Posts

Showing posts from April, 2019

Project management plan

Quality management plan -        Identify how the information of the project is reliable or accurate -        How you make sure the information have the quality -        Make sure the resources has the quality example from trusted website, books The Quality Management Plan defines the acceptable level of quality, which is typically defined by the customer, and describes how the project will ensure this level of quality in its deliverables and work processes. Quality management activities ensure that: Products are built to meet agreed- upon standards and requirements Work processes are performed efficiently and as documented Non-conformances found are identified and appropriate corrective action is taken Quality Plan Components The Quality Management Plan describes the following quality management components: Quality objectives Key project deliverables and processes to be reviewed for satisfactory quality level Quality standards Quality control and

Log Review

Image
Describe the test and purpose of the test Log analysis is the term used for analysis of computer-generated records for helping organizations, businesses or networks in proactively and reactively mitigating different risks.  Log analysis helps in reducing problem diagnosis, resolution time and in effective management of applications and infrastructure. Checking all the log to find if there ordinary problem Discuss how it works Logs are usually created by network devices, applications, operating systems, and programmable or smart devices. They comprise of several messages that are chronologically arranged and stored on a disk, in files, or in an application like a log collector. Provide example Discuss the solution of there is vulnerability after a test If there is 

Organizational security types

1.        Business Continuance -           Business have come to recognize that some services of the organization have to be delivered continuously without interruption -           Create an IT Business Continuity plan( Backup business Plan) -           Focus on getting the network and systems up and running as quickly as possible. Business continuity and disaster recovery planning -           Management leadership, goals and requirements, business impact analysis, team building and implementation Backup alternatives -           Hardware and software approaches, electronic vaulting Recovery and testing -           Strategies for executing recovery, carrying out drills and types of plan testing Emergency Response -           Preserving assets and life, reducing fraud, theft and vandalism 2.        Backup / Restoration of Data -           When we think of backup, we generally think of secure, offsite tape storage that will be available should we accide

Security breaches

Organizational security procedures -           -  Access control for physical entry -          -   Computer based access control -          -   Visitor notifications -          -   System logs -         -    System auto lock policy user permissions -         -    Starter and leaver -        -     Clear desk policy and documentation handling - Does knowing popular security breaches beneficial for an organization? Security breaches -           Happen when someone access without permission -           When confidential information is exposed Types of security breaches 1.        Denial of service -           When a website is overwhelmed with requests, which blocks other users from the site 2.        Malware -           Example of malware is adware, viruses, Trojans, crime ware, spyware, worms Malware symptoms -           System slow down -           Annoying ads and pop up messages -           Browser homepage keeps changing -         

Social engineering

What is social engineering? Social engineering is the act of tricking someone information or taking action, usually through technology. How social engineering works? Baiting They lure users into a trap that steals their personal information or inflicts their systems with malware. Scareware Scareware involves victims being bombarded with false alarms and fictitious threats. Phishing Phishing is a cybercrime in which a target or targets are contacted by email, telephone, or text message to steal information. Email hacking and contact spamming Some criminals try to take advantage of this by commandeering email accounts and spamming account contact lists. How to prevent 1. Don’t open emails and attachments from suspicious sources 2. Install antivirus software or a security suite 3. Be wary of tempting offers 4. Keep your software up to date 5. Delete any request for personal information or passwords. References What is Social Engineering | Attack Techniq

LO 1.2 - Project Manager

Project management Project management is the application of methods, knowledge, skill and an experience to achieving the objectives of the project. Key stages of project management 1.     Project initiation 2.     Project planning 3.     Project Execution 4.     Project Monitoring and Control 5.     Project Close Advantages and Importance of implementing project management 1.     Clearly defines the plan of the project 2.     Established and agreed schedule and plan 3.     Creates a base for teamwork 4.     Resources are maximized 5.     Helps to manage integration 6.     Helps to keep control of costs Initiation -           An idea for a project will be carefully examined to determine whether or not it benefit s the organization -           During this step, decision making team will identify or decided if the project can realistically be completed. Planning -           In this step, project charter and/or project scope may be put in writi