lOMoARcPSD|19511684 437036022 Col e 004653 Mscp Com079 Docx HND in Computing (ESOFT Metro Campus) Studocu is not sponsored or endorsed by any college or university Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 ESOFT METRO CAMPUS #3, De Fonseka Road, Colombo 04. Higher National Diploma in Computing & Systems Development / Business Management Assignment Submission Form Name ESOFT Reg. No Edexcel No Module Name Name of the Lecturer Date Due Date Submitted Fine Email-Address Contact No CD Check List () Kushan Wijerathne COL/E-004653 Name of Group Members (If Applicable) Managing a Successful Computing Project Ms Sumudu 29/12/2018 12/01/2019 wkushan99@gmail.com 0714069550 Assignment Formatting Sheet Harvard Referencing Brief Signature on Signature on Student Declaration Coversheet Herewith I agree for the given terms and conditions on plagiarism & Academic dishonesty also I declare the work submitted doesn’t breach these regulations. Note: Keep the softcopy of the assignment with you until the official results released by ESOFT. ESOFT has all rights to request the softcopy again at any time. 12/01/2019 wkushan99@gmail.com Signature Kushan Wijerathne Date MSCP Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) Page 1 lOMoARcPSD|19511684 Higher Nationals Internal verification of assessment decisions – BTEC (RQF) INTERNAL VERIFICATION – ASSESSMENT DECISIONS Programme title BTEC Higher National Diploma in Computing Assessor Ms Sumudu Unit(s) Assignment title Internal Verifier Unit 6 Managing a Successful Computing Project Vulnerability Assessment – Management Information System (MIS) Project Student’s name List which assessment criteria the Assessor has awarded. Pass Merit Distinction INTERNAL VERIFIER CHECKLIST Do the assessment criteria awarded match those shown in the assignment brief? Is the Pass/Merit/Distinctiongrade awarded justified by the assessor’s comments on the student work? Has the work been assessed accurately? Y/N Y/N Y/N Is the feedback to the student: Give details: • Constructive? Y/N • Linked to relevant assessment criteria? • Identifying opportunities for improved performance? Y/N Y/N • Agreeing actions? Y/N Does the assessment decision need amending? Y/N Assessor signature Date Internal Verifier signature Date Programme Leader signature (if required) Date Kushan Wijerathne MSCP Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) Page 2 lOMoARcPSD|19511684 Confirm action completed Remedial action taken Give details: Assessor signature Date Internal Verifier signature Date Programme Leader signature (if required) Date Kushan Wijerathne Page 3 MSCP Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 Higher Nationals - Summative Assignment Feedback Form Student Name/ID Unit Title Unit 6 Managing a Successful Computing Project Assignment Number 1 Assessor 29/12/2018 Date Received 1st submission Submission Date Ms Sumudu Date Received 2nd submission Re-submission Date Assessor Feedback: LO1. Assess risks to IT security Pass, Merit & Distinction P1 Descripts LO2. Describe IT security solutions. P2 M1 D1 P4 M2 D1 LO3. Review mechanisms to control organisational IT security. Pass, Merit & Distinction P5 P6 M3 Descripts M4 Pass, Merit & Distinction Descripts P3 D2 LO4. Create and use a Test Plan to review the performance and design of a multipage website. Pass, Merit & Distinction Descripts P7 Grade: P8 M5 D3 Assessor Signature: Date: Assessor Signature: Date: Resubmission Feedback: Grade: Internal Verifier’s Comments: Signature & Date: * Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and grades decisions have been agreed at the assessment board. Kushan Wijerathne Page 4 MSCP Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 Pearson Higher Nationals in Computing Unit 6: Managing a Successful Computing Project Kushan Wijerathne Page 5 MSCP Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 General Guidelines 1. A Cover page or title page – You should always attach a title page to your assignment. Use previous page as your cover sheet and be sure to fill the details correctly. 2. This entire brief should be attached in first before you start answering. 3. All the assignments should prepare using word processing software. 4. All the assignments should print in A4 sized paper, and make sure to only use one side printing. 5. Allow 1” margin on each side of the paper. But on the left side you will need to leave room for binging. Word Processing Rules 1. Use a font type that will make easy for your examiner to read. The font size should be 12 point, and should be in the style of Time New Roman. 2. Use 1.5 line word-processing. Left justify all paragraphs. 3. Ensure that all headings are consistent in terms of size and font style. 4. Use footer function on the word processor to insert Your Name, Subject, Assignment No, and Page Number on each page. This is useful if individual sheets become detached for any reason. 5. Use word processing application spell check and grammar check function to help edit your assignment. Important Points: 1. Check carefully the hand in date and the instructions given with the assignment. Late submissions will not be accepted. 2. Ensure that you give yourself enough time to complete the assignment by the due date. 3. Don’t leave things such as printing to the last minute – excuses of this nature will not be accepted for failure to hand in the work on time. 4. You must take responsibility for managing your own time effectively. 5. If you are unable to hand in your assignment on time and have valid reasons such as illness, you may apply (in writing) for an extension. 6. Failure to achieve at least a PASS grade will result in a REFERRAL grade being given. 7. Non-submission of work without valid reasons will lead to an automatic REFERRAL. You will then be asked to complete an alternative assignment. 8. Take great care that if you use other people’s work or ideas in your assignment, you properly reference them, using the HARVARD referencing system, in you text and any bibliography, otherwise you may be guilty of plagiarism. 9. If you are caught plagiarising you could have your grade reduced to A REFERRAL or at worst you could be excluded from the course. Kushan Wijerathne Page 6 MSCP Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 Student Declaration I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as my own without attributing the sources in the correct way. I further understand what it means to copy another’s work. 1. I know that plagiarism is a punishable offence because it constitutes theft. 2. I understand the plagiarism and copying policy of the Edexcel UK. 3. I know what the consequences will be if I plagiaries or copy another’s work in any of the assignments for this program. 4. I declare therefore that all work presented by me for every aspects of my program, will be my own, and where I have made use of another’s work, I will attribute the source in the correct way. 5. I acknowledge that the attachment of this document signed or not, constitutes a binding agreement between myself and Edexcel UK. 6. I understand that my assignment will not be considered as submitted if this document is not attached to the attached. wkushan99@gmail.com Student’s Signature: (Provide E-mail ID) Kushan Wijerathne Page 7 29/12/2018 Date: (Provide Submission Date) MSCP Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 Assignment Brief Student Name /ID Number COL/E-004653 Unit Number and Title Unit 6: Managing a Successful Computing Project Academic Year 2017/2018 Unit Tutor Assignment Title Vulnerability Assessment - Management Information System Project Issue Date Submission Date IV Name & Date Submission Format: The submission is in the form of an individual written report. This should be written in a concise, formal business style using single spacing and font size 12. You are required to make use of headings, paragraphs and subsections as appropriate, and all work must be supported with research and referenced using the Harvard referencing system. Please also provide an end list of references using the Harvard referencing system. Unit Learning Outcomes: LO1 Establish project aims, objectives and timeframes based on the chosen theme. LO2 Conduct small-scale research, information gathering and data collection to generate knowledge to support the project. LO3 Present the project and communicate appropriate recommendations based on meaningful conclusions drawn from the evidence findings and/or analysis. LO4 Reflect on the value gained from conducting the project and its usefulness to support sustainable organizational performance. Assignment Brief and Guidance: Vulnerability Assessment - Management Information System (MIS) Project Kushan Wijerathne Page 8 MSCP Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 Management Information Systems (MIS) plays a very important role in today’s organizations; it creates an impact on the organization’s functions, performance and productivity. A Management Information System (MIS) ensures that an appropriate data is collected from the various sources, processed and send further to all the needy destinations. A system is expected to fulfill the information needs of an individual, a group of individuals, management functionaries, managers and top management to improve efficiency and productivity. On contrary, any system can be compromised with vulnerability issues. This is mostly in area of confidentiality, integrity and availability (security triangle). You’re advised to provide solutions for improvements for a selected Management Information System’s in a selected organization in the area of how to improve aspects of confidentiality, integrity and availability (security triangle) through a vulnerability study assessment. You should investigate the causes and impacts of vulnerabilities within computing systems and explore the solutions to the problems presented in order to make recommendations to improve their security for Management Information System. The expected solution of the project is a vulnerability assessment and action plan which includes, issues of varying severity. In general, the vulnerability assessment may focus on a test of security infrastructure devices, network servers, operational systems (including Windows and Linux), physical security of buildings, and wireless internet security. You have to mainly focus on how can vulnerabilities in an existing system be identified and counteracted. Discover unknown entry points both physical and electronic – that is threat to the overall confidentiality, integrity, and availability of network data and resources. Problem can be discovered in the areas of installing, configuring, and maintaining servers and infrastructure equipment as well as practices of different department managers and staff tend to have different ways of managing their IT. Recommendations for standardization of upcoming infrastructure installations, configurations, and maintenance. Educate and increase user awareness on what they could change to improve their security situation in order to build confidence of using the Management Information System An action plan to keep their environment secure. Your role as a student researcher means that you are not trying to perform a specific solution to any vulnerability problem case. You have to make expert recommendations on how to tighten security controls, based on a proven assessment methodology, that are in the best interest of the specific project of Management Information System which may eliminate unnecessary entry points that would greatly reduce the threat. Introducing of a set of policies and procedures for the entire Management Information System help eliminate threats through network entry points and infrastructure. The vulnerability trends and recurring issues that needed careful attention. The project span 03 months in order to provide an accurate snapshot of their current security posture. The benefit of the project is that it provides a greater awareness among the entire staff about how any vulnerability or weakness in any functional area affects the overall security posture of the Management Information System at large. You are required to provide a full report on vulnerabilities you found and how you educate the Management Information System staff on what they could change to improve their security situation with an action plan to keep their environment secure. TASK – 01 Kushan Wijerathne Page 9 MSCP Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 1.1 Describe aims and objectives for vulnerability assessment project which you’re introducing. Your explanation should include a brief introduction about the company, the MIS and other relevant information to the assessment project. 1.2 Produce a comprehensive project management plan, The plan should include milestone schedule and project schedule for monitoring and completing the aims and objectives of the project that includes cost, scope, time, quality, communication, risk and resources management. 1.3 Produce a work breakdown structure and a Gantt Chart to provide timeframes and stages for completion. TASK – 02 2.1 Explain qualitative and quantitative research methods appropriate for meeting project aims and objectives which you produced as vulnerability assessment project. 2.2 Evaluate the project’s management process and appropriate research methodologies applied, the accuracy and reliability of different research methods applied for the small scale research TASK – 03 3.1 Analyze research data using appropriate tools and techniques. 3.2 Describe appropriate recommendations as a result of research and data analysis to draw valid and meaningful conclusions. 3.3 Evaluate the selection of appropriate tools and techniques for accuracy and authenticity to support and justify recommendations. TASK – 04 4.1. Provide a reflection on the value of undertaking the research to meet stated objectives with your own learning and performance which includes a discussion of the project outcomes, its usefulness to support sustainability of the given organization and its’ performance, the decisionmaking process and changes or developments of the initial project management plan to support justification of recommendations and learning during the project. 4.2. Evaluate the value of the project management process and use of quality research to meet stated objectives and support own learning and performance Kushan Wijerathne Page 10 MSCP Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 Grading Rubric Grading Criteria Achieved Feedback LO1 Establish project aims, objectives and timeframes based on the chosen theme P1 Devise project aims and objectives for a chosen scenario. P2 Produce a project management plan that covers aspects of cost, scope, time, quality, communication, risk and resources. P3 Produce a work breakdown structure and a Gantt Chart to provide timeframes and stages for completion. M1 Produce a comprehensive project management plan, milestone schedule and project schedule for monitoring and completing the aims and objectives of the project. LO2 Conduct small-scale research, information gathering and data collection to generate knowledge to support the project P4 Carry out small-scale research by applying qualitative and quantitative research methods appropriate for meeting project aims and objectives. M2 Evaluate the accuracy and reliability of different research methods applied. D1 Critically evaluate the project management process and appropriate research methodologies applied. LO3 Present the project and communicate appropriate recommendations based on meaningful conclusions drawn from the evidence findings and/or analysis P5 Analyse research and data using appropriate tools and techniques. P6 Communicate appropriate recommendations as a Kushan Wijerathne MSCP Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) Page 11 lOMoARcPSD|19511684 result of research and data analysis to draw valid and meaningful conclusions. M3 Evaluate the selection of appropriate tools and techniques for accuracy and authenticity to support and justify recommendations. LO4 Reflect on the value gained from conducting the project and its usefulness to support sustainable organisational performance P7 Reflect on the value of undertaking the research to meet stated objectives and own learning and performance. M4 Evaluate the value of the project management process and use of quality research to meet stated objectives and support own learning and performance. D2 Critically evaluate and reflect on the project outcomes, the decision making process and changes or developments of the initial project management plan to support justification of recommendations and learning during the project. Kushan Wijerathne MSCP Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) Page 12 lOMoARcPSD|19511684 Pearson Higher Nationals in Computing Unit 05: Security Kushan Wijerathne COL/E-004653 Kushan Wijerathne Page 13 MSCP Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 Acknowledgement The success and final outcome of this assignment required a lot of guidance and assistance from many people and I’m extremely fortunate to have this all along the completion of the assignment work. Whatever I have done so far is due to such guidance and assistance and I would not forget to thank them. I respect and thank Ms. Anne Sumudu for giving me an opportunity to do this assignment work and providing me all support and guidance which made me complete the assignment on time, I am extremely grateful to him for the support throughout the course. MSCP takes an important place in this semister because it covers a vast area of knowledge and it helps you to rectify errors that you make more often in managing a project. I am really grateful because we managed to complete this assignment within the given time frame. Even though we faced some issues in between the semester with lecturers we managed to do it successfully. I can’t forget my friends who helped me in every way. Last but not least I would like to express my gratitude to Esoft Metro Campus for the opportunities and teaching techniques that help every student to mold their cooperate life. Kushan Wijerathne Page 14 MSCP Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 Contents Acknowledgement..........................................................................................14 Task 01........................................................................................................16 1.1.................................................................................................................................................................16 Vulnerability Assessment.........................................................................................................................16 Company Description...............................................................................................................................16 Defining Security process........................................................................................................................16 1.2.................................................................................................................................................................18 Introduction..............................................................................................................................................18 Scope........................................................................................................................................................19 Milestones................................................................................................................................................19 Cost Management Plan.............................................................................................................................19 Objectives and Security Risks Objectives................................................................................................19 1.3.................................................................................................................................................................20 Work Breakdown Structure......................................................................................................................20 Task 02........................................................................................................24 Qualitative research......................................................................................................................................24 Focus groups............................................................................................................................................24 Interviews of one individual.....................................................................................................................24 Benefits of Qualitative Research for Small Businesses...........................................................................24 Quantitative research.................................................................................................................................26 Quantitative market research is more structured than qualitative research because of its statistical nature........................................................................................................................................................26 VULNERABILITY ASSESSTMENT QUESTIONAIRE..................................................................26 Task 3..........................................................................................................30 Quantitative research analysis..................................................................................................................30 Pie Chart...................................................................................................................................................30 Analysis....................................................................................................................................................30 Analysis of qualitative research................................................................................................................35 3.2.................................................................................................................................................................36 3.3.................................................................................................................................................................36 Task 4..........................................................................................................37 Task 4.1........................................................................................................................................................37 Kushan Wijerathne Page 15 MSCP Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 Project manager’s own learning and performances................................................................................37 4.2.................................................................................................................................................................37 Appendix...................................................................................................39 REFERENCES..............................................................................................39 Kushan Wijerathne Page 16 MSCP Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 Task 01 1.1 Vulnerability Assessment Vulnerability assessment is an important way of recognizing vulnerabilities in the system or application Their filtering analyzers use them to control target frames and identify potential attack agents, deficiencies and crossing points, while heads use them to identify already vague or unknown vulnerabilities that may affect their security base. For all vulnerability assessments, it is necessary to gather a summary of the potential vulnerabilities that indicate the relative levels of risk. In this way a linking effort can put its needs to face the dangers it encounters. Company Description The Kalutura Urban Council (KUC) is the local authority for Kalutara in the province of Kalutara in the western province of Sri Lanka established in 1878. KUC is responsible for providing a variety of local public services, including roads, sewers, sewers, homes, libraries, public parks and recreation areas. Currently their managing assessment information through a system The Management Information System (MIS) is a data framework used for basic initiatives and for coordinating, managing, inspecting and impressing data in associations. Affiliated organizations can think of different destinations and gather before they come across a risk and vulnerability assessment. These goals and target sections may be the intended consequences of compliance should be an indication of new laws, mandates and information security. Security as a means of setting up and assets of information technology is essentially underlined rather than expectation, area and response. By combining a sound and wide-ranging security process and an enthusiastic IT security plan and structure, relationships can be created to ensure the security of IT facilities and assets, as indicated by the key satisfactory risk or the level of introduction of the relationship. Defining Security process The defense system consists mainly of three parts: hopes, revelations and reactions. Depending on the expectations, re-certifications or certifications are used in security controls and in the life cycle safety master plan. It is automatically created by integrating the system into an unsupported system or application type for security reasons. Balanced operating systems and application for transparency, reliability and security of applications or application applications. Monitoring of IT organizations and asset inspection. Enter the checklists of the logs, the research lines, the spy acceptance program, and the IT institutes for the nineteen evaluation missions and processes. It is the responsibility of the information security experts to Kushan Wijerathne Page 17 MSCP Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 provide reliable information and information on newly discovered information, risks and risks, information systems and asset integration. The reaction is a defense of a technological relationship or knowledge or a reaction from a cloud to a security separation or a security risk, danger or power. Resistance usually crosses four areas: • Criminological Analysis Plan The CIRT team is properly prepared and information security experts collecting and retrieving information and data submit the information and data collected during a security interruption or research case to a measurable research program. • Disaster Recovery Plan (DRP) Associations with a significant import risk, especially in relation to air or in relation to war, must have an arrangement to deal with a disaster (for example, an overwhelming ocean, a flood, fire). • Business Continuity Plan (BCP) Associations that have a lot of enthusiasm for IT deployment and assets typically perform, test and support an internal BCP plan to disclose how they will maintain business and emancipation, basically assets. • SIRT (Security Incident Response) and design team Many partners have their SIRT security team, which includes a cross-section of human resources, genuine IT and department. Purpose of the risk and vulnerability assessment The risk of information technology can be understood if there is a risk in terms of risk and risk if resources have been invested in the information technology. Determination or renewal of identified risks, risks and risk situations can be organized and effectively organized by prioritizing or underestimating the asset and item data. The risks, risks, threats and risks for the risk and risk assessment have been identified and the relationship of responsibility is to provide the necessary security response and response to identified threats, threats and risk management. First, new information on laws, orders and safety issues can be developed in case of risk and weakness assessment. Provides an IT connection with the described destinations and objectives associated with case and risk assessment in assessing risks and deficiencies. There are informative IT resources and information resources. Risks, accidents and acceptable weaknesses can be identified and described in detail in relation to the relationship, system and assets. There is a difference in the IT security plans of the contact and the gaps or the contact plan in the box. Vincentus windows can be distinguished and restricted due to the purity of the union. Kushan Wijerathne Page 18 MSCP Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 Different assets and assets depend on the various ratings of the ITA affiliate. That is, criticism of the importance or affinity of assets, the preferences of the dollar. The risk, the risk and the condition of the acceptable risk depend on the impact or the risk of the assets or assets of IT. 1.2 Project Management Plan for Vulnerability assessment of UC Kalutara Version 1.0 Prepared by: Kushan Wijerathne Kushan Wijerathne Page 19 MSCP Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 Introduction The project plan combines information on personnel, expenditure planning, timing, deadline, goal and assessment. It gives further guidance on both personal and social goals of opportunities and how all aspects of the regulation should be done. As a technique for progress is complemented as a guide to the way a free effort works, a business plan points to the exploitation of the business. This project proposes providing solutions to improve selected information management systems in selected organizations in the ways of improving confidentiality, integrity and availability through research and vulnerability assessment. That's because I did it. Here we have to make a major proposal with the most sophisticated way of modifying security controls in the light of the proven evaluation strategy. This will be the biggest benefit of a clear effort of the information management system. Threatening. The presentation of multiple approaches and methods for the information management system as a whole contributes to the elimination of risks through the focus and infrastructure of the part of the system. The advantage of this exercise is that it pays more attention to all staff for the inability or lack of any utility that has moderate impact on the overall security attitude of the information management system. Scope We will complete a risk assessment of the Management Information System (MIS) through this project, identifying and strengthening complex objectives in every aspect, such as classification, dignity and access. At the end of this task, we have approved the difficulty of managing management and have issued a suitable arrangement for the MIS staff on specific security arrangements to change the activities to maintain their environment safely. Milestones Finding a company. Planning and preparation for the meeting Schedule the meeting and arrange a local visit Review the process, documents and related drawings and diagrams Create a full complete check list. A billing report has been designed for analysis of the field data by visiting the site. Grant full approval from the responsible party for preparing the final report. Cost Management Plan To treat this risk as a research project for a college student, it is not necessary to have an extension of the money for this purpose in gathering important data for the main business. Risk assessment is a procedure for identifying and measuring the risk of becoming confident in the status of the association. It is important to understand the situation and the danger when packaging needs information, minds and risk with farreaching vulnerability assessment program. Kushan Wijerathne Page 20 MSCP Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 Objectives and Security Risks Objectives The risk window can be identified according to the acceptable tolerance of the organization, which is at risk for the risk. Determine the vulnerability at the network. New Risk and Risk can be assessed with new Information Security Laws, Regulations and Regulations There are flaws or gaps in the information frame of the organization. Design your upgrade and build inventory of all equipment in the enterprise for the assessment of the future. Data protection is at a premium level. Identify security defects before identifying the attacker. 1.3 Work Breakdown Structure Project Management and System Engineering-the work-breakdown structure, the direction of the project into smaller components. A team project is a project breakdown structure for managing tasks. The PMBOK 5 (Project Management Body of Knowledge) defines the design breakdown structure. "Hieroglydifferency in the project group in the project team to provide the required projects for the achievement of project objectives." Work-breakdown structure is an element, product, data, service or any combination. Providing guidance and guidance for the WBS Scheduling and Controlling the framework for oversight and control Kushan Wijerathne Page 21 MSCP Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 vulnerability Assessment Project Initiation Developing business case Planning Processing requirements Developing WBS Identifying deliverables Kushan Wijerathne PLanning site visit schedule Execution Preparing checklist Executing project tasks Managing communication MSCP Closeout Procument Document closeout Tracking tasks Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) Evaluation Transfering project Analyzing Site visit records Page 22 Final report The questionaries Prepare the report Issuing the report lOMoARcPSD|19511684 Gantt chart Kushan Wijerathne Page 23 MSCP Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 Kushan Wijerathne MSCP Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) Page 24 lOMoARcPSD|19511684 Task 02 Qualitative research Qualitative research is a method that focuses on how people feel; What they think and why choose the right decisions. For example, if you look at changing your branding, some kind of quality research will be undertaken to understand the emotional reactions of your new identity and people associating with them. What is Qualitative Research? In simple terms, it is an experimental method, and as a result, it is semi-structured, and the discussion - negotiating - in one or the other, in a targeted group - applies to the quality you seek. Focus groups If you choose to have a group discussion with a selected person, select five or more participants. For a discussion of a number of predefined topics, a moderator is required to guide. The true capability of the team of the accuracy team through any dialogue will be the true and correct answer of the targeted delegated representatives. Interviews of one individual Direct individual interviews are often carried out in a quality market research or by telephone or face-to-face. Allowing your selected participants to become a more personal approach, allowing them to be open and open about their own ideas. If the topic of the conversation is one of the most personal or eminent, it is best to make quality market research more suitable to allow one external interaction. Benefits of Qualitative Research for Small Businesses Performing or reporting through quality research via audio or video is easier to analyze for answers. Qualitative research gives you the ability to research a variety of topics. Quantitative research may be more profitable than quantitative market research, and recruiting large scale scales or using wider methods is not large. You can make targeted exploratory explorations. No large number of participants is required for the interview. Qualitative research will help customers and the public to understand. A good quality research the project manager knows what the employees think about the system. That's why employees have a lot of questions at the system. In the section below, as the manager of the project, I have tried to answer some of employees and unrelated systems. Kushan Wijerathne Page 25 MSCP Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 Survey Question Strongly agree 1 Agree 2 Neutral 3 Disagree 4 This system will promote the LA This will increase customer support The environmenta l program has an enormous impact on the environment This system will receive great feedback from the general public Does the crew follow the established standards? Bios is safe with administrator password? Can privileged users be able to restart only their servers? Are there routers and portals on the system? Kushan Wijerathne Page 26 MSCP Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) Strongly disagree 5 lOMoARcPSD|19511684 Is there a built-in firewall? Quantitative research Quantitative market research is more structured than qualitative research because of its statistical nature. Small businesses that are explicit in quantitative research will be able to provide an accurate picture of their target market. Sample responded samples give a list of mainly closed questions for selecting and answering a sample of the sample. These closed questions can provide answers, respond to business, and quickly decide on preferences. Quantitative research may be based on paper - like postal surveys or computerized - online surveys or phone calls. All the quantities of samples; Response for a specific area should be minimally responded, and 100 responses are said to be of low quality. Reliable quantitative data will require large sample sizes. The objective of the project is to find the vulnerabilities of the assessment management system. As a project manager, the best and best research method will be found to find the right market for local authority. Assessment management system research by local authority has given as follows. Quantitative research can be done through observations, surveys, quizzes, and target groups. Therefore, as a quantitative research for the local authority, I have conducted a survey method for the research manager, as a project manager. So I have set up a survey questionnaire. 10 based on and on a Likert scale – VULNERABILITY ASSESSTMENT QUESTIONAIRE Name: Department: Designation: Phone Number: Email Address: 1. What is the status your computer literacy? Kushan Wijerathne Page 27 MSCP Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 a. Excellent b. Good c. Medium d. Low 2. Does any other office personal have access to your computer? a. Yes b. No 3. Is your computer password protected? a. Yes b. No 4. Does your computer screen lock after you are away from it for a while? a. Yes b. No 5. Has your local authority ever tested its network for vulnerabilities or performed a risk assessment? a. Yes b. No Kushan Wijerathne Page 28 MSCP Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 6. Are the staffs trained to identify unnecessary adware? a. Yes b. No 7. Do you have unique credentials for your access to the system? a. Yes b. No 8. Have you saved your credentials for access to the system in the browser? a. Yes b. No 9. Does your local authority have a confidential agreement with the development team of the system who has the access to the server? a. Yes b. No c. May be 10. Does the third party get remote access? a. Yes b. No Kushan Wijerathne Page 29 MSCP Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 c. May be 11. What email address do the employees use to register/access the system? a. Personal b. Official 12. If using personal email address, does the system send confidential information to the personal email address? a. Yes b. No 13. Does your firm require passwords or pins for mobile devices that can access company email or systems? a. Yes b. No 14. Does every laptop/PC have malware protection which satisfies the system requirements? a. Yes b. No c. May be 15. Does the system accept any kind of external devices to write/change data on it a. Yes b. No Kushan Wijerathne Page 30 MSCP Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 c. May be 16. Can employees access to other web sites using the laptop/PC? a. Yes b. No c. Some 17. What is the process of printing a document? a. Shared printer with own key code b. Own printer c. Shared printer Reliability and Validity in Quantitative Research The results of this test are quantitative measurements used to test quantitative studies and speculative and speculative experimental methods. They emphasize the factors that are calculated and tested. Based on the results of the survey, half of the separations can be resolved, test replacement or parallel framework strategies, and average security applies to tools. Fixed measurement management repeatedly receives the same answer. The level of reliability is similar to an unbeatable level of quality, and a high level of stability is a high level of negligible quality. The result can be reproduced. Whether the test expects real measurement or the results of the exploration is honest, determines the legitimacy of the test. Golafshani (2003) describes the validity of quantitative research as “establishing effectiveness”. Interpretation - is the basis for interpretation, conception or assumptions, collecting data collection and sampling plans. Reliability and Validity in Qualitative Research Three different ways of managing authenticity in subjective research are as approval for inspection, communication, and activity. Investigators rely on inclusion and writing to solve realism, universality and reliability issues. It is solved from a quantitative perspective, but it is subjectively confusing. In subjective research, authenticity is related to depiction and illumination, and whether the atmosphere is consistent or not, the given clarification is consistent with the given description. Interfaces with different technologies, such as observations, gatherings and records, will gradually lead to considerable, intense and Kushan Wijerathne Page 31 MSCP Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 contrasting material advances. In order to improve the inspection and understanding of the progress of others, triangulation is the stage by which the master incorporates some experts or experts to interpret the data at different times or in the field. Relatedly, subjective researchers can use the examiner triangulation and consider the ideas and clarifications created by additional scientists of the test panel. Kushan Wijerathne Page 32 MSCP Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 Task 3 Quantitative research analysis Analyse data analyses for security risks, analyse data, and analyse the best way to deliver results. Information Survey: Basically, we first checked the results of the audit information and information. I confirmed that I had no opportunity to get more information. Information Summary: A better way to summarize is general information about the information I collect. Describe the details as a result. Pie chart Bar graph In line In the histogram Pie Chart Pie demonstration can be used for skill test to test the experimental results. When you need to make a difference and require a specific dependency on one variable, you can share sufficient and productive data. By all due respect, I used a pin to show my specific results. Cutting down the cutting of the most important cut with a shade of 4-6 cuttings. Pie charts provide accurate and clear images. It brings out the information as an altogether part, so it is an addictive device by strangers from an unknown group. Analysis 18. What is the status your computer literacy? Kushan Wijerathne Page 33 MSCP Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 Most people have medium computer literacy. So they can use the system very easily. But most of them could not identify the malware or any kind of vulnerability. Solution: Conduct workshops and encourage them to participate 19. Does any other office personal have access to your computer? Unauthorized access would be less. There for vulnerability is low 20. Is your computer password protected? Kushan Wijerathne Page 34 MSCP Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 21. Does your computer screen lock after you are away from it for a while? When the screen si not locked, unauthorized person can access to the system through the computer. Solution: IT division of Kalutara UC must put screen lock to every machine 22. Has your local authority ever tested its network for vulnerabilities or performed a risk assessment? Kushan Wijerathne Page 35 MSCP Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 It is hard to tell that if any malware or spyware already stablished in the network. So there is a high chance of having a cyber attack Solution: Must do the testing the network for vulnerabilities as soon as possible. 23. Are the staffs trained to identify unnecessary adware? As most of them have medium computer literacy, it is hard thing to find an unnecessary adware. In their IT section, they do not have knowledge also Solution: Scheduling workshops 24. Does your local authority have a confidential agreement with the development team of the system who has the access to the server? Kushan Wijerathne Page 36 MSCP Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 Most of the workers do not have any idea about this question and some of them have not pretty sure answer. But according to the executive level management, UC has above mentioned agreement with Development Company 25. Does the third party get remote access? Development team can access to the system or server using Remote Desktop Connection or Team Viewer. But the threat is the passwords which are using to login are not recurring. There for anyone who has connected before can reconnect again without any acknowledge of Urban council. Solution: Using recurring passwords 26. Does your firm require passwords or pins for mobile devices that can access company email or systems? Kushan Wijerathne Page 37 MSCP Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 This is a major threat for the system. Anyone can access to the system via connecting mobile and have valuable user details. And it will hard to trace back to the user. Solution: Add a new security layer to the network and ask recurring pin or password from the user who is going to connect to the system via mobile device. And the pin or the password must be issued by the system admin or relevant officer. Analysis of qualitative research Respondent 1 When asked by the first respondents about the quality and benefits of the assessment management system, the researcher answered positively. The program is good for everyone, and the UC always focuses on the consumers who are aware. the environment. I asked him about the contentment. The answer was that the products were satisfactory, but they did not materialize Respondent 2 A second debater was not happy about the outcome of the Clean Environment Program. This single program could not attract the attention of the people for a short period of time. If the defendant is required to do so and other things to be done, the respondent should regularly do this to the UC and have a good budget for the UC . The overall evaluation of the assessment management system at the Kalutara Urban Council was satisfactory. Respondent 3 When the UC inquired about its potential to focus on its system efforts, the third respondent said that the UC could be promoted. They believe system and Corporate Social Responsibility will help boost assessment tax collection. Later, the program is beneficial to everyone, and the UC is socially responsible, which suggests paying tax from others at the kalutara UC. Work better than other local authorities. Kushan Wijerathne Page 38 MSCP Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 3.2 Several proposals have been recommended for the Kalutara Urban Council to analyze the research data using relevant tools and techniques. Following are the recommendations. Human Resources: System requires human resources to acquire competitive advantages in the UC. From my own experience in the recent Corporate Social Responsibility Project, I recommend refinancing the UC's improved human resources to the UC that meets this program time and budget limit Complete legal procedures: When implementing system as a department head, accountant worked out many solutions. Therefore, before any assement management system can be obtained for competitive advantage, the UC must be managed. Full budget: Accountant needs resources to complete a program. The UC has to prepare an adequate budget for system initiatives so that the program is easy to implement. Customized Product: The main feature of the quality products is the consumer 's product .Kalutara urban council also requires customer needs for customers. 3.3 Data analysis requires a number of intimate relationships, and requires the classification of categories, types of categories, data types, raw data, creating tables, and creating relationships. After summarizing, the analysis is usually based on the various sizes of the calculations. It is ugly, such as the use of clearly defined statistical statements. In analysis, it is important to determine that it is possible to determine whether it is possible to determine whether the relationship between conflicting or conflicting differences can occur between the original hypothesis or the new assumption. Data analysis and submission data plays an important role. Projected results are the only reliable source for forecasting results. Therefore, it is important to analyze the collection of data. Therefore, incorrect data can misidentify you by the organization, but it can be directly submitted to you accurately and accurately. Therefore, it is wise to select a data collection method according to the expected situation of the project and targeted varieties. As researchers, a system was selected for managing questionnaires. Select a group of respondents representing different fields of the organization. Kushan Wijerathne Page 39 MSCP Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 Task 4 Task 4.1 The research method for the UC is a research methodology for marketing and business analysis. Both qualitative and quantitative research methods are carried out efficiently to meet the objectives of the project. Above mentioned research has been carried out by the project manager of the project to meet the requirements of this project. The breakdown of projects will help the Project Manager to set up a specific task for the employees and prepare their talents. Project worker degradation of the project work has been reduced. According to the structure, the manager will be able to accomplish the project functions within the same period. On the other hand, the amount of time required for the work and the required amount of labor for the purpose of the project has been specified for the project's gantry. This work is specified by Gantt chart during the period. Therefore, the manager will be able to perform the task within the project period. Project manager’s own learning and performances Cost control: As a Project Manager at the Kalutara urban council, the process for managing the cost of the project has been learned. The most important factor in the project is the control project. I have a great deal of idea and technology about the process of cost control of the project. Negotiation skills: When implementing the project, I wanted to communicate with many projects and agents. Therefore, I intend to manage the stakeholders and do good transactions with customers. So this is a good lesson for me. Communication skills: Communication skills are the most important factor or quality of the manager. I was limited in communicating with customers when I started the project. But I have received many technologies and processes to communicate with business customers after the project. Risk management skills: Project management Risk management must have certain conditions, since any business project is at risk. So at the assessment management project, I got a lesson in project risk management as a project manager. This situation has helped me. To achieve the project, achieve the goal of the project. 4.2 The best way to find out the security risks involved in the present infrastructure of the testing method used by the Kalutara UC is Qualitative and quantitative research was done efficiently to fulfill the objectives of the project. As the city council decided to know the current technology of access to existing technologies, the aforementioned repository was studied to fulfill the project manager's project requirements. Quantitative research has revealed that employees' ideas are more effective in working with newer technologies, but provide insights into the current UC status and level of security that have helped to get it through quality surveys. A Kushan Wijerathne Page 40 MSCP Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 quality survey also helped the manager to provide better proposals to improve the current UC subsidiary. Project project manager's task is reduced to the task of the project. According to the structure, the manager can get the project work during that period. On the other hand, the Gantt chart of the project specifies the amount of time required for all tasks and the number of employees required for that task. The accountant can perform the project within the project period, as specified in Gantt chart during the engagement period. Kushan Wijerathne Page 41 MSCP Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 Appendix PROJECT LOG SHEET REFERENCES 1. Tomczyk, C. (2011). Project Manager's Spotlight on Planning. 2. Williams, M. (2008). Principles of Project Management (SitePoint. 1st ed. Collingwood: SitePoint 3. Maylor, H. (2010). Project management. 1st ed. Harlow, England: Financial Times Prentice Hall is an imprint of Pearson 4. Brighthub Project Management. (2017). Types of Project Costs - Examples of the Different Variables in Project Cost Management. [online] Available at: http://www.brighthubpm.com/project-planning/54894-example-of-costs-inproject-management 5. Art of Comunication in Project Management : https://www.pmi.org 6. Validity, reliability, and generalizability in qualitative research : https://www.ncbi.nlm.nih.gov Kushan Wijerathne Page 42 MSCP Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com) lOMoARcPSD|19511684 Kushan Wijerathne Page 43 MSCP Unit: 6 Downloaded by harshana wijayarathna (harshanathariduwijayarathna@gmail.com)