Posts

ESP overview

  task number  focus  No. Of hours  Marks allocated  1  Trouble shooting and test planning  2 hours 30  22  2  Interview and communication  2 hours 10  12  3  Project proposal  4 hours  24  4  Post project review  3 hours 30  12    Task uno:  This focus on trouble shooting a fault based on a specified problems/issues and designing a test plan.   The troubleshooting document should include:  User details   Test dates  Computer specs and software  Proposed tests and expected outcomes   Record of diagnosis  The test plan should include:  Administrative details E.G. dates names.  Test dates   Hardwear specs and software   Actual and relevant tests carried out in a logical order including images/diagrams  Full and complete details of expected outcomes  Remedial action required   Task d...

Technical and Non-Technical Threats to Organizations

Technical and Non-Technical Threats to Organizations Several threats to organizations are capable of doing large damage. These are either technical or non-technical (environmental, human, and procedural). Technical Threats Botnets: A botnet is a collection of hacked computers operated by cybercriminals. Bot herders scan for vulnerabilities, infect systems, and use them for malicious activities, such as DDoS (Distributed Denial-of-Service) attacks. EG the Mirai botnet in 2016 that infected IoT devices, leading to a massive DDoS attack. Denial-of-Service (DoS) & Distributed Denial-of-Service (DDoS) Attacks:  These attacks overwhelm a system with requests, making it unavailable for the average person to use, it can be: Application-layer flooding: In this attack type, an attacker simply floods the service with requests from a spoofed IP address in an attempt to slow or crash the service Unintended DoS (accidental overuse) DDoS (many computers attacking one target) EG...

hw 12/5

Test yourself 241  A botnet aims to take control of digital systems. It is a type of malware that allows a cyber security attacker to take control of someone's system without their knowledge.   The aim of a DOS attack is to make a network inaccessible to users. It does this by flooding the network with traffic which in turn slows its speeds down to a point where it is basically unusable.  One of the main differences between a DOS attack and a DDOS attack is a DDOS attack tends to use multiple devices to try and infiltrate a network. The types of networks that are usually under threat from these would be ones like websites, banks, and payment websites.   Some of the main websites that are targeted by DDOS attacks would be ones like banks and payment websites.   Test yourself 242 One way of trying to find a password is using a dictionary software. This goes through some of the most common passwords and trying them when trying to get access to the account....

Stakeholder roadmap

 A stakeholder roadmaps provides an overview of the main components of the project, it will include objectives, deliverables, milestones, resources, and timelines, and is used to show these to stakeholders as well as keeping stakeholders in the know of operations. unlike a project plan, it does not include day to day tasks or a detailed view of roles, only a quick overview to catch stakeholder interest Project timelines timelines show what phases of the project are complete, current, and to do they are used to keep track of different project tasks they include: start and end date of tasks the task duration who is assigned the task task dependencies (if it relies on another task being complete) they are important as they: a central area to display all tasks and project management phases provide a simple representation of the project to make it easier to understand allow team members to focus on important tasks help promote improved time and resource management  Linking pro...

Business cases

What is a business case? A business case is a document that justifies a proposed project or investment. It's used to assess the potential costs, benefits, and risks of a project. Purpose  To provide evidence to decision-makers that the investment is worthwhile To justify undertaking a project or initiative What's included  Background information about the project The problem the project is intended to solve The proposed solution The costs and benefits of the project The risks involved Options and alternatives considered Success criteria and stakeholder requirements Why is it import? A business case is important because it helps organizations make informed decisions about projects, allocate resources, and avoid wasting money. It also helps ensure that projects are well-planned and thought through Business case draft The project should be done to allow more people to access college tours without going to open evenings  expected outcomes In project management, an "output...

The influence and impact of digitalisation within a business context - snow

brand differentiation due to widespread advertisements brands can be more easily differentiated and have a story behind the brand Cloud storage and virtualisation virtualisation Types include Server virtualisation - enables on physical server to run multiple operating servers as a virtual machines, this leads to more efficient use of equipment, faster workload distribution, better application software, improved server access, reduces costs network virtualisation - reproduces the physical network requirements as a virtual network to allow applications to run in the same way as on a physical network but with logical rather than physical ports, devices, routers, etc desktop virtualisation - enables organisations to provide software configured for the specific needs of the workplace or and individual, any changes can be quickly rolled out to everyone all at once, this also allows people to access their files form anywhere if a remote gateway is set up use of virtualisation and AWS AWS is o...

defining the project scope

  What are the key deliverables of this project?  a functioning website, that links to the video high standard tour of the college, with voiced over videos What are the specific tasks or activities involved?  code a website, and review it regularly record videos on the 360 camera in different rooms/areas in the college record voiceover for the videos What resources are required for this project?  VS code GitHub Capcut (editing) insta-360 software (video formatting) steam media player for video viewing/testing What is the timeline for each major phase or milestone?  record all of the video before the Christmas holidays finish the website by the 18th of January, to allow a week of review What is included in the project (in-scope)?  a functional virtual tour of the college accessible online What is excluded from the project (out-of-scope)?  a functioning website, that links to the video high standard 360 video tour of the college, with voiced over videos ...