Explain qualitative and quantitative research methods

Assignment Help Software Engineering
Reference no: EM132714918

Unit 6 Managing a Successful Computing Project - BTEC Higher National Diploma in Computing

Vulnerability Assessment - Management Information System (MIS) Project

LO1. Establish project aims, objectives and timeframes based on the chosen theme

LO2. Conduct small-scale research, information gathering and data collection to generate knowledge

LO3. Present the project and communicate appropriate recommendations based on meaningful conclusions drawn from the evidence findings and/or analysis.

LO4. Reflect on the value gained from conducting the project and its usefulness to support sustainable organisational performance

Vulnerability Assessment - Management Information System (MIS) Project
Management Information Systems (MIS) plays a very important role in today's organizations; it creates an impact on the organization's functions, performance and productivity. A Management Information System (MIS) ensures that an appropriate data is collected from the various sources, processed and send further to all the needy destinations. A system is expected to fulfill the information needs of an individual, a group of individuals, management functionaries, managers and top management to improve efficiency and productivity.
On contrary, any system can be compromised with vulnerability issues. This is mostly in area of confidentiality, integrity and availability (security triangle).
You're advised to provide solutions for improvements for a selected Management Information System's in a selected organization in the area of how to improve aspects of confidentiality, integrity and availability (security triangle) through a vulnerability study assessment.
You should investigate the causes and impacts of vulnerabilities within computing systems and explore the solutions to the problems presented in order to make recommendations to improve their security for Management Information System. The expected solution of the project is a vulnerability assessment and action plan which includes, issues of varying severity.

In general, the vulnerability assessment may focus on a test of security infrastructure devices, network servers, operational systems (including Windows and Linux), physical security of buildings, and wireless internet security. You have to mainly focus on how can vulnerabilities in an existing system be identified and counteracted.
• Discover unknown entry points both physical and electronic - that is threat to the overall confidentiality, integrity, and availability of network data and resources.
• Problem can be discovered in the areas of installing, configuring, and maintaining servers and infrastructure equipment as well as practices of different department managers and staff tend to have different ways of managing their IT.
• Recommendations for standardization of upcoming infrastructure installations, configurations, and maintenance.
• Educate and increase user awareness on what they could change to improve their security situation in order to build confidence of using the Management Information System
• An action plan to keep their environment secure.
Your role as a student researcher means that you are not trying to perform a specific solution to any vulnerability problem case. You have to make expert recommendations on how to tighten security controls, based on a proven assessment methodology, that are in the best interest of the specific project of Management Information System which may eliminate unnecessary entry points that would greatly reduce the threat. Introducing of a set of policies and procedures for the entire Management Information System help eliminate threats through network entry points and infrastructure. The vulnerability trends and recurring issues that needed careful attention. The project span 03 months in order to provide an accurate snapshot of their current security posture.

The benefit of the project is that it provides a greater awareness among the entire staff about how any vulnerability or weakness in any functional area affects the overall security posture of the Management Information System at large. You are required to provide a full report on vulnerabilities you found and how you educate the Management Information System staff on what they could change to improve their security situation with an action plan to keep their environment secure.

TASK - 01

1.1 Describe aims and objectives for vulnerability assessment project which you're introducing. Your explanation should include a brief introduction about the company, the MIS and other relevant information to the assessment project.
1.2 Produce a comprehensive project management plan, The plan should include milestone schedule and project schedule for monitoring and completing the aims and objectives of the project that includes cost, scope, time, quality, communication, risk and resources management.
1.3 Produce a work breakdown structure and a Gantt Chart to provide timeframes and stages for completion.

TASK - 02

2.1 Explain qualitative and quantitative research methods appropriate for meeting project aims and objectives which you produced as vulnerability assessment project.
2.2 Evaluate the project's management process and appropriate research methodologies applied, the accuracy and reliability of different research methods applied for the small scale research

TASK - 03
3.1 Analyze research data using appropriate tools and techniques.
3.2 Describe appropriate recommendations as a result of research and data analysis to draw valid and meaningful conclusions.
3.3 Evaluate the selection of appropriate tools and techniques for accuracy and authenticity to support and justify recommendations.

TASK - 04
4.1. Provide a reflection on the value of undertaking the research to meet stated objectives with your own learning and performance which includes a discussion of the project outcomes, its usefulness to support sustainability of the given organization and its' performance, the decision-making process and changes or developments of the initial project management plan to support justification of recommendations and learning during the project.

4.2. Evaluate the value of the project management process and use of quality research to meet stated objectives and support own learning and performance

Attachment:- Managing a Successful research project.rar

Reference no: EM132714918

Questions Cloud

What would be ending inventory assuming lifo : Dunbar sold 580 units of inventory during the month. Ending inventory assuming LIFO would be: (Do not round your intermediate calculations).
Should inmates be required to pay bail : The healthcare costs (financial burden) of inmates at the local county jail is on the county government. How does this impact decision to release individuals.
What amount should be reported on avalia income statement : Avalia Ltd. decided on January 1, 2019 to discontinue its plastic-making division. The division, properly identified as a reportable segment, was sold on June.
Create additional issues regarding the health topic : Pick a public health issue, how the system either helps to create additional issues regarding this health topic or helps to address the health topic overall.
Explain qualitative and quantitative research methods : Explain qualitative and quantitative research methods appropriate for meeting project aims and objectives which you produced as vulnerability assessment project
How could understand the sweeping political changes : How you could understand the sweeping political changes that have taken place and are currently taking place since the election of President Trump
Why does continue to exist in the US : If this "line" is arbitrary, or a subjective and legally unsupported in American culture, why does it continue to exist in the US in 2016?
Calculate the value of the reinvestment : The ARA Corporation bonds have a coupon of 14%, You plan to reinvest the coupon interest at 12% rate of return per annum. Calculate the value of reinvestment
How does impact understanding of prejudice in society : Discusses the concept of White Privilege. According to Wise, what is White Privilege and how does it impact our understanding of prejudice in our society?

Reviews

Write a Review

Software Engineering Questions & Answers

  Answer the module review questions listed below these

1.answer the module review questions listed below. these questions were chosen to demonstrate your understanding and

  How your organisation uses technology roadmaps

Create an initial post in which you analyse how your company uses technology roadmaps. In your analysis, address how successful or unsuccessful the company has been in implementing that roadmap

  How applying a mixed-source methodology enhances testing

Elabote on how applying a mixed-source methodology overcomes the disadvantages of a single-source methodology. Elaborate on how applying a mixed-source methodology enhances testing efficiency.

  Fundamental approaches to requirements elicitation

Identify and explain the two fundamental approaches to requirements elicitation. Include reference please

  Senior management at your company is concerned about why

read the following scenario senior management at your company is concerned about why so many software development

  Describe the use of arrays and subscripts

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

  Suggest an architecture for a system

Suggest an architecture for a system that is used to sell and distribute music on the internet. What architectural patterns are the basis for this architecture?

  Could discipline enforced by suitable software management

how disciplined use of #include directives can mitigate worst danger of independent compilation. Could discipline enforced by suitable software management tool.

  Describe system and software standards

Describe system and software standards that could be used for the description of control constructs in C, C#, or Java. Explain how software standards are used to improve the quality of software in an organization. Provide examples to support your a..

  Create the software test document

ITECH7409 - Software Testing - Develop and maintain plans for scheduling quality assurance tasks including software testing-Implementation of project management

  Develop a visual rendering of approach using microsoft visio

Develop a visual rendering of each approach using Microsoft Visio or its open source alternative, Dia. Note: The graphically depicted solution is not included in the required page length.

  Generate an infinite number of tests from grammar

Construct a valid URL that is not valid with respect to your regular expression. If you have done an outstanding job in part 1, explain why your regular expression does not have any such URLs.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd