Explain qualitative and quantitative research methods

Assignment Help Software Engineering
Reference no: EM132714918

Unit 6 Managing a Successful Computing Project - BTEC Higher National Diploma in Computing

Vulnerability Assessment - Management Information System (MIS) Project

LO1. Establish project aims, objectives and timeframes based on the chosen theme

LO2. Conduct small-scale research, information gathering and data collection to generate knowledge

LO3. Present the project and communicate appropriate recommendations based on meaningful conclusions drawn from the evidence findings and/or analysis.

LO4. Reflect on the value gained from conducting the project and its usefulness to support sustainable organisational performance

Vulnerability Assessment - Management Information System (MIS) Project
Management Information Systems (MIS) plays a very important role in today's organizations; it creates an impact on the organization's functions, performance and productivity. A Management Information System (MIS) ensures that an appropriate data is collected from the various sources, processed and send further to all the needy destinations. A system is expected to fulfill the information needs of an individual, a group of individuals, management functionaries, managers and top management to improve efficiency and productivity.
On contrary, any system can be compromised with vulnerability issues. This is mostly in area of confidentiality, integrity and availability (security triangle).
You're advised to provide solutions for improvements for a selected Management Information System's in a selected organization in the area of how to improve aspects of confidentiality, integrity and availability (security triangle) through a vulnerability study assessment.
You should investigate the causes and impacts of vulnerabilities within computing systems and explore the solutions to the problems presented in order to make recommendations to improve their security for Management Information System. The expected solution of the project is a vulnerability assessment and action plan which includes, issues of varying severity.

In general, the vulnerability assessment may focus on a test of security infrastructure devices, network servers, operational systems (including Windows and Linux), physical security of buildings, and wireless internet security. You have to mainly focus on how can vulnerabilities in an existing system be identified and counteracted.
• Discover unknown entry points both physical and electronic - that is threat to the overall confidentiality, integrity, and availability of network data and resources.
• Problem can be discovered in the areas of installing, configuring, and maintaining servers and infrastructure equipment as well as practices of different department managers and staff tend to have different ways of managing their IT.
• Recommendations for standardization of upcoming infrastructure installations, configurations, and maintenance.
• Educate and increase user awareness on what they could change to improve their security situation in order to build confidence of using the Management Information System
• An action plan to keep their environment secure.
Your role as a student researcher means that you are not trying to perform a specific solution to any vulnerability problem case. You have to make expert recommendations on how to tighten security controls, based on a proven assessment methodology, that are in the best interest of the specific project of Management Information System which may eliminate unnecessary entry points that would greatly reduce the threat. Introducing of a set of policies and procedures for the entire Management Information System help eliminate threats through network entry points and infrastructure. The vulnerability trends and recurring issues that needed careful attention. The project span 03 months in order to provide an accurate snapshot of their current security posture.

The benefit of the project is that it provides a greater awareness among the entire staff about how any vulnerability or weakness in any functional area affects the overall security posture of the Management Information System at large. You are required to provide a full report on vulnerabilities you found and how you educate the Management Information System staff on what they could change to improve their security situation with an action plan to keep their environment secure.

TASK - 01

1.1 Describe aims and objectives for vulnerability assessment project which you're introducing. Your explanation should include a brief introduction about the company, the MIS and other relevant information to the assessment project.
1.2 Produce a comprehensive project management plan, The plan should include milestone schedule and project schedule for monitoring and completing the aims and objectives of the project that includes cost, scope, time, quality, communication, risk and resources management.
1.3 Produce a work breakdown structure and a Gantt Chart to provide timeframes and stages for completion.

TASK - 02

2.1 Explain qualitative and quantitative research methods appropriate for meeting project aims and objectives which you produced as vulnerability assessment project.
2.2 Evaluate the project's management process and appropriate research methodologies applied, the accuracy and reliability of different research methods applied for the small scale research

TASK - 03
3.1 Analyze research data using appropriate tools and techniques.
3.2 Describe appropriate recommendations as a result of research and data analysis to draw valid and meaningful conclusions.
3.3 Evaluate the selection of appropriate tools and techniques for accuracy and authenticity to support and justify recommendations.

TASK - 04
4.1. Provide a reflection on the value of undertaking the research to meet stated objectives with your own learning and performance which includes a discussion of the project outcomes, its usefulness to support sustainability of the given organization and its' performance, the decision-making process and changes or developments of the initial project management plan to support justification of recommendations and learning during the project.

4.2. Evaluate the value of the project management process and use of quality research to meet stated objectives and support own learning and performance

Attachment:- Managing a Successful research project.rar

Reference no: EM132714918

Questions Cloud

What would be ending inventory assuming lifo : Dunbar sold 580 units of inventory during the month. Ending inventory assuming LIFO would be: (Do not round your intermediate calculations).
Should inmates be required to pay bail : The healthcare costs (financial burden) of inmates at the local county jail is on the county government. How does this impact decision to release individuals.
What amount should be reported on avalia income statement : Avalia Ltd. decided on January 1, 2019 to discontinue its plastic-making division. The division, properly identified as a reportable segment, was sold on June.
Create additional issues regarding the health topic : Pick a public health issue, how the system either helps to create additional issues regarding this health topic or helps to address the health topic overall.
Explain qualitative and quantitative research methods : Explain qualitative and quantitative research methods appropriate for meeting project aims and objectives which you produced as vulnerability assessment project
How could understand the sweeping political changes : How you could understand the sweeping political changes that have taken place and are currently taking place since the election of President Trump
Why does continue to exist in the US : If this "line" is arbitrary, or a subjective and legally unsupported in American culture, why does it continue to exist in the US in 2016?
Calculate the value of the reinvestment : The ARA Corporation bonds have a coupon of 14%, You plan to reinvest the coupon interest at 12% rate of return per annum. Calculate the value of reinvestment
How does impact understanding of prejudice in society : Discusses the concept of White Privilege. According to Wise, what is White Privilege and how does it impact our understanding of prejudice in our society?

Reviews

Write a Review

Software Engineering Questions & Answers

  Research report on software design

Write a Research Report on software design and answer diffrent type of questions related to design. Report contain diffrent basic questions related to software design.

  A case study in c to java conversion and extensibility

A Case Study in C to Java Conversion and Extensibility

  Create a structural model

Structural modeling is a different view of the same system that you analyzed from a functional perspective. This model shows how data is organized within the system.

  Write an report on a significant software security

Write an report on a significant software security

  Development of a small software system

Analysis, design and development of a small software system.

  Systems analysis and design requirements

Systems Analysis and Design requirements

  Create a complete limited entry decision table

Create a complete limited entry decision table

  Explain flow boundaries map

Explain flow boundaries map the dfd into a software architecture using transform mapping.

  Frame diagrams

Prepare a frame diagram for the software systems.

  Identified systems and elements of the sap system

Identify computing devices, which could be used to support Your Improved Process

  Design a wireframe prototype

Design a wireframe prototype to meet the needs of the personas and requirements.

  Explain the characteristics of visual studio 2005

Explain the characteristics of Visual Studio 2005.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd