Security Login Data Analysis
v:* {behavior:url(#default#VML);}
o:* {behavior:url(#default#VML);}
w:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
Normal
0
false
false
false
false
EN-US
ZH-CN
X-NONE
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:”Table Normal”;
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:””;
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin:0in;
mso-para-margin-bottom:.0001pt;
mso-pagination:widow-orphan;
font-size:10.5pt;
mso-bidi-font-size:11.0pt;
font-family:等线;
mso-ascii-font-family:等线;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:等线;
mso-fareast-theme-font:minor-fareast;
mso-hansi-font-family:等线;
mso-hansi-theme-font:minor-latin;
mso-font-kerning:1.0pt;
mso-fareast-language:ZH-CN;}
As a manager, you will be required to understand and draw conclusions based on security data. Your skills to analyze and interpret security data can help you allocate the required budget and implement appropriate security measures and controls at your organization. The attached file indicates a sample of logins at a fictitious organization. Assume that the company is selling products to business customers via its website. It contains data on the following:
· Name of the individual logging in
· Organization they represent
· Address
· Phone Numbers
· Email Address
· Website the users are logging into
· User id
· Password
· Login Successful? (failed, successful, expired means that the password expired and the users needed to update password)
· Account Type (New or Old account)
· IP Address from which the users are logging
· Authentication Type: Authentication via Phone or OTP (one time password) or Regular (which means using user id and password).
Using this file, you can address questions such as the following:
1. How many logins have been successful versus how many unsuccessful? What is the percentage of successful versus unsuccessful logins?
2. What percentage of logins were successful versus failed versus expired (passwords) for different authentication types: call, OTP, regular?
3. What is the distribution of logins in the categories of successful, failed, expired by state? What are the percentages by state?
4. What is the distribution of logins in the categories of successful, failed, expired by user id? What are the percentages by user id?
5. Your organization is thinking of implementing one of the following four policies. If you analyzed the Excel file for passwords, what percentage of passwords will satisfy each of the policies 1, 2, 3, and 4?:
POLICY 1: Password should be at least 8 characters long with at least one number, at least one upper-case letter, and at least one lower-case letter
POLICY 2: Password should be at least 8 characters long with at least one number, at least one upper-case letter, and at least one lower-case letter; in addition, password should contain at least one of the following three special characters: @, #, $
POLICY 3: Password should be at least 10 characters long with at least one number, at least one upper-case letter, and at least one lower-case letter
POLICY 4: Password should be at least 12 characters long with at least one number, at least one upper-case letter, and at least one lower-case letter
Instructions:
You are expected to complete this assignment in Microsoft Excel. Complete and submit the assignment by Sunday.
Submission Instructions:
See the course grading policies page so that you understand policies on late work and the rubrics used for this assignment. The specific rubric used for this assignment is included below.
Grading Rubric
Your assignment will be graded according to the grading rubric.
MBA 720 Technical Rubric
MBA 720 Technical Rubric |
|||||||
标准 |
等级 |
得分 |
|||||
此标准已链接至学习结果Technology Design |
|
33.33 分 |
|||||
此标准已链接至学习结果Using Appropriate Technology Artifacts/Data |
|
33.33 分 |
|||||
此标准已链接至学习结果Making Decisions |
|
33.33 分 |