Professional Documents
Culture Documents
Student’s name
List which assessment criteria Pass Merit Distinction
the Assessor has awarded.
LO1.Establish project aims, objectives and time frames based on the chosen theme
LO3. Present the project and communicate appropriate recommendations based on meaningful conclusions
drawn from the evidence findings and/or analysis.
Pass, Merit & Distinction P5 P6 M3 D2
Descripts
LO4. Reflect on the value gained from conducting the project and its usefulness to support sustainable
organisational performance
Pass, Merit & Distinction P7 M4 D3
Descripts
Resubmission Feedback:
MSCP/2021/22/Remote working
Assignment Feedback
Formative Feedback: Assessor to Student
Action Plan
Summative feedback
MSCP/2021/22/Remote working
Pearson
Higher Nationals in
Computing
Unit 6: Managing a Successful Computing Project
MSCP/2021/22/Remote working
General Guidelines
1. A Cover page or title page – You should always attach a title page to your assignment. Use previous page as
your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom, right margins and 1.25” for the left margin of each page.
1. The font size should be 12 point and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and Page Number
on each page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help editing your assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the compulsory
information. eg: Figures, tables of comparison etc. Adding text boxes in the body except for the before
mentioned compulsory information will result in rejection of your work.
2. Carefully check the hand in date and the instructions given in the assignment. Late submissions will not be
accepted.
3. Ensure that you give yourself enough time to complete the assignment by the due date.
4. Excuses of any nature will not be accepted for failure to hand in the work on time.
5. You must take responsibility for managing your own time effectively.
6. If you are unable to hand in your assignment on time and have valid reasons such as illness, you may apply
(in writing) for an extension.
7. Failure to achieve at least PASS criteria will result in a REFERRAL grade.
8. Non-submission of work without valid reasons will lead to an automatic REFERRAL. You will then be asked to
complete an alternative assignment.
9. If you use other people’s work or ideas in your assignment, reference them properly using HARVARD
referencing system to avoid plagiarism. You have to provide both in-text citation and a reference list.
10. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be reduced to A
REFERRAL or at worst you could be expelled from the course
MSCP/2021/22/Remote working
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as my own
without attributing the sources in the correct way. I further understand what it means to copy another’s work.
MSCP/2021/22/Remote working
Higher National Diploma in Computing
Assignment Brief
Student Name /ID Number
Unit Tutor
Issue Date
Submission Date
Submission Format:
The submission should be in the form of an individual report written in a concise, formal business style
using single spacing (refer to the assignment guidelines for more details). You are required to make use
of headings, paragraphs, and subsections as appropriate, and all work must be supported with research
and referenced using Harvard referencing system. Please provide in-text citation and a list of
references using Harvard referencing system.
Please note that this is an individual assessment and your report should include evidences to that you
have conducted a research to collect relevant data individually.
MSCP/2021/22/Remote working
Unit Learning Outcomes:
LO1 Establish project aims, objectives and timeframes based on the chosen theme.
LO2 Conduct small-scale research, information gathering and data collection to generate knowledge to
support the project.
LO3 Present the project and communicate appropriate recommendations based on meaningful conclusions
drawn from the evidence findings and/or analysis.
LO4 Reflect on the value gained from conducting the project and its usefulness to support sustainable
organizational performance.
MSCP/2021/22/Remote working
MSCP/2021/22/Remote working
MSCP/2021/22/Remote working
Research Theme: Remote working
Research Topic: What are the key cyber security risks of working remotely e.g. employees downloading
unsecure apps or sharing their work devices with family members?
“The option to work remotely was already being embraced by some businesses in the pre-pandemic era. These
businesses were making some progress to adapt their working practices to accommodate remote working by
allowing those in certain job roles to take the opportunity to work from home, albeit a day or two a week.
However, on the whole there had been a reluctance to have staff working remotely and this has largely
centred around productivity concerns, security implications and technology issues.
The global pandemic however necessitated and accelerated the move to remote working. The vast majority of
businesses have now shifted some or all of their operations online, and almost all of their staff are working
from home. The enabling force behind this necessary shift has been the different technologies and platforms
that facilitate workers to achieve business goals remotely. This sudden shift to remote working took place
within weeks and months and has not been without issues. Several surveys conducted during this period cited
business leaders complaining about how technology problems have impacted their business and employees
while working remotely. The biggest issues remote workers face are being frequently disconnected from
corporate networks, slow file downloads, poor quality of video meetings and long response times when
loading apps. As a result, building secure, effective and integrated technology capability, to continue this
flexibility in the workforce, has now become a priority for all organisations”. (Pearson, 2020)
You are expected to carry out a small-scale research in order to explore the cyber security risks of working
remotely due to the pandemic, from the standpoint of a computing professional. The research that you carry
out can be based on an organization that you have access to gather sufficient information to investigate the
cyber security risks of remote working.
MSCP/2021/22/Remote working
A comprehensive project management plan
Evaluation of data collection methods and data analysis tools and/or techniques should be provided
Appropriate recommendations should be provided
Reflect on the value gained from conducting the project and its usefulness to support sustainable
organizational performance
TASK – 01
o Define the scope of the project and devise aims and objectives of the project that you are going
to carry out. You also should include a brief introduction to the selected company, remote
working process and technologies used, explanation to the project and other relevant
information about the research.
TASK – 02
Carry out a research to investigate the cyber security risks of remote working by applying appropriate
qualitative and quantitative research methodologies and critically evaluate the reliability, accuracy and the
appropriateness of the research methods applied. Your answer also should include a critical evaluation of the
project management process and a justification to the selected research methodologies.
TASK – 03
o Analyze research data collected to support your research project using appropriate tools,
techniques and critically evaluate how selected tools, techniques uphold authenticity and the
accuracy of the data collected.
o Draw valid conclusions and recommendations from the research data analysed and
communicate your recommendations to the top management of the organization through an
action plan. The action plan should include a justification to the recommendations suggested.
MSCP/2021/22/Remote working
TASK – 04
4.1. Reflect on the objectives of the cyber security risks project and your own learning experience gained
through following a quality research and the project management process. Critically evaluate the ways in
which the research project carried out supports the organization to sustain its performance/ security in a
remote working environment and how the project supported you to improve your own learning and
performance.
Acknowledgment
Firstly, I would like to thank my parents and my friends for helping me throughout this assignment. And I’m
also so grateful to my Lecturer at Esoft Computer Studies (Pvt.) Ltd, Kandy, and Mr.Anuradha for giving me
the proper guidance and help to do this assignment without any hassle. It was very interesting to learn about
managing successful computing project, as I have not had any previous knowledge about it. I thank Esoft
Computer studies (Pvt.) Ltd for giving me a wonderful opportunity to do this assignment.
MSCP/2021/22/Remote working
TASK – 01
Define the scope of the project and devise aims and objectives of the project that you are going to carry
out. You also should include a brief introduction to the selected company, remote working process and
MSCP/2021/22/Remote working
technologies used, explanation to the project and other relevant information about the research.
Introduction
The pandemic sweeping the world, COVID-19, has rendered a large proportion of the workforce unable to
commute to work, as to mitigate the spread of the virus. This has resulted in both employers and employees
seeking alternative work arrangements. Due to the pandemic, most if not all workers experienced work from
home (WFH). Hence WFH has become a policy priority for most governments. In doing so, the policies must
be made keeping in mind the practicality for both employers and employees. A critical insight and related
recommendations have been developed for future policy decisions. It will also critically investigate if this work
arrangement will remain as a transitory element responding to the exceptional circumstances, or whether it
could be a permanent arrangement.
Definition of Project
The term ‘project’ may be defined as a complex set of economic activities in which scarce resources are
committed in expectation of benefits that exceed the costs of resources consumed. It refers to an investment
activity in which resources are committed within a given time framework, to create assets over an extended
time in expectations of benefits which exceeds the committed resources. Thus, Projects require resources. They
are also expected to derive benefits. Projects are said to be desirable if their benefits are greater than the costs
incurred on them. A project can also be referred to as a non-repetitive activity. A project is viewed as a
conversion process. This implies that a project involves a transformation of some form of inputs Into an output.
(managementguide, 2022)
(Dreamstime, n.d.)
MSCP/2021/22/Remote working
Basic characteristics of Projects
Projects could be small or large. However, regardless of the size of a project, projects have Common
characteristics. Some of these characteristics are:
A project has a unique purpose.
Every project should have a well-defined objective. For example, many people hire Firms to design and build a
new house, but each house, like each person, is unique.
A project is temporary.
A project has a definite beginning and a definite end. For a home construction project, Owners usually have a
date in mind when they’d like to move into their new homes.
A project is developed using progressive elaboration or in an iterative fashion.
Projects are often defined broadly when they begin, and as time passes, the specific Details of the project
become clearer. A project requires resources, often from various areas. Resources include people, hardware,
software, or other assets. Many different types of people, skill sets, and resources are needed to build a home.
A project should have a primary customer or sponsor.
Most projects have many interested parties or stakeholders, but someone must take the primary role of
sponsorship. The project sponsor usually provides the direction and funding for the project.
Have definite location and target group (beneficiaries)
MSCP/2021/22/Remote working
(https://medium.com/thrive-global/how-to-complete-a-personal-swot-analysis-2f8769aebd5e)
S.W.O.T. Strengths, Weaknesses, Opportunities and Threats. SWOT analysis is a systematic list of your
business strengths, weaknesses, opportunities and threats. Weaknesses and weaknesses are within us company
(think: reputation, patents, location). You can change them over time, but not without a bit of work. There are
opportunities and threats foreign (think: suppliers, competitors, prices) - they are in the market, whether you
like it or not.
You cannot change them. The project had strengths and weaknesses, as well as opportunities and threats. Before
everything, Assisted power, sufficient human resources to successfully complete the task trained, supporting
stakeholders and company partners in the project. Team members, good integration of project team person
resources as well an experienced project manager. Like this weakness, they also affected our project. Lack of
communication of team members, insufficient budget to complete the project, and no enough company staff
bars. Opportunities are a positive response from donors. Support, political will and incentives to project team
member’s communities, companies and government borders are supported in our project go successfully. And
threats of lack of access to target groups, locations and time interval. They are involved in our project.
MSCP/2021/22/Remote working
Company Description
About Us
We are a business-consulting firm based in Colombo, Sri Lanka that provides innovative solutions to all your
business needs. Our team comprise of MBA graduates from world's leading universities and
CA/FCMA/ACMA/CGMA members with more than 15 years’ experience in Banking, Finance, Marketing,
International Business and Management.
Our mission
We are passionate to provide innovative business solutions to our clients with competitive rates with the
information that we gathered through extensive research from reliable sources & technical expertise of our
consultants while maintaining high quality technical standards & best ethical practices and providing good job
satisfaction to our team members with a fair return on investment to our shareholders.
Our vision
To become a leading total business solutions provider in the region
Our services
Investment consulting
We will be there for you from thought to finish in turnkey investment projects in any industry in the world. Our
services includes
Preliminary market research reports
Initial project feasibility study reports
MSCP/2021/22/Remote working
Marketing Plans
Financial forecasting and Investment project appraisals
Assistance in acquiring private /government land & buildings with necessary approvals from
government agencies
Introduction to development and commercial banks for long term project loans
Corporate Planning
We undertake to prepare corporate and strategic plans for businesses in order to maximize the opportunities in
the market while utilizing their internal strengths and overcoming the internal weaknesses while defending the
strategic business unit to the threats from the external environment. A proper corporate plan will highlight the
answers to the following questions of any business unit.
1. Where are we now?
2. Where do we want to be?
3. How can we get there?
(jtconnect.org, n.d.)
Aims are a general statement used to describe the final hope of the 'goal' of a researcher or researcher who
wants to achieve the end of a project. It basically describes what will be achieved in the long run. It should be
MSCP/2021/22/Remote working
based on broad terms and a desire for prominence but not beyond what is possible. Aim of the project is to
carry out a small-scale research in order to explore the cyber security risks of working remotely due to
the pandemic, from the standpoint of a computing professional.
Objective
Objectives are a specific statement describing the course of actions an investigator needs to take to achieve
aims. In objective statement, you are trying to make your project more feasible and tangible, something that can
be touchable in the reality. Once you've defined your goals, consider if each one is possible and if the number of
goals is realistic (as a guide, there should be three to five goals derived from the end).
MSCP/2021/22/Remote working
The purpose and objective of the investigation must be SMART
(clicdata, n.d.)
Specific
Be clear about what you are going to do.
Measurability
What evidence will you have that you have achieved your goal?
Achievable
Do not try too hard. A less ambitious but achieved goal is better than an overly ambitious
one that cannot be achieved.
Realistic
Do you have the necessary resources (time, money, skills, etc.) to achieve the goal?
Time Limit
Determine when each stage should be completed. Do you have unforeseen delays in your
schedule?
Our goal and objectives should define our research project and answer our research
questions.
MSCP/2021/22/Remote working
Project management plan
A project management plan is an approved official document that defines how the project is
executed, monitored and controlled. This may be a summary or a detailed document and
may include references, branch management plans and other planning documents. This
document is used to define the approach taken by the project team to provide the extent of
planned project management. The project manager creates the project management plan
following inputs from the project team and the key stakeholders. (pmi.org, n.d.)
(padakuu, n.d.)
Project lifecycle
1. Project identification
This stage is called pre-feasibility studies. In this stage, projects that can contribute toward achieving
the specified objective are identified. Project ideas may come from:
New experiments from previous project failures
New experiments from expansion
External threats
Opportunities
Other sources
MSCP/2021/22/Remote working
2. Project Preparation
Once the project is approved to move forward based on your business case, statement of work, or
project initiation document, you move into the planning phase.
3. Project appraisal
4. Project implementation
5. Project evolution
MSCP/2021/22/Remote working
(rindle, n.d.)
PROJECT OVERVIEW
PURPOSE
Explore the cyber security risks of working remotely for sentroconsulting.
OF PROJECT
CONSTRAINTS
MSCP/2021/22/Remote working
Time constraints. The projects since the timeframe was given is only four months
Cost constraints. The budget has been used in the first two months. Thus, there is limited
cost left for the recovery effort and avoid any more wastage
Employee working experiences and skills constraints. Maybe need train the employees
on
network and security to improve their technical skills as they lack of experiences and skills
TENTATIVE SCHEDULE
MSCP/2021/22/Remote working
risks are managed.
Confirming that the business requirements
are valid and correctly prioritized.
Report and inform stakeholders on the
project progress
Ms.Dinushka Communication Manage
Carry out and manage daily internal and
Weerakoon external communication activities
Schedule interviews and media events.
Schedule meetings and maintain
information
on the status of changes requests.
Ms.Hansi
Coordinator Assist in gathering project plans and
Pannaseeha monitor
work efforts
BENEFITS AND CUSTOMERS
A retention/destruction schedule can ensure your business information
PROCESS
stays safe
Company
Crime prevention
OWNER
Determines the need for Change in Policies and Standards
Protect IT System & Infrastructure against Attacks
Employs Evaluates the Security of Data Flow
Effectiveness of Security Training & Awareness
EXPECTED Find Gaps Or Non-Compliance In Current Security Systems/Practices
BENEFITS Gain Access to Tools and Training to Help Close Discovered Gaps
MSCP/2021/22/Remote working
Work Breakdown Structure
Abstract
Work Breakdown Structure (WBS) is a phase breakdown that focuses on the delivery of work to be done by the
project team to achieve the project objectives and to create the required delivery. WBS is the foundation of
project planning, implementation, control, monitoring, and reporting. All work contained within the WBS must
be identified, measured, organized, and budgeted for. Company owners and project managers use the Work
Breakdown Structure (WBS) to make complex projects more manageable. WBS is designed to help divide a
project into manageable and manageable components. This article will provide you with a few examples of job
classification structure and will give you a summary of how WBS can help with project planning. (Alutbi, 2020)
MSCP/2021/22/Remote working
descends on the WBS represents a more detailed description of project delivery.
MSCP/2021/22/Remote working
(Develop by author)
Gannt chart
The Gantt chart, commonly used in project management, is one of the most popular and useful ways to display
tasks (activities or events) that are displayed over time. To the left of the chart is a list of tasks and at the top is a
timeline. The start and end dates of end items and overview items in a project are illustrated with Gantt
diagrams. The job breakdown structure of the project consists of terminal elements and description
elements.
MSCP/2021/22/Remote working
MSCP/2021/22/Remote working
(Develop by author)
The project plan for the sentroconsulting has started on 03/25/2022 (Monday) and
ends on 07/26/2022 (Thursday). All the tasks and the break downed tasks has also been
given for the preparation of Gantt Chart. Duration needed for each and every task and the
sub tasks are clearly given in the Gantt Chart. This is the finalized Gantt chart where this
will be followed for the execution process of the sentroconsulting.
TASK – 02
Research Design
Abstract
Research is valid if the conclusion is accurate or true and the research design is the conceptual framework in
which the research is conducted. His research expert, who prepares an application, incorporates a framework for
data collection, measurement and analysis. The research design is not associated with any particular data
collection method or any specific type of data. When designing research it is important that we identify the type
of evidence needed to answer the research question correctly. This chapter outlines the purpose, significance
and types of research structure.
MSCP/2021/22/Remote working
Research Design
(htt3)
By the term ‘research’, we can understand that a collection of data that encompasses sensitive information by
considering research methods. In other words, it is the compilation of information or data that is explored by
hypothesis and therefore results in a more concise and systematic finding. Research can be done both
academically and scientifically as well. Let us first understand what the research design means. (leverageedu,
2021).
The design of the study helps the researcher to pursue his or her journey to an unfamiliar but organized place
next to them. Just as an engineer or an architect prepares a building, so the researcher selects the design in a
variety of ways to determine what kind of research is to be done.
MSCP/2021/22/Remote working
The method applied for analyzing collected details
Type of research methodology
Accurate purpose statement
Probable objections for research
The research methodologies can be categorized into many types but there are two main
Types that has been used often.
1. Qualitative Research
2. .Quantitative Research
Qualitative Research
Introduction
This paper provides information on high-level research and highlights the benefits of a state-of-the-art research
methodology for radiation science. Advanced research methods can be used independently, or to improve
measurement methods. We draw attention to the process of producing high-quality research questionnaire.
(penmypaper, n.d.)
Quality research is defined as a market-based approach to data acquisition through open communication and
discussion. This approach is not only "what" people think but also "why" they think so. For example, consider a
MSCP/2021/22/Remote working
store that wants to improve its support. The formal observation concludes that the number of men visiting the
store is enormous. Another good way to determine why women would not visit the store is to do a thorough
interview of potential customers in the category.
Quality research is based on the fields of social sciences such as psychology, social sciences, and anthropology.
Therefore, high-level research methods allow for in-depth and continuous research and questioning of
respondents based on their responses, while the interviewer / researcher also tries to understand their motives
and feelings. Understanding how your audience makes decisions can help to draw conclusions from market
research. (questionpro, n.d.)
There are different types of qualitative research methods like,
One on One Interview
Case study Research
Content Analysis
Ethnographic Research
Focus Groups
(htt4)
A common quality research tool, one-on-one interviews are exactly the same as how they sound - in-depth
individual interviews between each respondent and a professional qualitative researcher. This method helps to
understand and can capture more information. They are also flexible and allow for more organized, less
MSCP/2021/22/Remote working
organized and less formal methods.
A case study is an in-depth study of an individual, group, or event. In exemplary research, almost all aspects of
health and study history are analyzed to identify patterns and causes of behavior. Examples of studies can be
used in a variety of fields including psychology, medicine, education, anthropology, political science, and social
work. The hope is that the lessons learned from studying one story can be passed on to many others.
Unfortunately, case studies are often very speculative and sometimes difficult to produce results for most
people.
MSCP/2021/22/Remote working
Focus group
A focus group is a research methodology that involves a small group of people to answer questions in a limited
space. The group is selected based on previously defined traits, and questions are designed to determine the
topic of interest. Focus groups are a form of quality research. A look at group flexibility, their responses to
focus group questions, and even their body language can guide future research on consumer decisions, products
and services, or controversial topics.
They can be used in three ways in the research design:
Standalone - where focus groups are one way to collect data and act as the main source of data
Add-on - used to improve other data collection methods. This will often be the prelude to the plural phase -
determining the issues to be addressed in a formal interview and providing details on the issues or opportunities
being explored.
As part of a multi-method design - where studies use multiple data collection sources and there is no one
method that determines the use of others.
MSCP/2021/22/Remote working
have difficulty expressing themselves freely. Therefore, the level of knowledge obtained is low and the
investment is wasted.
Hard to Get Honest Opinions For Sensitive Topics
Focus groups are not successful on sensitive issues as participants are reluctant to answer such
questions. Therefore, it is difficult to get them to express themselves sincerely. Otherwise, the
chairperson may have doubts about the views of the participants, as the information they use is difficult
to access.
Results Are Biased
Focus groups have become a common market research tool because they are biased and often provide
encouraging feedback. Chairmen may deliberately or unintentionally change the views of participants,
as they may not want to disappoint the chairperson. For this reason, focused surveys may give false
information about your product or service.
Might Not Be a True Representation of Your Target Group
Focus groups include an example of an audience that is not an accurate representation of the community.
The views expressed by the participants may not represent the views of the public. Therefore, more
research is often needed to evaluate the results of focus groups.
(https://resources.pollfish.com/survey-guides/the-complete-guide-to-quantitative-market-research/)
MSCP/2021/22/Remote working
Abstract
The aim of this study is to explicate the quantitative methodology. The study established that quantitative
research deals with quantifying and analyzing variables in order to get results. It involves the utilization and
analysis of numerical data using specific statistical techniques to answer questions like who, how much, what,
where, when, how many, and how. It also describes the methods of explaining an issue or phenomenon through
gathering data in numerical form. The study further reveals that quantitative methods can be categorized into;
survey research, correlational research, experimental research and causal-comparative research.
MSCP/2021/22/Remote working
and are therefore commonly used in quantitative research.
Previous studies
Various items related to the research topic are examined before feedback is collected from the
participants.
Quantity data
Usually, quantity data is represented by tables, charts, graphs, or any other non-numerical form. This
makes it easier to understand the data collected and verify the authenticity of the market research.
Generalization of results: The results of this research approach can be communicated to all people for
appropriate developmental measures.
MSCP/2021/22/Remote working
all your results. Even forming a hypothesis may be a good fit for you, especially if you already have a
specific question that you know you want to prove or disprove.
It can be misleading.
Many people think that quantitative research is more reliable or scientific than experimental, quality
research because it is based on mathematics. However, both types of research can be independent and
misleading. The views and biases of the researcher can affect the way the masses gather information. In
fact, the effect of this bias is more pronounced in the quantitative research system than in the quality
research situation.
Cannot determine if answers are true or not.
Researchers using the measurement method should work with the assumption that all answers given to
them through research, measurement and evaluation are based on reality. This way there is no face-to-
face contact, which means that interviewers or researchers cannot measure the validity or authenticity of
each outcome.
MSCP/2021/22/Remote working
Questionnaires
A survey is a research tool that includes a set of questions or other types of notifications aimed at gathering
information from the respondent. A research questionnaire is usually a combination of closed-ended and open-
ended questions. Open, long-form questions give the respondent the ability to detail their own thoughts. The
research questionnaire was developed by the London Statistical Institute in 1838. Data collected from a data
collection questionnaire can be both qualitative and quantitative. The survey may or may not be presented in
survey form, but the survey always contains a list of questions. (questionpro, n.d.)
Why questionnaires?
Economical
It is an economical way of accumulating information. It is economical both for the sender and for the
MSCP/2021/22/Remote working
respondent in time, effort and cost. The cost of conducting the study with the help of questionnaire
method is very low.
Wide coverage
It is probably the best method to collect information, compared to the other methods like interview or
observation, when the sample population is spread over a large territory.
Rapidity
Replies may be received very quickly in questionnaire method. In this case there is no need to visit the
respondent personally or continue the study over a long period.
An Easier Method
Comparability
Once the data has been calculated, it can be used to compare and contrast with other studies and can be
used to quantify change. This makes the monthly or annual question list very important over time.
MSCP/2021/22/Remote working
2. Is your device configured to run automatic updates?
3. Are you using encryption, such as BitLocker, for your computer?
4. Are you using the latest version of your operating system (OS)?
5. Is your work data stored on your corporate network?
Password security
1. Do you have strong password Management?
2. Are any of your passwords written on paper?
3. You have any unencrypted passwords?
4. Does your remote access tool (Take Control, VPN, and RDS) automatically lock when left open?
5. Is your device set to lock automatically in case you forget to lock it?
Email Security
Is your Email secure?
1. Do you send sensitive information, such as credit card details, via email?
2. Do you know how to check an email header to determine its legitimacy?
3. Do you have a spam filter and know how to train it?
4. Do you know how to securely share files with people outside your organization?
5. Do you know the common signs of a phishing scam?
Phone security
Is your smartphone secure?
1. Do you know the common signs of a vishing scam?
2. Do you know the common signs of a smishing scam?
3. Is your SIM card encrypted?
4. Are your location services tracking you?
5. Are you aware of caller ID spoofing?
6. Is your phone protected by a password, PIN, or fingerprint?
7. Do you use public Wi-Fi on your smartphone?
Network security
Is your network prepared for a malicious actor?
1. Does your network name include your street address or family name?
MSCP/2021/22/Remote working
2. Do you have an active firewall built into your router?
3. Is wireless security enabled on your router?
4. Have you changed the default admin password for your router?
5. Is anyone outside your immediate family using your home Wi-Fi network?
MSCP/2021/22/Remote working
MSCP/2021/22/Remote working
MSCP/2021/22/Remote working
MSCP/2021/22/Remote working
MSCP/2021/22/Remote working
MSCP/2021/22/Remote working
MSCP/2021/22/Remote working
MSCP/2021/22/Remote working
MSCP/2021/22/Remote working
MSCP/2021/22/Remote working
MSCP/2021/22/Remote working
Scale research
Range is a measure of volume where the order is, the difference between two variables is reasonable and even,
and there is no zero. Measure current variables at intervals at a standard rate. The measurements used to
calculate the distance between variables are very reliable.
The interval scale is the third measurement scale after the standard and ordinal scale. Understanding the first
two levels will help you break down the range measurements. The self-reported scale is used when the variable
has no natural order or level. You can include random or non-numeric variables, but typical test examples
include gender, location, political party, pets, etc. is found. First of all, we asked the employees and suppliers,
for the example, here is the one of the examples, for the laborer answers for our questions
Concoction
Open Completed Questionnaire The Quality Assurance Questionnaire is used to extract the above information.
Expected. That's why it's helpful to focus on problems and learn about them. Practical help during the Closed
Value Question List The study is used to measure time statistics, results and evaluation tests. View of the bars.
So taking this approach will help improve research. Mathematically, mathematics is also an important factor.
TASK – 03
3.1 Explain the common data analytical techniques. Analyze the collected data
using appropriate tools and techniques.
Data analysis
Introduction
Data analysis is defined as the process of cleaning, modifying and modeling data to gain useful insights for
business decisions. The purpose of data analysis is to extract useful information from data and make decisions
based on data analysis. A simple example of data analysis when we make any decision in our daily life is to
choose that decision and think about the last or most likely event. This is nothing more than an analysis of our
MSCP/2021/22/Remote working
past or future and making decisions accordingly. So we collect memories of the past or dreams of our future. So
this is nothing but data analysis. Now the same thing an analyst does for business purposes is called Data
Analysis.
MSCP/2021/22/Remote working
What is the data Analysis Process?
(https://www.anblicks.com/blog/faqs-on-data-analytics)
When it comes to data analysis, there is a procedure to follow to draw the necessary conclusions. The analysis
process has 5 basic stages. We'll cover each in more detail later in the post, but to start providing the context
needed to understand what's next, here's a description of the 5 essential steps for data analysis.
Identify: Before you get your hands dirty with data, you need to state why you need it in the first place. Identity
is a stage where you identify the questions you need to answer. For example, what is the customer's view of our
product? Is there any type of packaging that is most appealing to our potential customers? Once you have
identified the questions, you are ready for the next step.
Gather: As the name suggests, this is the stage where you start collecting the necessary data. Here you will
learn which resources to use and how to use them. Data collection can take various forms such as internal or
external sources, surveys, interviews, surveys, focus groups, among others. The important point here is that the
MSCP/2021/22/Remote working
way you collect information will differ in terms of capacity and quality.
Clean: Once you have the required data, it's time to clean it up and leave it ready for analysis. Because you
collect a large amount of information in different formats, not all the data you collect will be useful because you
may find yourself with duplicate or badly formatted data. To avoid this, you need to make sure you clean up
any spaces, duplicate records, or formatting errors before you start working with your data. This way you avoid
damaging your analysis with incorrect data.
Analyze: With the help of various techniques such as statistical analysis, retransmission, emotional networks,
text analysis and more, you can start analyzing and manipulating your data to draw relevant conclusions. In this
section you will find trends, relationships, diversity and patterns that can help you answer the first questions
that come to mind during the definition phase. Various technologies on the market assist researchers and
middle-class business users in managing their data. Some include business intelligence and software
recognition, predictive analytics, data mining, among others. (Calzon, 2022)
Translate: Finally, you have a very important step: it's time to translate your results. This is the stage where the
researcher draws lessons based on the findings. For example, here you will know whether your customers prefer
red or green packaging, plastic or paper. Also in this section you can also find some limitations and work
around them. (Calzon, 2022).
Collection analysis
The act of collecting a set of data items in such a way that the specified features are more similar to one another
(in some sense) than those in other groups - hence the term 'collection'. Since no variables are targeted during
collection, the method is often used to detect hidden patterns in data. The method is also used to provide
additional context for a trend or database.
Let's take a look at the job. All over the world, retailers will be able to analyze each customer individually and
provide the best personalized service, but let's face it, it's impossible to do this on time with a large customer
base. This is where integration comes into play. By grouping customers by demographics, buying behavior,
value for money, or anything else that may be relevant to your company, you will be able to quickly improve
your efforts and present your customers with the best information possible. For your needs.
MSCP/2021/22/Remote working
Group Analysis
This type of data analysis method uses historical data to evaluate and compare a fixed portion of user behavior
that can be combined with others with similar characteristics. By using this approach, you can learn more about
customer needs or gain a stronger understanding of the target group.
Collection analysis can be really helpful for marketing analysis as it will allow you to understand the impact of
your campaigns on specific customer groups.
Data Mining
Data mining, also known as data acquisition (KDD), is the process of extracting patterns and other important
information from large data sets. Given the emergence of data storage technologies and big data growth, the
adoption of data mining techniques has accelerated over the past few decades, helping companies by converting
their raw data into useful information. However, despite the continued emergence of technology to process data
on a large scale, leaders still face the challenges of balance and automation.
MSCP/2021/22/Remote working
(https://www.datapine.com/blog/wp-content/uploads/2021/03/inteligent-data-alarms-datapine.png)
Text analysis
Text analysis, also known in the industry as text mining, works by capturing large text datasets and is organized
to make management easier. By working through this robust data purification process, you will be able to
extract data that is truly relevant to your organization and use it to develop practical insights that will propel you
forward.
Modern tools accelerate the use of text analysis. Thanks to a combination of machine learning and smart
algorithms, you can perform advanced analytical processes such as emotional analysis. This approach allows
you to understand the intentions and feelings of the text and rate it based on certain factors and categories
relevant to your product, for example if you are right, negative or neutral. Emotional analysis is often used to
monitor product and product reputation and understand how effective your customer experience is. Check out
this insightful article to learn more about the topic.
MSCP/2021/22/Remote working
decisions while reducing costs and increasing profits. Organized into software categories, with various focuses
and features, and represented by each model.
DATAPINE
(https://www.datapine.com/images/datapine-bi-tool.png)
KEY FEATURES:
Visual drag-and-drop interface to build SQL queries automatically, with the option to switch to,
advanced (manual) SQL mode
MSCP/2021/22/Remote working
Powerful predictive analytics features, interactive charts and dashboards, and automated reporting
AI-powered alarms that are triggered as soon as an anomaly occurs or a goal is met.
R Programming/ R-studio
R Analysis is the analysis of data using R programming language, the open source language used to compute
mathematical computing or graphics. This planning language is often used in statistical analysis and data
mining. It can be used for analysis to identify patterns and build functional models. R not only helps
organizations to analyze their data, but it can also be used to assist in the creation and development of software
applications that perform statistical analysis.
Through visual visualization of system development, R supports a variety of analytical modeling methods such
as statistical testing, compilation, time series analysis, direct and indirect modeling, and more. The interface has
four windows: text window, console window, workspace and history window, and interest tabs (help, packages,
diagrams, and files). R allows for charts and graphs ready for publication as well as storage for reusable analysis
of future data.
MSCP/2021/22/Remote working
Benefits of R Analysis
Python
MSCP/2021/22/Remote working
(https://www.datapine.com/articles/data-analyst-tools-software)
Compared to other popular languages like Python, Java, the code is more accessible and the syntax is easy to
learn, making this tool popular among users looking for open source solution and simple coding processes. In
data analysis, Python is used to clean data, clean up, model, and create analytical algorithms based on business
conditions. One of the best features of its user-friendliness: programmers do not need to remember system
configurations or manage memory - Python is considered a high-quality language that is not under the
computer's native processor. (Calzon, 2022)
Another remarkable feature of Python is its versatility. Users can apply the code to several operating systems
without making any changes, so there is no need to write completely new code. This makes Python a very
portable language because programmers can use it on Windows and macOS. The wide range of modules,
packages and libraries make Python a respected and useful language in all companies, with companies such as
Spotify, Netflix, and Dropbox and Reedit the most popular use of this language in their operations. With
features like text mining and machine learning, Python has become a respected authority for advanced analytics
processes.
MSCP/2021/22/Remote working
SQL consoles
Our list of data analysis tools wouldn't be complete without the SQL console. Actually SQL is a programming
language used to manage/query data stored on related websites, especially those effective in managing
organized data as a tool for analytics websites. It is very popular in the data science community and is one of
the analytical tools used in various business and data situations. The reason is simple: SQL is a crucial part of
business success, as most data is stored in a communications database and you need to access and unlock its
value, and by reading it, analysts can give their skills a competitive advantage. . There are various (SQL-based)
management systems such as MySQL, PostgreSQL, MS SQL and Oracle, and these data analyst tools can be
very useful for any critical analyst to study. Here we will focus on the most popular MySQL Workbench.
MSCP/2021/22/Remote working
For example, data should remain unchanged when transferred or repeated between updates. As a result, data
integrity and data integration can be closely linked. Data is uninterrupted, only stored once on your systems.
Many things can change your data from the first day it is created on your system and throughout its lifecycle. It
can be transferred to other systems, modified and updated many times.
Organizations often use several management systems (ERP, CRM, SCM, etc.). Factors such as human
interaction, data transfer, viral software or compromised computer software can compromise the integrity of
your data. This is where maintaining the integrity of data can be a daunting task. In my job I often provide
solutions for data integration in organizations. I also frequently discuss data quality and data integrity with
various companies in good detail. Many of my customers know that improving the integrity of their data is
important. Data integrity should be high in your mind at all stages of your data cycle. From the design and
implementation phase of your systems. Data integrity also ensures availability and search, monitoring and
communication. Maintaining the accuracy and accuracy of data also improves the stability and performance of
your systems.
MSCP/2021/22/Remote working
The saved filter view is now displayed in Data View and then View Filter. filter
The types are highlighted in dark gray in the column and row headings.
Introduction
In order to determine the accuracy of the data collected during the study, it is necessary to analyze the data. The
best outcome will be to meet the customer's needs and clear their doubts about cyber security. Data analysis
should be performed on each component as a project goal to obtain the most accurate result. Here, an online
Questionnaire was used as a research method to collect information. About the Internet of research materials.
Selection of methods available from sentroconsulting Sri Lanka handles and rods. Study distributed to
colleagues at sentroconsulting Sri Lanka Cyber security Risk work from home. From there, Eighty responses
were received and an interview was conducted.
Between the administrator Experts understand a lot in depth. These answers help gather information about
Cyber security Risk work from home used in data centers. And command What is important will be determined
by analysis. This will be part of the restructuring session, which means which component needs the most
consideration. Many The requested part should be the part that can be used daily or used by most people. Many
practical risk analysis methods are briefly discussed above. Google form and the Risk Register methods used to
analyze the information collected. Google forms analyzes survey responses. And the risk record analyze the
negotiation method.
MSCP/2021/22/Remote working
Responded Questionnaire
I have been gathering data about the level of satisfaction people have while working at home. So far I have
gathered reactions from a diverse sample of 50 people. In the data set, I have 50% male and 50% female
respondents. People come from various functions, and 15% are top management, 22% senior leaders, 19%
middle managers, 10% supervisors, and 32% individual contributors. The data comes from sentroconsulting
Employs, Here are a few observations from my initial data.
The majority of respondents like feel less stressed and anxious while working from home. When asked if they
enjoyed working from home, 26% agreed or strongly agreed. 46% said they feel less stressed working from
home, and 28% thought that they were more productive working from home. The initial research on working
from home done prior to the Pandemic found that people feel less stressed working from home. There have
been concerns from some that productivity in the Pandemic may decline. Nicholas Bloom, a Stanford
Economist, said in an interview, "The global work-from-home movement intended to maintain output and
efficiency during the COVID-19 Pandemic could generate a worldwide productivity slump and threaten
MSCP/2021/22/Remote working
economic growth for many years.” However, it is clear that many organizations are big hurry to return to the
office.
The majority of Employs are already familiar to working from home concept. When asked if they already
worked from home, 52% agreed or strongly agreed. 48% said they not worked from home. Work from home
(WFH) increased sharply and persistently after the outbreak, and much more so among some workers than
others. Using theory and evidence, we argue that the observed heterogeneity in WFH transitions is consistent
with potentially more permanent changes to work arrangements in some occupations Consistent with increased
WFH adoption, many more – especially higher-educated – workers expect to WFH in the future.
MSCP/2021/22/Remote working
A good work routine helps you eliminate distractions and accomplish more while maintaining efficiency. Top
performers can do an impressive amount of work and achieve incredible results by structuring their schedules
strategically. By practicing habits that help maintain work efficiency, these top performers also maintain a
healthy balance while maintaining their leisure and family time.57.1% of Employs Create an effective work
routine and 42.9% don’t.
MSCP/2021/22/Remote working
One of the great benefits of remote work is great flexibility. With the ability to work remotely, employees can
use this opportunity to work from home and create a flexible plan to take care of their work and responsibilities.
But with this flexibility sometimes comes additional pressure. If you work odd hours, or if you do not meet
face-to-face daily, you may feel pressured to spend more time online and work than you would in an office.
And with the exception of coworkers nearby to remind you to take a break, have lunch, and leave the office all
day, distant workers may find themselves working overtime, and not having as much free time as they could
otherwise.48.4% of people they have a healthy work and life balance when working from home and 37.7%
don’t have a healthy life balance. 13% of Employs they don’t have an idea about that.
MSCP/2021/22/Remote working
The graph above shows the results of 50 people in our study. Each person was asked if they "Are you less
productive, equally productive, or more productive that when working in the office?” Note that those who
strongly disagreed— (e.g., their supervisor did not support them — responded more productive to only 42% of
the interview items. Those who strongly disagree responded negative to 48% of the items.10% of them they
don’t have any significant changes.
MSCP/2021/22/Remote working
Home working enables more agility and flexibility in working arrangements. With employees no longer tied to
an office, they may be better placed and more willing to work flexible hours such as earlier or later in the day or
even at weekends. This may help you meet certain business needs eg: if you are trading with customers residing
in a different time zone. According to the result 52% of them have a suitable workspace and 48% of them don’t.
MSCP/2021/22/Remote working
Address it diplomatically. Open communication is key in any relationship, and the employee-boss relationship
is no different. As you have concerns, try to express them calmly. Signs of a bad manager are undesirable
leadership traits that cause friction between supervisors and employees. Most of the Workers they don’t have a
strong relationship to team and team managers.
In the best of times, working from home is associated with all sorts of positive emotions for remote workers—
freedom, autonomy, trust, and happiness, to name just a few. Indeed, remote work is often considered the “holy
grail” of flexible work options, with benefits galore that far outweigh any potential downsides. Acceding to the
questionnaire replay that server evidence, majority people they trusted to work from home.
MSCP/2021/22/Remote working
Normal work is becoming more common. To ensure that their employees are organized for success,
organizations need to know how to support them while working from home. It is therefore important to create a
supportive environment for your home-based employees, as they do not have the team colleagues they had
before and can be easily separated from the rest of the company.52% of Employs they agree for the
organization is providing the proper support. However, it also has downsides. More than half of employees say
they've become no proper support from organization working from home during the pandemic.
MSCP/2021/22/Remote working
Nowadays, many companies provide employees with a wide range of devices from smartphones to laptops and
even tablets to complete their work. The company's IT departments often set up your login information, a
selection of important applications and all the tools that allow you to do your job successfully. Somewhere
during the fifth day at work is usually when we start updating the device at will: change the screen saver into a
pet, log in to Spotify account to list the complete "late app" playlist, check out Facebook's daily news and so on.
However, cybersecurity experts say that weaving your personal and work life together using a portable
computer is a risky business - both for you and for the company. According to the survey more than 50 IT
professionals who revealed that about two-thirds of IT professionals believe that the latest breach of profile was
due to staff negligence.
MSCP/2021/22/Remote working
Specifies whether this computer will receive security updates and other important downloads through the
Windows automatic updating service. Run automatic updates good because most of the time, they don’t want
to. Also, humans can be very forgetful and if you’re relying on them to remember to perform an update there’s
a good chance they won’t happen. But most of Employs they not allow to update device automatically.
Software is vulnerable to hackers and cyber criminals as updates keep you safe from exploitable holes into your
organization. Having reliable security in place is especially important as the release of software update notes
often reveal the patched-up exploitable entry points to the public .More than 20% of Employs they don’t know
about their update status.
MSCP/2021/22/Remote working
BitLocker Drive Encryption is an important security feature for Windows computers. It provides security for
your computer operating system and the data stored on it, ensuring that data remains encrypted even if the
computer is interrupted when the operating system is inactive.61.1% of workers using Bit locker, This helps
protect against "offline attacks," those made by disabling or circumventing the installed operating system, or
made by physically removing the hard drive to attack the data separately.
MSCP/2021/22/Remote working
Employers can see your online activity on your phone. Especially if it is a company phone, and you are
connected to your company network. The company phone uses the data and voice time the company is paying
for to monitor how it is used.
A strong password is essential when it comes to your online security, and you need a different one for each
social network, bank accounts, live streaming services and apps. But with so many accounts to follow, it is
tempting (and surprisingly easy) to fall into the trap of using the same login credentials for everything.
MSCP/2021/22/Remote working
Majority of people more that 40% of they don’t have a strong password management. This lead to break-ins can
include the loss of valuable data such as presentations, emails, and music. Victims may also have their bank
account information, money, or even their identity stolen.
Written Down passwords does not increase password security and makes it more difficult for someone online to
steal your passwords, which may result in easy access for someone to steal those passwords locally. It all
depends on how well you protect those secrets.54% of workers they written down password on papers or note
someware else.
MSCP/2021/22/Remote working
An unencrypted password (or Plaintext, or Plain-text) is a way of writing (and sending) a password in a clear,
readable format. Such password is not encrypted and can be easily read by other humans and machines. And, I
repeat, 40% of organizations keep their passwords in plain text. Questionnaire answer show 28.6% of they have
unencrypted password. That’s mean they have higher risk possibilities.
MSCP/2021/22/Remote working
The most important thing to know about the difference between VPN vs remote desktop solutions is that they
are different operating systems. There are other differences, such as safety risks and standards of flexibility and
control, but understanding what each one does will help you decide which solution will work best for you.46%
of they have remote access tool. But 32% they don’t have any remote access tool. 22% to don’t know about the
remote access tools.
Lock screen on smartphones or devices is an important way to keep your device's content confidential. In the
event that you have personal, business, and financial information on your phone, locking your cell phone is a
must instead of a choice. Only 32% of Employs have automatic lock. But more than exactly 40% don’t have.
MSCP/2021/22/Remote working
Generally, anything you send via email is clearly visible to any mail server that carries the message at all times
(and any people who do not have access to those servers), so sending a standard message with sensitive
information is not recommended. When you send an email message, you have no control over who holds the
message, how many copies are stored on the route and how long those messages are stored in the mail system
along the way.42% of people they send some sensitive information. 29% of them don’t share any of sensitive
information.
MSCP/2021/22/Remote working
Criminal emails to steal sensitive information are used to commit various cybercrime. We all receive a lot of
emails every day - many of which end up in our spam folders. But most of the time, spam emails for sensitive
information are easily escaped from email client checks and are delivered to our inbox. So, if you are
wondering how you can detect a fake email - or, more specifically, how you can detect a fake email or a real
one - we have covered you. Good thing is 62.5% of Workers know about how to check an email header to
determine its legitimacy.
MSCP/2021/22/Remote working
Spam monitoring poses a greater technical challenge than monitoring malware, such as viruses. First of all, only
certain file types can transfer malware that you can use. Empty text files, such as those commonly used for
email, may not contain malicious software but may contain spam. Allows the end user to see real emails and
allow senders to be authorized. An important feature of a business spam filter service is that it scans outgoing
emails to detect spam. Thus, it protects the reputation of the organization.54% are known about spam filter and
know how to train it.46% said they don’t.
MSCP/2021/22/Remote working
The majority of respondents they know to securely share files with people outside organization. When asked if
they know securely file sharing, 49% know or strongly agreed. 51% said they don’t know.
MSCP/2021/22/Remote working
Successful phishing scams give hackers access to corporate networks, access to important information such as
intellectual property, and in some cases money. The question is how to raise awareness about phishing scams
and train your team to detect e-mail spam. The majority of respondents they know phishing Emil. When asked
if they know phishing Email, 60% know or strongly agreed. 40% said they don’t know.
MSCP/2021/22/Remote working
Vishing is a phone scam. In a vishing attack, a scammer preys on human error by phoning their victims and
attempting to get them to reveal their personal information, money, or both. Interesting outcomes from the
questionnaire 50% of know about vishing scam and 50% of them don’t.
Many smashing attacks serve as a crime to steal sensitive information via email. The attacker sends a message
MSCP/2021/22/Remote working
that attracts the user to click a link or request a response containing private data of the targeted user. The
information the attacker wants can be anything, including: Internet account verification.
Caller ID fraud occurs when the caller intentionally lies about the information passed to hide the caller's
number. it may look like it came from a government agency, business, or someone in your contact list in an
attempt to trick you into answering the call.51% not aware of caller ID spoofing and 49% of they aware of
Caller ID spoofing.
MSCP/2021/22/Remote working
Thankfully, there are several authentication methods to unlock your phone. Along with PIN codes and
passwords, smartphone manufacturers have introduced biometric authentication methods, such as facial
recognition, fingerprint, and iris scanning, to give users a faster and more convenient way to access their
phones.54% of have security locks and 48% of don’t have security locks.
Wi-Fi best names never include personal information like your real name, address, apartment number, date of
birth, etc. Wi-Fi passwords are nothing. Never create an SSID associated with a network password. Avoid
annoying SSIDs that can make your network more targeted at hackers.70% of people network name include
their street address or family name.
MSCP/2021/22/Remote working
It is best to turn on the firewall on your router, a device that literally connects you to the Internet. That may be a
cable modem, fiber optic modem, or similar, but those are the best part of a security system because they
prevent malicious questions on all devices in your network, not just your computer.44% have firewall , 32%
don’t have firewall and 24% they don’t know about that.
It's recommended to change the password after you get in the first time. If you don't change the password to
your router, then anyone with access to it can change its settings and even lock you out.38% they skip to change
default password, 36% are changed default password and 26% don’t know about that.
MSCP/2021/22/Remote working
Draw valid conclusions and recommendations from the research data analyzed and communicate your
recommendations to the top management of the organization through an action plan. The action plan
should include a justification to the recommendations suggested.
MSCP/2021/22/Remote working
(https://static.safetydetectives.com/wp-content/uploads/2021/04/Antivirus-Internet-Security.png)
One of the most effective home security tips to invest in a wide range of your antivirus program with your
employees. According to sources, the estimated global damage to businesses as a result of cybercrime is
estimated at $ 1.5 billion a year. This number is likely to increase as criminals try to exploit the local Internet
networks and business VPNs to gain access to sensitive files. These attacks may leave you, your business, and
your employees vulnerable to ransomware attacks, DDoS attacks, malware, spyware, and other forms of
malware. Antivirus suits take the hard work out of your hands by providing automatic remote operating security
against a host of threats, including:
Attack of zero days (viruses use security pre-installed errors and amendments)
Malicious software, spyware, and viruses
Trojans and worms Crime scams to steal sensitive information,
including those sent via email
Not only is a comprehensive antivirus suite able to protect up to 100% of online security threats, but it also
automatically updates itself to stay on top of new and emerging threats. It also works smarter after some of your
tasks, so you won't even notice the hard work it does. (kaspersky, n.d.).
While you may be confident that you and your tech-savvy employees will keep you safe online, it is good to
remember that working from home means that the company's computers are more likely to be exposed to minors
and other members of staff members. Therefore, it is important to remind employees to keep their tools safe and
not to allow other family members to access their work laptops, cell phones, and other hardware. It is also worth
reminding them of the importance of passwords that protect their devices from preventing third-party companies
from accessing sensitive files.
MSCP/2021/22/Remote working
(https://static.toiimg.com/photo/msid-78363548/78363548.jpg)
Working from home often means participating in conferences and video calls that require the use of your
webcam. Unfortunately, savvy criminals can easily access your webcam without permission, which has
undermined your privacy. Worse still, if you have sensitive documents in your workplace, cyber criminals can
watch you by hijacking your webcam.
If your webcam is different from your device, you should remove it whenever you do not use it. If your webcam
is built-in, you should take extra steps to protect yourself - you never know when a webcam attack might occur.
Smooth web camera covers are readily available online in all shapes, sizes, and colors to suit your needs. They
are usually easy to install, too, as many come with a sticky layer that fits your webcam. While using video
conferencing software, you may also want to use functions such as the "background blurring" feature if your
forum has one. This can prevent people at your conferences from checking the back of your home, which can
often include sensitive information about you or your clients. (kaspersky, n.d.)
Use a VPN
MSCP/2021/22/Remote working
(https://vpnoverview.com/vpn-information/what-is-a-vpn/)
Working remotely usually means connecting your computer to a Virtual Private Network (VPN connection) -
but this in turn creates 'backdoors' to home office security that criminals can expose. First and foremost, it's
important to provide employees with a homework of at-home safety tips and guidelines or principles to be a
secure remote worker. Companies should look for ways to make their VPNs more secure. VPN security can be
improved by using a more robust authentication method.
Most VPNs use a username and password, but you might want to consider switching to smart cards. You can
also upgrade your encryption to gain VPN access, for example, by upgrading the Point-to-Point Tuning
Protocol to Second Layer Drag Protocol (L2TP). Of course, no matter how powerful your VPN is: If your
password is compromised, it gives hackers an easy way to get in.
Therefore, it is important to ensure that employees regularly update their passwords. You should also remind
employees to only use the VPN when they need it, and to turn it off when using their equipment in the evening
or on weekends. When working from home, employees will use their home networks and internet connections.
That's why it's a good idea to teach employees how to set up their own wireless routers and personal firewalls
and how to keep their home networks secure. And of course, complete security and antivirus software will also
integrate your VPN. (kaspersky, n.d.)
MSCP/2021/22/Remote working
(https://www.kaspersky.com/resource-center/preemptive-safety/how-to-set-up-a-secure-home-network)
One of the easiest ways to ensure internet security for remote workers is to strengthen the security of your home
Wi-Fi network. You can achieve this with some special steps. Instead of relying on the default password your
route comes from, create a strong, unique password. You can access your Route settings page by typing
“192.168.1.1” into your browser and changing your password there. Make sure you choose a password that is
hard for everyone to guess.
You can also change your SSID, E.g.: the name of your wireless network, in the same settings page to make it
harder for third parties to recognize and access your home Wi-Fi network. Do not use your name, home address,
or anything else that could be used to identify you. Make sure you enable network encryption, which is usually
done under security settings on your wireless configuration page. You will have a variety of security options to
choose from, such as WEP, WPA, and WPA2.
If you are using new hardware (much later than 2006) the most powerful is WPA2. For added security, you can
restrict network access to specific MAC addresses. Every device connected to your network has a unique MAC
address (if available, you can find the address of each device by opening Command Prompt and then entering
"ipconfig /all"). If you know the addresses of verified devices, you can add them to your wireless router settings
so that only those devices can connect to your Wi-Fi network. Finally, make sure you are using the latest
version of your firmware by visiting your router settings page regularly. Peach and software updates often
address potential security concerns.
MSCP/2021/22/Remote working
Protect your online banking
If you are responsible for business accounts, it is important to ensure that money is stored and transferred in the
safest way possible. The last thing you want is to deal with security breaches on any of your online banking
forums. Above all, it is important to use only authorized software and services to manage finances. Only use
services you know and are familiar with. If you are unsure of the reliability of a particular site, search online for
updates and additional information before using it. Trusted institutions should include on their websites the
contact details of people customers can contact if they have any concerns.
Are you using a comprehensive antivirus and internet security software at home?
Have you secured your devices – by keeping them safe from family members and ensuring that
encryption is turned on and configured? Have you enabled “Find my device” and remote wipe on all
your devices?
Have you invested in a web cam cover? If your webcam is external, do you unplug it when not in use?
Are you using a VPN?
Have you secured your home Wi-Fi?
Have you made sure that your passwords are strong and secure?
Are you alert to the dangers of phishing scams, avoiding clicking on links or opening attachments in any
emails you are unsure of?
Are you using a supported operating system, and do you keep your operating system up to date?
Do you keep all software up to date?
Have you enabled two-factor authentication where appropriate, or considered the use of an authenticator
app such as Google Authenticator or Authy?
During video calls, do you take care not to over share your screen and are you mindful of what might be
in the background?
Working from Home Security Tips for Employers
Employers considering remote work security best practices can use these tips as a checklist:
Do you have a documented work from home security policy? A good example from the Information
MSCP/2021/22/Remote working
Commissioner’s Office can be found here.
Do you have a BYOD (Bring Your Own Device) policy?
Do you provide cyber security awareness training to employees?
In particular, do you train staff to be alert to phishing attacks and how to avoid falling victim to them?
Are you ensuring that staff use a VPN, and is this set up correctly and kept up to date with security
patches?
Is the platform you use for staff video teleconferencing secure with end-to-end encryption?
Do you use a centralized storage solution – i.e. safe data storage in the cloud – and encourage staff to
backup data regularly?
Are company devices secured by company-approved antivirus software?
Do you encourage employees to have strong and safe passwords, and have you considered the use of a
Password Manager?
Do you encourage the use of two-factor authentication to validate credentials?
Do you use encryption software to protect company data by barring access to any unauthorized users?
Do you advise staff to use corporate email solutions and not to rely on their own email or messaging
accounts for the storage or transmission of personal data?
As working from home has increased worldwide, cybersecurity for remote workers has become a hot topic. By
following cybersecurity remote work best practices, individuals and organizations can avoid risks and ensure
safety.
MSCP/2021/22/Remote working
MSCP/2021/22/Remote working
Reference
https://whatdoesmean.net/what-is-a-research-project/
https://www.datapine.com/articles/data-analyst-tools-software
https://mymanagementguide.com/basics/what-is-a-project/
https://www.researchgate.net/publication/342163727_WORK_BREAKDOWN_STRUCTURE_WBS
https://leverageedu.com/blog/research-design/
https://penmypaper.com/blog/qualitative-research/
https://www.questionpro.com/blog/quantitative-research/
https://www.questionpro.com/blog/what-is-a-questionnaire/
https://www2.deloitte.com/ch/en/pages/risk/articles/impact-covid-cybersecurity.html
https://www.projectguru.in/important-data-analysis-research/
https://www.datapine.com/blog/data-analysis-methods-and-techniques/#data-analysis-importance
https://www.kaspersky.com/resource-center/threats/remote-working-how-to-stay-safe
MSCP/2021/22/Remote working
MSCP/2021/22/Remote working
MSCP/2021/22/Remote working
Grading Rubric
Grading Criteria Achieved Feedback
LO1 Establish project aims, objectives and timeframes based on the chosen
theme
P1 Devise project aims and objectives for a chosen scenario.
MSCP/2021/22/Remote working
LO3 Present the project and communicate appropriate recommendations
based on meaningful conclusions drawn from the evidence findings and/or
analysis
D2 Critically evaluate the research and data analysis tools used in the
project development stages..
LO4 Reflect on the value gained from conducting the project and its
usefulness to support sustainable organisational performance
P7 Reflect on the value of undertaking the research to meet stated objectives .
and own learning and performance.
M4 Evaluate the value of the project management process and use of quality
research to meet stated objectives and support own learning and
performance.
D3 Critically evaluate how the project supports sustainable
organisational performance.
MSCP/2021/22/Remote working