Principles of information security, Computer Network Security

Assignment Help:

The key concepts and frameworks covered in modules 1-4 are particularly relevant for this assignment. Assignment 2 relates to the specific course learning objectives 1, 2 and 3:

1. have a strong understanding of the vulnerabilities and threats relating to information systems and the controls which can be implemented to mitigate their effect

2. understand the need for information systems security

3. describe various network related threats and controls as covered in this course

And assesses the following graduate skills: The Academic & Professional Literacy and Written & Oral Communication at level 2.

Assignment 2 requires you to cover two specific tasks regarding SAP security. Your Assignment 2 must be professionally structured, worded for readability and appropriate for the intended audience. Your assignment 2 must be structured as follows:

? Cover page for your assignment 2

? Table of contents

? Body of report - main section for each task with appropriate use of subsections for

each task sub report

? Task 1 - with appropriate sub section headings for each report

? Task 2 - with appropriate sub section headings for each report

Task 1 Specifications - Analyze SAP Security Audit Log Data.

You are provided with a data file - Userdata.xls.

Userdata.xls is a summarized record of user activity on a client's SAP system. Each record contains the following fields:

USERID

YYYYMM

TCODE

TEXT

TCODESTAT

TCD

TSTATUS

TCOUNT

TTEXT

YYYYMM describes when the user action took place. YYYYMM is useful for summarising user activity by month. TCODE refers to the transaction (option on the menu) performed by the user.  TEXT describes the outcome of the action, including its success or failure. Some tcodes are blank. Accordingly, TCODESTAT is an invented transaction code for each action indicating whether the action was successful (-0) or failed (-1). TCD is the same as TCODESTAT, except there is no -0 or -1. TSTATUS indicates whether the action was successful or not (0/1). TCOUNT is the number of times the user has performed this action, with this outcome, in the month YYYYMM. TTEXT is the narrative description of the TCODE.


Related Discussions:- Principles of information security

Placeholders for the plaintext characters, Encode the following plaintext, ...

Encode the following plaintext, using the Caesar cipher:             LORD OF THE RINGS b) The following ciphertext              jw njbh lxmn cx kanjt has been encoded usi

Increasingly significant impact on society, Question: (a) African gove...

Question: (a) African governments are slowly shifting to more transparent ICT regulations. However, but limited spectrum availability remains a key barrier to sustaining lon

Ipv6 addressing, IPv6 ADDRESSING IPv6 has 128-bit addresses. A 128-bit...

IPv6 ADDRESSING IPv6 has 128-bit addresses. A 128-bit address adds network prefix and host suffix. An benefit of IPv6 addressing is that there is address classes i.e. prefix/s

Evaluate the sample correlation between y and z, Question: (a) Data on ...

Question: (a) Data on four variables are stored in a file called file1.dat. The first line of the file is the variable names f, x, y and z. Give the R commands to (i) read t

Define byte stuffing, Sometimes the special character may see in data and a...

Sometimes the special character may see in data and as a part of data they will be misinterpreted as packet data. The solution to this cause is Byte stuffing.   In general to

Balancing security and access-information security, BALANCING SECURITY AND ...

BALANCING SECURITY AND ACCESS Even with best planning and implementation, it is impossible to obtain perfect security, that is, it is a process, not an absolute. Security should

Social studies, how would land elevation have canged if coronado had travel...

how would land elevation have canged if coronado had traveled 150 miles due west from what is today arizona instead of west toward new mexico

Explain the security service - confidentiality, Question: (a) Explain t...

Question: (a) Explain the following security services: Confidentiality, Availability. (b) Which attack will be used to bypass even the best physical and logical security m

Digital signatures, Digital Signatures Digital Signatures are encrypted ...

Digital Signatures Digital Signatures are encrypted messages which can be proven mathematically to be authentic. These are created in response to rising requirement to verify in

Project, Network diagram for a mediacal care

Network diagram for a mediacal care

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd