Ask Computer Network & Security Expert

The key concepts and frameworks

1. Analyse information security vulnerabilities and threats and determine appropriate controls that can be applied to mitigate the potential risks

2. demonstrate an ability to communicate effectively both written and orally about the management of information security in organisations

Task 1 Specifications - Login to SAP System using your student SAP userid and password and Complete System/User Profile/Own Data fields as specified below

590_Analyze SAP Security Audit Log Data.png

Complete and save the following fields

Title, Last name, First name, Function, Department, Room Number, Floor and Building and provide a screen capture of completed fields in System/User Profile/Own Data

Task 2 Specifications - Analyze SAP Security Audit Log Data.

Userdata.xls is a summarized record of user activity on a client's SAP system. Each record contains the following fields:

USERID
YYYYMM
TCODE
TEXT
TCODESTAT
TCD
TSTATUS
TCOUNT
TTEXT

YYYYMM describes when the user action took place. YYYYMM is useful for summarising user activity by month. TCODE refers to the transaction (option on the menu) performed by the user. TEXT describes the outcome of the action, including its success or failure. Some tcodes are blank. Accordingly, TCODESTAT is an invented transaction code for each action indicating whether the action was successful (-0) or failed (-1). TCD is the same as TCODESTAT, except there is no -0 or -1. TSTATUS indicates whether the action was successful or not (0/1). TCOUNT is the number of times the user has performed this action, with this outcome, in the month YYYYMM. TTEXT is the narrative description of the TCODE.

Task 2 Requirements

You can use software of your choice (spreadsheet, database, statistical package etc) to analyze the provided SAP security audit log data (Userdata.xls), generate appropriate reports and provide an analysis of your findings (hint this assignment 2 task 2 can be done using excel pivot tables or Microsoft Access database SQL queries). Of particular interest are the following reports:

1. Alphabetic list of all actions and their frequency by any selected user, e.g. USER-040.
2. List of users performing unsuccessful activities.
3. List of transaction codes performed, with their frequency by each user.
4. List of users engaging in security-related actions.
5. Top 10 users in terms of frequency of activity.
6. List of users who are dormant - in the range USER-001 to USER-050.
7. You should also produce at least 3 reports/charts/plots based on any of the above previous reports that summarise activity over time using YYYYMM date format.

TASK 3 Specifications - Analyze SAP System-Wide Security Settings.

You are required to review the system-wide security settings on our SAP system. The data file RSPARAM contains an extract from the client's system (Note you should open this file using excel spreadsheet to view the system-wide security settings with the fields aligned correctly. Hint you can use the search function to locate the appropriate SAP system wide security settings and their related values in the data file RSPARAM.txt.

You required to produce a report for Task 3 of Assignment 3 summarizing the current user settings, default settings and recommended settings based on the RSPARAM.txt file.

Your report will consist of a written evaluation of the current settings highlighting any weaknesses, with explanations, and recommendations (1000 words approx.). Note some relevant resources on SAP security will be provided for Tutorials and Assignment 2 discussion forum. The report should take the following form:

ACME DISTRIBUTION COMPANY

SAP System-Wide Security Settings

System Setting Value

User   

Default Value

Recommended

Value

Actual Value

No auto user SAP*    

 

 

 

 

Failed logins to end

 

 

 

 

Failed logins to lock

 

 

 

 

Auto failed unlock

 

 

 

 

Min password length

 

 

 

 

Password expiry (days)

 

 

 

 

Idle logout (seconds)

 

 

 

 

No check on Tcodes

 

 

 

 

Default login client    

 

 

 

 

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91389223
  • Price:- $50

Priced at Now at $50, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

After reading this weeks materials please respond to two 2

After reading this week's materials, please respond to TWO (2) of the following questions. AND PROVIDE CITATION IN APA 1. Describe the differences between bus, ring, star and mesh topologies. 2. Explain the TCP/IP Model ...

The abstract should not be more than 250 words describe

The abstract should not be more than 250 words. Describe your project, focusing on research questions and research method for next stage of the project. 1. Introduction [The introduction should describe what the project ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As