Explain qualitative and quantitative research methods

Assignment Help Software Engineering
Reference no: EM132714918

Unit 6 Managing a Successful Computing Project - BTEC Higher National Diploma in Computing

Vulnerability Assessment - Management Information System (MIS) Project

LO1. Establish project aims, objectives and timeframes based on the chosen theme

LO2. Conduct small-scale research, information gathering and data collection to generate knowledge

LO3. Present the project and communicate appropriate recommendations based on meaningful conclusions drawn from the evidence findings and/or analysis.

LO4. Reflect on the value gained from conducting the project and its usefulness to support sustainable organisational performance

Vulnerability Assessment - Management Information System (MIS) Project
Management Information Systems (MIS) plays a very important role in today's organizations; it creates an impact on the organization's functions, performance and productivity. A Management Information System (MIS) ensures that an appropriate data is collected from the various sources, processed and send further to all the needy destinations. A system is expected to fulfill the information needs of an individual, a group of individuals, management functionaries, managers and top management to improve efficiency and productivity.
On contrary, any system can be compromised with vulnerability issues. This is mostly in area of confidentiality, integrity and availability (security triangle).
You're advised to provide solutions for improvements for a selected Management Information System's in a selected organization in the area of how to improve aspects of confidentiality, integrity and availability (security triangle) through a vulnerability study assessment.
You should investigate the causes and impacts of vulnerabilities within computing systems and explore the solutions to the problems presented in order to make recommendations to improve their security for Management Information System. The expected solution of the project is a vulnerability assessment and action plan which includes, issues of varying severity.

In general, the vulnerability assessment may focus on a test of security infrastructure devices, network servers, operational systems (including Windows and Linux), physical security of buildings, and wireless internet security. You have to mainly focus on how can vulnerabilities in an existing system be identified and counteracted.
• Discover unknown entry points both physical and electronic - that is threat to the overall confidentiality, integrity, and availability of network data and resources.
• Problem can be discovered in the areas of installing, configuring, and maintaining servers and infrastructure equipment as well as practices of different department managers and staff tend to have different ways of managing their IT.
• Recommendations for standardization of upcoming infrastructure installations, configurations, and maintenance.
• Educate and increase user awareness on what they could change to improve their security situation in order to build confidence of using the Management Information System
• An action plan to keep their environment secure.
Your role as a student researcher means that you are not trying to perform a specific solution to any vulnerability problem case. You have to make expert recommendations on how to tighten security controls, based on a proven assessment methodology, that are in the best interest of the specific project of Management Information System which may eliminate unnecessary entry points that would greatly reduce the threat. Introducing of a set of policies and procedures for the entire Management Information System help eliminate threats through network entry points and infrastructure. The vulnerability trends and recurring issues that needed careful attention. The project span 03 months in order to provide an accurate snapshot of their current security posture.

The benefit of the project is that it provides a greater awareness among the entire staff about how any vulnerability or weakness in any functional area affects the overall security posture of the Management Information System at large. You are required to provide a full report on vulnerabilities you found and how you educate the Management Information System staff on what they could change to improve their security situation with an action plan to keep their environment secure.

TASK - 01

1.1 Describe aims and objectives for vulnerability assessment project which you're introducing. Your explanation should include a brief introduction about the company, the MIS and other relevant information to the assessment project.
1.2 Produce a comprehensive project management plan, The plan should include milestone schedule and project schedule for monitoring and completing the aims and objectives of the project that includes cost, scope, time, quality, communication, risk and resources management.
1.3 Produce a work breakdown structure and a Gantt Chart to provide timeframes and stages for completion.

TASK - 02

2.1 Explain qualitative and quantitative research methods appropriate for meeting project aims and objectives which you produced as vulnerability assessment project.
2.2 Evaluate the project's management process and appropriate research methodologies applied, the accuracy and reliability of different research methods applied for the small scale research

TASK - 03
3.1 Analyze research data using appropriate tools and techniques.
3.2 Describe appropriate recommendations as a result of research and data analysis to draw valid and meaningful conclusions.
3.3 Evaluate the selection of appropriate tools and techniques for accuracy and authenticity to support and justify recommendations.

TASK - 04
4.1. Provide a reflection on the value of undertaking the research to meet stated objectives with your own learning and performance which includes a discussion of the project outcomes, its usefulness to support sustainability of the given organization and its' performance, the decision-making process and changes or developments of the initial project management plan to support justification of recommendations and learning during the project.

4.2. Evaluate the value of the project management process and use of quality research to meet stated objectives and support own learning and performance

Attachment:- Managing a Successful research project.rar

Reference no: EM132714918

Questions Cloud

What would be ending inventory assuming lifo : Dunbar sold 580 units of inventory during the month. Ending inventory assuming LIFO would be: (Do not round your intermediate calculations).
Should inmates be required to pay bail : The healthcare costs (financial burden) of inmates at the local county jail is on the county government. How does this impact decision to release individuals.
What amount should be reported on avalia income statement : Avalia Ltd. decided on January 1, 2019 to discontinue its plastic-making division. The division, properly identified as a reportable segment, was sold on June.
Create additional issues regarding the health topic : Pick a public health issue, how the system either helps to create additional issues regarding this health topic or helps to address the health topic overall.
Explain qualitative and quantitative research methods : Explain qualitative and quantitative research methods appropriate for meeting project aims and objectives which you produced as vulnerability assessment project
How could understand the sweeping political changes : How you could understand the sweeping political changes that have taken place and are currently taking place since the election of President Trump
Why does continue to exist in the US : If this "line" is arbitrary, or a subjective and legally unsupported in American culture, why does it continue to exist in the US in 2016?
Calculate the value of the reinvestment : The ARA Corporation bonds have a coupon of 14%, You plan to reinvest the coupon interest at 12% rate of return per annum. Calculate the value of reinvestment
How does impact understanding of prejudice in society : Discusses the concept of White Privilege. According to Wise, what is White Privilege and how does it impact our understanding of prejudice in our society?

Reviews

Write a Review

Software Engineering Questions & Answers

  Improving the new product development process

In this era of "faster, cheaper and better", companies are focusing on improving the product development process. New business strategies, new organizational approaches, new business processes and new enabling technology are being used by many upc..

  Discuss reasons behind nibcos decision

Case Study- NIBCO's "Big Bang": An SAP Implementation, Discuss reasons behind NIBCO's decision to implement an ERP system

  What important skills needed for a good penetration tester

Need to review given article with 2 APA references. What are the most important skills and methods needed for a good penetration tester

  Advantages of using customer relations management

From the e-Activity, determine the strategic advantages and disadvantages of using Customer Relations Management (CRM), services provided by vendors, such as Salesforce.com, with regard to analytics and forecasting, infrastructure maintenance, dat..

  Recognize the benefits that uml brings to the software

identify the benefits that uml brings to the software development industry. speculate on umls development and its

  Calculating a discount that customers receive

Computing a discount that consumers receive based on the value of their order. If the total value ordered is less than $20, no discount will be given.

  Spending their time handling customer issues

What kind of process would you suggest to help the team be more proactive about addressing what needs to get fixed?

  Develop an online payment system for customers

Questions of this part analyze the students' understanding in analyzing the given scenario and practical skills to build Sequence diagrams

  Understanding a real-time and time-critical system

ITECH 7410: Software Engineering Methodologies Assignment. The purposes of the assignment: Understanding a real-time and time-critical system. Understanding Entity Relationship Diagram and Data Flow Diagram in terms of a real time software system

  Saving privacy on the web

Explain two tools that people can use to save their privacy on the web. Give one useful application of location tracking.

  Prepare a sequence diagram for booking confirmation use case

Prepare a sequence diagram for the booking confirmation use case. Must include a detailed description. Create a communication diagram for the booking confirmation use case.

  Amount of payments made during june

The June 30 Accounts Payable balance was $32,000. What was the amount of payments made during June?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd