Posts

Showing posts from March, 2025

ESP overview

  task number  focus  No. Of hours  Marks allocated  1  Trouble shooting and test planning  2 hours 30  22  2  Interview and communication  2 hours 10  12  3  Project proposal  4 hours  24  4  Post project review  3 hours 30  12    Task uno:  This focus on trouble shooting a fault based on a specified problems/issues and designing a test plan.   The troubleshooting document should include:  User details   Test dates  Computer specs and software  Proposed tests and expected outcomes   Record of diagnosis  The test plan should include:  Administrative details E.G. dates names.  Test dates   Hardwear specs and software   Actual and relevant tests carried out in a logical order including images/diagrams  Full and complete details of expected outcomes  Remedial action required   Task d...

Technical and Non-Technical Threats to Organizations

Technical and Non-Technical Threats to Organizations Several threats to organizations are capable of doing large damage. These are either technical or non-technical (environmental, human, and procedural). Technical Threats Botnets: A botnet is a collection of hacked computers operated by cybercriminals. Bot herders scan for vulnerabilities, infect systems, and use them for malicious activities, such as DDoS (Distributed Denial-of-Service) attacks. EG the Mirai botnet in 2016 that infected IoT devices, leading to a massive DDoS attack. Denial-of-Service (DoS) & Distributed Denial-of-Service (DDoS) Attacks:  These attacks overwhelm a system with requests, making it unavailable for the average person to use, it can be: Application-layer flooding: In this attack type, an attacker simply floods the service with requests from a spoofed IP address in an attempt to slow or crash the service Unintended DoS (accidental overuse) DDoS (many computers attacking one target) EG...

hw 12/5

Test yourself 241  A botnet aims to take control of digital systems. It is a type of malware that allows a cyber security attacker to take control of someone's system without their knowledge.   The aim of a DOS attack is to make a network inaccessible to users. It does this by flooding the network with traffic which in turn slows its speeds down to a point where it is basically unusable.  One of the main differences between a DOS attack and a DDOS attack is a DDOS attack tends to use multiple devices to try and infiltrate a network. The types of networks that are usually under threat from these would be ones like websites, banks, and payment websites.   Some of the main websites that are targeted by DDOS attacks would be ones like banks and payment websites.   Test yourself 242 One way of trying to find a password is using a dictionary software. This goes through some of the most common passwords and trying them when trying to get access to the account....

Stakeholder roadmap

 A stakeholder roadmaps provides an overview of the main components of the project, it will include objectives, deliverables, milestones, resources, and timelines, and is used to show these to stakeholders as well as keeping stakeholders in the know of operations. unlike a project plan, it does not include day to day tasks or a detailed view of roles, only a quick overview to catch stakeholder interest Project timelines timelines show what phases of the project are complete, current, and to do they are used to keep track of different project tasks they include: start and end date of tasks the task duration who is assigned the task task dependencies (if it relies on another task being complete) they are important as they: a central area to display all tasks and project management phases provide a simple representation of the project to make it easier to understand allow team members to focus on important tasks help promote improved time and resource management  Linking pro...

Business cases

What is a business case? A business case is a document that justifies a proposed project or investment. It's used to assess the potential costs, benefits, and risks of a project. Purpose  To provide evidence to decision-makers that the investment is worthwhile To justify undertaking a project or initiative What's included  Background information about the project The problem the project is intended to solve The proposed solution The costs and benefits of the project The risks involved Options and alternatives considered Success criteria and stakeholder requirements Why is it import? A business case is important because it helps organizations make informed decisions about projects, allocate resources, and avoid wasting money. It also helps ensure that projects are well-planned and thought through Business case draft The project should be done to allow more people to access college tours without going to open evenings  expected outcomes In project management, an "output...