 128-bit...

IPv6 ADDRESSING IPv6 has 128-bit addresses. A 128-bit address adds network prefix and host suffix. An benefit of IPv6 addressing is that there is address classes i.e. prefix/s

Marketing, what are the participant of marketing channal?

what are the participant of marketing channal?

[email protected], Re: Website Google Ranking Hello! Hope yo...

Re: Website Google Ranking Hello! Hope you are doing well. I discovered some major issues in your website which might be the cause for the Google Penalties and poor search ranki

Network simplex method, QUESTION: (a) Briefly explain the steps invol...

QUESTION: (a) Briefly explain the steps involved in Network Simplex Method. (b) What data structures you would expect in the Network Simplex Method. Show the data struct

Maximum transmission unit (mtu), Maximum Transmission Unit  (MTU) Eac...

Maximum Transmission Unit  (MTU) Each hardware method specification adds the definition of the maximum size of the frame data area, which is known the Maximum Transmission Uni

Describe the function of a tap in wmns, Question: (a) A Wireless Mesh N...

Question: (a) A Wireless Mesh Network (WMN) is a communications network made up of radio nodes organized in a mesh topology. i. Describe the function of a TAP in WMNs. ii.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd