Posts

Showing posts from May, 2019

Project Management Plan

Image
What is Project Management Plan? Describe its importance. A Project Management Plan is actually a formal document that helps outline all the components of a project to – from stakeholders and scope all the way to risk management and contingency plans. Far more than just a schedule, these extensive and comprehensive reports give decision makers all the information they need to decide on whether this project is worth pursuing. Importance: The purpose of a project management plan (PMP) is to determine the project outcome, how a successful outcome will be achieved, who will be involved in the project, and how the project will be measured and communicated. Like any blueprint, you have to know what you are trying to do; so having a goal is important. Secondly, you have to know how you are going to achieve those goals by knowing which people in the process play which roles. Describe each management plan and discuss its importance. Scope : is primarily concerned with defining and ...

Research Activity: Qualitative and Quantitative

Focus on different methods of gathering data and material. Feedback the advantages and disadvantages. There are two type of data that can be used for research method, that is; Primary data Secondary data Primary data is a data that are being collect by the researcher themselves for the purpose it was being collected. Secondary data is a data that are gathered by other researcher such as studies, book, journal, diaries and so on. Quantitative method is gathering information that can be measured and expressed numerically. It is usually used for large scale representative samples. Quantitative method such as; Primary data: Survey Primary data: Observation Secondary data: Company account Survey is a set of questions that is being done by the researcher for the participants. Participants such as an entire group or individuals. Survey are useful for researcher aims to describe feature of a large groups. Advantages: High Representatives Low Costs Convenient Data G...

Security Research Activity: Network Security Common Tools & Techniques.

For each of the common tools: Provide description: DMZ (Demilitarization Zone): is a physical subnet that separates an internal LAN from unauthorized/ untrusted network, usually on the internet.   NAT (Network Address Translation): is the process where a network device assigns a public address to a computer inside a private network. FWs (Firewalls): is a software that used to maintain the security of a private network. It control and monitor data that can flow into or out of the network. Discuss its purpose. DMZ: Allow access to  resources from untrusted network while keeping the private network secure. NAT: Is to limit the number of public IP addresses an organization or company must use, for both economy and security purposes. FWs : Can block unauthorized access by looking for suspicious words, domain names or IP addresses. Give the advantages (2) and disadvantages (2). DMZ: Advantages: Increase the security of the LAN. Do not offer any easy route. Ther...

Security vulnerability test: Vulnerability scanning

Image
Describe the test and purpose of the test. Vulnerability scanning is a security technique to identify security weaknesses in a computer system. The purpose of Vulnerability scanning is to check whether there is an error or a problems within the security. Such as if a hacker can hack a system or not. Discuss how it works. A vulnerability scan detect and classifies system weakness in computers, network and communications equipment and predicts the effectiveness of countermeasures. A vulnerability scanner runs from the end point of the person inspecting the attack surface in question. The software compares details about the target attack surface to a database of information about known security holes in services and ports, anomalies in packet construction, and potential paths to exploitable programs or scripts. The scanner software attempts to exploit each vulnerability that is discovered. Provide example of the test. By using Nessus Professional Discuss ...

Research Activity: IT Security Solution

Find two tools (2) used for implementing network security. Wireshark: use to capture and view the data traveling back and forth on your network. It provides the ability to drill down and read the contents of each packet and is filtered to meet your specific needs. It is commonly used to troubleshoot network problems and to develop and test software. Nessus Professional: makes no assumptions regarding what services are running on what ports and it actively attempts to exploit vulnerabilities rather than just comparing version numbers of the active services. Find two techniques (2) used for implementing network security. Encryption:  A password manager that controls access. People within companies cause the most problems. Provide training on how to avoid malware and phishing attacks. The Yahoo breach was due to an employee clicking on a malicious link. Real-time ingestion and visualization:  to track the intruder as they move in and around the network. Find ...