Security Login Data Analysis

Security Login Data Analysis

v:* {behavior:url(#default#VML);}
o:* {behavior:url(#default#VML);}
w:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}

Normal
0
false

false
false
false

EN-US
ZH-CN
X-NONE

/* Style Definitions */
table.MsoNormalTable
{mso-style-name:”Table Normal”;
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:””;
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin:0in;
mso-para-margin-bottom:.0001pt;
mso-pagination:widow-orphan;
font-size:10.5pt;
mso-bidi-font-size:11.0pt;
font-family:等线;
mso-ascii-font-family:等线;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:等线;
mso-fareast-theme-font:minor-fareast;
mso-hansi-font-family:等线;
mso-hansi-theme-font:minor-latin;
mso-font-kerning:1.0pt;
mso-fareast-language:ZH-CN;}

As a manager, you will be required to understand and draw conclusions based on security data. Your skills to analyze and interpret security data can help you allocate the required budget and implement appropriate security measures and controls at your organization. The attached file预览文档 indicates a sample of logins at a fictitious organization. Assume that the company is selling products to business customers via its website. It contains data on the following:

·         Name of the individual logging in

·         Organization they represent

·         Address

·         Phone Numbers

·         Email Address

·         Website the users are logging into

·         User id

·         Password

·         Login Successful? (failed, successful, expired means that the password expired and the users needed to update password)

·         Account Type  (New or Old account)

·         IP Address from which the users are logging

·         Authentication Type: Authentication via Phone or OTP (one time password) or Regular (which means using user id and password).

 Using this file, you can address questions such as the following:

1.    How many logins have been successful versus how many unsuccessful? What is the percentage of successful versus unsuccessful logins?

2.    What percentage of logins were successful versus failed versus expired (passwords) for different authentication types: call, OTP, regular?

3.    What is the distribution of logins in the categories of successful, failed, expired by state? What are the percentages by state?

4.    What is the distribution of logins in the categories of successful, failed, expired by user id? What are the percentages by user id?

5.    Your organization is thinking of implementing one of the following four policies. If you analyzed the Excel file for passwords, what percentage of passwords will satisfy each of the policies 1, 2, 3, and 4?:

POLICY 1: Password should be at least  8 characters long with at least one number, at least one upper-case letter, and at least one lower-case letter
POLICY 2: Password should be at least 8 characters long with at least one number, at least one upper-case letter, and at least one lower-case letter; in addition, password should contain at least one of the following three special characters: @, #, $
POLICY 3: Password should be at least 10 characters long with at least one number, at least one upper-case letter, and at least one lower-case letter
POLICY 4: Password should be at least 12 characters long with at least one number, at least one upper-case letter, and at least one lower-case letter

 

Instructions:
You are expected to complete this assignment in Microsoft Excel. Complete and submit the assignment by Sunday.

Submission Instructions:

See the course grading policies page so that you understand policies on late work and the rubrics used for this assignment.  The specific rubric used for this assignment is included below.

 

 

null

Grading Rubric 


Your assignment will be graded according to the grading rubric.

 

MBA 720 Technical Rubric

MBA 720 Technical Rubric

标准

等级

得分

此标准已链接至学习结果Technology Design

33.33 得分

Excellent

Student analyzed the business problem and arrived at the correct design to solve the business problem. Student’s solution was efficient.

27.0 得分

Very Good

Student’s analysis of the business problem was mostly correct and the student arrived at close to the correct design to solve the business problem.

24.0 得分

Satisfactory

Student’s analysis of the business problem and student’s design was lacking in some aspects

17.0 得分

Unsatisfactory

Student’s analysis of the business problem was mostly incorrect and the student’s design to solve the business problem was incorrect.

0.0 得分

Not Submitted

Student did not submit relevant work.

33.33 

此标准已链接至学习结果Using Appropriate Technology Artifacts/Data

33.33 得分

Excellent

Student used correct data and analyzed correct sets of data to solve the business problem; student used the right technological tools such as formula and queries to analyze data.

27.0 得分

Very Good

Student mostly used correct data and analyzed correct sets of data most of the time (80-90% of the time) to solve the business problem; student used mostly the right technological tools such as formula and queries to analyze data.

24.0 得分

Satisfactory

Student’s usage of data and analysis of data sets was lacking in some aspects; student’s usage of technological tools was lacking in some aspects.

17.0 得分

Unsatisfactory

Student’s usage of data and analysis of data sets was incorrect; student’s usage of technological tools was incorrect.

0.0 得分

Not Submitted

Student did not submit relevant work.

33.33 

此标准已链接至学习结果Making Decisions

33.33 得分

Excellent

Student made correct decisions for the business problem based on completed technical analysis.

27.0 得分

Very Good

Student made correct decisions for the business problem most of the time (80-90% of the time) based on technical analysis.

24.0 得分

Satisfactory

Student made correct decisions 70% to 80% of the time based on technical analysis.

17.0 得分

Unsatisfactory

A majority of student’s decisions were incorrect.

0.0 得分

Not Submitted

Student did not submit relevant work.

33.33 

Click here to request for this assignment help