- Information
- AI Chat
437036022 Col e 004653 Mscp Com079 Docx
HND in Computing
ESOFT Metro Campus
Recommended for you
Preview text
Higher National Diploma in Computing & Systems Development / Business Management Assignment Submission Form Name Kushan Wijerathne Name of Group Members (If ESOFT Reg. No COL/E-004653 Applicable) Edexcel No Module Name Managing a Successful Computing Project Name of the Lecturer Ms Sumudu Date Due 29/12/ Date Submitted 12/01/ Fine Email-Address wkushan99@gmail Contact No 0714069550 Check List () CD Assignment Brief
Formatting Sheet Harvard Referencing
Signature on Coversheet
Signature on Student Declaration
Herewith I agree for the given terms and conditions on plagiarism & Academic dishonesty also I declare the work submitted doesn’t breach these regulations. Note: Keep the softcopy of the assignment with you until the official results released by ESOFT. ESOFT has all rights to request the softcopy again at any time.
wkushan99@gmail 12/01/ Signature Date
Kushan Wijerathne MSCP Unit: 6 Page 1
#3, De Fonseka Road, Colombo 04.
ESOFT METRO CAMPUS
Higher Nationals Internal verification of assessment decisions – BTEC (RQF)
INTERNAL VERIFICATION – ASSESSMENT DECISIONS Programme title BTEC Higher National Diploma in Computing Assessor Ms Sumudu Internal Verifier Unit(s) Unit 6 Managing a Successful Computing Project Assignment title Vulnerability Assessment – Management Information System (MIS) Project Student’s name List which assessment criteria the Assessor has awarded.
Pass Merit Distinction
INTERNAL VERIFIER CHECKLIST Do the assessment criteria awarded match those shown in the assignment brief? Y/N
Is the Pass/Merit/Distinctiongrade awarded justified by the assessor’s comments on the student work?
Y/N
Has the work been assessed accurately? Y/N Is the feedback to the student: Give details: - Constructive? - Linked to relevant assessment criteria? - Identifying opportunities for improved performance?
- Agreeing actions?
Y/N Y/N
Y/N Y/N Does the assessment decision need amending? Y/N Assessor signature Date Internal Verifier signature Date Programme Leader signature (if required) Date
Kushan Wijerathne MSCP Unit: 6 Page 2
Higher Nationals - Summative Assignment Feedback Form
Student Name/ID
Unit Title Unit 6 Managing a Successful Computing Project
Assignment Number 1 Assessor Ms Sumudu
Submission Date 29/12/2018 Date Received 1st submission
Re-submission Date Date Received 2ndsubmission
Assessor Feedback:
LO1. Assess risks to IT security Pass, Merit & Distinction Descripts
P1 P2 M1 D
LO2. Describe IT security solutions.
Pass, Merit & Distinction Descripts
P3 P4 M2 D
LO3. Review mechanisms to control organisational IT security. Pass, Merit & Distinction Descripts
P5 P6 M3 M4 D
LO4. Create and use a Test Plan to review the performance and design of a multipage website. Pass, Merit & Distinction Descripts
P7 P8 M5 D
Grade: Assessor Signature: Date:
Resubmission Feedback:
Grade: Assessor Signature: Date:
Internal Verifier’s Comments:
Signature & Date:
- Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and grades decisions have been agreed at the assessment board.
Kushan Wijerathne MSCP Unit: 6
Pearson
Higher Nationals in
Computing
Unit 6: Managing a Successful Computing Project
Kushan Wijerathne MSCP Unit: 6
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as my own without attributing the sources in the correct way. I further understand what it means to copy another’s work.
- I know that plagiarism is a punishable offence because it constitutes theft.
- I understand the plagiarism and copying policy of the Edexcel UK.
- I know what the consequences will be if I plagiaries or copy another’s work in any of the assignments for this program.
- I declare therefore that all work presented by me for every aspects of my program, will be my own, and where I have made use of another’s work, I will attribute the source in the correct way.
- I acknowledge that the attachment of this document signed or not, constitutes a binding agreement between myself and Edexcel UK.
- I understand that my assignment will not be considered as submitted if this document is not attached to the attached.
wkushan99@gmail 29/12/ Student’s Signature: Date: (Provide E-mail ID) (Provide Submission Date)
Kushan Wijerathne MSCP Unit: 6
Assignment Brief
Student Name /ID Number COL/E- Unit Number and Title Unit 6: Managing a Successful Computing Project Academic Year 2017/ Unit Tutor Assignment Title Vulnerability Assessment - Management Information System Project Issue Date Submission Date IV Name & Date Submission Format: The submission is in the form of an individual written report. This should be written in a concise, formal business style using single spacing and font size 12. You are required to make use of headings, paragraphs and subsections as appropriate, and all work must be supported with research and referenced using the Harvard referencing system. Please also provide an end list of references using the Harvard referencing system.
Unit Learning Outcomes: LO1 Establish project aims, objectives and timeframes based on the chosen theme.
LO2 Conduct small-scale research, information gathering and data collection to generate knowledge to support the project.
LO3 Present the project and communicate appropriate recommendations based on meaningful conclusions drawn from the evidence findings and/or analysis.
LO4 Reflect on the value gained from conducting the project and its usefulness to support sustainable organizational performance.
Assignment Brief and Guidance:
Vulnerability Assessment - Management Information System (MIS) Project
Kushan Wijerathne MSCP Unit: 6
1 Describe aims and objectives for vulnerability assessment project which you’re introducing. Your explanation should include a brief introduction about the company, the MIS and other relevant information to the assessment project. 1 Produce a comprehensive project management plan, The plan should include milestone schedule and project schedule for monitoring and completing the aims and objectives of the project that includes cost, scope, time, quality, communication, risk and resources management. 1 Produce a work breakdown structure and a Gantt Chart to provide timeframes and stages for completion. TASK – 02
2 Explain qualitative and quantitative research methods appropriate for meeting project aims and objectives which you produced as vulnerability assessment project. 2 Evaluate the project’s management process and appropriate research methodologies applied, the accuracy and reliability of different research methods applied for the small scale research
TASK – 03
3 Analyze research data using appropriate tools and techniques. 3 Describe appropriate recommendations as a result of research and data analysis to draw valid and meaningful conclusions. 3 Evaluate the selection of appropriate tools and techniques for accuracy and authenticity to support and justify recommendations.
TASK – 04
Provide a reflection on the value of undertaking the research to meet stated objectives with your own learning and performance which includes a discussion of the project outcomes, its usefulness to support sustainability of the given organization and its’ performance, the decision- making process and changes or developments of the initial project management plan to support justification of recommendations and learning during the project.
Evaluate the value of the project management process and use of quality research to meet stated objectives and support own learning and performance
Kushan Wijerathne MSCP Unit: 6
Grading Rubric Grading Criteria Achieved Feedback
LO1 Establish project aims, objectives and timeframes based on the chosen theme
P1 Devise project aims and objectives for a chosen scenario.
P2 Produce a project management plan that covers aspects of cost, scope, time, quality, communication, risk and resources. P3 Produce a work breakdown structure and a Gantt Chart to provide timeframes and stages for completion. M1 Produce a comprehensive project management plan, milestone schedule and project schedule for monitoring and completing the aims and objectives of the project. LO2 Conduct small-scale research, information gathering and data collection to generate knowledge to support the project
P4 Carry out small-scale research by applying qualitative and quantitative research methods appropriate for meeting project aims and objectives.
M2 Evaluate the accuracy and reliability of different research methods applied.
D1 Critically evaluate the project management process and appropriate research methodologies applied. LO3 Present the project and communicate appropriate recommendations based on meaningful conclusions drawn from the evidence findings and/or analysis
P5 Analyse research and data using appropriate tools and techniques.
P6 Communicate appropriate recommendations as a
Kushan Wijerathne MSCP Unit: 6 Page 11
Pearson Higher Nationals in
Computing
Kushan Wijerathne COL/E-
Kushan Wijerathne MSCP Unit: 6
Unit 05: Security
Acknowledgement
The success and final outcome of this assignment required a lot of guidance and assistance from many
people and I’m extremely fortunate to have this all along the completion of the assignment work. Whatever
I have done so far is due to such guidance and assistance and I would not forget to thank them. I respect
and thank Ms. Anne Sumudu for giving me an opportunity to do this assignment work and providing me all
support and guidance which made me complete the assignment on time, I am extremely grateful to him for
the support throughout the course. MSCP takes an important place in this semister because it covers a vast
area of knowledge and it helps you to rectify errors that you make more often in managing a project. I am
really grateful because we managed to complete this assignment within the given time frame. Even though
we faced some issues in between the semester with lecturers we managed to do it successfully. I can’t
forget my friends who helped me in every way. Last but not least I would like to express my gratitude to
Esoft Metro Campus for the opportunities and teaching techniques that help every student to mold their
cooperate life.
Kushan Wijerathne MSCP Unit: 6
- Project manager’s own learning and performances................................................................................
- 4.................................................................................................................................................................
- Appendix...................................................................................................
- REFERENCES..............................................................................................
- Kushan Wijerathne MSCP Unit:
Task 01
Vulnerability Assessment Vulnerability assessment is an important way of recognizing vulnerabilities in the system or application Their filtering analyzers use them to control target frames and identify potential attack agents, deficiencies and crossing points, while heads use them to identify already vague or unknown vulnerabilities that may affect their security base. For all vulnerability assessments, it is necessary to gather a summary of the potential vulnerabilities that indicate the relative levels of risk. In this way a linking effort can put its needs to face the dangers it encounters.
Company Description The Kalutura Urban Council (KUC) is the local authority for Kalutara in the province of Kalutara in the western province of Sri Lanka established in 1878. KUC is responsible for providing a variety of local public services, including roads, sewers, sewers, homes, libraries, public parks and recreation areas. Currently their managing assessment information through a system The Management Information System (MIS) is a data framework used for basic initiatives and for coordinating, managing, inspecting and impressing data in associations. Affiliated organizations can think of different destinations and gather before they come across a risk and vulnerability assessment. These goals and target sections may be the intended consequences of compliance should be an indication of new laws, mandates and information security. Security as a means of setting up and assets of information technology is essentially underlined rather than expectation, area and response. By combining a sound and wide-ranging security process and an enthusiastic IT security plan and structure, relationships can be created to ensure the security of IT facilities and assets, as indicated by the key satisfactory risk or the level of introduction of the relationship.
Defining Security process The defense system consists mainly of three parts: hopes, revelations and reactions. Depending on the expectations, re-certifications or certifications are used in security controls and in the life cycle safety master plan. It is automatically created by integrating the system into an unsupported system or application type for security reasons. Balanced operating systems and application for transparency, reliability and security of applications or application applications. Monitoring of IT organizations and asset inspection. Enter the checklists of the logs, the research lines, the spy acceptance program, and the IT institutes for the nineteen evaluation missions and processes. It is the responsibility of the information security experts to
Kushan Wijerathne MSCP Unit: 6
Different assets and assets depend on the various ratings of the ITA affiliate. That is, criticism of the importance or affinity of assets, the preferences of the dollar.
The risk, the risk and the condition of the acceptable risk depend on the impact or the risk of the assets or assets of IT.
Project Management Plan
for
Vulnerability assessment of UC
Kalutara
Version 1.
Prepared by: Kushan Wijerathne
Kushan Wijerathne MSCP Unit: 6
Introduction The project plan combines information on personnel, expenditure planning, timing, deadline, goal and assessment. It gives further guidance on both personal and social goals of opportunities and how all aspects of the regulation should be done. As a technique for progress is complemented as a guide to the way a free effort works, a business plan points to the exploitation of the business. This project proposes providing solutions to improve selected information management systems in selected organizations in the ways of improving confidentiality, integrity and availability through research and vulnerability assessment. That's because I did it. Here we have to make a major proposal with the most sophisticated way of modifying security controls in the light of the proven evaluation strategy. This will be the biggest benefit of a clear effort of the information management system. Threatening. The presentation of multiple approaches and methods for the information management system as a whole contributes to the elimination of risks through the focus and infrastructure of the part of the system. The advantage of this exercise is that it pays more attention to all staff for the inability or lack of any utility that has moderate impact on the overall security attitude of the information management system.
Scope We will complete a risk assessment of the Management Information System (MIS) through this project, identifying and strengthening complex objectives in every aspect, such as classification, dignity and access. At the end of this task, we have approved the difficulty of managing management and have issued a suitable arrangement for the MIS staff on specific security arrangements to change the activities to maintain their environment safely.
Milestones Finding a company.
Planning and preparation for the meeting
Schedule the meeting and arrange a local visit
Review the process, documents and related drawings and diagrams
Create a full complete check list.
A billing report has been designed for analysis of the field data by visiting the site.
Grant full approval from the responsible party for preparing the final report.
Cost Management Plan To treat this risk as a research project for a college student, it is not necessary to have an extension of the money for this purpose in gathering important data for the main business. Risk assessment is a procedure for identifying and measuring the risk of becoming confident in the status of the association. It is important to understand the situation and the danger when packaging needs information, minds and risk with far- reaching vulnerability assessment program.
Kushan Wijerathne MSCP Unit: 6
437036022 Col e 004653 Mscp Com079 Docx
Course: HND in Computing
University: ESOFT Metro Campus
- Discover more from:HND in ComputingESOFT Metro Campus999+ Documents
- More from:HND in ComputingESOFT Metro Campus999+ Documents