Higher Nationals Internal verification of assessment decisions – BTEC (RQF) INTERNAL VERIFICATION – ASSESSMENT DECISIONS Programme title BTEC HND in Computing Assessor Internal Verifier Unit 06: Managing a Successful Computing Project Unit(s) Managing a Project on cyber security risks due to Remote working Assignment title Student’s name List which assessment criteria the Assessor has awarded. Pass Merit Distinction INTERNAL VERIFIER CHECKLIST Do the assessment criteria awarded match those shown in the assignment brief? Y/N Is the Pass/Merit/Distinction grade awarded justified by the assessor’s comments on the student work? Y/N Has the work been assessed accurately? Y/N Is the feedback to the student: Give details: • Constructive? • Linked to relevant assessment criteria? • Identifying opportunities for improved performance? • Agreeing actions? Y/N Y/N Y/N Does the assessment decision need amending? Y/N Y/N Assessor signature Date Internal Verifier signature Date Programme Leader signature (if required) Date Confirm action completed Remedial action taken Give details: Assessor signature Date Internal Verifier signature Date Programme Leader signature (if required) Date Higher Nationals – Summative Assignment Feedback Form Student Name/ID Unit Title Unit 6 Managing a Successful Computing Project Assignment Number 1 Assessor Submission Date DateReceived1stsub mission Re-submission Date DateReceived2ndsubmissio n Assessor Feedback: LO1.Establish project aims, objectives and time frames based on the chosen theme Pass, Merit & Distinction P1 P2 P3 M1 Descripts LO2. Conduct small-scale research, information gathering and data collection to generate knowledge to support the project Pass, Merit & Distinction Descripts P4 M2 D1 LO3. Present the project and communicate appropriate recommendations based on meaningful conclusions drawn from the evidence findings and/or analysis. Pass, Merit & Distinction P5 P6 M3 D2 Descripts LO4. Reflect on the value gained from conducting the project and its usefulness to support sustainable organisational performance Pass, Merit & Distinction P7 M4 D3 Descripts Grade: Assessor Signature: Date: Assessor Signature: Date: Resubmission Feedback: Grade: Internal Verifier’s Comments: Signature & Date: * Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and grades decisions have been agreed at the assessment board. MSCP/2021/22/Remote working Assignment Feedback Formative Feedback: Assessor to Student Action Plan Summative feedback Feedback: Student to Assessor Assessor signature Date Student signature Date MSCP/2021/22/Remote working Pearson Higher Nationals in Computing Unit 6: Managing a Successful Computing Project MSCP/2021/22/Remote working General Guidelines 1. A Cover page or title page – You should always attach a title page to your assignment. Use previous page as your cover sheet and make sure all the details are accurately filled. 2. Attach this brief as the first section of your assignment. 3. All the assignments should be prepared using a word processing software. 4. All the assignments should be printed on A4 sized papers. Use single side printing. 5. Allow 1” for top, bottom, right margins and 1.25” for the left margin of each page. Word Processing Rules 1. 2. 3. 4. The font size should be 12 point and should be in the style of Time New Roman. Use 1.5 line spacing. Left justify all paragraphs. Ensure that all the headings are consistent in terms of the font size and font style. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and Page Number on each page. This is useful if individual sheets become detached for any reason. 5. Use word processing application spell check and grammar check function to help editing your assignment. Important Points: 1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body except for the before mentioned compulsory information will result in rejection of your work. 2. Carefully check the hand in date and the instructions given in the assignment. Late submissions will not be accepted. 3. Ensure that you give yourself enough time to complete the assignment by the due date. 4. Excuses of any nature will not be accepted for failure to hand in the work on time. 5. You must take responsibility for managing your own time effectively. 6. If you are unable to hand in your assignment on time and have valid reasons such as illness, you may apply (in writing) for an extension. 7. Failure to achieve at least PASS criteria will result in a REFERRAL grade. 8. Non-submission of work without valid reasons will lead to an automatic REFERRAL. You will then be asked to complete an alternative assignment. 9. If you use other people’s work or ideas in your assignment, reference them properly using HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation and a reference list. 10. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be reduced to A REFERRAL or at worst you could be expelled from the course MSCP/2021/22/Remote working Student Declaration I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as my own without attributing the sources in the correct way. I further understand what it means to copy another’s work. 1. I know that plagiarism is a punishable offence because it constitutes theft. 2. I understand the plagiarism and copying policy of the Pearson UK. 3. I know what the consequences will be if I plagiaries or copy another’s work in any of the assignments for this program. 4. I declare therefore that all work presented by me for every aspects of my program, will be my own, and where I have made use of another’s work, I will attribute the source in the correct way. 5. I acknowledge that the attachment of this document signed or not, constitutes a binding agreement between myself and Pearson UK. 6. I understand that my assignment will not be considered as submitted if this document is not attached to the attached. Student’s Signature: (Provide E-mail ID) MSCP/2021/22/Remote working Date: (Provide Submission Date) Higher National Diploma in Computing Assignment Brief Student Name /ID Number Unit Number and Title Unit 6: Managing a Successful Computing Project Academic Year 2021/20222018 Unit Tutor Assignment Title Vulnerability Assessment - Management Information System Project Issue Date Submission Date IV Name & Date Submission Format: The submission should be in the form of an individual report written in a concise, formal business style using single spacing (refer to the assignment guidelines for more details). You are required to make use of headings, paragraphs, and subsections as appropriate, and all work must be supported with research and referenced using Harvard referencing system. Please provide in-text citation and a list of references using Harvard referencing system. Please note that this is an individual assessment and your report should include evidences to that you have conducted a research to collect relevant data individually. MSCP/2021/22/Remote working Unit Learning Outcomes: LO1 Establish project aims, objectives and timeframes based on the chosen theme. LO2 Conduct small-scale research, information gathering and data collection to generate knowledge to support the project. LO3 Present the project and communicate appropriate recommendations based on meaningful conclusions drawn from the evidence findings and/or analysis. LO4 Reflect on the value gained from conducting the project and its usefulness to support sustainable organizational performance. Assignment Brief and Guidance: MSCP/2021/22/Remote working MSCP/2021/22/Remote working MSCP/2021/22/Remote working Research Theme: Remote working Research Topic: What are the key cyber security risks of working remotely e.g. employees downloading unsecure apps or sharing their work devices with family members? “The option to work remotely was already being embraced by some businesses in the pre-pandemic era. These businesses were making some progress to adapt their working practices to accommodate remote working by allowing those in certain job roles to take the opportunity to work from home, albeit a day or two a week. However, on the whole there had been a reluctance to have staff working remotely and this has largely centred around productivity concerns, security implications and technology issues. The global pandemic however necessitated and accelerated the move to remote working. The vast majority of businesses have now shifted some or all of their operations online, and almost all of their staff are working from home. The enabling force behind this necessary shift has been the different technologies and platforms that facilitate workers to achieve business goals remotely. This sudden shift to remote working took place within weeks and months and has not been without issues. Several surveys conducted during this period cited business leaders complaining about how technology problems have impacted their business and employees while working remotely. The biggest issues remote workers face are being frequently disconnected from corporate networks, slow file downloads, poor quality of video meetings and long response times when loading apps. As a result, building secure, effective and integrated technology capability, to continue this flexibility in the workforce, has now become a priority for all organisations”. (Pearson, 2020) You are expected to carry out a small-scale research in order to explore the cyber security risks of working remotely due to the pandemic, from the standpoint of a computing professional. The research that you carry out can be based on an organization that you have access to gather sufficient information to investigate the cyber security risks of remote working. The report should include, MSCP/2021/22/Remote working A comprehensive project management plan Evaluation of data collection methods and data analysis tools and/or techniques should be provided Appropriate recommendations should be provided Reflect on the value gained from conducting the project and its usefulness to support sustainable organizational performance TASK – 01 o Define the scope of the project and devise aims and objectives of the project that you are going to carry out. You also should include a brief introduction to the selected company, remote working process and technologies used, explanation to the project and other relevant information about the research. 1.2 Produce a comprehensive project plan including the following. Cost, scope, time, quality, communication, risk, and resources management plan Comprehensive Work Breakdown Structure (WBS) with clearly defined activities and milestones Gannt chart to illustrate project schedule with realistic time allocated for each activity and clearly defined deadlines for milestones. TASK – 02 Carry out a research to investigate the cyber security risks of remote working by applying appropriate qualitative and quantitative research methodologies and critically evaluate the reliability, accuracy and the appropriateness of the research methods applied. Your answer also should include a critical evaluation of the project management process and a justification to the selected research methodologies. TASK – 03 o Analyze research data collected to support your research project using appropriate tools, techniques and critically evaluate how selected tools, techniques uphold authenticity and the accuracy of the data collected. o Draw valid conclusions and recommendations from the research data analysed and communicate your recommendations to the top management of the organization through an action plan. The action plan should include a justification to the recommendations suggested. MSCP/2021/22/Remote working TASK – 04 4.1. Reflect on the objectives of the cyber security risks project and your own learning experience gained through following a quality research and the project management process. Critically evaluate the ways in which the research project carried out supports the organization to sustain its performance/ security in a remote working environment and how the project supported you to improve your own learning and performance. Acknowledgment Firstly, I would like to thank my parents and my friends for helping me throughout this assignment. And I’m also so grateful to my Lecturer at Esoft Computer Studies (Pvt.) Ltd, Kandy, and Mr.Anuradha for giving me the proper guidance and help to do this assignment without any hassle. It was very interesting to learn about managing successful computing project, as I have not had any previous knowledge about it. I thank Esoft Computer studies (Pvt.) Ltd for giving me a wonderful opportunity to do this assignment. MSCP/2021/22/Remote working TASK – 01 Define the scope of the project and devise aims and objectives of the project that you are going to carry out. You also should include a brief introduction to the selected company, remote working process and MSCP/2021/22/Remote working technologies used, explanation to the project and other relevant information about the research. Introduction The pandemic sweeping the world, COVID-19, has rendered a large proportion of the workforce unable to commute to work, as to mitigate the spread of the virus. This has resulted in both employers and employees seeking alternative work arrangements. Due to the pandemic, most if not all workers experienced work from home (WFH). Hence WFH has become a policy priority for most governments. In doing so, the policies must be made keeping in mind the practicality for both employers and employees. A critical insight and related recommendations have been developed for future policy decisions. It will also critically investigate if this work arrangement will remain as a transitory element responding to the exceptional circumstances, or whether it could be a permanent arrangement. Definition of Project The term ‘project’ may be defined as a complex set of economic activities in which scarce resources are committed in expectation of benefits that exceed the costs of resources consumed. It refers to an investment activity in which resources are committed within a given time framework, to create assets over an extended time in expectations of benefits which exceeds the committed resources. Thus, Projects require resources. They are also expected to derive benefits. Projects are said to be desirable if their benefits are greater than the costs incurred on them. A project can also be referred to as a non-repetitive activity. A project is viewed as a conversion process. This implies that a project involves a transformation of some form of inputs Into an output. (managementguide, 2022) (Dreamstime, n.d.) MSCP/2021/22/Remote working Basic characteristics of Projects Projects could be small or large. However, regardless of the size of a project, projects have Common characteristics. Some of these characteristics are: A project has a unique purpose. Every project should have a well-defined objective. For example, many people hire Firms to design and build a new house, but each house, like each person, is unique. A project is temporary. A project has a definite beginning and a definite end. For a home construction project, Owners usually have a date in mind when they’d like to move into their new homes. A project is developed using progressive elaboration or in an iterative fashion. Projects are often defined broadly when they begin, and as time passes, the specific Details of the project become clearer. A project requires resources, often from various areas. Resources include people, hardware, software, or other assets. Many different types of people, skill sets, and resources are needed to build a home. A project should have a primary customer or sponsor. Most projects have many interested parties or stakeholders, but someone must take the primary role of sponsorship. The project sponsor usually provides the direction and funding for the project. Have definite location and target group (beneficiaries) A project involves uncertainty. Because every project is unique, it is sometimes difficult to define the project’s objectives clearly, estimate exactly how long it will take To complete, or determine how much it will cost. External factors also cause uncertainty, such as a supplier going out of business or a project team member needing unplanned time off SWOT analysis for this project MSCP/2021/22/Remote working (https://medium.com/thrive-global/how-to-complete-a-personal-swot-analysis-2f8769aebd5e) S.W.O.T. Strengths, Weaknesses, Opportunities and Threats. SWOT analysis is a systematic list of your business strengths, weaknesses, opportunities and threats. Weaknesses and weaknesses are within us company (think: reputation, patents, location). You can change them over time, but not without a bit of work. There are opportunities and threats foreign (think: suppliers, competitors, prices) - they are in the market, whether you like it or not. You cannot change them. The project had strengths and weaknesses, as well as opportunities and threats. Before everything, Assisted power, sufficient human resources to successfully complete the task trained, supporting stakeholders and company partners in the project. Team members, good integration of project team person resources as well an experienced project manager. Like this weakness, they also affected our project. Lack of communication of team members, insufficient budget to complete the project, and no enough company staff bars. Opportunities are a positive response from donors. Support, political will and incentives to project team member’s communities, companies and government borders are supported in our project go successfully. And threats of lack of access to target groups, locations and time interval. They are involved in our project. MSCP/2021/22/Remote working Company Description About Us We are a business-consulting firm based in Colombo, Sri Lanka that provides innovative solutions to all your business needs. Our team comprise of MBA graduates from world's leading universities and CA/FCMA/ACMA/CGMA members with more than 15 years’ experience in Banking, Finance, Marketing, International Business and Management. Our mission We are passionate to provide innovative business solutions to our clients with competitive rates with the information that we gathered through extensive research from reliable sources & technical expertise of our consultants while maintaining high quality technical standards & best ethical practices and providing good job satisfaction to our team members with a fair return on investment to our shareholders. Our vision To become a leading total business solutions provider in the region Our services Investment consulting We will be there for you from thought to finish in turnkey investment projects in any industry in the world. Our services includes Preliminary market research reports Initial project feasibility study reports MSCP/2021/22/Remote working Marketing Plans Financial forecasting and Investment project appraisals Assistance in acquiring private /government land & buildings with necessary approvals from government agencies Introduction to development and commercial banks for long term project loans Corporate Planning We undertake to prepare corporate and strategic plans for businesses in order to maximize the opportunities in the market while utilizing their internal strengths and overcoming the internal weaknesses while defending the strategic business unit to the threats from the external environment. A proper corporate plan will highlight the answers to the following questions of any business unit. 1. Where are we now? 2. Where do we want to be? 3. How can we get there? Aims and objectives of the project (jtconnect.org, n.d.) Aims are a general statement used to describe the final hope of the 'goal' of a researcher or researcher who wants to achieve the end of a project. It basically describes what will be achieved in the long run. It should be MSCP/2021/22/Remote working based on broad terms and a desire for prominence but not beyond what is possible. Aim of the project is to carry out a small-scale research in order to explore the cyber security risks of working remotely due to the pandemic, from the standpoint of a computing professional. Objective Objectives are a specific statement describing the course of actions an investigator needs to take to achieve aims. In objective statement, you are trying to make your project more feasible and tangible, something that can be touchable in the reality. Once you've defined your goals, consider if each one is possible and if the number of goals is realistic (as a guide, there should be three to five goals derived from the end). Objects in small scale research 1. Collect information about sentroconsulting Srilanka. 2. Arrange interview date and location to collect information 3. Get a summary of receiving responses and interview analysis. 4. Arrange a meeting, submit the research documentation, and present it on group meeting. 5. While conducting the group meeting, prepare schedules like Gantt chart and Milestone and Payment chart. 6. After the group meeting, arrange whole decisions about restructuring Small scale research project plan as a document. 7. Submit the plan report through email and make an official visit to deliver the plan report for their clarification. MSCP/2021/22/Remote working The purpose and objective of the investigation must be SMART (clicdata, n.d.) Specific Be clear about what you are going to do. Measurability What evidence will you have that you have achieved your goal? Achievable Do not try too hard. A less ambitious but achieved goal is better than an overly ambitious one that cannot be achieved. Realistic Do you have the necessary resources (time, money, skills, etc.) to achieve the goal? Time Limit Determine when each stage should be completed. Do you have unforeseen delays in your schedule? Our goal and objectives should define our research project and answer our research questions. MSCP/2021/22/Remote working Project management plan A project management plan is an approved official document that defines how the project is executed, monitored and controlled. This may be a summary or a detailed document and may include references, branch management plans and other planning documents. This document is used to define the approach taken by the project team to provide the extent of planned project management. The project manager creates the project management plan following inputs from the project team and the key stakeholders. (pmi.org, n.d.) (padakuu, n.d.) Project lifecycle 1. Project identification This stage is called pre-feasibility studies. In this stage, projects that can contribute toward achieving the specified objective are identified. Project ideas may come from: New experiments from previous project failures New experiments from expansion External threats Opportunities Other sources MSCP/2021/22/Remote working 2. Project Preparation Once the project is approved to move forward based on your business case, statement of work, or project initiation document, you move into the planning phase. 3. Project appraisal 4. Project implementation 5. Project evolution Benefits of project Management The main advantages of project management is that it help you to manage your projects effectively, enabling to resolve problem more quickly. following can help you; Improve your chances of achieving the desired result. Gain a fresh perspective on your project, and how it fits with your business strategy. Priorities your business' resources and ensure their efficient use. Set the scope, schedule and budget accurately from the start. Stay on schedule and keep costs and resources to budget. Improve productivity and quality of work. Encourage consistent communications amongst staff, suppliers and clients. Satisfy the various needs of the project's stakeholders. Mitigate risks of a project failing. MSCP/2021/22/Remote working (rindle, n.d.) 1.2 Produce a comprehensive project plan including the following. Cost, scope, time, quality, communication, risk, and resources management plan Comprehensive Work Breakdown Structure (WBS) with clearly defined activities and milestones Gannt chart to illustrate project schedule with realistic time allocated for each activity and clearly defined deadlines for milestones. PROJECT CHARTER FOR SENTRO CONSULTATION (PRIVATE) LIMITED GENERAL PROJECT INFORMATION PROJECT NAME PROJECT MANAGER Small scale research explore the cyber security risks of working remotely due to the pandemic EMAIL Ms. R.G.Anjali Wasana Rajapaksha PHONE info@sentroconsulting.lk GREEN BELTS ASSIGNED Mr.Nadun chanaka BLACK BELTS ASSIGNED Mr.Dushiyanthan PROJECT SPONSOR Mr. Samantha Weerasinghe, ORGANIZATIONAL UNIT +94112 698635 Business Solution EXPECTED START DATE EXPECTED COMPLETION DATE 03/25/2022` 07/26/2022 EXPECTED SAVINGS ESTIMATED COSTS Rs.237,750 Rs.184,900 PROJECT OVERVIEW PURPOSE OF PROJECT Explore the cyber security risks of working remotely for sentroconsulting. CONSTRAINTS MSCP/2021/22/Remote working Time constraints. The projects since the timeframe was given is only four months Cost constraints. The budget has been used in the first two months. Thus, there is limited cost left for the recovery effort and avoid any more wastage Employee working experiences and skills constraints. Maybe need train the employees on network and security to improve their technical skills as they lack of experiences and skills TENTATIVE SCHEDULE KEY MILESTONE START FINISH Project conception and initiation 27/03/2022 25/04/2022 Project Definition and planning 26/04/2022 16/05/2022 Project Launch and Execution 17/05/2022 16/06/2022 Project performance and monitoring 17/07/2022 26/07/2022 Roles and Responsibility’s Name Roles Responsibility Ms. R.G.Anjali Wasana Rajapaksha Project Manager Prepare project management plan Prepare project management plan. Define project scope. Planning the progress of project. Deliverable work to team member. Approve or disapprove the project expenses. Report the project statue to the stakeholder Evaluate team member’s performance. . Mr. Samantha Weerasinghe, Project Sponsor MSCP/2021/22/Remote working Resolve conflict and remove obstacles and ensure Ensuring the project is under control and Ms.Dinushka Weerakoon Communication Manage Ms.Hansi Pannaseeha Coordinator risks are managed. Confirming that the business requirements are valid and correctly prioritized. Report and inform stakeholders on the project progress Carry out and manage daily internal and external communication activities Schedule interviews and media events. Schedule meetings and maintain information on the status of changes requests. Assist in gathering project plans and monitor work efforts Mr.Reiva Kehelgamuwa It Department Mr.Geeshapathi Prasanna Support the team if they face any obstacles Ensure that the final system meets the requirements of the end users and free from any errors Ensure that the modules and components within the system meet the standards BENEFITS AND CUSTOMERS PROCESS Company OWNER Employs EXPECTED BENEFITS A retention/destruction schedule can ensure your business information stays safe Crime prevention Determines the need for Change in Policies and Standards Protect IT System & Infrastructure against Attacks Evaluates the Security of Data Flow Effectiveness of Security Training & Awareness Find Gaps Or Non-Compliance In Current Security Systems/Practices Gain Access to Tools and Training to Help Close Discovered Gaps PREPARED BY TITLE Ms. R.G.Anjali Wasana Rajapaksha MSCP/2021/22/Remote working Project Manager DATE 6/25/2022 Work Breakdown Structure Abstract Work Breakdown Structure (WBS) is a phase breakdown that focuses on the delivery of work to be done by the project team to achieve the project objectives and to create the required delivery. WBS is the foundation of project planning, implementation, control, monitoring, and reporting. All work contained within the WBS must be identified, measured, organized, and budgeted for. Company owners and project managers use the Work Breakdown Structure (WBS) to make complex projects more manageable. WBS is designed to help divide a project into manageable and manageable components. This article will provide you with a few examples of job classification structure and will give you a summary of how WBS can help with project planning. (Alutbi, 2020) What is work Breakdown Structure? Work Breakdown Structure (WBS) is a phase breakdown based on the delivery of work done by the project team to achieve the project objectives and to create the required delivery. WBS is the foundation of project planning, implementation, control, monitoring, and reporting. All work contained within the WBS must be identified, measured, organized, and budgeted for. Company owners and project managers use the Work Breakdown Structure (WBS) to make complex projects more manageable. WBS is designed to help divide a project into manageable and manageable components. This article will provide you with a few examples of job classification structure and will give you an overview of how WBS can help with project planning. (Alutbi, 2020) Work breakdown Structure for sentroconsulting PVT. The Work Breakdown Structure (WBS) is developed to establish a MSCP/2021/22/Remote working common understanding of project scope. It is a hierarchical description of the work that must be done to complete the deliverables of a project. Each descending level in the WBS represents an increasingly detailed description of the project deliverables. Work Breakdown Structure (WBS) has been developed to achieve a common understanding of project scope. It is a description of the phase of work that needs to be done to complete the project delivery. Each level that MSCP/2021/22/Remote working descends on the WBS represents a more detailed description of project delivery. Benefits of work breakdown Structure defines and organizes the work required facilitates the quick development of a schedule by allocating effort estimates to specific sections of the WBS provides a visual of entire scope can be used to identify communication points provides a visual of impacts when deliverables are falling behind can be used to show and assign accountabilities and responsibilities can show control points and milestones provides a way to estimates project costs it can assist with resource allocation MSCP/2021/22/Remote working (Develop by author) Gannt chart The Gantt chart, commonly used in project management, is one of the most popular and useful ways to display tasks (activities or events) that are displayed over time. To the left of the chart is a list of tasks and at the top is a timeline. The start and end dates of end items and overview items in a project are illustrated with Gantt diagrams. The job breakdown structure of the project consists of terminal elements and description elements. Step that are followed when progressing a Gannt chart 1. Identify Essential Tasks 2. Identify Task Relationships 3. Input Activities into Software 4. Chart Progress Advantages of Gantt charts Improved communication and team cohesion Avoid resource overload See overlapping activities and task dependencies Measure the progress of projects time management MSCP/2021/22/Remote working MSCP/2021/22/Remote working (Develop by author) The project plan for the sentroconsulting has started on 03/25/2022 (Monday) and ends on 07/26/2022 (Thursday). All the tasks and the break downed tasks has also been given for the preparation of Gantt Chart. Duration needed for each and every task and the sub tasks are clearly given in the Gantt Chart. This is the finalized Gantt chart where this will be followed for the execution process of the sentroconsulting. TASK – 02 Research Design Abstract Research is valid if the conclusion is accurate or true and the research design is the conceptual framework in which the research is conducted. His research expert, who prepares an application, incorporates a framework for data collection, measurement and analysis. The research design is not associated with any particular data collection method or any specific type of data. When designing research it is important that we identify the type of evidence needed to answer the research question correctly. This chapter outlines the purpose, significance and types of research structure. MSCP/2021/22/Remote working Research Design (htt3) By the term ‘research’, we can understand that a collection of data that encompasses sensitive information by considering research methods. In other words, it is the compilation of information or data that is explored by hypothesis and therefore results in a more concise and systematic finding. Research can be done both academically and scientifically as well. Let us first understand what the research design means. (leverageedu, 2021). The design of the study helps the researcher to pursue his or her journey to an unfamiliar but organized place next to them. Just as an engineer or an architect prepares a building, so the researcher selects the design in a variety of ways to determine what kind of research is to be done. Elements of Research Design MSCP/2021/22/Remote working The method applied for analyzing collected details Type of research methodology Accurate purpose statement Probable objections for research The research methodologies can be categorized into many types but there are two main Types that has been used often. 1. Qualitative Research 2. .Quantitative Research Qualitative Research Introduction This paper provides information on high-level research and highlights the benefits of a state-of-the-art research methodology for radiation science. Advanced research methods can be used independently, or to improve measurement methods. We draw attention to the process of producing high-quality research questionnaire. What is qualitative research? (penmypaper, n.d.) Quality research is defined as a market-based approach to data acquisition through open communication and discussion. This approach is not only "what" people think but also "why" they think so. For example, consider a MSCP/2021/22/Remote working store that wants to improve its support. The formal observation concludes that the number of men visiting the store is enormous. Another good way to determine why women would not visit the store is to do a thorough interview of potential customers in the category. Quality research is based on the fields of social sciences such as psychology, social sciences, and anthropology. Therefore, high-level research methods allow for in-depth and continuous research and questioning of respondents based on their responses, while the interviewer / researcher also tries to understand their motives and feelings. Understanding how your audience makes decisions can help to draw conclusions from market research. (questionpro, n.d.) There are different types of qualitative research methods like, One on One Interview Case study Research Content Analysis Ethnographic Research Focus Groups One on One Interview (htt4) A common quality research tool, one-on-one interviews are exactly the same as how they sound - in-depth individual interviews between each respondent and a professional qualitative researcher. This method helps to understand and can capture more information. They are also flexible and allow for more organized, less MSCP/2021/22/Remote working organized and less formal methods. When to use an interview approach; Sensitive topic Potential for bias Confidential information Busy target audience Detailed understanding Case by case study A case study is an in-depth study of an individual, group, or event. In exemplary research, almost all aspects of health and study history are analyzed to identify patterns and causes of behavior. Examples of studies can be used in a variety of fields including psychology, medicine, education, anthropology, political science, and social work. The hope is that the lessons learned from studying one story can be passed on to many others. Unfortunately, case studies are often very speculative and sometimes difficult to produce results for most people. Benefits of case by case study Allow researchers to collect a great deal of information Give researchers the chance to collect information on rare or unusual case Allows researchers to develop hypotheses that can be explored in experimental reteach. Disadvantages of case by case study Cannot necessarily be generalized to the larger population Cannot demonstrate cause and effect May not be scientifically rigorous Can lead to bias MSCP/2021/22/Remote working Focus group A focus group is a research methodology that involves a small group of people to answer questions in a limited space. The group is selected based on previously defined traits, and questions are designed to determine the topic of interest. Focus groups are a form of quality research. A look at group flexibility, their responses to focus group questions, and even their body language can guide future research on consumer decisions, products and services, or controversial topics. They can be used in three ways in the research design: Standalone - where focus groups are one way to collect data and act as the main source of data Add-on - used to improve other data collection methods. This will often be the prelude to the plural phase determining the issues to be addressed in a formal interview and providing details on the issues or opportunities being explored. As part of a multi-method design - where studies use multiple data collection sources and there is no one method that determines the use of others. Advantages of focus group Easily measure customer reaction Focus group is a useful method that can be used to measure customer response to your new product or company strategy. Focus groups often provide quick ideas for the development of specific products or concepts. They also help identify the end user's product needs as well as other unmet needs for the company and its competitors. Time saving opportunity The concise nature of the focus group makes it possible for your business to solicit a number of ideas and feedback on many aspects of the product without the in-depth process of requesting each interview. Disadvantages of focus groups More Expensive to Execute Than Surveys Focus groups are more expensive than market assessments because participants often expect to receive compensation for participating in the discussion. Therefore, you have to spend money and additionally pay researchers and participants to prepare a set of questions. Participants Can’t Voice Their Opinion Freely Focus groups always “feel” that you are under the microscope. People with unusual personality traits MSCP/2021/22/Remote working have difficulty expressing themselves freely. Therefore, the level of knowledge obtained is low and the investment is wasted. Hard to Get Honest Opinions For Sensitive Topics Focus groups are not successful on sensitive issues as participants are reluctant to answer such questions. Therefore, it is difficult to get them to express themselves sincerely. Otherwise, the chairperson may have doubts about the views of the participants, as the information they use is difficult to access. Results Are Biased Focus groups have become a common market research tool because they are biased and often provide encouraging feedback. Chairmen may deliberately or unintentionally change the views of participants, as they may not want to disappoint the chairperson. For this reason, focused surveys may give false information about your product or service. Might Not Be a True Representation of Your Target Group Focus groups include an example of an audience that is not an accurate representation of the community. The views expressed by the participants may not represent the views of the public. Therefore, more research is often needed to evaluate the results of focus groups. Quantitative research methodology (https://resources.pollfish.com/survey-guides/the-complete-guide-to-quantitative-market-research/) MSCP/2021/22/Remote working Abstract The aim of this study is to explicate the quantitative methodology. The study established that quantitative research deals with quantifying and analyzing variables in order to get results. It involves the utilization and analysis of numerical data using specific statistical techniques to answer questions like who, how much, what, where, when, how many, and how. It also describes the methods of explaining an issue or phenomenon through gathering data in numerical form. The study further reveals that quantitative methods can be categorized into; survey research, correlational research, experimental research and causal-comparative research. What is quantitative research? Many studies are defined as the systematic investigation of events by collecting data that can and do apply mathematical, mathematical or statistical strategies. A lot of research is from existing clients and online surveys, online surveys, questions, etc., which can use sample methods. It collects information from senders about results that can be expressed numerically. Once you understand these numbers correctly, you can predict the future of the product or service and make adjustments accordingly. An example of a dosing study is a study to determine the time it takes for a doctor to attend to a patient when a patient enters the hospital. The patient satisfaction test model can be checked to ask questions such as how long it takes the doctor to see the patient, how often the patient is admitted to the hospital, and so on. (questionpro, n.d.). So, in this manner these are the following methods used in the approach of Quantitative Research. 1. Close - ended questions 2. .Online surveys 3. Questionnaires 4. Polls Quantitative research characteristics Built-in tools Structured tools such as surveys, surveys or surveys are used to collect quantitative data. Using these structured methods helps gather in-depth data that can be considered in respondents. Sample size Limited research is conducted on a significant sample representative of the target market. Appropriate sampling methods should be used while sampling to strengthen the research purpose. Closed questions Closed questions are made for research purposes. These questions help in collecting quantitative data MSCP/2021/22/Remote working and are therefore commonly used in quantitative research. Previous studies Various items related to the research topic are examined before feedback is collected from the participants. Quantity data Usually, quantity data is represented by tables, charts, graphs, or any other non-numerical form. This makes it easier to understand the data collected and verify the authenticity of the market research. Generalization of results: The results of this research approach can be communicated to all people for appropriate developmental measures. Advantages of Quantitative Research It can be tested and tested. Most studies require careful test design and the ability for anyone to repeat both tests and results. This makes the data you collect more reliable and less controversial. Direct analysis When you collect quantity data, the type of results will tell you which math tests to use. As a result, interpreting your data and presenting the findings is simpler and less prone to errors and abuses. Fame Research involving complex statistics and data analysis is considered important and impressive because many people do not understand the relevant statistics. Many studies are associated with technological advances such as computer modeling, stock selection, portfolio testing, and other data-driven business decisions. The relationship of reputation with quantification and quantification research can best reflect your small business. Disadvantages of Quantitative Research Don't focus on numbers. Many studies may be limited in seeking practical, mathematical relationships that can lead researchers to ignore themes and broader relationships. By focusing solely on numbers, you risk losing great information or great images that could benefit your business. The challenge of constructing a research model. When doing quantitative research, you need to carefully develop the hypothesis and create a model for data collection and analysis. Any errors in your settings, researcher's bias or usage errors may invalidate MSCP/2021/22/Remote working all your results. Even forming a hypothesis may be a good fit for you, especially if you already have a specific question that you know you want to prove or disprove. It can be misleading. Many people think that quantitative research is more reliable or scientific than experimental, quality research because it is based on mathematics. However, both types of research can be independent and misleading. The views and biases of the researcher can affect the way the masses gather information. In fact, the effect of this bias is more pronounced in the quantitative research system than in the quality research situation. Cannot determine if answers are true or not. Researchers using the measurement method should work with the assumption that all answers given to them through research, measurement and evaluation are based on reality. This way there is no face-toface contact, which means that interviewers or researchers cannot measure the validity or authenticity of each outcome. Quantitative Research Methods: Types with Examples Quantitative researchers will seek to maintain a level of control of the different variables that may influence the relationship between events and recruit respondents randomly. Quantitative data is often gathered through; Questionnaires Surveys Biophysical measurements MSCP/2021/22/Remote working Questionnaires A survey is a research tool that includes a set of questions or other types of notifications aimed at gathering information from the respondent. A research questionnaire is usually a combination of closed-ended and openended questions. Open, long-form questions give the respondent the ability to detail their own thoughts. The research questionnaire was developed by the London Statistical Institute in 1838. Data collected from a data collection questionnaire can be both qualitative and quantitative. The survey may or may not be presented in survey form, but the survey always contains a list of questions. (questionpro, n.d.) Characteristics of a good questionnaire Uniformity Exploratory Question Sequence Why questionnaires? Economical It is an economical way of accumulating information. It is economical both for the sender and for the MSCP/2021/22/Remote working respondent in time, effort and cost. The cost of conducting the study with the help of questionnaire method is very low. Wide coverage It is probably the best method to collect information, compared to the other methods like interview or observation, when the sample population is spread over a large territory. Rapidity Replies may be received very quickly in questionnaire method. In this case there is no need to visit the respondent personally or continue the study over a long period. An Easier Method Comparability Once the data has been calculated, it can be used to compare and contrast with other studies and can be used to quantify change. This makes the monthly or annual question list very important over time. Working from home Security Questionnaire The questionnaire were divided into Work From home, Data security, password security, Email security, phone security, network security. Work From Home 1. How do you feel about working from home? 2. Have you worked from home before? 3. Have you established a good work routine? 4. Do you have a healthy work and life balance when working from home? 5. Are you less productive, equally productive, or more productive than when working in the office? 6. Do you have a suitable workspace? 7. Are you in regular contact with your team and manager? 8. Do you feel trusted to work from home? 9. Do you feel your organisation is providing the proper support? Data security 1. Does anyone else use your work computer? MSCP/2021/22/Remote working 2. Is your device configured to run automatic updates? 3. Are you using encryption, such as BitLocker, for your computer? 4. Are you using the latest version of your operating system (OS)? 5. Is your work data stored on your corporate network? Password security 1. Do you have strong password Management? 2. Are any of your passwords written on paper? 3. You have any unencrypted passwords? 4. Does your remote access tool (Take Control, VPN, and RDS) automatically lock when left open? 5. Is your device set to lock automatically in case you forget to lock it? Email Security Is your Email secure? 1. Do you send sensitive information, such as credit card details, via email? 2. Do you know how to check an email header to determine its legitimacy? 3. Do you have a spam filter and know how to train it? 4. Do you know how to securely share files with people outside your organization? 5. Do you know the common signs of a phishing scam? Phone security Is your smartphone secure? 1. Do you know the common signs of a vishing scam? 2. Do you know the common signs of a smishing scam? 3. Is your SIM card encrypted? 4. Are your location services tracking you? 5. Are you aware of caller ID spoofing? 6. Is your phone protected by a password, PIN, or fingerprint? 7. Do you use public Wi-Fi on your smartphone? Network security Is your network prepared for a malicious actor? 1. Does your network name include your street address or family name? MSCP/2021/22/Remote working 2. Do you have an active firewall built into your router? 3. Is wireless security enabled on your router? 4. Have you changed the default admin password for your router? 5. Is anyone outside your immediate family using your home Wi-Fi network? MSCP/2021/22/Remote working MSCP/2021/22/Remote working MSCP/2021/22/Remote working MSCP/2021/22/Remote working MSCP/2021/22/Remote working MSCP/2021/22/Remote working MSCP/2021/22/Remote working MSCP/2021/22/Remote working MSCP/2021/22/Remote working MSCP/2021/22/Remote working MSCP/2021/22/Remote working Scale research Range is a measure of volume where the order is, the difference between two variables is reasonable and even, and there is no zero. Measure current variables at intervals at a standard rate. The measurements used to calculate the distance between variables are very reliable. The interval scale is the third measurement scale after the standard and ordinal scale. Understanding the first two levels will help you break down the range measurements. The self-reported scale is used when the variable has no natural order or level. You can include random or non-numeric variables, but typical test examples include gender, location, political party, pets, etc. is found. First of all, we asked the employees and suppliers, for the example, here is the one of the examples, for the laborer answers for our questions Concoction Open Completed Questionnaire The Quality Assurance Questionnaire is used to extract the above information. Expected. That's why it's helpful to focus on problems and learn about them. Practical help during the Closed Value Question List The study is used to measure time statistics, results and evaluation tests. View of the bars. So taking this approach will help improve research. Mathematically, mathematics is also an important factor. TASK – 03 3.1 Explain the common data analytical techniques. Analyze the collected data using appropriate tools and techniques. Data analysis Introduction Data analysis is defined as the process of cleaning, modifying and modeling data to gain useful insights for business decisions. The purpose of data analysis is to extract useful information from data and make decisions based on data analysis. A simple example of data analysis when we make any decision in our daily life is to choose that decision and think about the last or most likely event. This is nothing more than an analysis of our MSCP/2021/22/Remote working past or future and making decisions accordingly. So we collect memories of the past or dreams of our future. So this is nothing but data analysis. Now the same thing an analyst does for business purposes is called Data Analysis. Why data Analysis? Your data is the core of your research. This is the foundation on which all work will be supported. After months of intensive research, the scientist collects a huge amount of data. This data must be properly compiled and stored in an orderly manner. This article will consider the importance of data analysis in a research paper. Data analysis is the second and most important part of the research paper. Also, the hardest step is that most researchers are not able to perform the analysis on their own. Simply put, data analysis is the division of complex research material into a basic and simple form. This helps to prove and better understand the research. Your article should not only contain research data, but also its description after a thorough analysis. (abhinash, 2012) Types of Data Analysis Techniques and Methods 1. Informed decision-making: From the perspective of management, you can benefit from analyzing your data as it helps you to make informed decisions rather than simple information. For example, you can understand where to invest your big money, explore growth opportunities, predict income, or resolve unusual situations before they become a problem. In this way, you can extract relevant information from all areas of your organization and present information to different stakeholders in a professional and collaborative way with the help of dashboard software. 2. Reduce costs: Another major benefit is cost reduction. With the help of advanced technology such as forecasting statistics, businesses can identify development opportunities, trends and patterns in their data and plan their strategies accordingly. Over time this will help you save money and resources on using the wrong strategies. Not only that, you can also predict production and supply by estimating different conditions such as sales and demand. 3. Identify customers better: Customers are undoubtedly the most important part of any business. By using statistics to get a 360 ° view of all aspects of your customers, you can understand which channels they use to contact you, their demographics, interests, habits, shopping habits and more. Over time, it will bring success to your marketing strategies, allowing you to see new trends and avoid wasting resources by targeting the wrong people or sending the wrong message. You can also track customer satisfaction by analyzing your customer reviews or performance of your customer service department. (Calzon, 2022) MSCP/2021/22/Remote working What is the data Analysis Process? (https://www.anblicks.com/blog/faqs-on-data-analytics) When it comes to data analysis, there is a procedure to follow to draw the necessary conclusions. The analysis process has 5 basic stages. We'll cover each in more detail later in the post, but to start providing the context needed to understand what's next, here's a description of the 5 essential steps for data analysis. Identify: Before you get your hands dirty with data, you need to state why you need it in the first place. Identity is a stage where you identify the questions you need to answer. For example, what is the customer's view of our product? Is there any type of packaging that is most appealing to our potential customers? Once you have identified the questions, you are ready for the next step. Gather: As the name suggests, this is the stage where you start collecting the necessary data. Here you will learn which resources to use and how to use them. Data collection can take various forms such as internal or external sources, surveys, interviews, surveys, focus groups, among others. The important point here is that the MSCP/2021/22/Remote working way you collect information will differ in terms of capacity and quality. Clean: Once you have the required data, it's time to clean it up and leave it ready for analysis. Because you collect a large amount of information in different formats, not all the data you collect will be useful because you may find yourself with duplicate or badly formatted data. To avoid this, you need to make sure you clean up any spaces, duplicate records, or formatting errors before you start working with your data. This way you avoid damaging your analysis with incorrect data. Analyze: With the help of various techniques such as statistical analysis, retransmission, emotional networks, text analysis and more, you can start analyzing and manipulating your data to draw relevant conclusions. In this section you will find trends, relationships, diversity and patterns that can help you answer the first questions that come to mind during the definition phase. Various technologies on the market assist researchers and middle-class business users in managing their data. Some include business intelligence and software recognition, predictive analytics, data mining, among others. (Calzon, 2022) Translate: Finally, you have a very important step: it's time to translate your results. This is the stage where the researcher draws lessons based on the findings. For example, here you will know whether your customers prefer red or green packaging, plastic or paper. Also in this section you can also find some limitations and work around them. (Calzon, 2022). Data Analysis Methods Collection analysis The act of collecting a set of data items in such a way that the specified features are more similar to one another (in some sense) than those in other groups - hence the term 'collection'. Since no variables are targeted during collection, the method is often used to detect hidden patterns in data. The method is also used to provide additional context for a trend or database. Let's take a look at the job. All over the world, retailers will be able to analyze each customer individually and provide the best personalized service, but let's face it, it's impossible to do this on time with a large customer base. This is where integration comes into play. By grouping customers by demographics, buying behavior, value for money, or anything else that may be relevant to your company, you will be able to quickly improve your efforts and present your customers with the best information possible. For your needs. MSCP/2021/22/Remote working Group Analysis This type of data analysis method uses historical data to evaluate and compare a fixed portion of user behavior that can be combined with others with similar characteristics. By using this approach, you can learn more about customer needs or gain a stronger understanding of the target group. Collection analysis can be really helpful for marketing analysis as it will allow you to understand the impact of your campaigns on specific customer groups. Data Mining Data mining, also known as data acquisition (KDD), is the process of extracting patterns and other important information from large data sets. Given the emergence of data storage technologies and big data growth, the adoption of data mining techniques has accelerated over the past few decades, helping companies by converting their raw data into useful information. However, despite the continued emergence of technology to process data on a large scale, leaders still face the challenges of balance and automation. MSCP/2021/22/Remote working (https://www.datapine.com/blog/wp-content/uploads/2021/03/inteligent-data-alarms-datapine.png) Text analysis Text analysis, also known in the industry as text mining, works by capturing large text datasets and is organized to make management easier. By working through this robust data purification process, you will be able to extract data that is truly relevant to your organization and use it to develop practical insights that will propel you forward. Modern tools accelerate the use of text analysis. Thanks to a combination of machine learning and smart algorithms, you can perform advanced analytical processes such as emotional analysis. This approach allows you to understand the intentions and feelings of the text and rate it based on certain factors and categories relevant to your product, for example if you are right, negative or neutral. Emotional analysis is often used to monitor product and product reputation and understand how effective your customer experience is. Check out this insightful article to learn more about the topic. Data Analyst Tools? Data analytics tools is the term used by data analysts to describe software and applications used by data analysts to develop and implement analytical processes while helping companies make better, more informed business MSCP/2021/22/Remote working decisions while reducing costs and increasing profits. Organized into software categories, with various focuses and features, and represented by each model. Business Intelligence tools BI tools are one of the most independent methods of performing data analysis. Specifically for business statistics, these tools will be useful for any data analyst who needs critical analysis, monitoring and reporting. Features such as customization, predictive analysis and advanced SQL methods make these solutions customizable easily at any level of knowledge without extensive IT interventions. By providing a few useful features, analysts can understand trends and make strategic decisions. Our article of data analysis tools would not be complete without business intelligence, and datapine is an example that satisfies most of the needs of beginners and advanced users alike. (datapine, n.d.). DATAPINE (https://www.datapine.com/images/datapine-bi-tool.png) KEY FEATURES: Visual drag-and-drop interface to build SQL queries automatically, with the option to switch to, advanced (manual) SQL mode MSCP/2021/22/Remote working Powerful predictive analytics features, interactive charts and dashboards, and automated reporting AI-powered alarms that are triggered as soon as an anomaly occurs or a goal is met. R Programming/ R-studio R Analysis is the analysis of data using R programming language, the open source language used to compute mathematical computing or graphics. This planning language is often used in statistical analysis and data mining. It can be used for analysis to identify patterns and build functional models. R not only helps organizations to analyze their data, but it can also be used to assist in the creation and development of software applications that perform statistical analysis. Through visual visualization of system development, R supports a variety of analytical modeling methods such as statistical testing, compilation, time series analysis, direct and indirect modeling, and more. The interface has four windows: text window, console window, workspace and history window, and interest tabs (help, packages, diagrams, and files). R allows for charts and graphs ready for publication as well as storage for reusable analysis of future data. MSCP/2021/22/Remote working Benefits of R Analysis Democratizing Analytics Across the Organization: R can help democratize analytics by enabling business users with interactive data visualization and reporting tools. Providing Deeper, More Accurate Insights: Today, most successful companies are data driven and therefore data analytics affects almost every area of business. Leveraging Big Data: R can help with querying big data and is used by many industry leaders to leverage big data across the business. With R analytics, organizations can surface new insights in their large data sets and make sense of their data Creating Interactive Data Visualizations: R is also helpful for data visualization and >data exploration because it supports the creation of graphs and diagrams. Python MSCP/2021/22/Remote working (https://www.datapine.com/articles/data-analyst-tools-software) Compared to other popular languages like Python, Java, the code is more accessible and the syntax is easy to learn, making this tool popular among users looking for open source solution and simple coding processes. In data analysis, Python is used to clean data, clean up, model, and create analytical algorithms based on business conditions. One of the best features of its user-friendliness: programmers do not need to remember system configurations or manage memory - Python is considered a high-quality language that is not under the computer's native processor. (Calzon, 2022) Another remarkable feature of Python is its versatility. Users can apply the code to several operating systems without making any changes, so there is no need to write completely new code. This makes Python a very portable language because programmers can use it on Windows and macOS. The wide range of modules, packages and libraries make Python a respected and useful language in all companies, with companies such as Spotify, Netflix, and Dropbox and Reedit the most popular use of this language in their operations. With features like text mining and machine learning, Python has become a respected authority for advanced analytics processes. MSCP/2021/22/Remote working SQL consoles Our list of data analysis tools wouldn't be complete without the SQL console. Actually SQL is a programming language used to manage/query data stored on related websites, especially those effective in managing organized data as a tool for analytics websites. It is very popular in the data science community and is one of the analytical tools used in various business and data situations. The reason is simple: SQL is a crucial part of business success, as most data is stored in a communications database and you need to access and unlock its value, and by reading it, analysts can give their skills a competitive advantage. . There are various (SQL-based) management systems such as MySQL, PostgreSQL, MS SQL and Oracle, and these data analyst tools can be very useful for any critical analyst to study. Here we will focus on the most popular MySQL Workbench. Why Is data integrity importance? Your employees need regular access to quality data. Data integrity is important as it enables and protects your data from being searched and tracked from its original source. Data performance and stability increase when you provide active data accuracy and data protection. It is important to maintain data integrity and ensure data completeness. Corrupted data won't work for most companies. This includes big data. Organizations collect more and more data and it has become increasingly important to protect and maintain the integrity of that data. Without integrity and accuracy, your data is useless. If you don't, your data may be at risk. In this case, more complex and expensive data analysis methods may be needed to track errors and retrieve data. Data integrity can be compromised in many different ways. Data is usually digital and transmitted to many locations online. This results in an increase in the amount and variety of data collected. ` MSCP/2021/22/Remote working For example, data should remain unchanged when transferred or repeated between updates. As a result, data integrity and data integration can be closely linked. Data is uninterrupted, only stored once on your systems. Many things can change your data from the first day it is created on your system and throughout its lifecycle. It can be transferred to other systems, modified and updated many times. Organizations often use several management systems (ERP, CRM, SCM, etc.). Factors such as human interaction, data transfer, viral software or compromised computer software can compromise the integrity of your data. This is where maintaining the integrity of data can be a daunting task. In my job I often provide solutions for data integration in organizations. I also frequently discuss data quality and data integrity with various companies in good detail. Many of my customers know that improving the integrity of their data is important. Data integrity should be high in your mind at all stages of your data cycle. From the design and implementation phase of your systems. Data integrity also ensures availability and search, monitoring and communication. Maintaining the accuracy and accuracy of data also improves the stability and performance of your systems. Questionnaire Analyzing Accuracy The following survey response statistics are displayed in the control panel at the top of the screen. a page is displayed, so a list of received responses appears in the grid below the statistics. Filter responses and vies response details In Google Spreadsheets, open the spreadsheet you want to create a filter view. Click the cell that contains the data. Select Data, then Filter View, and Create New Filter View. Click the drop-down list in the column header and select the data you want to filter. The filter view is still active as changes are made. (Optional) Enter your text into the search field to search for data. After selecting the data to filter, click OK. Repeat steps 4 to 6 for each column you want to filter. Enter the name of the filter view box in the Name box. If you do not enter a name, The filter view is saved as a filter number where the number corresponds to the number. Filters you create. MSCP/2021/22/Remote working The saved filter view is now displayed in Data View and then View Filter. filter The types are highlighted in dark gray in the column and row headings. Submit survey results To send data: Sign in to Google Surveys. Click on the survey whose data you want. Click Download on the search results page or survey. Excel file is saved in default output folder Describe appropriate recommendations as a result of research and data analysis to draw valid and meaningful conclusions. Introduction In order to determine the accuracy of the data collected during the study, it is necessary to analyze the data. The best outcome will be to meet the customer's needs and clear their doubts about cyber security. Data analysis should be performed on each component as a project goal to obtain the most accurate result. Here, an online Questionnaire was used as a research method to collect information. About the Internet of research materials. Selection of methods available from sentroconsulting Sri Lanka handles and rods. Study distributed to colleagues at sentroconsulting Sri Lanka Cyber security Risk work from home. From there, Eighty responses were received and an interview was conducted. Between the administrator Experts understand a lot in depth. These answers help gather information about Cyber security Risk work from home used in data centers. And command What is important will be determined by analysis. This will be part of the restructuring session, which means which component needs the most consideration. Many The requested part should be the part that can be used daily or used by most people. Many practical risk analysis methods are briefly discussed above. Google form and the Risk Register methods used to analyze the information collected. Google forms analyzes survey responses. And the risk record analyze the negotiation method. MSCP/2021/22/Remote working Responded Questionnaire I have been gathering data about the level of satisfaction people have while working at home. So far I have gathered reactions from a diverse sample of 50 people. In the data set, I have 50% male and 50% female respondents. People come from various functions, and 15% are top management, 22% senior leaders, 19% middle managers, 10% supervisors, and 32% individual contributors. The data comes from sentroconsulting Employs, Here are a few observations from my initial data. The majority of respondents like feel less stressed and anxious while working from home. When asked if they enjoyed working from home, 26% agreed or strongly agreed. 46% said they feel less stressed working from home, and 28% thought that they were more productive working from home. The initial research on working from home done prior to the Pandemic found that people feel less stressed working from home. There have been concerns from some that productivity in the Pandemic may decline. Nicholas Bloom, a Stanford Economist, said in an interview, "The global work-from-home movement intended to maintain output and efficiency during the COVID-19 Pandemic could generate a worldwide productivity slump and threaten MSCP/2021/22/Remote working economic growth for many years.” However, it is clear that many organizations are big hurry to return to the office. The majority of Employs are already familiar to working from home concept. When asked if they already worked from home, 52% agreed or strongly agreed. 48% said they not worked from home. Work from home (WFH) increased sharply and persistently after the outbreak, and much more so among some workers than others. Using theory and evidence, we argue that the observed heterogeneity in WFH transitions is consistent with potentially more permanent changes to work arrangements in some occupations Consistent with increased WFH adoption, many more – especially higher-educated – workers expect to WFH in the future. MSCP/2021/22/Remote working A good work routine helps you eliminate distractions and accomplish more while maintaining efficiency. Top performers can do an impressive amount of work and achieve incredible results by structuring their schedules strategically. By practicing habits that help maintain work efficiency, these top performers also maintain a healthy balance while maintaining their leisure and family time.57.1% of Employs Create an effective work routine and 42.9% don’t. MSCP/2021/22/Remote working One of the great benefits of remote work is great flexibility. With the ability to work remotely, employees can use this opportunity to work from home and create a flexible plan to take care of their work and responsibilities. But with this flexibility sometimes comes additional pressure. If you work odd hours, or if you do not meet face-to-face daily, you may feel pressured to spend more time online and work than you would in an office. And with the exception of coworkers nearby to remind you to take a break, have lunch, and leave the office all day, distant workers may find themselves working overtime, and not having as much free time as they could otherwise.48.4% of people they have a healthy work and life balance when working from home and 37.7% don’t have a healthy life balance. 13% of Employs they don’t have an idea about that. MSCP/2021/22/Remote working The graph above shows the results of 50 people in our study. Each person was asked if they "Are you less productive, equally productive, or more productive that when working in the office?” Note that those who strongly disagreed— (e.g., their supervisor did not support them — responded more productive to only 42% of the interview items. Those who strongly disagree responded negative to 48% of the items.10% of them they don’t have any significant changes. MSCP/2021/22/Remote working Home working enables more agility and flexibility in working arrangements. With employees no longer tied to an office, they may be better placed and more willing to work flexible hours such as earlier or later in the day or even at weekends. This may help you meet certain business needs eg: if you are trading with customers residing in a different time zone. According to the result 52% of them have a suitable workspace and 48% of them don’t. MSCP/2021/22/Remote working Address it diplomatically. Open communication is key in any relationship, and the employee-boss relationship is no different. As you have concerns, try to express them calmly. Signs of a bad manager are undesirable leadership traits that cause friction between supervisors and employees. Most of the Workers they don’t have a strong relationship to team and team managers. In the best of times, working from home is associated with all sorts of positive emotions for remote workers— freedom, autonomy, trust, and happiness, to name just a few. Indeed, remote work is often considered the “holy grail” of flexible work options, with benefits galore that far outweigh any potential downsides. Acceding to the questionnaire replay that server evidence, majority people they trusted to work from home. MSCP/2021/22/Remote working Normal work is becoming more common. To ensure that their employees are organized for success, organizations need to know how to support them while working from home. It is therefore important to create a supportive environment for your home-based employees, as they do not have the team colleagues they had before and can be easily separated from the rest of the company.52% of Employs they agree for the organization is providing the proper support. However, it also has downsides. More than half of employees say they've become no proper support from organization working from home during the pandemic. MSCP/2021/22/Remote working Nowadays, many companies provide employees with a wide range of devices from smartphones to laptops and even tablets to complete their work. The company's IT departments often set up your login information, a selection of important applications and all the tools that allow you to do your job successfully. Somewhere during the fifth day at work is usually when we start updating the device at will: change the screen saver into a pet, log in to Spotify account to list the complete "late app" playlist, check out Facebook's daily news and so on. However, cybersecurity experts say that weaving your personal and work life together using a portable computer is a risky business - both for you and for the company. According to the survey more than 50 IT professionals who revealed that about two-thirds of IT professionals believe that the latest breach of profile was due to staff negligence. MSCP/2021/22/Remote working Specifies whether this computer will receive security updates and other important downloads through the Windows automatic updating service. Run automatic updates good because most of the time, they don’t want to. Also, humans can be very forgetful and if you’re relying on them to remember to perform an update there’s a good chance they won’t happen. But most of Employs they not allow to update device automatically. Software is vulnerable to hackers and cyber criminals as updates keep you safe from exploitable holes into your organization. Having reliable security in place is especially important as the release of software update notes often reveal the patched-up exploitable entry points to the public .More than 20% of Employs they don’t know about their update status. MSCP/2021/22/Remote working BitLocker Drive Encryption is an important security feature for Windows computers. It provides security for your computer operating system and the data stored on it, ensuring that data remains encrypted even if the computer is interrupted when the operating system is inactive.61.1% of workers using Bit locker, This helps protect against "offline attacks," those made by disabling or circumventing the installed operating system, or made by physically removing the hard drive to attack the data separately. MSCP/2021/22/Remote working Employers can see your online activity on your phone. Especially if it is a company phone, and you are connected to your company network. The company phone uses the data and voice time the company is paying for to monitor how it is used. A strong password is essential when it comes to your online security, and you need a different one for each social network, bank accounts, live streaming services and apps. But with so many accounts to follow, it is tempting (and surprisingly easy) to fall into the trap of using the same login credentials for everything. MSCP/2021/22/Remote working Majority of people more that 40% of they don’t have a strong password management. This lead to break-ins can include the loss of valuable data such as presentations, emails, and music. Victims may also have their bank account information, money, or even their identity stolen. Written Down passwords does not increase password security and makes it more difficult for someone online to steal your passwords, which may result in easy access for someone to steal those passwords locally. It all depends on how well you protect those secrets.54% of workers they written down password on papers or note someware else. MSCP/2021/22/Remote working An unencrypted password (or Plaintext, or Plain-text) is a way of writing (and sending) a password in a clear, readable format. Such password is not encrypted and can be easily read by other humans and machines. And, I repeat, 40% of organizations keep their passwords in plain text. Questionnaire answer show 28.6% of they have unencrypted password. That’s mean they have higher risk possibilities. MSCP/2021/22/Remote working The most important thing to know about the difference between VPN vs remote desktop solutions is that they are different operating systems. There are other differences, such as safety risks and standards of flexibility and control, but understanding what each one does will help you decide which solution will work best for you.46% of they have remote access tool. But 32% they don’t have any remote access tool. 22% to don’t know about the remote access tools. Lock screen on smartphones or devices is an important way to keep your device's content confidential. In the event that you have personal, business, and financial information on your phone, locking your cell phone is a must instead of a choice. Only 32% of Employs have automatic lock. But more than exactly 40% don’t have. MSCP/2021/22/Remote working Generally, anything you send via email is clearly visible to any mail server that carries the message at all times (and any people who do not have access to those servers), so sending a standard message with sensitive information is not recommended. When you send an email message, you have no control over who holds the message, how many copies are stored on the route and how long those messages are stored in the mail system along the way.42% of people they send some sensitive information. 29% of them don’t share any of sensitive information. MSCP/2021/22/Remote working Criminal emails to steal sensitive information are used to commit various cybercrime. We all receive a lot of emails every day - many of which end up in our spam folders. But most of the time, spam emails for sensitive information are easily escaped from email client checks and are delivered to our inbox. So, if you are wondering how you can detect a fake email - or, more specifically, how you can detect a fake email or a real one - we have covered you. Good thing is 62.5% of Workers know about how to check an email header to determine its legitimacy. MSCP/2021/22/Remote working Spam monitoring poses a greater technical challenge than monitoring malware, such as viruses. First of all, only certain file types can transfer malware that you can use. Empty text files, such as those commonly used for email, may not contain malicious software but may contain spam. Allows the end user to see real emails and allow senders to be authorized. An important feature of a business spam filter service is that it scans outgoing emails to detect spam. Thus, it protects the reputation of the organization.54% are known about spam filter and know how to train it.46% said they don’t. MSCP/2021/22/Remote working The majority of respondents they know to securely share files with people outside organization. When asked if they know securely file sharing, 49% know or strongly agreed. 51% said they don’t know. MSCP/2021/22/Remote working Successful phishing scams give hackers access to corporate networks, access to important information such as intellectual property, and in some cases money. The question is how to raise awareness about phishing scams and train your team to detect e-mail spam. The majority of respondents they know phishing Emil. When asked if they know phishing Email, 60% know or strongly agreed. 40% said they don’t know. MSCP/2021/22/Remote working Vishing is a phone scam. In a vishing attack, a scammer preys on human error by phoning their victims and attempting to get them to reveal their personal information, money, or both. Interesting outcomes from the questionnaire 50% of know about vishing scam and 50% of them don’t. Many smashing attacks serve as a crime to steal sensitive information via email. The attacker sends a message MSCP/2021/22/Remote working that attracts the user to click a link or request a response containing private data of the targeted user. The information the attacker wants can be anything, including: Internet account verification. Caller ID fraud occurs when the caller intentionally lies about the information passed to hide the caller's number. it may look like it came from a government agency, business, or someone in your contact list in an attempt to trick you into answering the call.51% not aware of caller ID spoofing and 49% of they aware of Caller ID spoofing. MSCP/2021/22/Remote working Thankfully, there are several authentication methods to unlock your phone. Along with PIN codes and passwords, smartphone manufacturers have introduced biometric authentication methods, such as facial recognition, fingerprint, and iris scanning, to give users a faster and more convenient way to access their phones.54% of have security locks and 48% of don’t have security locks. Wi-Fi best names never include personal information like your real name, address, apartment number, date of birth, etc. Wi-Fi passwords are nothing. Never create an SSID associated with a network password. Avoid annoying SSIDs that can make your network more targeted at hackers.70% of people network name include their street address or family name. MSCP/2021/22/Remote working It is best to turn on the firewall on your router, a device that literally connects you to the Internet. That may be a cable modem, fiber optic modem, or similar, but those are the best part of a security system because they prevent malicious questions on all devices in your network, not just your computer.44% have firewall , 32% don’t have firewall and 24% they don’t know about that. It's recommended to change the password after you get in the first time. If you don't change the password to your router, then anyone with access to it can change its settings and even lock you out.38% they skip to change default password, 36% are changed default password and 26% don’t know about that. MSCP/2021/22/Remote working Draw valid conclusions and recommendations from the research data analyzed and communicate your recommendations to the top management of the organization through an action plan. The action plan should include a justification to the recommendations suggested. Issue and Recommendations as a result of research and data analysis With the growth of remote operations, some cybersecurity threats - especially, the theft of sensitive information - have become increasingly common. A key problem is that, in many workplaces, the IT team will take care of internet security within the office. With distributed employees working remotely, employees should pay close attention to online security threats themselves. Here are some tips to keep you safe from working at home. The study encouraged the translation of staff opinions from sentroconsulting. Sentroconsulting staff were allowing the introduction of new state-of-the-art technology at sentroconsulting to promote the organization’s business. To protect the network, the company will need to maintain strong internet security. Employees must have qualifications to be able to use emerging technologies without difficulty. Use antivirus and internet security software at home MSCP/2021/22/Remote working (https://static.safetydetectives.com/wp-content/uploads/2021/04/Antivirus-Internet-Security.png) One of the most effective home security tips to invest in a wide range of your antivirus program with your employees. According to sources, the estimated global damage to businesses as a result of cybercrime is estimated at $ 1.5 billion a year. This number is likely to increase as criminals try to exploit the local Internet networks and business VPNs to gain access to sensitive files. These attacks may leave you, your business, and your employees vulnerable to ransomware attacks, DDoS attacks, malware, spyware, and other forms of malware. Antivirus suits take the hard work out of your hands by providing automatic remote operating security against a host of threats, including: Attack of zero days (viruses use security pre-installed errors and amendments) Malicious software, spyware, and viruses Trojans and worms Crime scams to steal sensitive information, including those sent via email Not only is a comprehensive antivirus suite able to protect up to 100% of online security threats, but it also automatically updates itself to stay on top of new and emerging threats. It also works smarter after some of your tasks, so you won't even notice the hard work it does. (kaspersky, n.d.). Keep Family Members away from Work Devices While you may be confident that you and your tech-savvy employees will keep you safe online, it is good to remember that working from home means that the company's computers are more likely to be exposed to minors and other members of staff members. Therefore, it is important to remind employees to keep their tools safe and not to allow other family members to access their work laptops, cell phones, and other hardware. It is also worth reminding them of the importance of passwords that protect their devices from preventing third-party companies from accessing sensitive files. Invest in a sliding webcam cover MSCP/2021/22/Remote working (https://static.toiimg.com/photo/msid-78363548/78363548.jpg) Working from home often means participating in conferences and video calls that require the use of your webcam. Unfortunately, savvy criminals can easily access your webcam without permission, which has undermined your privacy. Worse still, if you have sensitive documents in your workplace, cyber criminals can watch you by hijacking your webcam. If your webcam is different from your device, you should remove it whenever you do not use it. If your webcam is built-in, you should take extra steps to protect yourself - you never know when a webcam attack might occur. Smooth web camera covers are readily available online in all shapes, sizes, and colors to suit your needs. They are usually easy to install, too, as many come with a sticky layer that fits your webcam. While using video conferencing software, you may also want to use functions such as the "background blurring" feature if your forum has one. This can prevent people at your conferences from checking the back of your home, which can often include sensitive information about you or your clients. (kaspersky, n.d.) Use a VPN MSCP/2021/22/Remote working (https://vpnoverview.com/vpn-information/what-is-a-vpn/) Working remotely usually means connecting your computer to a Virtual Private Network (VPN connection) but this in turn creates 'backdoors' to home office security that criminals can expose. First and foremost, it's important to provide employees with a homework of at-home safety tips and guidelines or principles to be a secure remote worker. Companies should look for ways to make their VPNs more secure. VPN security can be improved by using a more robust authentication method. Most VPNs use a username and password, but you might want to consider switching to smart cards. You can also upgrade your encryption to gain VPN access, for example, by upgrading the Point-to-Point Tuning Protocol to Second Layer Drag Protocol (L2TP). Of course, no matter how powerful your VPN is: If your password is compromised, it gives hackers an easy way to get in. Therefore, it is important to ensure that employees regularly update their passwords. You should also remind employees to only use the VPN when they need it, and to turn it off when using their equipment in the evening or on weekends. When working from home, employees will use their home networks and internet connections. That's why it's a good idea to teach employees how to set up their own wireless routers and personal firewalls and how to keep their home networks secure. And of course, complete security and antivirus software will also integrate your VPN. (kaspersky, n.d.) Secure your Home Wi-Fi MSCP/2021/22/Remote working (https://www.kaspersky.com/resource-center/preemptive-safety/how-to-set-up-a-secure-home-network) One of the easiest ways to ensure internet security for remote workers is to strengthen the security of your home Wi-Fi network. You can achieve this with some special steps. Instead of relying on the default password your route comes from, create a strong, unique password. You can access your Route settings page by typing “192.168.1.1” into your browser and changing your password there. Make sure you choose a password that is hard for everyone to guess. You can also change your SSID, E.g.: the name of your wireless network, in the same settings page to make it harder for third parties to recognize and access your home Wi-Fi network. Do not use your name, home address, or anything else that could be used to identify you. Make sure you enable network encryption, which is usually done under security settings on your wireless configuration page. You will have a variety of security options to choose from, such as WEP, WPA, and WPA2. If you are using new hardware (much later than 2006) the most powerful is WPA2. For added security, you can restrict network access to specific MAC addresses. Every device connected to your network has a unique MAC address (if available, you can find the address of each device by opening Command Prompt and then entering "ipconfig /all"). If you know the addresses of verified devices, you can add them to your wireless router settings so that only those devices can connect to your Wi-Fi network. Finally, make sure you are using the latest version of your firmware by visiting your router settings page regularly. Peach and software updates often address potential security concerns. MSCP/2021/22/Remote working Protect your online banking If you are responsible for business accounts, it is important to ensure that money is stored and transferred in the safest way possible. The last thing you want is to deal with security breaches on any of your online banking forums. Above all, it is important to use only authorized software and services to manage finances. Only use services you know and are familiar with. If you are unsure of the reliability of a particular site, search online for updates and additional information before using it. Trusted institutions should include on their websites the contact details of people customers can contact if they have any concerns. Working from Home Security Tips for Staff In summary, to ensure working from home safely, remote workers can use these tips as a checklist: Are you using a comprehensive antivirus and internet security software at home? Have you secured your devices – by keeping them safe from family members and ensuring that encryption is turned on and configured? Have you enabled “Find my device” and remote wipe on all your devices? Have you invested in a web cam cover? If your webcam is external, do you unplug it when not in use? Are you using a VPN? Have you secured your home Wi-Fi? Have you made sure that your passwords are strong and secure? Are you alert to the dangers of phishing scams, avoiding clicking on links or opening attachments in any emails you are unsure of? Are you using a supported operating system, and do you keep your operating system up to date? Do you keep all software up to date? Have you enabled two-factor authentication where appropriate, or considered the use of an authenticator app such as Google Authenticator or Authy? During video calls, do you take care not to over share your screen and are you mindful of what might be in the background? Working from Home Security Tips for Employers Employers considering remote work security best practices can use these tips as a checklist: Do you have a documented work from home security policy? A good example from the Information MSCP/2021/22/Remote working Commissioner’s Office can be found here. Do you have a BYOD (Bring Your Own Device) policy? Do you provide cyber security awareness training to employees? In particular, do you train staff to be alert to phishing attacks and how to avoid falling victim to them? Are you ensuring that staff use a VPN, and is this set up correctly and kept up to date with security patches? Is the platform you use for staff video teleconferencing secure with end-to-end encryption? Do you use a centralized storage solution – i.e. safe data storage in the cloud – and encourage staff to backup data regularly? Are company devices secured by company-approved antivirus software? Do you encourage employees to have strong and safe passwords, and have you considered the use of a Password Manager? Do you encourage the use of two-factor authentication to validate credentials? Do you use encryption software to protect company data by barring access to any unauthorized users? Do you advise staff to use corporate email solutions and not to rely on their own email or messaging accounts for the storage or transmission of personal data? As working from home has increased worldwide, cybersecurity for remote workers has become a hot topic. By following cybersecurity remote work best practices, individuals and organizations can avoid risks and ensure safety. MSCP/2021/22/Remote working MSCP/2021/22/Remote working Reference https://whatdoesmean.net/what-is-a-research-project/ https://www.datapine.com/articles/data-analyst-tools-software https://mymanagementguide.com/basics/what-is-a-project/ https://www.researchgate.net/publication/342163727_WORK_BREAKDOWN_STRUCTURE_WBS https://leverageedu.com/blog/research-design/ https://penmypaper.com/blog/qualitative-research/ https://www.questionpro.com/blog/quantitative-research/ https://www.questionpro.com/blog/what-is-a-questionnaire/ https://www2.deloitte.com/ch/en/pages/risk/articles/impact-covid-cybersecurity.html https://www.projectguru.in/important-data-analysis-research/ https://www.datapine.com/blog/data-analysis-methods-and-techniques/#data-analysis-importance https://www.kaspersky.com/resource-center/threats/remote-working-how-to-stay-safe MSCP/2021/22/Remote working MSCP/2021/22/Remote working MSCP/2021/22/Remote working Grading Rubric Grading Criteria LO1 Establish project aims, objectives and timeframes based on the chosen theme P1 Devise project aims and objectives for a chosen scenario. P2 Produce a project management plan that covers aspects of cost, scope, time, quality, communication, risk and resources. P3 Produce a work breakdown structure and a Gantt Chart to provide timeframes and stages for completion. M1 Produce a comprehensive project management plan, milestone schedule and project schedule for monitoring and completing the aims and objectives of the project. LO2 Conduct small-scale research, information gathering and data collection to generate knowledge to support the project P4 Carry out small-scale research by applying qualitative and quantitative research methods appropriate for meeting project aims and objectives. M2 Evaluate the accuracy and reliability of different research methods applied. D1 Critically evaluate the project management process and appropriate research methodologies applied. MSCP/2021/22/Remote working Achieved Feedback LO3 Present the project and communicate appropriate recommendations based on meaningful conclusions drawn from the evidence findings and/or analysis P5 Analyse research and data using appropriate tools and techniques. P6 Communicate appropriate recommendations as a result of research and data analysis to draw valid and meaningful conclusions. M3 Evaluate the selection of appropriate tools and techniques for accuracy and authenticity to support and justify recommendations. D2 Critically evaluate the research and data analysis tools used in the project development stages.. LO4 Reflect on the value gained from conducting the project and its usefulness to support sustainable organisational performance P7 Reflect on the value of undertaking the research to meet stated objectives and own learning and performance. M4 Evaluate the value of the project management process and use of quality research to meet stated objectives and support own learning and performance. D3 Critically evaluate how the project supports sustainable organisational performance. MSCP/2021/22/Remote working .