You are on page 1of 106

Higher Nationals

Internal verification of assessment decisions – BTEC (RQF)


INTERNAL VERIFICATION – ASSESSMENT DECISIONS
Programme title BTEC HND in Computing

Assessor Internal Verifier


Unit 06: Managing a Successful Computing Project
Unit(s)
Managing a Project on cyber security risks due to Remote working
Assignment title

Student’s name
List which assessment criteria Pass Merit Distinction
the Assessor has awarded.

INTERNAL VERIFIER CHECKLIST

Do the assessment criteria awarded match


those shown in the assignment brief? Y/N
Is the Pass/Merit/Distinction grade awarded
justified by the assessor’s comments on the Y/N
student work?
Has the work been assessed
Y/N
accurately?
Is the feedback to the student:
Give details:
• Constructive? Y/N
• Linked to relevant assessment criteria? Y/N
• Identifying opportunities for Y/N
improved performance?
• Agreeing actions? Y/N
Does the assessment decision need
Y/N
amending?

Assessor signature Date

Internal Verifier signature Date


Programme Leader signature (if required)
Date
Confirm action completed
Remedial action taken
Give details:

Assessor signature Date


Internal Verifier
signature Date
Programme Leader
signature (if required) Date
Higher Nationals – Summative Assignment Feedback Form
Student Name/ID

Unit Title Unit 6 Managing a Successful Computing Project

Assignment Number 1 Assessor


DateReceived1stsub
Submission Date
mission
DateReceived2ndsubmissio
Re-submission Date
n
Assessor Feedback:

LO1.Establish project aims, objectives and time frames based on the chosen theme

Pass, Merit & Distinction P1 P2 P3 M1


Descripts
LO2. Conduct small-scale research, information gathering and data collection to generate knowledge

to support the project

Pass, Merit & Distinction P4 M2 D1


Descripts

LO3. Present the project and communicate appropriate recommendations based on meaningful conclusions
drawn from the evidence findings and/or analysis.
Pass, Merit & Distinction P5 P6 M3 D2
Descripts

LO4. Reflect on the value gained from conducting the project and its usefulness to support sustainable
organisational performance
Pass, Merit & Distinction P7 M4 D3
Descripts

Grade: Assessor Signature: Date:

Resubmission Feedback:

Grade: Assessor Signature: Date:

Internal Verifier’s Comments:

Signature & Date:


* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and grades decisions have
been agreed at the assessment board.

MSCP/2021/22/Remote working
Assignment Feedback
Formative Feedback: Assessor to Student

Action Plan

Summative feedback

Feedback: Student to Assessor

Assessor signature Date

Student signature Date

MSCP/2021/22/Remote working
Pearson
Higher Nationals in
Computing
Unit 6: Managing a Successful Computing Project

MSCP/2021/22/Remote working
General Guidelines

1. A Cover page or title page – You should always attach a title page to your assignment. Use previous page as
your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom, right margins and 1.25” for the left margin of each page.

Word Processing Rules

1. The font size should be 12 point and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and Page Number
on each page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help editing your assignment.

Important Points:

1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the compulsory
information. eg: Figures, tables of comparison etc. Adding text boxes in the body except for the before
mentioned compulsory information will result in rejection of your work.
2. Carefully check the hand in date and the instructions given in the assignment. Late submissions will not be
accepted.
3. Ensure that you give yourself enough time to complete the assignment by the due date.
4. Excuses of any nature will not be accepted for failure to hand in the work on time.
5. You must take responsibility for managing your own time effectively.
6. If you are unable to hand in your assignment on time and have valid reasons such as illness, you may apply
(in writing) for an extension.
7. Failure to achieve at least PASS criteria will result in a REFERRAL grade.
8. Non-submission of work without valid reasons will lead to an automatic REFERRAL. You will then be asked to
complete an alternative assignment.
9. If you use other people’s work or ideas in your assignment, reference them properly using HARVARD
referencing system to avoid plagiarism. You have to provide both in-text citation and a reference list.
10. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be reduced to A
REFERRAL or at worst you could be expelled from the course

MSCP/2021/22/Remote working
Student Declaration

I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as my own
without attributing the sources in the correct way. I further understand what it means to copy another’s work.

1. I know that plagiarism is a punishable offence because it constitutes theft.


2. I understand the plagiarism and copying policy of the Pearson UK.
3. I know what the consequences will be if I plagiaries or copy another’s work in any of the assignments for this
program.
4. I declare therefore that all work presented by me for every aspects of my program, will be my own, and where I
have made use of another’s work, I will attribute the source in the correct way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding agreement between
myself and Pearson UK.
6. I understand that my assignment will not be considered as submitted if this document is not attached to the
attached.

Student’s Signature: Date:


(Provide E-mail ID) (Provide Submission Date)

MSCP/2021/22/Remote working
Higher National Diploma in Computing

Assignment Brief
Student Name /ID Number

Unit Number and Title Unit 6: Managing a Successful Computing Project

Academic Year 2021/20222018

Unit Tutor

Assignment Title Vulnerability Assessment - Management Information System Project

Issue Date

Submission Date

IV Name & Date

Submission Format:
The submission should be in the form of an individual report written in a concise, formal business style
using single spacing (refer to the assignment guidelines for more details). You are required to make use
of headings, paragraphs, and subsections as appropriate, and all work must be supported with research
and referenced using Harvard referencing system. Please provide in-text citation and a list of
references using Harvard referencing system.

Please note that this is an individual assessment and your report should include evidences to that you
have conducted a research to collect relevant data individually.

MSCP/2021/22/Remote working
Unit Learning Outcomes:
LO1 Establish project aims, objectives and timeframes based on the chosen theme.

LO2 Conduct small-scale research, information gathering and data collection to generate knowledge to
support the project.

LO3 Present the project and communicate appropriate recommendations based on meaningful conclusions
drawn from the evidence findings and/or analysis.

LO4 Reflect on the value gained from conducting the project and its usefulness to support sustainable
organizational performance.

Assignment Brief and Guidance:

MSCP/2021/22/Remote working
MSCP/2021/22/Remote working
MSCP/2021/22/Remote working
Research Theme: Remote working

Research Topic: What are the key cyber security risks of working remotely e.g. employees downloading
unsecure apps or sharing their work devices with family members?

“The option to work remotely was already being embraced by some businesses in the pre-pandemic era. These
businesses were making some progress to adapt their working practices to accommodate remote working by
allowing those in certain job roles to take the opportunity to work from home, albeit a day or two a week.
However, on the whole there had been a reluctance to have staff working remotely and this has largely
centred around productivity concerns, security implications and technology issues.

The global pandemic however necessitated and accelerated the move to remote working. The vast majority of
businesses have now shifted some or all of their operations online, and almost all of their staff are working
from home. The enabling force behind this necessary shift has been the different technologies and platforms
that facilitate workers to achieve business goals remotely. This sudden shift to remote working took place
within weeks and months and has not been without issues. Several surveys conducted during this period cited
business leaders complaining about how technology problems have impacted their business and employees
while working remotely. The biggest issues remote workers face are being frequently disconnected from
corporate networks, slow file downloads, poor quality of video meetings and long response times when
loading apps. As a result, building secure, effective and integrated technology capability, to continue this
flexibility in the workforce, has now become a priority for all organisations”. (Pearson, 2020)

You are expected to carry out a small-scale research in order to explore the cyber security risks of working
remotely due to the pandemic, from the standpoint of a computing professional. The research that you carry
out can be based on an organization that you have access to gather sufficient information to investigate the
cyber security risks of remote working.

The report should include,

MSCP/2021/22/Remote working
 A comprehensive project management plan
 Evaluation of data collection methods and data analysis tools and/or techniques should be provided
 Appropriate recommendations should be provided
 Reflect on the value gained from conducting the project and its usefulness to support sustainable
organizational performance

TASK – 01
o Define the scope of the project and devise aims and objectives of the project that you are going
to carry out. You also should include a brief introduction to the selected company, remote
working process and technologies used, explanation to the project and other relevant
information about the research.

1.2 Produce a comprehensive project plan including the following.


 Cost, scope, time, quality, communication, risk, and resources management plan
 Comprehensive Work Breakdown Structure (WBS) with clearly defined activities and milestones
 Gannt chart to illustrate project schedule with realistic time allocated for each activity and clearly
defined deadlines for milestones.

TASK – 02
Carry out a research to investigate the cyber security risks of remote working by applying appropriate
qualitative and quantitative research methodologies and critically evaluate the reliability, accuracy and the
appropriateness of the research methods applied. Your answer also should include a critical evaluation of the
project management process and a justification to the selected research methodologies.

TASK – 03
o Analyze research data collected to support your research project using appropriate tools,
techniques and critically evaluate how selected tools, techniques uphold authenticity and the
accuracy of the data collected.
o Draw valid conclusions and recommendations from the research data analysed and
communicate your recommendations to the top management of the organization through an
action plan. The action plan should include a justification to the recommendations suggested.

MSCP/2021/22/Remote working
TASK – 04
4.1. Reflect on the objectives of the cyber security risks project and your own learning experience gained
through following a quality research and the project management process. Critically evaluate the ways in
which the research project carried out supports the organization to sustain its performance/ security in a
remote working environment and how the project supported you to improve your own learning and
performance.

Acknowledgment

Firstly, I would like to thank my parents and my friends for helping me throughout this assignment. And I’m
also so grateful to my Lecturer at Esoft Computer Studies (Pvt.) Ltd, Kandy, and Mr.Anuradha for giving me
the proper guidance and help to do this assignment without any hassle. It was very interesting to learn about
managing successful computing project, as I have not had any previous knowledge about it. I thank Esoft
Computer studies (Pvt.) Ltd for giving me a wonderful opportunity to do this assignment.

MSCP/2021/22/Remote working
TASK – 01
 Define the scope of the project and devise aims and objectives of the project that you are going to carry
out. You also should include a brief introduction to the selected company, remote working process and

MSCP/2021/22/Remote working
technologies used, explanation to the project and other relevant information about the research.

Introduction
The pandemic sweeping the world, COVID-19, has rendered a large proportion of the workforce unable to
commute to work, as to mitigate the spread of the virus. This has resulted in both employers and employees
seeking alternative work arrangements. Due to the pandemic, most if not all workers experienced work from
home (WFH). Hence WFH has become a policy priority for most governments. In doing so, the policies must
be made keeping in mind the practicality for both employers and employees. A critical insight and related
recommendations have been developed for future policy decisions. It will also critically investigate if this work
arrangement will remain as a transitory element responding to the exceptional circumstances, or whether it
could be a permanent arrangement.
Definition of Project
The term ‘project’ may be defined as a complex set of economic activities in which scarce resources are
committed in expectation of benefits that exceed the costs of resources consumed. It refers to an investment
activity in which resources are committed within a given time framework, to create assets over an extended
time in expectations of benefits which exceeds the committed resources. Thus, Projects require resources. They
are also expected to derive benefits. Projects are said to be desirable if their benefits are greater than the costs
incurred on them. A project can also be referred to as a non-repetitive activity. A project is viewed as a
conversion process. This implies that a project involves a transformation of some form of inputs Into an output.
(managementguide, 2022)

(Dreamstime, n.d.)

MSCP/2021/22/Remote working
Basic characteristics of Projects
Projects could be small or large. However, regardless of the size of a project, projects have Common
characteristics. Some of these characteristics are:
 A project has a unique purpose.
Every project should have a well-defined objective. For example, many people hire Firms to design and build a
new house, but each house, like each person, is unique.
 A project is temporary.
A project has a definite beginning and a definite end. For a home construction project, Owners usually have a
date in mind when they’d like to move into their new homes.
 A project is developed using progressive elaboration or in an iterative fashion.
Projects are often defined broadly when they begin, and as time passes, the specific Details of the project
become clearer. A project requires resources, often from various areas. Resources include people, hardware,
software, or other assets. Many different types of people, skill sets, and resources are needed to build a home.
 A project should have a primary customer or sponsor.
Most projects have many interested parties or stakeholders, but someone must take the primary role of
sponsorship. The project sponsor usually provides the direction and funding for the project.
 Have definite location and target group (beneficiaries)

 A project involves uncertainty.


Because every project is unique, it is sometimes difficult to define the project’s objectives clearly, estimate
exactly how long it will take To complete, or determine how much it will cost. External factors also cause
uncertainty, such as a supplier going out of business or a project team member needing unplanned time off

SWOT analysis for this project

MSCP/2021/22/Remote working
(https://medium.com/thrive-global/how-to-complete-a-personal-swot-analysis-2f8769aebd5e)

S.W.O.T. Strengths, Weaknesses, Opportunities and Threats. SWOT analysis is a systematic list of your
business strengths, weaknesses, opportunities and threats. Weaknesses and weaknesses are within us company
(think: reputation, patents, location). You can change them over time, but not without a bit of work. There are
opportunities and threats foreign (think: suppliers, competitors, prices) - they are in the market, whether you
like it or not.
You cannot change them. The project had strengths and weaknesses, as well as opportunities and threats. Before
everything, Assisted power, sufficient human resources to successfully complete the task trained, supporting
stakeholders and company partners in the project. Team members, good integration of project team person
resources as well an experienced project manager. Like this weakness, they also affected our project. Lack of
communication of team members, insufficient budget to complete the project, and no enough company staff
bars. Opportunities are a positive response from donors. Support, political will and incentives to project team
member’s communities, companies and government borders are supported in our project go successfully. And
threats of lack of access to target groups, locations and time interval. They are involved in our project.

MSCP/2021/22/Remote working
Company Description

About Us
We are a business-consulting firm based in Colombo, Sri Lanka that provides innovative solutions to all your
business needs. Our team comprise of MBA graduates from world's leading universities and
CA/FCMA/ACMA/CGMA members with more than 15 years’ experience in Banking, Finance, Marketing,
International Business and Management.

Our mission
We are passionate to provide innovative business solutions to our clients with competitive rates with the
information that we gathered through extensive research from reliable sources & technical expertise of our
consultants while maintaining high quality technical standards & best ethical practices and providing good job
satisfaction to our team members with a fair return on investment to our shareholders.

Our vision
To become a leading total business solutions provider in the region

Our services
Investment consulting
We will be there for you from thought to finish in turnkey investment projects in any industry in the world. Our
services includes
 Preliminary market research reports
 Initial project feasibility study reports

MSCP/2021/22/Remote working
 Marketing Plans
 Financial forecasting and Investment project appraisals
 Assistance in acquiring private /government land & buildings with necessary approvals from
government agencies
 Introduction to development and commercial banks for long term project loans

Corporate Planning
We undertake to prepare corporate and strategic plans for businesses in order to maximize the opportunities in
the market while utilizing their internal strengths and overcoming the internal weaknesses while defending the
strategic business unit to the threats from the external environment. A proper corporate plan will highlight the
answers to the following questions of any business unit.
1. Where are we now?
2. Where do we want to be?
3. How can we get there?

Aims and objectives of the project

(jtconnect.org, n.d.)

Aims are a general statement used to describe the final hope of the 'goal' of a researcher or researcher who
wants to achieve the end of a project. It basically describes what will be achieved in the long run. It should be

MSCP/2021/22/Remote working
based on broad terms and a desire for prominence but not beyond what is possible. Aim of the project is to
carry out a small-scale research in order to explore the cyber security risks of working remotely due to
the pandemic, from the standpoint of a computing professional.

Objective
Objectives are a specific statement describing the course of actions an investigator needs to take to achieve
aims. In objective statement, you are trying to make your project more feasible and tangible, something that can
be touchable in the reality. Once you've defined your goals, consider if each one is possible and if the number of
goals is realistic (as a guide, there should be three to five goals derived from the end).

Objects in small scale research


1. Collect information about sentroconsulting Srilanka.
2. Arrange interview date and location to collect information
3. Get a summary of receiving responses and interview analysis.
4. Arrange a meeting, submit the research documentation, and present it on group
meeting.
5. While conducting the group meeting, prepare schedules like Gantt chart and
Milestone and Payment chart.
6. After the group meeting, arrange whole decisions about restructuring Small scale research
project plan as a document.
7. Submit the plan report through email and make an official visit to deliver the plan
report for their clarification.

MSCP/2021/22/Remote working
The purpose and objective of the investigation must be SMART

(clicdata, n.d.)
Specific
Be clear about what you are going to do.
Measurability
What evidence will you have that you have achieved your goal?
Achievable
Do not try too hard. A less ambitious but achieved goal is better than an overly ambitious
one that cannot be achieved.
Realistic
Do you have the necessary resources (time, money, skills, etc.) to achieve the goal?
Time Limit
Determine when each stage should be completed. Do you have unforeseen delays in your
schedule?
Our goal and objectives should define our research project and answer our research
questions.

MSCP/2021/22/Remote working
Project management plan
A project management plan is an approved official document that defines how the project is
executed, monitored and controlled. This may be a summary or a detailed document and
may include references, branch management plans and other planning documents. This
document is used to define the approach taken by the project team to provide the extent of
planned project management. The project manager creates the project management plan
following inputs from the project team and the key stakeholders. (pmi.org, n.d.)

(padakuu, n.d.)

Project lifecycle
1. Project identification
This stage is called pre-feasibility studies. In this stage, projects that can contribute toward achieving
the specified objective are identified. Project ideas may come from:
 New experiments from previous project failures
 New experiments from expansion
 External threats
 Opportunities
 Other sources

MSCP/2021/22/Remote working
2. Project Preparation
Once the project is approved to move forward based on your business case, statement of work, or
project initiation document, you move into the planning phase.
3. Project appraisal
4. Project implementation
5. Project evolution

Benefits of project Management


The main advantages of project management is that it help you to manage your projects effectively, enabling to
resolve problem more quickly. following can help you;
 Improve your chances of achieving the desired result.
 Gain a fresh perspective on your project, and how it fits with your business strategy.
 Priorities your business' resources and ensure their efficient use.
 Set the scope, schedule and budget accurately from the start.
 Stay on schedule and keep costs and resources to budget.
 Improve productivity and quality of work.
 Encourage consistent communications amongst staff, suppliers and clients.
 Satisfy the various needs of the project's stakeholders.
 Mitigate risks of a project failing.

MSCP/2021/22/Remote working
(rindle, n.d.)

1.2 Produce a comprehensive project plan including the following.


 Cost, scope, time, quality, communication, risk, and resources management plan
 Comprehensive Work Breakdown Structure (WBS) with clearly defined activities and milestones
 Gannt chart to illustrate project schedule with realistic time allocated for each activity and clearly
defined deadlines for milestones.

PROJECT CHARTER FOR SENTRO CONSULTATION (PRIVATE) LIMITED

GENERAL PROJECT INFORMATION


PROJECT NAME PROJECT MANAGER PROJECT SPONSOR
 Small scale research explore the
Ms. R.G.Anjali Wasana Mr. Samantha
cyber security risks of working
Rajapaksha  Weerasinghe,
remotely due to the pandemic
EMAIL PHONE ORGANIZATIONAL UNIT

 info@sentroconsulting.lk +94112 698635  Business Solution

GREEN BELTS ASSIGNED     EXPECTED START DATE EXPECTED COMPLETION DATE

 Mr.Nadun chanaka 03/25/2022` 07/26/2022

BLACK BELTS ASSIGNED     EXPECTED SAVINGS ESTIMATED COSTS

 Mr.Dushiyanthan Rs.237,750 Rs.184,900

PROJECT OVERVIEW

PURPOSE
 Explore the cyber security risks of working remotely for sentroconsulting.
OF PROJECT

CONSTRAINTS

MSCP/2021/22/Remote working
 Time constraints. The projects since the timeframe was given is only four months 

 Cost constraints. The budget has been used in the first two months. Thus, there is limited
cost left for the recovery effort and avoid any more wastage

 Employee working experiences and skills constraints. Maybe need train the employees
on
network and security to improve their technical skills as they lack of experiences and skills

TENTATIVE SCHEDULE

KEY MILESTONE START FINISH

Project conception and initiation 27/03/2022 25/04/2022

Project Definition and planning 26/04/2022 16/05/2022

Project Launch and Execution 17/05/2022 16/06/2022


Project performance and
17/07/2022 26/07/2022
monitoring

Roles and Responsibility’s


Name Roles Responsibility
 Prepare project
management plan
 Prepare project
management plan.
 Define project scope.
 Planning the progress
of project.
Ms. R.G.Anjali  Deliverable work to
team member.
Wasana  Project Manager  Approve or disapprove
Rajapaksha  the project expenses.
 Report the project
statue to the
stakeholder
 Evaluate team
member’s
performance.
.
Mr. Samantha  Project Sponsor  Resolve conflict and remove obstacles and
ensure
Weerasinghe,
 Ensuring the project is under control and

MSCP/2021/22/Remote working
risks are managed.
 Confirming that the business requirements
are valid and correctly prioritized.
 Report and inform stakeholders on the
project progress
Ms.Dinushka  Communication Manage
 Carry out and manage daily internal and
Weerakoon external communication activities
 Schedule interviews and media events.
 Schedule meetings and maintain
information
on the status of changes requests.
Ms.Hansi
 Coordinator  Assist in gathering project plans and
Pannaseeha monitor
work efforts

 Support the team if they face any


Mr.Reiva obstacles
Kehelgamuwa  Ensure that the final system meets the
requirements of the end users and free
 It Department from
Mr.Geeshapathi any errors
Prasanna  Ensure that the modules and components
within the system meet the standards

     
BENEFITS AND CUSTOMERS
 A retention/destruction schedule can ensure your business information
PROCESS
stays safe
Company
 Crime prevention
OWNER
 Determines the need for Change in Policies and Standards
 Protect IT System & Infrastructure against Attacks
Employs  Evaluates the Security of Data Flow
 Effectiveness of Security Training & Awareness
EXPECTED  Find Gaps Or Non-Compliance In Current Security Systems/Practices
BENEFITS  Gain Access to Tools and Training to Help Close Discovered Gaps

PREPARED BY TITLE DATE


 Ms. R.G.Anjali Wasana
 Project Manager 6/25/2022
Rajapaksha 

MSCP/2021/22/Remote working
Work Breakdown Structure

Abstract
Work Breakdown Structure (WBS) is a phase breakdown that focuses on the delivery of work to be done by the
project team to achieve the project objectives and to create the required delivery. WBS is the foundation of
project planning, implementation, control, monitoring, and reporting. All work contained within the WBS must
be identified, measured, organized, and budgeted for. Company owners and project managers use the Work
Breakdown Structure (WBS) to make complex projects more manageable. WBS is designed to help divide a
project into manageable and manageable components. This article will provide you with a few examples of job
classification structure and will give you a summary of how WBS can help with project planning. (Alutbi, 2020)

What is work Breakdown Structure?


Work Breakdown Structure (WBS) is a phase breakdown based on the delivery of work done by the project
team to achieve the project objectives and to create the required delivery. WBS is the foundation of project
planning, implementation, control, monitoring, and reporting. All work contained within the WBS must be
identified, measured, organized, and budgeted for. Company owners and project managers use the Work
Breakdown Structure (WBS) to make complex projects more manageable. WBS is designed to help divide a
project into manageable and manageable components. This article will provide you with a few examples of job
classification structure and will give you an overview of how WBS can help with project planning. (Alutbi,
2020)

Work breakdown Structure for sentroconsulting PVT.

The Work Breakdown


Structure (WBS) is
developed to establish a
MSCP/2021/22/Remote working
common
understanding of project
scope. It is a hierarchical
description of the work
that must be done to
complete the deliverables
of a project. Each
descending level in the
WBS represents an
increasingly detailed
description
of the project deliverables.
Work Breakdown Structure (WBS) has been developed to achieve a common understanding of project scope. It
is a description of the phase of work that needs to be done to complete the project delivery. Each level that

MSCP/2021/22/Remote working
descends on the WBS represents a more detailed description of project delivery.

Benefits of work breakdown Structure


 defines and organizes the work required
 facilitates the quick development of a schedule by allocating effort estimates to specific sections of the
WBS
 provides a visual of entire scope
 can be used to identify communication points
 provides a visual of impacts when deliverables are falling behind
 can be used to show and assign accountabilities and responsibilities
 can show control points and milestones
 provides a way to estimates project costs
 it can assist with resource allocation

MSCP/2021/22/Remote working
(Develop by author)

Gannt chart
The Gantt chart, commonly used in project management, is one of the most popular and useful ways to display
tasks (activities or events) that are displayed over time. To the left of the chart is a list of tasks and at the top is a
timeline. The start and end dates of end items and overview items in a project are illustrated with Gantt
diagrams. The job breakdown structure of the project consists of terminal elements and description
elements.

Step that are followed when progressing a Gannt chart


1. Identify Essential Tasks
2. Identify Task Relationships
3. Input Activities into Software
4. Chart Progress

Advantages of Gantt charts


 Improved communication and team cohesion
 Avoid resource overload
 See overlapping activities and task dependencies
 Measure the progress of projects
 time management

MSCP/2021/22/Remote working
MSCP/2021/22/Remote working
(Develop by author)

The project plan for the sentroconsulting has started on 03/25/2022 (Monday) and
ends on 07/26/2022 (Thursday). All the tasks and the break downed tasks has also been
given for the preparation of Gantt Chart. Duration needed for each and every task and the
sub tasks are clearly given in the Gantt Chart. This is the finalized Gantt chart where this
will be followed for the execution process of the sentroconsulting.

TASK – 02
Research Design
Abstract
Research is valid if the conclusion is accurate or true and the research design is the conceptual framework in
which the research is conducted. His research expert, who prepares an application, incorporates a framework for
data collection, measurement and analysis. The research design is not associated with any particular data
collection method or any specific type of data. When designing research it is important that we identify the type
of evidence needed to answer the research question correctly. This chapter outlines the purpose, significance
and types of research structure.

MSCP/2021/22/Remote working
Research Design

(htt3)

By the term ‘research’, we can understand that a collection of data that encompasses sensitive information by
considering research methods. In other words, it is the compilation of information or data that is explored by
hypothesis and therefore results in a more concise and systematic finding. Research can be done both
academically and scientifically as well. Let us first understand what the research design means. (leverageedu,
2021).
The design of the study helps the researcher to pursue his or her journey to an unfamiliar but organized place
next to them. Just as an engineer or an architect prepares a building, so the researcher selects the design in a
variety of ways to determine what kind of research is to be done.

Elements of Research Design

MSCP/2021/22/Remote working
 The method applied for analyzing collected details
 Type of research methodology
 Accurate purpose statement
 Probable objections for research

The research methodologies can be categorized into many types but there are two main
Types that has been used often.
1. Qualitative Research
2. .Quantitative Research

Qualitative Research
Introduction
This paper provides information on high-level research and highlights the benefits of a state-of-the-art research
methodology for radiation science. Advanced research methods can be used independently, or to improve
measurement methods. We draw attention to the process of producing high-quality research questionnaire.

What is qualitative research?

(penmypaper, n.d.)
Quality research is defined as a market-based approach to data acquisition through open communication and
discussion. This approach is not only "what" people think but also "why" they think so. For example, consider a

MSCP/2021/22/Remote working
store that wants to improve its support. The formal observation concludes that the number of men visiting the
store is enormous. Another good way to determine why women would not visit the store is to do a thorough
interview of potential customers in the category.
Quality research is based on the fields of social sciences such as psychology, social sciences, and anthropology.
Therefore, high-level research methods allow for in-depth and continuous research and questioning of
respondents based on their responses, while the interviewer / researcher also tries to understand their motives
and feelings. Understanding how your audience makes decisions can help to draw conclusions from market
research. (questionpro, n.d.)
There are different types of qualitative research methods like,
 One on One Interview
 Case study Research
 Content Analysis
 Ethnographic Research
 Focus Groups

One on One Interview

(htt4)

A common quality research tool, one-on-one interviews are exactly the same as how they sound - in-depth
individual interviews between each respondent and a professional qualitative researcher. This method helps to
understand and can capture more information. They are also flexible and allow for more organized, less

MSCP/2021/22/Remote working
organized and less formal methods.

When to use an interview approach;


 Sensitive topic
 Potential for bias
 Confidential information
 Busy target audience
 Detailed understanding

Case by case study

A case study is an in-depth study of an individual, group, or event. In exemplary research, almost all aspects of
health and study history are analyzed to identify patterns and causes of behavior. Examples of studies can be
used in a variety of fields including psychology, medicine, education, anthropology, political science, and social
work. The hope is that the lessons learned from studying one story can be passed on to many others.
Unfortunately, case studies are often very speculative and sometimes difficult to produce results for most
people.

Benefits of case by case study


 Allow researchers to collect a great deal of information
 Give researchers the chance to collect information on rare or unusual case
 Allows researchers to develop hypotheses that can be explored in experimental reteach.

Disadvantages of case by case study


 Cannot necessarily be generalized to the larger population
 Cannot demonstrate cause and effect
 May not be scientifically rigorous
 Can lead to bias

MSCP/2021/22/Remote working
Focus group
A focus group is a research methodology that involves a small group of people to answer questions in a limited
space. The group is selected based on previously defined traits, and questions are designed to determine the
topic of interest. Focus groups are a form of quality research. A look at group flexibility, their responses to
focus group questions, and even their body language can guide future research on consumer decisions, products
and services, or controversial topics.
They can be used in three ways in the research design:
Standalone - where focus groups are one way to collect data and act as the main source of data
Add-on - used to improve other data collection methods. This will often be the prelude to the plural phase -
determining the issues to be addressed in a formal interview and providing details on the issues or opportunities
being explored.
As part of a multi-method design - where studies use multiple data collection sources and there is no one
method that determines the use of others.

Advantages of focus group


 Easily measure customer reaction
Focus group is a useful method that can be used to measure customer response to your new product or
company strategy. Focus groups often provide quick ideas for the development of specific products or
concepts. They also help identify the end user's product needs as well as other unmet needs for the
company and its competitors.
 Time saving opportunity
The concise nature of the focus group makes it possible for your business to solicit a number of ideas
and feedback on many aspects of the product without the in-depth process of requesting each interview.

Disadvantages of focus groups


 More Expensive to Execute Than Surveys
Focus groups are more expensive than market assessments because participants often expect to receive
compensation for participating in the discussion. Therefore, you have to spend money and additionally
pay researchers and participants to prepare a set of questions.
 Participants Can’t Voice Their Opinion Freely
Focus groups always “feel” that you are under the microscope. People with unusual personality traits

MSCP/2021/22/Remote working
have difficulty expressing themselves freely. Therefore, the level of knowledge obtained is low and the
investment is wasted.
 Hard to Get Honest Opinions For Sensitive Topics
Focus groups are not successful on sensitive issues as participants are reluctant to answer such
questions. Therefore, it is difficult to get them to express themselves sincerely. Otherwise, the
chairperson may have doubts about the views of the participants, as the information they use is difficult
to access.
 Results Are Biased
Focus groups have become a common market research tool because they are biased and often provide
encouraging feedback. Chairmen may deliberately or unintentionally change the views of participants,
as they may not want to disappoint the chairperson. For this reason, focused surveys may give false
information about your product or service.
 Might Not Be a True Representation of Your Target Group
Focus groups include an example of an audience that is not an accurate representation of the community.
The views expressed by the participants may not represent the views of the public. Therefore, more
research is often needed to evaluate the results of focus groups.

Quantitative research methodology

(https://resources.pollfish.com/survey-guides/the-complete-guide-to-quantitative-market-research/)

MSCP/2021/22/Remote working
Abstract
The aim of this study is to explicate the quantitative methodology. The study established that quantitative
research deals with quantifying and analyzing variables in order to get results. It involves the utilization and
analysis of numerical data using specific statistical techniques to answer questions like who, how much, what,
where, when, how many, and how. It also describes the methods of explaining an issue or phenomenon through
gathering data in numerical form. The study further reveals that quantitative methods can be categorized into;
survey research, correlational research, experimental research and causal-comparative research.

What is quantitative research?


Many studies are defined as the systematic investigation of events by collecting data that can and do apply
mathematical, mathematical or statistical strategies. A lot of research is from existing clients and online surveys,
online surveys, questions, etc., which can use sample methods. It collects information from senders about results
that can be expressed numerically. Once you understand these numbers correctly, you can predict the future of
the product or service and make adjustments accordingly.
An example of a dosing study is a study to determine the time it takes for a doctor to attend to a patient when a
patient enters the hospital. The patient satisfaction test model can be checked to ask questions such as how long it
takes the doctor to see the patient, how often the patient is admitted to the hospital, and so on. (questionpro, n.d.).
So, in this manner these are the following methods used in the approach of Quantitative Research.
1. Close - ended questions
2. .Online surveys
3. Questionnaires
4. Polls
Quantitative research characteristics
 Built-in tools
Structured tools such as surveys, surveys or surveys are used to collect quantitative data. Using these
structured methods helps gather in-depth data that can be considered in respondents.
 Sample size
Limited research is conducted on a significant sample representative of the target market. Appropriate
sampling methods should be used while sampling to strengthen the research purpose.
 Closed questions
Closed questions are made for research purposes. These questions help in collecting quantitative data

MSCP/2021/22/Remote working
and are therefore commonly used in quantitative research.
 Previous studies
Various items related to the research topic are examined before feedback is collected from the
participants.
 Quantity data
Usually, quantity data is represented by tables, charts, graphs, or any other non-numerical form. This
makes it easier to understand the data collected and verify the authenticity of the market research.
Generalization of results: The results of this research approach can be communicated to all people for
appropriate developmental measures.

Advantages of Quantitative Research


 It can be tested and tested.
Most studies require careful test design and the ability for anyone to repeat both tests and results. This
makes the data you collect more reliable and less controversial.
 Direct analysis
When you collect quantity data, the type of results will tell you which math tests to use. As a result,
interpreting your data and presenting the findings is simpler and less prone to errors and abuses.
 Fame
Research involving complex statistics and data analysis is considered important and impressive because
many people do not understand the relevant statistics. Many studies are associated with technological
advances such as computer modeling, stock selection, portfolio testing, and other data-driven business
decisions. The relationship of reputation with quantification and quantification research can best reflect
your small business.

Disadvantages of Quantitative Research


 Don't focus on numbers.
Many studies may be limited in seeking practical, mathematical relationships that can lead researchers to
ignore themes and broader relationships. By focusing solely on numbers, you risk losing great
information or great images that could benefit your business.
 The challenge of constructing a research model.
When doing quantitative research, you need to carefully develop the hypothesis and create a model for
data collection and analysis. Any errors in your settings, researcher's bias or usage errors may invalidate

MSCP/2021/22/Remote working
all your results. Even forming a hypothesis may be a good fit for you, especially if you already have a
specific question that you know you want to prove or disprove.
 It can be misleading.
Many people think that quantitative research is more reliable or scientific than experimental, quality
research because it is based on mathematics. However, both types of research can be independent and
misleading. The views and biases of the researcher can affect the way the masses gather information. In
fact, the effect of this bias is more pronounced in the quantitative research system than in the quality
research situation.
 Cannot determine if answers are true or not.
Researchers using the measurement method should work with the assumption that all answers given to
them through research, measurement and evaluation are based on reality. This way there is no face-to-
face contact, which means that interviewers or researchers cannot measure the validity or authenticity of
each outcome.

Quantitative Research Methods: Types with Examples


Quantitative researchers will seek to maintain a level of control of the different variables that may influence the
relationship between events and recruit respondents randomly. Quantitative data is often gathered through;
 Questionnaires
 Surveys
 Biophysical measurements

MSCP/2021/22/Remote working
Questionnaires

A survey is a research tool that includes a set of questions or other types of notifications aimed at gathering
information from the respondent. A research questionnaire is usually a combination of closed-ended and open-
ended questions. Open, long-form questions give the respondent the ability to detail their own thoughts. The
research questionnaire was developed by the London Statistical Institute in 1838. Data collected from a data
collection questionnaire can be both qualitative and quantitative. The survey may or may not be presented in
survey form, but the survey always contains a list of questions. (questionpro, n.d.)

Characteristics of a good questionnaire


 Uniformity
 Exploratory
 Question Sequence

Why questionnaires?
 Economical
It is an economical way of accumulating information. It is economical both for the sender and for the

MSCP/2021/22/Remote working
respondent in time, effort and cost. The cost of conducting the study with the help of questionnaire
method is very low.
 Wide coverage
It is probably the best method to collect information, compared to the other methods like interview or
observation, when the sample population is spread over a large territory.
 Rapidity
Replies may be received very quickly in questionnaire method. In this case there is no need to visit the
respondent personally or continue the study over a long period.
 An Easier Method
 Comparability
Once the data has been calculated, it can be used to compare and contrast with other studies and can be
used to quantify change. This makes the monthly or annual question list very important over time.

Working from home Security Questionnaire


The questionnaire were divided into Work From home, Data security, password security, Email security, phone
security, network security.

Work From Home


1. How do you feel about working from home?
2. Have you worked from home before?
3. Have you established a good work routine?
4. Do you have a healthy work and life balance when working from home?
5. Are you less productive, equally productive, or more productive than when working in the office?
6. Do you have a suitable workspace?
7. Are you in regular contact with your team and manager?
8. Do you feel trusted to work from home?
9. Do you feel your organisation is providing the proper support?
Data security
1. Does anyone else use your work computer?

MSCP/2021/22/Remote working
2. Is your device configured to run automatic updates?
3. Are you using encryption, such as BitLocker, for your computer?
4. Are you using the latest version of your operating system (OS)?
5. Is your work data stored on your corporate network?

Password security
1. Do you have strong password Management?
2. Are any of your passwords written on paper?
3. You have any unencrypted passwords?
4. Does your remote access tool (Take Control, VPN, and RDS) automatically lock when left open?
5. Is your device set to lock automatically in case you forget to lock it?

Email Security
Is your Email secure?
1. Do you send sensitive information, such as credit card details, via email?
2. Do you know how to check an email header to determine its legitimacy?
3. Do you have a spam filter and know how to train it?
4. Do you know how to securely share files with people outside your organization?
5. Do you know the common signs of a phishing scam?

Phone security
Is your smartphone secure?
1. Do you know the common signs of a vishing scam?
2. Do you know the common signs of a smishing scam?
3. Is your SIM card encrypted?
4. Are your location services tracking you?
5. Are you aware of caller ID spoofing?
6. Is your phone protected by a password, PIN, or fingerprint?
7. Do you use public Wi-Fi on your smartphone?

Network security
Is your network prepared for a malicious actor?
1. Does your network name include your street address or family name?

MSCP/2021/22/Remote working
2. Do you have an active firewall built into your router?
3. Is wireless security enabled on your router?
4. Have you changed the default admin password for your router?
5. Is anyone outside your immediate family using your home Wi-Fi network?

MSCP/2021/22/Remote working
MSCP/2021/22/Remote working
MSCP/2021/22/Remote working
MSCP/2021/22/Remote working
MSCP/2021/22/Remote working
MSCP/2021/22/Remote working
MSCP/2021/22/Remote working
MSCP/2021/22/Remote working
MSCP/2021/22/Remote working
MSCP/2021/22/Remote working
MSCP/2021/22/Remote working
Scale research
Range is a measure of volume where the order is, the difference between two variables is reasonable and even,
and there is no zero. Measure current variables at intervals at a standard rate. The measurements used to
calculate the distance between variables are very reliable.

The interval scale is the third measurement scale after the standard and ordinal scale. Understanding the first
two levels will help you break down the range measurements. The self-reported scale is used when the variable
has no natural order or level. You can include random or non-numeric variables, but typical test examples
include gender, location, political party, pets, etc. is found. First of all, we asked the employees and suppliers,
for the example, here is the one of the examples, for the laborer answers for our questions

Concoction
Open Completed Questionnaire The Quality Assurance Questionnaire is used to extract the above information.
Expected. That's why it's helpful to focus on problems and learn about them. Practical help during the Closed
Value Question List The study is used to measure time statistics, results and evaluation tests. View of the bars.
So taking this approach will help improve research. Mathematically, mathematics is also an important factor.

TASK – 03

3.1 Explain the common data analytical techniques. Analyze the collected data
using appropriate tools and techniques.

Data analysis
Introduction
Data analysis is defined as the process of cleaning, modifying and modeling data to gain useful insights for
business decisions. The purpose of data analysis is to extract useful information from data and make decisions
based on data analysis. A simple example of data analysis when we make any decision in our daily life is to
choose that decision and think about the last or most likely event. This is nothing more than an analysis of our

MSCP/2021/22/Remote working
past or future and making decisions accordingly. So we collect memories of the past or dreams of our future. So
this is nothing but data analysis. Now the same thing an analyst does for business purposes is called Data
Analysis.

Why data Analysis?


Your data is the core of your research. This is the foundation on which all work will be supported. After months
of intensive research, the scientist collects a huge amount of data. This data must be properly compiled and
stored in an orderly manner. This article will consider the importance of data analysis in a research paper. Data
analysis is the second and most important part of the research paper. Also, the hardest step is that most
researchers are not able to perform the analysis on their own. Simply put, data analysis is the division of
complex research material into a basic and simple form. This helps to prove and better understand the research.
Your article should not only contain research data, but also its description after a thorough analysis. (abhinash,
2012)

Types of Data Analysis Techniques and Methods


1. Informed decision-making: From the perspective of management, you can benefit from analyzing your
data as it helps you to make informed decisions rather than simple information. For example, you can
understand where to invest your big money, explore growth opportunities, predict income, or resolve
unusual situations before they become a problem. In this way, you can extract relevant information from
all areas of your organization and present information to different stakeholders in a professional and
collaborative way with the help of dashboard software.
2. Reduce costs: Another major benefit is cost reduction. With the help of advanced technology such as
forecasting statistics, businesses can identify development opportunities, trends and patterns in their data
and plan their strategies accordingly. Over time this will help you save money and resources on using
the wrong strategies. Not only that, you can also predict production and supply by estimating different
conditions such as sales and demand.
3. Identify customers better: Customers are undoubtedly the most important part of any business. By
using statistics to get a 360 ° view of all aspects of your customers, you can understand which channels
they use to contact you, their demographics, interests, habits, shopping habits and more. Over time, it
will bring success to your marketing strategies, allowing you to see new trends and avoid wasting
resources by targeting the wrong people or sending the wrong message. You can also track customer
satisfaction by analyzing your customer reviews or performance of your customer service department.
(Calzon, 2022)

MSCP/2021/22/Remote working
What is the data Analysis Process?

(https://www.anblicks.com/blog/faqs-on-data-analytics)

When it comes to data analysis, there is a procedure to follow to draw the necessary conclusions. The analysis
process has 5 basic stages. We'll cover each in more detail later in the post, but to start providing the context
needed to understand what's next, here's a description of the 5 essential steps for data analysis.

Identify: Before you get your hands dirty with data, you need to state why you need it in the first place. Identity
is a stage where you identify the questions you need to answer. For example, what is the customer's view of our
product? Is there any type of packaging that is most appealing to our potential customers? Once you have
identified the questions, you are ready for the next step.

Gather: As the name suggests, this is the stage where you start collecting the necessary data. Here you will
learn which resources to use and how to use them. Data collection can take various forms such as internal or
external sources, surveys, interviews, surveys, focus groups, among others. The important point here is that the

MSCP/2021/22/Remote working
way you collect information will differ in terms of capacity and quality.

Clean: Once you have the required data, it's time to clean it up and leave it ready for analysis. Because you
collect a large amount of information in different formats, not all the data you collect will be useful because you
may find yourself with duplicate or badly formatted data. To avoid this, you need to make sure you clean up
any spaces, duplicate records, or formatting errors before you start working with your data. This way you avoid
damaging your analysis with incorrect data.

Analyze: With the help of various techniques such as statistical analysis, retransmission, emotional networks,
text analysis and more, you can start analyzing and manipulating your data to draw relevant conclusions. In this
section you will find trends, relationships, diversity and patterns that can help you answer the first questions
that come to mind during the definition phase. Various technologies on the market assist researchers and
middle-class business users in managing their data. Some include business intelligence and software
recognition, predictive analytics, data mining, among others. (Calzon, 2022)

Translate: Finally, you have a very important step: it's time to translate your results. This is the stage where the
researcher draws lessons based on the findings. For example, here you will know whether your customers prefer
red or green packaging, plastic or paper. Also in this section you can also find some limitations and work
around them. (Calzon, 2022).

Data Analysis Methods

Collection analysis
The act of collecting a set of data items in such a way that the specified features are more similar to one another
(in some sense) than those in other groups - hence the term 'collection'. Since no variables are targeted during
collection, the method is often used to detect hidden patterns in data. The method is also used to provide
additional context for a trend or database.
Let's take a look at the job. All over the world, retailers will be able to analyze each customer individually and
provide the best personalized service, but let's face it, it's impossible to do this on time with a large customer
base. This is where integration comes into play. By grouping customers by demographics, buying behavior,
value for money, or anything else that may be relevant to your company, you will be able to quickly improve
your efforts and present your customers with the best information possible. For your needs.

MSCP/2021/22/Remote working
Group Analysis

This type of data analysis method uses historical data to evaluate and compare a fixed portion of user behavior
that can be combined with others with similar characteristics. By using this approach, you can learn more about
customer needs or gain a stronger understanding of the target group.

Collection analysis can be really helpful for marketing analysis as it will allow you to understand the impact of
your campaigns on specific customer groups.

Data Mining
Data mining, also known as data acquisition (KDD), is the process of extracting patterns and other important
information from large data sets. Given the emergence of data storage technologies and big data growth, the
adoption of data mining techniques has accelerated over the past few decades, helping companies by converting
their raw data into useful information. However, despite the continued emergence of technology to process data
on a large scale, leaders still face the challenges of balance and automation.

MSCP/2021/22/Remote working
(https://www.datapine.com/blog/wp-content/uploads/2021/03/inteligent-data-alarms-datapine.png)

Text analysis
Text analysis, also known in the industry as text mining, works by capturing large text datasets and is organized
to make management easier. By working through this robust data purification process, you will be able to
extract data that is truly relevant to your organization and use it to develop practical insights that will propel you
forward.

Modern tools accelerate the use of text analysis. Thanks to a combination of machine learning and smart
algorithms, you can perform advanced analytical processes such as emotional analysis. This approach allows
you to understand the intentions and feelings of the text and rate it based on certain factors and categories
relevant to your product, for example if you are right, negative or neutral. Emotional analysis is often used to
monitor product and product reputation and understand how effective your customer experience is. Check out
this insightful article to learn more about the topic.

Data Analyst Tools?


Data analytics tools is the term used by data analysts to describe software and applications used by data analysts
to develop and implement analytical processes while helping companies make better, more informed business

MSCP/2021/22/Remote working
decisions while reducing costs and increasing profits. Organized into software categories, with various focuses
and features, and represented by each model.

Business Intelligence tools


BI tools are one of the most independent methods of performing data analysis. Specifically for business
statistics, these tools will be useful for any data analyst who needs critical analysis, monitoring and reporting.
Features such as customization, predictive analysis and advanced SQL methods make these solutions
customizable easily at any level of knowledge without extensive IT interventions. By providing a few useful
features, analysts can understand trends and make strategic decisions. Our article of data analysis tools would
not be complete without business intelligence, and datapine is an example that satisfies most of the needs of
beginners and advanced users alike. (datapine, n.d.).

DATAPINE

(https://www.datapine.com/images/datapine-bi-tool.png)

KEY FEATURES:

 Visual drag-and-drop interface to build SQL queries automatically, with the option to switch to,
advanced (manual) SQL mode

MSCP/2021/22/Remote working
 Powerful predictive analytics features, interactive charts and dashboards, and automated reporting
 AI-powered alarms that are triggered as soon as an anomaly occurs or a goal is met.

R Programming/ R-studio

R Analysis is the analysis of data using R programming language, the open source language used to compute
mathematical computing or graphics. This planning language is often used in statistical analysis and data
mining. It can be used for analysis to identify patterns and build functional models. R not only helps
organizations to analyze their data, but it can also be used to assist in the creation and development of software
applications that perform statistical analysis.

Through visual visualization of system development, R supports a variety of analytical modeling methods such
as statistical testing, compilation, time series analysis, direct and indirect modeling, and more. The interface has
four windows: text window, console window, workspace and history window, and interest tabs (help, packages,
diagrams, and files). R allows for charts and graphs ready for publication as well as storage for reusable analysis
of future data.

MSCP/2021/22/Remote working
Benefits of R Analysis

Democratizing Analytics Across the Organization:


R can help democratize analytics by enabling business users with interactive data visualization and reporting
tools.
Providing Deeper, More Accurate Insights:
Today, most successful companies are data driven and therefore data analytics affects almost every area of
business.
Leveraging Big Data:
R can help with querying big data and is used by many industry leaders to leverage big data across the business.
With R analytics, organizations can surface new insights in their large data sets and make sense of their data

Creating Interactive Data Visualizations:


R is also helpful for data visualization and >data exploration because it supports the creation of graphs and
diagrams.

Python

MSCP/2021/22/Remote working
(https://www.datapine.com/articles/data-analyst-tools-software)
Compared to other popular languages like Python, Java, the code is more accessible and the syntax is easy to
learn, making this tool popular among users looking for open source solution and simple coding processes. In
data analysis, Python is used to clean data, clean up, model, and create analytical algorithms based on business
conditions. One of the best features of its user-friendliness: programmers do not need to remember system
configurations or manage memory - Python is considered a high-quality language that is not under the
computer's native processor. (Calzon, 2022)

Another remarkable feature of Python is its versatility. Users can apply the code to several operating systems
without making any changes, so there is no need to write completely new code. This makes Python a very
portable language because programmers can use it on Windows and macOS. The wide range of modules,
packages and libraries make Python a respected and useful language in all companies, with companies such as
Spotify, Netflix, and Dropbox and Reedit the most popular use of this language in their operations. With
features like text mining and machine learning, Python has become a respected authority for advanced analytics
processes.

MSCP/2021/22/Remote working
SQL consoles

Our list of data analysis tools wouldn't be complete without the SQL console. Actually SQL is a programming
language used to manage/query data stored on related websites, especially those effective in managing
organized data as a tool for analytics websites. It is very popular in the data science community and is one of
the analytical tools used in various business and data situations. The reason is simple: SQL is a crucial part of
business success, as most data is stored in a communications database and you need to access and unlock its
value, and by reading it, analysts can give their skills a competitive advantage. . There are various (SQL-based)
management systems such as MySQL, PostgreSQL, MS SQL and Oracle, and these data analyst tools can be
very useful for any critical analyst to study. Here we will focus on the most popular MySQL Workbench.

Why Is data integrity importance?


Your employees need regular access to quality data. Data integrity is important as it enables and protects your
data from being searched and tracked from its original source. Data performance and stability increase when
you provide active data accuracy and data protection. It is important to maintain data integrity and ensure data
completeness. Corrupted data won't work for most companies.
This includes big data. Organizations collect more and more data and it has become increasingly important to
protect and maintain the integrity of that data. Without integrity and accuracy, your data is useless. If you don't,
your data may be at risk. In this case, more complex and expensive data analysis methods may be needed to
track errors and retrieve data. Data integrity can be compromised in many different ways. Data is usually digital
and transmitted to many locations online. This results in an increase in the amount and variety of data collected.
`

MSCP/2021/22/Remote working
For example, data should remain unchanged when transferred or repeated between updates. As a result, data
integrity and data integration can be closely linked. Data is uninterrupted, only stored once on your systems.
Many things can change your data from the first day it is created on your system and throughout its lifecycle. It
can be transferred to other systems, modified and updated many times.

Organizations often use several management systems (ERP, CRM, SCM, etc.). Factors such as human
interaction, data transfer, viral software or compromised computer software can compromise the integrity of
your data. This is where maintaining the integrity of data can be a daunting task. In my job I often provide
solutions for data integration in organizations. I also frequently discuss data quality and data integrity with
various companies in good detail. Many of my customers know that improving the integrity of their data is
important. Data integrity should be high in your mind at all stages of your data cycle. From the design and
implementation phase of your systems. Data integrity also ensures availability and search, monitoring and
communication. Maintaining the accuracy and accuracy of data also improves the stability and performance of
your systems.

Questionnaire Analyzing Accuracy


The following survey response statistics are displayed in the control panel at the top of the screen.
a page is displayed, so a list of received responses appears in the grid below the statistics.

Filter responses and vies response details


 In Google Spreadsheets, open the spreadsheet you want to create a filter view.
 Click the cell that contains the data.
 Select Data, then Filter View, and Create New Filter View.
 Click the drop-down list in the column header and select the data you want to filter.
 The filter view is still active as changes are made.
 (Optional) Enter your text into the search field to search for data.
 After selecting the data to filter, click OK.
 Repeat steps 4 to 6 for each column you want to filter.
 Enter the name of the filter view box in the Name box. If you do not enter a name,
The filter view is saved as a filter number where the number corresponds to the number.
Filters you create.

MSCP/2021/22/Remote working
 The saved filter view is now displayed in Data View and then View Filter. filter
The types are highlighted in dark gray in the column and row headings.

Submit survey results


To send data:
 Sign in to Google Surveys.
 Click on the survey whose data you want.
 Click Download on the search results page or survey.
 Excel file is saved in default output folder

Describe appropriate recommendations as a result of research and data


analysis to draw valid and meaningful conclusions.

Introduction
In order to determine the accuracy of the data collected during the study, it is necessary to analyze the data. The
best outcome will be to meet the customer's needs and clear their doubts about cyber security. Data analysis
should be performed on each component as a project goal to obtain the most accurate result. Here, an online
Questionnaire was used as a research method to collect information. About the Internet of research materials.
Selection of methods available from sentroconsulting Sri Lanka handles and rods. Study distributed to
colleagues at sentroconsulting Sri Lanka Cyber security Risk work from home. From there, Eighty responses
were received and an interview was conducted.
Between the administrator Experts understand a lot in depth. These answers help gather information about
Cyber security Risk work from home used in data centers. And command What is important will be determined
by analysis. This will be part of the restructuring session, which means which component needs the most
consideration. Many The requested part should be the part that can be used daily or used by most people. Many
practical risk analysis methods are briefly discussed above. Google form and the Risk Register methods used to
analyze the information collected. Google forms analyzes survey responses. And the risk record analyze the
negotiation method.

MSCP/2021/22/Remote working
Responded Questionnaire

I have been gathering data about the level of satisfaction people have while working at home. So far I have
gathered reactions from a diverse sample of 50 people. In the data set, I have 50% male and 50% female
respondents. People come from various functions, and 15% are top management, 22% senior leaders, 19%
middle managers, 10% supervisors, and 32% individual contributors. The data comes from sentroconsulting
Employs, Here are a few observations from my initial data.

The majority of respondents like feel less stressed and anxious while working from home. When asked if they
enjoyed working from home, 26% agreed or strongly agreed. 46% said they feel less stressed working from
home, and 28% thought that they were more productive working from home. The initial research on working
from home done prior to the Pandemic found that people feel less stressed working from home. There have
been concerns from some that productivity in the Pandemic may decline. Nicholas Bloom, a Stanford
Economist, said in an interview, "The global work-from-home movement intended to maintain output and
efficiency during the COVID-19 Pandemic could generate a worldwide productivity slump and threaten

MSCP/2021/22/Remote working
economic growth for many years.” However, it is clear that many organizations are big hurry to return to the
office.

The majority of Employs are already familiar to working from home concept. When asked if they already
worked from home, 52% agreed or strongly agreed. 48% said they not worked from home. Work from home
(WFH) increased sharply and persistently after the outbreak, and much more so among some workers than
others. Using theory and evidence, we argue that the observed heterogeneity in WFH transitions is consistent
with potentially more permanent changes to work arrangements in some occupations Consistent with increased
WFH adoption, many more – especially higher-educated – workers expect to WFH in the future.

MSCP/2021/22/Remote working
A good work routine helps you eliminate distractions and accomplish more while maintaining efficiency. Top
performers can do an impressive amount of work and achieve incredible results by structuring their schedules
strategically. By practicing habits that help maintain work efficiency, these top performers also maintain a
healthy balance while maintaining their leisure and family time.57.1% of Employs Create an effective work
routine and 42.9% don’t.

MSCP/2021/22/Remote working
One of the great benefits of remote work is great flexibility. With the ability to work remotely, employees can
use this opportunity to work from home and create a flexible plan to take care of their work and responsibilities.
But with this flexibility sometimes comes additional pressure. If you work odd hours, or if you do not meet
face-to-face daily, you may feel pressured to spend more time online and work than you would in an office.
And with the exception of coworkers nearby to remind you to take a break, have lunch, and leave the office all
day, distant workers may find themselves working overtime, and not having as much free time as they could
otherwise.48.4% of people they have a healthy work and life balance when working from home and 37.7%
don’t have a healthy life balance. 13% of Employs they don’t have an idea about that.

MSCP/2021/22/Remote working
The graph above shows the results of 50 people in our study. Each person was asked if they "Are you less
productive, equally productive, or more productive that when working in the office?” Note that those who
strongly disagreed— (e.g., their supervisor did not support them — responded more productive to only 42% of
the interview items. Those who strongly disagree responded negative to 48% of the items.10% of them they
don’t have any significant changes.

MSCP/2021/22/Remote working
Home working enables more agility and flexibility in working arrangements. With employees no longer tied to
an office, they may be better placed and more willing to work flexible hours such as earlier or later in the day or
even at weekends. This may help you meet certain business needs eg: if you are trading with customers residing
in a different time zone. According to the result 52% of them have a suitable workspace and 48% of them don’t.

MSCP/2021/22/Remote working
Address it diplomatically. Open communication is key in any relationship, and the employee-boss relationship
is no different. As you have concerns, try to express them calmly. Signs of a bad manager are undesirable
leadership traits that cause friction between supervisors and employees. Most of the Workers they don’t have a
strong relationship to team and team managers.

In the best of times, working from home is associated with all sorts of positive emotions for remote workers—
freedom, autonomy, trust, and happiness, to name just a few. Indeed, remote work is often considered the “holy
grail” of flexible work options, with benefits galore that far outweigh any potential downsides. Acceding to the
questionnaire replay that server evidence, majority people they trusted to work from home.

MSCP/2021/22/Remote working
Normal work is becoming more common. To ensure that their employees are organized for success,
organizations need to know how to support them while working from home. It is therefore important to create a
supportive environment for your home-based employees, as they do not have the team colleagues they had
before and can be easily separated from the rest of the company.52% of Employs they agree for the
organization is providing the proper support. However, it also has downsides. More than half of employees say
they've become no proper support from organization working from home during the pandemic.

MSCP/2021/22/Remote working
Nowadays, many companies provide employees with a wide range of devices from smartphones to laptops and
even tablets to complete their work. The company's IT departments often set up your login information, a
selection of important applications and all the tools that allow you to do your job successfully. Somewhere
during the fifth day at work is usually when we start updating the device at will: change the screen saver into a
pet, log in to Spotify account to list the complete "late app" playlist, check out Facebook's daily news and so on.
However, cybersecurity experts say that weaving your personal and work life together using a portable
computer is a risky business - both for you and for the company. According to the survey more than 50 IT
professionals who revealed that about two-thirds of IT professionals believe that the latest breach of profile was
due to staff negligence.

MSCP/2021/22/Remote working
Specifies whether this computer will receive security updates and other important downloads through the
Windows automatic updating service. Run automatic updates good because most of the time, they don’t want
to. Also, humans can be very forgetful and if you’re relying on them to remember to perform an update there’s
a good chance they won’t happen. But most of Employs they not allow to update device automatically.
Software is vulnerable to hackers and cyber criminals as updates keep you safe from exploitable holes into your
organization. Having reliable security in place is especially important as the release of software update notes
often reveal the patched-up exploitable entry points to the public .More than 20% of Employs they don’t know
about their update status.

MSCP/2021/22/Remote working
BitLocker Drive Encryption is an important security feature for Windows computers. It provides security for
your computer operating system and the data stored on it, ensuring that data remains encrypted even if the
computer is interrupted when the operating system is inactive.61.1% of workers using Bit locker, This helps
protect against "offline attacks," those made by disabling or circumventing the installed operating system, or
made by physically removing the hard drive to attack the data separately.

MSCP/2021/22/Remote working
Employers can see your online activity on your phone. Especially if it is a company phone, and you are
connected to your company network. The company phone uses the data and voice time the company is paying
for to monitor how it is used.

A strong password is essential when it comes to your online security, and you need a different one for each
social network, bank accounts, live streaming services and apps. But with so many accounts to follow, it is
tempting (and surprisingly easy) to fall into the trap of using the same login credentials for everything.

MSCP/2021/22/Remote working
Majority of people more that 40% of they don’t have a strong password management. This lead to break-ins can
include the loss of valuable data such as presentations, emails, and music. Victims may also have their bank
account information, money, or even their identity stolen.

Written Down passwords does not increase password security and makes it more difficult for someone online to
steal your passwords, which may result in easy access for someone to steal those passwords locally. It all
depends on how well you protect those secrets.54% of workers they written down password on papers or note
someware else.

MSCP/2021/22/Remote working
An unencrypted password (or Plaintext, or Plain-text) is a way of writing (and sending) a password in a clear,
readable format. Such password is not encrypted and can be easily read by other humans and machines. And, I
repeat, 40% of organizations keep their passwords in plain text. Questionnaire answer show 28.6% of they have
unencrypted password. That’s mean they have higher risk possibilities.

MSCP/2021/22/Remote working
The most important thing to know about the difference between VPN vs remote desktop solutions is that they
are different operating systems. There are other differences, such as safety risks and standards of flexibility and
control, but understanding what each one does will help you decide which solution will work best for you.46%
of they have remote access tool. But 32% they don’t have any remote access tool. 22% to don’t know about the
remote access tools.

Lock screen on smartphones or devices is an important way to keep your device's content confidential. In the
event that you have personal, business, and financial information on your phone, locking your cell phone is a
must instead of a choice. Only 32% of Employs have automatic lock. But more than exactly 40% don’t have.

MSCP/2021/22/Remote working
Generally, anything you send via email is clearly visible to any mail server that carries the message at all times
(and any people who do not have access to those servers), so sending a standard message with sensitive
information is not recommended. When you send an email message, you have no control over who holds the
message, how many copies are stored on the route and how long those messages are stored in the mail system
along the way.42% of people they send some sensitive information. 29% of them don’t share any of sensitive
information.

MSCP/2021/22/Remote working
Criminal emails to steal sensitive information are used to commit various cybercrime. We all receive a lot of
emails every day - many of which end up in our spam folders. But most of the time, spam emails for sensitive
information are easily escaped from email client checks and are delivered to our inbox. So, if you are
wondering how you can detect a fake email - or, more specifically, how you can detect a fake email or a real
one - we have covered you. Good thing is 62.5% of Workers know about how to check an email header to
determine its legitimacy.

MSCP/2021/22/Remote working
Spam monitoring poses a greater technical challenge than monitoring malware, such as viruses. First of all, only
certain file types can transfer malware that you can use. Empty text files, such as those commonly used for
email, may not contain malicious software but may contain spam. Allows the end user to see real emails and
allow senders to be authorized. An important feature of a business spam filter service is that it scans outgoing
emails to detect spam. Thus, it protects the reputation of the organization.54% are known about spam filter and
know how to train it.46% said they don’t.

MSCP/2021/22/Remote working
The majority of respondents they know to securely share files with people outside organization. When asked if
they know securely file sharing, 49% know or strongly agreed. 51% said they don’t know.

MSCP/2021/22/Remote working
Successful phishing scams give hackers access to corporate networks, access to important information such as
intellectual property, and in some cases money. The question is how to raise awareness about phishing scams
and train your team to detect e-mail spam. The majority of respondents they know phishing Emil. When asked
if they know phishing Email, 60% know or strongly agreed. 40% said they don’t know.

MSCP/2021/22/Remote working
Vishing is a phone scam. In a vishing attack, a scammer preys on human error by phoning their victims and
attempting to get them to reveal their personal information, money, or both. Interesting outcomes from the
questionnaire 50% of know about vishing scam and 50% of them don’t.

Many smashing attacks serve as a crime to steal sensitive information via email. The attacker sends a message

MSCP/2021/22/Remote working
that attracts the user to click a link or request a response containing private data of the targeted user. The
information the attacker wants can be anything, including: Internet account verification.

Caller ID fraud occurs when the caller intentionally lies about the information passed to hide the caller's
number. it may look like it came from a government agency, business, or someone in your contact list in an
attempt to trick you into answering the call.51% not aware of caller ID spoofing and 49% of they aware of
Caller ID spoofing.

MSCP/2021/22/Remote working
Thankfully, there are several authentication methods to unlock your phone. Along with PIN codes and
passwords, smartphone manufacturers have introduced biometric authentication methods, such as facial
recognition, fingerprint, and iris scanning, to give users a faster and more convenient way to access their
phones.54% of have security locks and 48% of don’t have security locks.

Wi-Fi best names never include personal information like your real name, address, apartment number, date of
birth, etc. Wi-Fi passwords are nothing. Never create an SSID associated with a network password. Avoid
annoying SSIDs that can make your network more targeted at hackers.70% of people network name include
their street address or family name.

MSCP/2021/22/Remote working
It is best to turn on the firewall on your router, a device that literally connects you to the Internet. That may be a
cable modem, fiber optic modem, or similar, but those are the best part of a security system because they
prevent malicious questions on all devices in your network, not just your computer.44% have firewall , 32%
don’t have firewall and 24% they don’t know about that.

It's recommended to change the password after you get in the first time. If you don't change the password to
your router, then anyone with access to it can change its settings and even lock you out.38% they skip to change
default password, 36% are changed default password and 26% don’t know about that.

MSCP/2021/22/Remote working
Draw valid conclusions and recommendations from the research data analyzed and communicate your
recommendations to the top management of the organization through an action plan. The action plan
should include a justification to the recommendations suggested.

Issue and Recommendations as a result of research and data analysis


With the growth of remote operations, some cybersecurity threats - especially, the theft of sensitive information
- have become increasingly common. A key problem is that, in many workplaces, the IT team will take care of
internet security within the office. With distributed employees working remotely, employees should pay close
attention to online security threats themselves. Here are some tips to keep you safe from working at home.
The study encouraged the translation of staff opinions from sentroconsulting. Sentroconsulting staff were
allowing the introduction of new state-of-the-art technology at sentroconsulting to promote the organization’s
business. To protect the network, the company will need to maintain strong internet security. Employees must
have qualifications to be able to use emerging technologies without difficulty.

Use antivirus and internet security software at home

MSCP/2021/22/Remote working
(https://static.safetydetectives.com/wp-content/uploads/2021/04/Antivirus-Internet-Security.png)
One of the most effective home security tips to invest in a wide range of your antivirus program with your
employees. According to sources, the estimated global damage to businesses as a result of cybercrime is
estimated at $ 1.5 billion a year. This number is likely to increase as criminals try to exploit the local Internet
networks and business VPNs to gain access to sensitive files. These attacks may leave you, your business, and
your employees vulnerable to ransomware attacks, DDoS attacks, malware, spyware, and other forms of
malware. Antivirus suits take the hard work out of your hands by providing automatic remote operating security
against a host of threats, including:
 Attack of zero days (viruses use security pre-installed errors and amendments)
 Malicious software, spyware, and viruses
 Trojans and worms Crime scams to steal sensitive information,
 including those sent via email
Not only is a comprehensive antivirus suite able to protect up to 100% of online security threats, but it also
automatically updates itself to stay on top of new and emerging threats. It also works smarter after some of your
tasks, so you won't even notice the hard work it does. (kaspersky, n.d.).

Keep Family Members away from Work Devices

While you may be confident that you and your tech-savvy employees will keep you safe online, it is good to
remember that working from home means that the company's computers are more likely to be exposed to minors
and other members of staff members. Therefore, it is important to remind employees to keep their tools safe and
not to allow other family members to access their work laptops, cell phones, and other hardware. It is also worth
reminding them of the importance of passwords that protect their devices from preventing third-party companies
from accessing sensitive files.

Invest in a sliding webcam cover

MSCP/2021/22/Remote working
(https://static.toiimg.com/photo/msid-78363548/78363548.jpg)
Working from home often means participating in conferences and video calls that require the use of your
webcam. Unfortunately, savvy criminals can easily access your webcam without permission, which has
undermined your privacy. Worse still, if you have sensitive documents in your workplace, cyber criminals can
watch you by hijacking your webcam.

If your webcam is different from your device, you should remove it whenever you do not use it. If your webcam
is built-in, you should take extra steps to protect yourself - you never know when a webcam attack might occur.
Smooth web camera covers are readily available online in all shapes, sizes, and colors to suit your needs. They
are usually easy to install, too, as many come with a sticky layer that fits your webcam. While using video
conferencing software, you may also want to use functions such as the "background blurring" feature if your
forum has one. This can prevent people at your conferences from checking the back of your home, which can
often include sensitive information about you or your clients. (kaspersky, n.d.)

Use a VPN

MSCP/2021/22/Remote working
(https://vpnoverview.com/vpn-information/what-is-a-vpn/)
Working remotely usually means connecting your computer to a Virtual Private Network (VPN connection) -
but this in turn creates 'backdoors' to home office security that criminals can expose. First and foremost, it's
important to provide employees with a homework of at-home safety tips and guidelines or principles to be a
secure remote worker. Companies should look for ways to make their VPNs more secure. VPN security can be
improved by using a more robust authentication method.
Most VPNs use a username and password, but you might want to consider switching to smart cards. You can
also upgrade your encryption to gain VPN access, for example, by upgrading the Point-to-Point Tuning
Protocol to Second Layer Drag Protocol (L2TP). Of course, no matter how powerful your VPN is: If your
password is compromised, it gives hackers an easy way to get in.
Therefore, it is important to ensure that employees regularly update their passwords. You should also remind
employees to only use the VPN when they need it, and to turn it off when using their equipment in the evening
or on weekends. When working from home, employees will use their home networks and internet connections.
That's why it's a good idea to teach employees how to set up their own wireless routers and personal firewalls
and how to keep their home networks secure. And of course, complete security and antivirus software will also
integrate your VPN. (kaspersky, n.d.)

Secure your Home Wi-Fi

MSCP/2021/22/Remote working
(https://www.kaspersky.com/resource-center/preemptive-safety/how-to-set-up-a-secure-home-network)
One of the easiest ways to ensure internet security for remote workers is to strengthen the security of your home
Wi-Fi network. You can achieve this with some special steps. Instead of relying on the default password your
route comes from, create a strong, unique password. You can access your Route settings page by typing
“192.168.1.1” into your browser and changing your password there. Make sure you choose a password that is
hard for everyone to guess.
You can also change your SSID, E.g.: the name of your wireless network, in the same settings page to make it
harder for third parties to recognize and access your home Wi-Fi network. Do not use your name, home address,
or anything else that could be used to identify you. Make sure you enable network encryption, which is usually
done under security settings on your wireless configuration page. You will have a variety of security options to
choose from, such as WEP, WPA, and WPA2.
If you are using new hardware (much later than 2006) the most powerful is WPA2. For added security, you can
restrict network access to specific MAC addresses. Every device connected to your network has a unique MAC
address (if available, you can find the address of each device by opening Command Prompt and then entering
"ipconfig /all"). If you know the addresses of verified devices, you can add them to your wireless router settings
so that only those devices can connect to your Wi-Fi network. Finally, make sure you are using the latest
version of your firmware by visiting your router settings page regularly. Peach and software updates often
address potential security concerns.

MSCP/2021/22/Remote working
Protect your online banking

If you are responsible for business accounts, it is important to ensure that money is stored and transferred in the
safest way possible. The last thing you want is to deal with security breaches on any of your online banking
forums. Above all, it is important to use only authorized software and services to manage finances. Only use
services you know and are familiar with. If you are unsure of the reliability of a particular site, search online for
updates and additional information before using it. Trusted institutions should include on their websites the
contact details of people customers can contact if they have any concerns.

Working from Home Security Tips for Staff


In summary, to ensure working from home safely, remote workers can use these tips as a checklist:

 Are you using a comprehensive antivirus and internet security software at home?
 Have you secured your devices – by keeping them safe from family members and ensuring that
encryption is turned on and configured? Have you enabled “Find my device” and remote wipe on all
your devices?
 Have you invested in a web cam cover? If your webcam is external, do you unplug it when not in use?
 Are you using a VPN?
 Have you secured your home Wi-Fi?
 Have you made sure that your passwords are strong and secure?
 Are you alert to the dangers of phishing scams, avoiding clicking on links or opening attachments in any
emails you are unsure of?
 Are you using a supported operating system, and do you keep your operating system up to date?
 Do you keep all software up to date?
 Have you enabled two-factor authentication where appropriate, or considered the use of an authenticator
app such as Google Authenticator or Authy?
 During video calls, do you take care not to over share your screen and are you mindful of what might be
in the background?
Working from Home Security Tips for Employers
 Employers considering remote work security best practices can use these tips as a checklist:

 Do you have a documented work from home security policy? A good example from the Information

MSCP/2021/22/Remote working
Commissioner’s Office can be found here.
 Do you have a BYOD (Bring Your Own Device) policy?
 Do you provide cyber security awareness training to employees?
 In particular, do you train staff to be alert to phishing attacks and how to avoid falling victim to them?
 Are you ensuring that staff use a VPN, and is this set up correctly and kept up to date with security
patches?
 Is the platform you use for staff video teleconferencing secure with end-to-end encryption?
 Do you use a centralized storage solution – i.e. safe data storage in the cloud – and encourage staff to
backup data regularly?
 Are company devices secured by company-approved antivirus software?
 Do you encourage employees to have strong and safe passwords, and have you considered the use of a
Password Manager?
 Do you encourage the use of two-factor authentication to validate credentials?
 Do you use encryption software to protect company data by barring access to any unauthorized users?
 Do you advise staff to use corporate email solutions and not to rely on their own email or messaging
accounts for the storage or transmission of personal data?

As working from home has increased worldwide, cybersecurity for remote workers has become a hot topic. By
following cybersecurity remote work best practices, individuals and organizations can avoid risks and ensure
safety.

MSCP/2021/22/Remote working
MSCP/2021/22/Remote working
Reference
https://whatdoesmean.net/what-is-a-research-project/

https://www.datapine.com/articles/data-analyst-tools-software

https://mymanagementguide.com/basics/what-is-a-project/

https://www.researchgate.net/publication/342163727_WORK_BREAKDOWN_STRUCTURE_WBS

https://leverageedu.com/blog/research-design/

https://penmypaper.com/blog/qualitative-research/

https://www.questionpro.com/blog/quantitative-research/

https://www.questionpro.com/blog/what-is-a-questionnaire/

https://www2.deloitte.com/ch/en/pages/risk/articles/impact-covid-cybersecurity.html

https://www.projectguru.in/important-data-analysis-research/

https://www.datapine.com/blog/data-analysis-methods-and-techniques/#data-analysis-importance

https://www.kaspersky.com/resource-center/threats/remote-working-how-to-stay-safe

MSCP/2021/22/Remote working
MSCP/2021/22/Remote working
MSCP/2021/22/Remote working
Grading Rubric
Grading Criteria Achieved Feedback

LO1 Establish project aims, objectives and timeframes based on the chosen
theme
P1 Devise project aims and objectives for a chosen scenario.

P2 Produce a project management plan that covers aspects of cost, scope,


time, quality, communication, risk and resources.
P3 Produce a work breakdown structure and a Gantt Chart to provide
timeframes and stages for completion.
M1 Produce a comprehensive project management plan, milestone schedule
and project schedule for monitoring and completing the aims and objectives
of the project.
LO2 Conduct small-scale research, information gathering and data collection
to generate knowledge to support the project

P4 Carry out small-scale research by applying qualitative and


quantitative research methods appropriate for meeting project aims and
objectives.
M2 Evaluate the accuracy and reliability of different research methods
applied.
D1 Critically evaluate the project management process and appropriate
research methodologies applied.

MSCP/2021/22/Remote working
LO3 Present the project and communicate appropriate recommendations
based on meaningful conclusions drawn from the evidence findings and/or
analysis

P5 Analyse research and data using appropriate


tools and techniques.
P6 Communicate appropriate recommendations as a
result of research and data analysis to draw valid and meaningful
conclusions.
M3 Evaluate the selection of appropriate tools and techniques for accuracy
and authenticity to support and justify recommendations.

D2 Critically evaluate the research and data analysis tools used in the
project development stages..
LO4 Reflect on the value gained from conducting the project and its
usefulness to support sustainable organisational performance
P7 Reflect on the value of undertaking the research to meet stated objectives .
and own learning and performance.
M4 Evaluate the value of the project management process and use of quality
research to meet stated objectives and support own learning and
performance.
D3 Critically evaluate how the project supports sustainable
organisational performance.

MSCP/2021/22/Remote working

You might also like