





















Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Recommendations based on research findings and outcomes of a study on security vulnerabilities and risk identification in systems. The research includes both quantitative and qualitative methods, with a focus on identifying vulnerabilities in routers and implementing appropriate risk identification strategies. The document also discusses the importance of timely communication between IT specialists and business workers in addressing security issues.
Typology: Assignments
1 / 29
This page cannot be seen from the preview
Don't miss anything!
Table of Contents Scenario:.......................................................................................................................................... 2
Scenario: According to the scenario I even have works as trainer as Associate in IT security specialist for a leading security practice. As a part of my job I have carry out small scale researched in order to recognized and discover a range of software vulnerability that potentially impacts on range of businesses. I have researched a recent market; it shows that’s several business owners don't seem to be responsive to computer vulnerability as a weakness in protection of their business. wherever several of business man don't seem to be responsive to security vulnerability might enable could allow an attacker to compromise the integrity an availability or confidentiality of that product or confidentiality of that product. Single security vulnerability will compromise one or all of those components at identical time. to Illustrate, whereas remote code execution vulnerability would compromise its integrity, handiness and confidentiality. With relevance earlier analysis, during this I even carry out small-scale analysis plan/ project to look at what proportion vulnerabilities in existing system can be identified and counteracted
1. Establish your aims and objectives for the project. Outline objectives and timeframes based on the scenario. Research topic: how vulnerabilities in an existing system can be identified and counteracted. Introduction: I am working as a trainee as an IT security specialist for a leading security consultancy. I am conduct small scale research with business vulnerability which would allow an attacker to compromise one or all of these elements at the same time. My major work is to make software more secure Projects aims and objectives While doing project I have some aims with some objectives. Here are some of the aims of the projects. Aims: To find information about security vulnerabilities and risk identification existing in system. Objectives: preparation of proposal which include importance of the research like cost, time require, risk and scope Making back of topic and its history.
The scope of the project is the area in an agreement where the work to be performed is describe. The scope should contain any milestone, reports, deliverables and end product that are expected to be provided by the performing party. There should also contain a time line for all deliverables. (Totally, 2018) The scope of the project should contain the following components.
1 Paper 1000 1 1000 2 Pen 100 20 2000 3 Pencil 100 10 1000 4 Easer, sharpener 100 5 500 5 Scale 50 10 500
I. Governance risk relates to board and management performance with relation to ethics, community office, and company reputation. II. Strategic risks result from errors in strategy, like selecting a technology that can’t be created to work. III. Operational risk includes risks from poor implementation and method issues like precudal, production, and distribution. IV. Market risks include competition, interchange, artefact markets, and rate of interest risk, yet as liquidity and credit risks. V. Legal risks arise from legal and restrictive obligations, as well as contract risks and proceeding brought against the organization. VI. Risks related to external hazards, as well as storms, floods, and earthquakes; vandalism, sabotage, and terrorism; labour strikes; and civil unrest. Resources The resources of an organization consist of individuals, materials, equipment, data and time. Organizations sometimes have limited resources; so, trade-offs on what project resources are spent and once are created each day inside organizations. A resource allocation plan is a very important tool in effective management of scarce resources. The temporal order of the requirement of these resources may be and may be determined inside the project schedules. A resource set up, that describes the sort of resource required and also the temporal order of that require, is vital to effective resource management. because the project schedule changes, the resource set up should even be versatile enough to regulate as these changes occur. Milestone schedule The milestone schedule provides a calculable timeline for the lifetime of the project. The milestones include all project activities and interim steps required to implement the project. The schedule should include milestones for the design, development, construction, analysis and reporting of the project’s implementation. The milestone dates are only projected dates supported an anticipated grant award. Those dates could change looking on the timing of the grant award. Date of change in phases starting and ending dates Submission of important document/purpose
Approval Meeting Presentation Other important activity for project Work breakdown structure
3. Conduct a research to generate knowledge which will form the basis for analysis of the scenario in the brief. I have conducted some research. The research is done with the help of quantitative and qualitive research. I have done research on the vulnerability existent in the router with the help of different people in the different post for the office. Research work Name: sabita acharya post: reception 1. what is the type of packet available? There are four type of packet available for the customer. When they take packet of 1 year they will get net tv free for one year with HD channel without any extra cost. 2. do you inform your customer about issues in time? We inform our user the issues within 12-30 min of issues through mail and message. 3. how many times take to solve any problem in your router? To solve any issues, it can take up to one hour. 4. do you get any feedback from customer about router? Yes, we get many feedbacks from customer mainly about the connection speed of router 5. How many times take to update your problem? To update any problem, it takes about one to two months. Name: pujan subedi post: marketing
4. Analyze your finding and draw conclusion to form the basis for recommendations.
vulnerabilities no vulnerabilities
5. Present the report in written format and also prepare a presentation that includes research process and outcomes to the audience who has little or no knowledge on the research process. ` this is first slide of my presentation which is about my subject name. This is about my research topic in which all the presentation and assignment are based on this topic. All research is done under this topic only.
The aim of my tpoic is to get all the information about security vulnerabilities and risk identification existing in the router or networking which is provided by network provider. This is some of the objective that have listed above to meet the aim of the project. All the object is done creafuly so the we can meet aim n time
In above slide I have shown some questionnaires that I have asked to different person in different post in an office. Who are responsible for the question that I have asked them. In slide I have shown the pie-chart which I have to the them and after analyzing the answer this diagram has been drawn. This data shows the overall all analyses of my topic.