Use a software of your choice spreadsheet database


Assignment - SAP Practical Written Report

The key concepts and frameworks covered in modules 1-4 are particularly relevant for this assignment.

1. Analyse information security vulnerabilities and threats and determine appropriate controls that can be applied to mitigate the potential risks.

2. Demonstrate an ability to communicate effectively both written and orally about the management of information security in organizations.

Assignment consists of three specific tasks regarding SAP R/3 System Security.

 Task 1 - Login to SAP System Student Account and Complete and Save System/User Profile/Own Data Fields

Task 2 - Eight reports as specified (include an Excel spreadsheet or Access database) with your submission of Assignment report

Task 3 - SAP System Security Settings

Task 1

Task 1 Specifications - Login to SAP R/3 System using your student SAP userid and password and Complete System/User Profile/Own Data fields.

Task 1 Requirements - Complete and save following fields in your SAP R/3 Student Account User Profile Title, Last name, First name, Function, Department, Room Number, Floor and Building and provide a screen capture of completed fields in System/User Profile/Own Data Screen in your SAP R/3 Assignment Report

Task 2

Task 2 Specifications - Analyze SAP Security Audit Log Data.

Userdata.xls is a spreadsheet log file containing summarized records of user activity on a client's SAP R/3 system. Each record contains the following fields:

Task 2 Requirements

Use a software of your choice (spreadsheet, database, statistical package etc) to analyze the provided SAP Security Audit Log File (Userdata.xls), and generate the required eight user activity reports listed below and provide a brief description for each user activity report (About 500 words in total for all eight required reports/graphs) (hint this assignment 2 task 2 is best done using MS Excel pivot tables or Microsoft Access database SQL queries). The required eight user activity reports are:

1. Alphabetic list of all actions and their frequency by any selected user, e.g. USER-040.

2. List of users performing unsuccessful activities.

3. List of transaction codes performed, with their frequency by each user.

4. List of users engaging in security-related actions.

5. Top 10 users in terms of frequency of activity.

6. List of users who are dormant - in the range USER-001 to USER-050.

7. You should also produce at least 2 reports or charts based on any of the above previous reports that summarise user activity over time using YYYYMM date format.

Task 3-

TASK 3 Specifications - Analyze and discuss SAP System-Wide Security Settings.

You are required to review the system-wide security settings on a SAP R/3 system. The data file SAP_RSPARAM_Basis.xlsx contains an extract from the client's system. Note you should open this file using an excel spreadsheet to view the system-wide security settings so the fields are aligned correctly. Hint you can use the search function to locate the appropriate SAP system wide security settings and their related values in the data file SAP_RSPARAM_Basis.xlsx. Note you will need to research the relevant SAP System Security literature in order to determine what are recommended values for each SAP System Security Setting.

Task 3 Requirements complete the following task:

a) For each SAP System Security Setting listed in Table 1 complete the User Defined Value, System Default Value and Recommended Value based on your analysis of the SAP_RSPARAM_Basis.xlsx file and the relevant SAP System Security Literature.

Attachment:- Assignment.rar

Request for Solution File

Ask an Expert for Answer!!
Dissertation: Use a software of your choice spreadsheet database
Reference No:- TGS01557057

Expected delivery within 24 Hours