Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Research Findings and Outcomes: A Study on Security Vulnerabilities in Systems, Assignments of Project Management

Recommendations based on research findings and outcomes of a study on security vulnerabilities and risk identification in systems. The research includes both quantitative and qualitative methods, with a focus on identifying vulnerabilities in routers and implementing appropriate risk identification strategies. The document also discusses the importance of timely communication between IT specialists and business workers in addressing security issues.

Typology: Assignments

2020/2021

Uploaded on 06/20/2021

kiran-gautam
kiran-gautam 🇳🇵

5 documents

1 / 29

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Managing a successful computing project-2018
Table of Contents
Scenario:..........................................................................................................................................2
1. Establish your aims and objectives for the project. Outline objectives and timeframes based on
the scenario......................................................................................................................................2
2. produce an appropriate project management plan that includes relevant actions to meet
objectives and timeframes................................................................................................................3
3. Conduct a research to generate knowledge which will form the basis for analysis of the
scenario in the brief........................................................................................................................10
4. Analyze your finding and draw conclusion to form the basis for recommendations................14
5. Present the report in written format and also prepare a presentation that includes research
process and outcomes to the audience who has little or no knowledge on the research process...16
6. Write recommendations based on the research findings and outcomes....................................23
Recommendation for quantitative research data:.......................................................................23
Recommendation for each qualitative research.........................................................................24
7. Write a reflective writing focusing on personal development and research journey in a critical
and objective way..........................................................................................................................24
Reflection:..................................................................................................................................24
Evaluation:.................................................................................................................................25
Critical evaluation:.................................................................................................................26
References......................................................................................................................................27
1 | P a g e K i r a n G a u t a m
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a
pf1b
pf1c
pf1d

Partial preview of the text

Download Research Findings and Outcomes: A Study on Security Vulnerabilities in Systems and more Assignments Project Management in PDF only on Docsity!

Table of Contents Scenario:.......................................................................................................................................... 2

  1. Establish your aims and objectives for the project. Outline objectives and timeframes based on the scenario...................................................................................................................................... 2
  2. produce an appropriate project management plan that includes relevant actions to meet objectives and timeframes................................................................................................................ 3
  3. Conduct a research to generate knowledge which will form the basis for analysis of the scenario in the brief........................................................................................................................ 10
  4. Analyze your finding and draw conclusion to form the basis for recommendations................ 14
  5. Present the report in written format and also prepare a presentation that includes research process and outcomes to the audience who has little or no knowledge on the research process... 16
  6. Write recommendations based on the research findings and outcomes.................................... 23 Recommendation for quantitative research data:....................................................................... 23 Recommendation for each qualitative research......................................................................... 24
  7. Write a reflective writing focusing on personal development and research journey in a critical and objective way.......................................................................................................................... 24 Reflection:.................................................................................................................................. 24 Evaluation:................................................................................................................................. 25 Critical evaluation:................................................................................................................. 26 References...................................................................................................................................... 27

Scenario: According to the scenario I even have works as trainer as Associate in IT security specialist for a leading security practice. As a part of my job I have carry out small scale researched in order to recognized and discover a range of software vulnerability that potentially impacts on range of businesses. I have researched a recent market; it shows that’s several business owners don't seem to be responsive to computer vulnerability as a weakness in protection of their business. wherever several of business man don't seem to be responsive to security vulnerability might enable could allow an attacker to compromise the integrity an availability or confidentiality of that product or confidentiality of that product. Single security vulnerability will compromise one or all of those components at identical time. to Illustrate, whereas remote code execution vulnerability would compromise its integrity, handiness and confidentiality. With relevance earlier analysis, during this I even carry out small-scale analysis plan/ project to look at what proportion vulnerabilities in existing system can be identified and counteracted

1. Establish your aims and objectives for the project. Outline objectives and timeframes based on the scenario. Research topic: how vulnerabilities in an existing system can be identified and counteracted. Introduction: I am working as a trainee as an IT security specialist for a leading security consultancy. I am conduct small scale research with business vulnerability which would allow an attacker to compromise one or all of these elements at the same time. My major work is to make software more secure Projects aims and objectives While doing project I have some aims with some objectives. Here are some of the aims of the projects. Aims: To find information about security vulnerabilities and risk identification existing in system. Objectives:  preparation of proposal which include importance of the research like cost, time require, risk and scope  Making back of topic and its history.

The scope of the project is the area in an agreement where the work to be performed is describe. The scope should contain any milestone, reports, deliverables and end product that are expected to be provided by the performing party. There should also contain a time line for all deliverables. (Totally, 2018) The scope of the project should contain the following components.

  1. System analysis
  2. Network analysis
  3. General member
  4. System analysis In the system analysis, at first system analysis team start to analysis the old document so the required vulnerabilities can be found. Also, this team analysis the market and try to find the need of the market so the three will be any problem to other team. This team makes the can take one to two months for the analysis. The desired of this team to make product more effective and analysis the product according to requirement.
  5. Network analysis In network analysis, team will analysis all the network activities and performances of the project. The main work of this team is to analysis all the networking activities. If any problem comes on the networking then this start to analysis the problem and try to find best solution in short period of time.
  6. General member In general member, the whole project is tested. Blackbox and Whitebox testing is also done here. They also tested weather the demand is fulfil or not. If any people fell discomfort to run the project then they will discuss here to find the best solution.  Cost Will making project there will be spend of money. To show approx. spend of the I have shown the table. s.n. Name Quantity Rate Amount

1 Paper 1000 1 1000 2 Pen 100 20 2000 3 Pencil 100 10 1000 4 Easer, sharpener 100 5 500 5 Scale 50 10 500

  1. Marker 10 100 1000
  2. Printer ink 100 250 25000 Here I have shown some of the cost involve in my project. Other cost like skill manpower, resources cost etc are not involve because they can be increase in any time.  Quality Being a project manager requires planning, organization and a strong dependency on the team. Among other qualities. A project manager has to lead back and see the big picture, constantly re- assessing and making changes as need in order to keep a project within scope. In order to help you becomes a better project manager, we’ll run through a few of the top qualities of an effective project manager. 1. Reliability Reliability may be a method of assessing the standard of the mensuration procedure want to collect knowledge in an exceedingly thesis. so as for the results from a study to be thought-about valid, the mensuration procedure should 1st be reliable. during this article, we: (a) justify what dependableness is providing. (b) highlight a number of the additional common threats to dependableness in project; (c) shortly discuss every of the most sorts of dependableness you will use in your thesis, and also the things wherever they're appropriate; and (d) purpose to the assorted articles on the Lead thesis web site wherever we tend to discuss every of those sorts of dependableness in additional detail, together with articles explaining a way to run these dependableness tests within the statistics package, SPSS, likewise as interpret and write up the results of such tests. (Dissertation.laerd.com, 2018) 2. Vitality validity is important because of we would like to be able to say that the conclusions we have a tendency to create in our treatise is generalised. we have a tendency to might want to create

I. Governance risk relates to board and management performance with relation to ethics, community office, and company reputation. II. Strategic risks result from errors in strategy, like selecting a technology that can’t be created to work. III. Operational risk includes risks from poor implementation and method issues like precudal, production, and distribution. IV. Market risks include competition, interchange, artefact markets, and rate of interest risk, yet as liquidity and credit risks. V. Legal risks arise from legal and restrictive obligations, as well as contract risks and proceeding brought against the organization. VI. Risks related to external hazards, as well as storms, floods, and earthquakes; vandalism, sabotage, and terrorism; labour strikes; and civil unrest.  Resources The resources of an organization consist of individuals, materials, equipment, data and time. Organizations sometimes have limited resources; so, trade-offs on what project resources are spent and once are created each day inside organizations. A resource allocation plan is a very important tool in effective management of scarce resources. The temporal order of the requirement of these resources may be and may be determined inside the project schedules. A resource set up, that describes the sort of resource required and also the temporal order of that require, is vital to effective resource management. because the project schedule changes, the resource set up should even be versatile enough to regulate as these changes occur.  Milestone schedule The milestone schedule provides a calculable timeline for the lifetime of the project. The milestones include all project activities and interim steps required to implement the project. The schedule should include milestones for the design, development, construction, analysis and reporting of the project’s implementation. The milestone dates are only projected dates supported an anticipated grant award. Those dates could change looking on the timing of the grant award.  Date of change in phases starting and ending dates  Submission of important document/purpose

 Approval  Meeting  Presentation  Other important activity for project  Work breakdown structure

3. Conduct a research to generate knowledge which will form the basis for analysis of the scenario in the brief. I have conducted some research. The research is done with the help of quantitative and qualitive research. I have done research on the vulnerability existent in the router with the help of different people in the different post for the office. Research work Name: sabita acharya post: reception 1. what is the type of packet available? There are four type of packet available for the customer. When they take packet of 1 year they will get net tv free for one year with HD channel without any extra cost. 2. do you inform your customer about issues in time? We inform our user the issues within 12-30 min of issues through mail and message. 3. how many times take to solve any problem in your router? To solve any issues, it can take up to one hour. 4. do you get any feedback from customer about router? Yes, we get many feedbacks from customer mainly about the connection speed of router 5. How many times take to update your problem? To update any problem, it takes about one to two months. Name: pujan subedi post: marketing

  1. Do tell any issues of the router to new customer? We don’t tell about the issues of the router to new user in the initial phase.
  2. If any user finds issues in the initial phase do you try to solve it or leave it? If any user finds any new issues of the router then the technical team try to solve it by analyzing the problem.
  3. How to you market your product to new user? We market our product by giving about 7 to 15 days trial where user haven’t to pay any cost.
  4. Do you give new user any trial period to test the internet? Yes, we give trial period to test the internet.
  1. Do you go to meet any individual to sell the product or the user come to meet you? Normally new user come to meet at office for the enquiry. Name: Rakesh gyawali post: network engineer 1. Do tell your user to change login default password? We tell every user to change default login password so that any unauthorized cant access it. 2. Do you tell user to hidden user name of Wi-Fi? We tell user to hidden user name of Wi-Fi so that any other cant finds the any issues in the router. 3. Do tell any user any issues that you can’t solve? Yes, we tell to user if any issues that can’t solve and our analyzer tell start to analyzed the issues. 4. Do you tell user to change password in every month or more? We tell to change password in every three to four months. 5. Do you tell you user to reset the router? No, we don’t tell user to reset the router if any problem if in the system.  Secondary research(self-reading) Secondary data is public information that has been collected by others. It is typically free or inexpensive to obtain and can act as a strong foundation to any research project — provided you know where to find it and how to judge its worth and relevance.  Data available on the internet: One of the most popular ways of collecting secondary data is using the internet. Data is readily available on the internet and can be downloaded at the click of a button. This data is practically free of cost or one may have to pay a negligible amount to download the already existing data. Websites have a lot of information that businesses or organizations can use to suit their research needs. However, organizations need to consider only authentic and trusted website to collect information. (QuestionPro, 2019)  Public libraries: Public libraries are another good source to search for data for secondary research. Public libraries have copies of important research that were conducted earlier. They are a storehouse

4. Analyze your finding and draw conclusion to form the basis for recommendations.

router vulnerbilities

vulnerabilities no vulnerabilities

user loging password type

5. Present the report in written format and also prepare a presentation that includes research process and outcomes to the audience who has little or no knowledge on the research process. ` this is first slide of my presentation which is about my subject name. This is about my research topic in which all the presentation and assignment are based on this topic. All research is done under this topic only.

The aim of my tpoic is to get all the information about security vulnerabilities and risk identification existing in the router or networking which is provided by network provider. This is some of the objective that have listed above to meet the aim of the project. All the object is done creafuly so the we can meet aim n time

In above slide I have shown some questionnaires that I have asked to different person in different post in an office. Who are responsible for the question that I have asked them. In slide I have shown the pie-chart which I have to the them and after analyzing the answer this diagram has been drawn. This data shows the overall all analyses of my topic.