DISCUSS WHAT IS A TRANSACTION CODE AND ITS MAIN PURPOSE IN THE SAP R/3 SYSTEM. RESEARCH THE…

DISCUSS WHAT IS A TRANSACTION CODE AND ITS MAIN PURPOSE IN THE SAP R/3 SYSTEM. RESEARCH THE FOLLOWING RELATED SAP TRANSACTION CODES SM19 AND SM20 AND EXPLAIN HOW YOU WOULD USE THESE TWO RELATED SAP TRANSACTION CODES TO UNDER- TAKE A SECURITY AUDIT OF AN ORGANISATION’S SAP R/3 SYSTEM (ABOUT 500 WORDS)
Discuss what is a transaction code and its main purpose in the SAPR/3 System. Research the following related SAP Transaction Codes SM19 and SM20 and explain how you would use these two related SAP Transaction codes to under- take a security audit of an organisation’s SAP R/3 System (About 500 words)Task 1.2.1 Discuss how the user master record in SAP plays an important role in ensuring assignment of appropriate rights, activity groups / roles and authorisations for individual users. (About 500 words)Task1.2.2 As it is not possible to delete the SAP* user account describe two suggested controls to secure this account from misuse. (About 250 words) Task 2 Ethical Behaviour for an Information Security ProfessionalReview the Wikipedia Link for Professional Ethics and ACS Code of Professional Practice and provided with the Assignment 3 and consider the following two case studies as an Information Security Professional:Task 2.1 Security hole in Distributed Record Management System used by Company X and Company Y – Summary of caseCompany X has just signed a business agreement with Company Y, which entitles both of them to access each other clients’ records. Faisal, a software programmer at Company Z, was assigned the task of developing a software program that handles the access and retrieval of records from each Company’s database system into the other. A first run of the software on real data indicated that the work was well within the state of the art, and no difficulties were found or anticipated.Several weeks later and during a normal test on the software developed, Faisal discovered a serious ‘security hole’ in the database system of Company Y by which hackers can easily obtain confidential information about clients. He was convinced that while the software he developed could correctly accomplish the task, the code in Company Y’s database system could not be trusted as the security hole posed a threat even on Company X’s database system. Faisal told his manager about the problem and explained its significance. The manager’s response was, -That’s not our problem; let’s just be sure that our software functions properly.- Faisal is not sure what to do. Refusing to work on the project means disobeying his manager’s orders. Continuing to work on the project, means disobeying one of God’s commands, which requires him to be truthful and sincere in his dealings.

 
PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET AN AMAZING DISCOUNT

QUALITY: 100% ORIGINAL PAPERNO PLAGIARISM - CUSTOM PAPER

Recent Completed and delivered Papers

# Topic title Subject Area Academic Level Pages delivered
6
Writer's choice
Business
University
2
1 hour 32 min
7
Wise Approach to
Philosophy
College
2
2 hours 19 min
8
1980's and 1990
History
College
3
2 hours 20 min
9
pick the best topic
Finance
School
2
2 hours 27 min
10
finance for leisure
Finance
University
12
2 hours 36 min