BTEC Computing Project Guide
BTEC Computing Project Guide
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the conseque
understand that making a false declaration is a form of malpractice.
P5 P6 P7 P8 M3 M4 D2
IV Signature:
1. Project purpose:...........................................................................................................................................
2. Project Objectives........................................................................................................................................
II. Devise comprehensive project plans for a chosen scenario, including a work and resource
allocation breakdown using appropriate tools. (P5)...............................................................................................
1. Overview......................................................................................................................................................
a. Definition..................................................................................................................................................
b. Results:.....................................................................................................................................................
c. Summary:.................................................................................................................................................
III. Communicate appropriate project recommendations for technical and non-technical audiences.
(P6)...............................................................................................................................................................
3. Project recommendation...............................................................................................................................
IV. Present arguments for the planning decisions made when developing the project plans (P7)....................
Document shared on https://www.docsity.com/en/unit-06-planning-a-computing-project/10871070/
VI. References....................................................................................................................................................
I.I ntroduction
This research delves into the important intersection between Big Data storage systems and
cybersecurity risks. The growing importance of Big Data in business brings serious threats to
data security, putting companies and individuals at risk. The misuse of personal data and the
rise in sophisticated cyberattacks highlight the complexity of cybersecurity challenges. The
report highlights the urgent need to understand and address cybersecurity risks associated with
both cloud-based and local Big Data storage systems. The increasing volume of data,
combined with inadequate awareness and the potential for misuse, creates vulnerabilities that
pose risks to cybersecurity. The analysis includes evolving attack methods, exploited
vulnerabilities, and changes in data security threats over time. In addition to highlighting
current challenges, the report also predicts future dangers arising from technological advances,
emphasizing the importance of protecting critical data and systems. Solutions and limitations
to mitigate these security risks are explored with the aim of providing a comprehensive and
secure approach. The study not only provides an overview of cybersecurity risks in local
and/or cloud-based Big Data systems but also suggests strategies to avoid risks and solve
problems quickly. comprehensive way. Overall, the report contributes to understanding the
evolving landscape of cybersecurity risks in the context of Big Data storage systems and
highlights the need for continuous improvements in security capabilities.
1. Project purpose:
Our projects in the field of Academic are designed with the main aim of improving the quality of
education and research, and supporting political
Document shared on and social decisions through the use of big data.
https://www.docsity.com/en/unit-06-planning-a-computing-project/10871070/
Downloaded by: bui-thi-hoai-btec-hn (hoaibtbh01141@fpt.edu.vn)
. Below are the detailed purposes of the project:
- Media: Process data to produce reports, research articles, and scholarly resources that support the
research community.
Political and Social Decision Support:
- Purpose: Use data to provide academic information to support political and social decisions in
the field of education.
- Means: Analyze data on academic performance, educational quality, and other
educational issues to make assessments and policy recommendations.
Explore New Thinking and Creative Perspectives:
- Purpose: Search and develop new aspects in the academic field through the use of big data.
- Means: Analyze data to identify trends, relationships, and creative thinking abilities,
thereby creating new ideas and different perspectives.
This project's main aim is to make a positive contribution to the academic field, providing tools
to support both teaching and research processes, and supporting political and social decisions in
improving the system education.
2. Project Objectives:
Our project, focusing on the Academic field, has a detailed and complete goal to meet the needs
and make a positive contribution to the education and research community. Below are details of
the project's goals:
Document shared on https://www.docsity.com/en/unit-06-planning-a-computing-project/10871070/
Downloaded by: bui-thi-hoai-btec-hn (hoaibtbh01141@fpt.edu.vn)
Improving the Quality of Education:
- Goal: Develop a large data system to track and evaluate student learning performance,
helping schools and teachers better understand challenges and opportunities in the
teaching process.
- Implementation Plan: Collect data on scores, learning activities, and class participation
to create an easy-to-read dashboard that provides detailed information about student
progress.
Support for Research and Academic Development:
- Goal: Build a large academic database to support research and development in diverse
fields, from social sciences to natural sciences.
- Implementation Plan: Organize data from diverse sources such as scientific articles,
academic research, and statistical data to create a diverse and reliable academic resource
3. Political and Social Decision Support:
- Goal: Use data to provide academic information to support political and social
decisions in making policies and decisions in the field of education.
- Implementation Plan: Analyze data related to educational quality, learning
motivation, and specific educational issues to make assessments and propose
educational policies.
Explore New Thinking and Creative Perspectives:
- Goal: Find and develop new aspects in the academic field through the use of big
data to discover trends and creative thinking.
- Implementation Plan: Use data analytics to identify unknown connections, trends,
and thereby generate new ideas and innovative perspectives in the academic field.
Creating Smart Tools for Educational Management:
- Goal: Develop an application or tool that uses artificial intelligence to support
educational management, make performance predictions and suggest improvement
measures.
- Implementation Plan: Use machine learning algorithms to predict academic
performance, provide suggestions for improving educational quality, and support school
management.
support academic research and development, and provide academic information to support political
and economic decisions. society in the field of education.
II. Devise comprehensive project plans for a chosen scenario, including a work
and resource allocation breakdown using appropriate tools. (P5)
1. Overview:
a. Project Overview:
MAIN TARGET
This project focuses on researching and evaluating cybersecurity risks related to large data
storage systems on both local and cloud. Main goals include:
Target:
- Identify and analyze current cybersecurity risks for big data storage systems (Big Data) both
local and cloud.
- Assess the severity of each risk and their impact on the entire system.
- Recommend specific preventive measures for each risk to minimize their severity and risk of
occurrence.
- List the limitations and potential risks when implementing preventative measures.
Conclude:
Risk assessment is an important step in understanding the threats facing big data storage
systems. Through this assessment, we can prioritize and implement preventative measures to
maximize the protection of critical information.
- Research the historical development of cybersecurity risks related to big data storage systems
(Big Data).
- Understand how risks change over time and identify the key points influencing these
developments.
Establishment Period (Before 2010): Understand the origins and early development of big data
storage systems.
Acceleration Period (2010-2015): Identify new business models and significant increases in data
capacity and scale.
Cloud Transition (2015-2020): Research the transition from local to cloud storage and its impact
on cybersecurity.
Rising Challenges (2020-present): Assesses emerging challenges, including increasing scale and
complexity of attacks.
Prepare a detailed report analyzing historical developments and the most important insights.
Share reports with stakeholders and dialogue to ensure common understanding and
engagement in aligning cybersecurity strategy.
Conclude:
Analyzing the historical evolution of cybersecurity risks in the big data storage sector will
provide an in-depth understanding of risk and volatility in the industry. This helps
organizations be better prepared and more effective in facing today's cybersecurity
challenges.
Target:
- Predict potential future cybersecurity risks associated with large data storage systems.
- Consider technological advances and industry trends that may impact cybersecurity.
The Evolution of Storage Technology: Assess the evolution of big data storage technology and
how it may create new risks.
Mobile Trends: Analyzing the impact of mobile trends on the cybersecurity of big data storage
systems.
The Rise of Artificial Intelligence (AI) and Machine Learning: Examines how AI and
machine learning can create both new risks and security solutions.
Enhanced Attack Technology: Anticipate advances in attack technology, including new malware
and attack techniques.
Internal Risks: Consider risks that may arise from within the organization, including employee
risks and access management.
Switching Technology Partners: Anticipate risks that may stem from switching
technology partners and dependence on third parties.
Internet of Things (IoT): Assessing the impact of IoT developments on the cybersecurity of big
data storage systems.
Blockchain and Data Security: Consider how blockchain can help increase data security while
also creating new risks.
Technology Intersection: Analyze the intersection of new technologies and how it can create new
risk situations.
Conclude:
Predicting future risks is an important part of a cybersecurity strategy so that
organizations can effectively deal with an increasingly complex security
environment. Considering technology developments and industry trends will help
build a cybersecurity strategy that is flexible and responds quickly to new
challenges.
Target: Identify and implement security measures to mitigate current risks and prevent future
vulnerabilities to big data storage systems.
Data Encryption: Apply full data encryption during transmission and storage to prevent
unauthorized access.
Firewall and Virtual Private Network (VPN): Use a firewall and connect via VPN to protect
your network from outside attacks.
Document shared on https://www.docsity.com/en/unit-06-planning-a-computing-project/10871070/
Recommended System Updates: Ensure thatby:systems
Downloaded are kept
bui-thi-hoai-btec-hn up to date with the latest
(hoaibtbh01141@fpt.edu.vn)
Cloud Access Control: Strictly manage access to data in the cloud environment.
Data Encryption in the Cloud: Use data encryption in the cloud environment to protect important
information.
Recommended System Backup: Organize a regular backup mode to ensure data safety and quick
recovery after incidents.
Periodic Tests: Perform periodic tests to ensure that the backup process is working properly and
that data is recoverable.
Periodic Security Reviews: Organize periodic security reviews to ensure that security measures
remain effective.
Conclude:
These security measures aim to increase the security of large data storage systems, protect
critical information and minimize risks from both internal users and external attacks.
Regular monitoring, evaluation, and updating processes will help maintain the safety and
effectiveness of your security strategy.
Document shared on https://www.docsity.com/en/unit-06-planning-a-computing-project/10871070/
Downloaded by: bui-thi-hoai-btec-hn (hoaibtbh01141@fpt.edu.vn)
PROJECT SCOPE:
SYSTEM IDENIFICATION:
Target: Store and analyze data from the organization's large data storage systems both locally
and in the cloud.
Specific work:
Identify Data Sources: Evaluate and identify data sources from local and cloud storage systems.
Database Analysis: Create database analysis models to understand the structure and relationships
between components.
Build Storage Process: Develop effective data storage process for both local and cloud.
COMPATIBILITY:
Target: Ensure compatibility between storage systems and other elements in the IT
infrastructure.
Specific work:
Check Current Compatibility: Perform checks on current compatibility between
systems and other components in the IT infrastructure.
Adjust Link Protocol: If necessary, adjust link protocol to ensure compatibility between systems.
Perform Compatibility Testing: Organize tests to ensure compatibility under different conditions.
PREVENTION SYSTEM:
Specific work:
- Current Risk Assessment: Analyze and evaluate current cybersecurity risks in data storage
systems.
- Build Security Measures: Develop security measures such as encryption, access management to
deal with identified risks.
- Deploy Preventive Technology: Implement preventive technologies such as firewall and
behavioral monitoring to protect theshared
Document system.
on https://www.docsity.com/en/unit-06-planning-a-computing-project/10871070/
Downloaded by: bui-thi-hoai-btec-hn (hoaibtbh01141@fpt.edu.vn)
EVALUATE:
Research results:
- Evaluate the success of data storage and analysis.
- Check compatibility between systems and other elements.
- Evaluate the performance of preventive measures and make improvements if necessary.
Rapport and Communication:
- Prepare detailed reports on results and suggestions for improvement.
- Communicate with stakeholders to share information and receive feedback.
IMPLEMENTATION PLAN:
Phase 1 (February 15, 2023 - February 28, 2023): System Identification
RESEARCHERS:
Team Leader:
Team Members:
Document shared on https://www.docsity.com/en/unit-06-planning-a-computing-project/10871070/
Downloaded by: bui-thi-hoai-btec-hn (hoaibtbh01141@fpt.edu.vn)
Duties: Identify and analyze large data storage structures, recommend improvements to the storage
system.
Mission: Research and deploy security solutions for cloud environments, ensuring compatibility.
Task: Analyze specifically the structure and relationships between data in the system.
This project aims to extensively research cybersecurity risks associated with large data
storage systems, both local and cloud. Understanding the evolution of risks over time and
predicting future risks will help develop effective security measures to protect important
information. The schedule is designed to ensure project integrity and feasibility.
Project: Cybersecurity Risks Associated with Local and/or Cloud-based Big Data Storage
Systems
- Research and evaluate current cybersecurity risks in large data storage systems both locally and in
the cloud.
- Research the historical development of risks to understand changes and adjustments in attack
methods.
- Anticipate potential future cybersecurity risks, considering technological advances and industry
trends.
Security Measures:
- Identify necessary security measures to mitigate current risks and prevent future vulnerabilities.
Project scope:
- Store and analyze data from the organization's large data storage systems, both local and cloud.
Prevention System:
Deliverables:
Expected results:
- Diagnose and mitigate current risks, while predicting and preparing for future risks.
- Propose specific plans to improve the security of large data storage systems.
- Collect Data
- Assess ricks when accessing the network
- Data Analysis Document shared on https://www.docsity.com/en/unit-06-planning-a-computing-project/10871070/
Downloaded by: bui-thi-hoai-btec-hn (hoaibtbh01141@fpt.edu.vn)
- Toss in recommendations.
- Completed report
For example, the development of the comprehensive plan to manage and reduce the
environmental impact of digital technologies depends on the completion of the
literature review. Gantt charts are an important tool for project management. They
help project managers plan, track progress, and identify potential problems.
Main target:
1. Start-Up Meeting: Each new phase, the team will hold a meeting to share details about
the project goals and schedule, and listen to opinions and suggestions from every
member.
2. Project Team Meeting: Every week, every member will participate in a meeting to
discuss work progress, resolve problems, and suggest improvements. This meeting will
help keep the team in sync.
3. Check-Ins (Meeting Summary): Each day, we will have a quick summary of progress
and key points from the team meeting. This helps all members update information
effectively.
4. Project Status Meeting: Every month, we will hold a meeting to overview progress, risks,
and adjust strategy if necessary.
Kickoff Share details about Every new stage When there are The entire project
meeting project goals, scope, major updates or team, project
UX design review andTest and evaluate Every 3 months changes
schedule. To to strategy UX design team,
ensuremanagement, research
and key
user interface design continuous team, and target users
stakeholders
Project with work
team Discuss input from
Every Week To improvement
track progressandResearch team member,
meetings experts and target
progress, andmeet
stay user needs
flexible cybersecurity expert, and
users.
solve project manager
problems, and
suggest
improvements.
Check- Get quick updates Email Daily Project team and
ins(meeting on team meeting key stakeholders
recap) progress and key
points.
Project status Overall assessment Every Month To ensure consensus Project team,
meetings of progress, risks, and adjust to cybersecurity
and strategy changes management, and
adjustments if peripheral stakeholders
necessary.
a. Definition:
WBS concept:
1. Decomposition of Work: WBS helps decompose large tasks into smaller and more detailed parts,
reducing project complexity.
2. Create a System Structure: Provide a system structure for the project, making each job and its
responsibilities clear.
3. Relationship Display: Allows the display of relationships between tasks and provides an overview
of the scope of the project.
4. Easy to Track and Manage: WBS makes it easier for management to track and evaluate the
progress of each piece of work.
5. Information Sharing: WBS helps share information effectively among project team members and
with stakeholders.
Benefits of WBS:
- Clarity: Understand the specific tasks and responsibilities of each member in the project.
- Better Management: Easily manage and track project progress step by step.
- Determine what belongs to the project and what does not belong to it.
- Divide main work into smaller work packages that can be easily managed and evaluated.
- The highest level usually represents the main project, lower levels represent more detailed work.
- This helps define the order of execution and dependencies between tasks.
- Assign unique codes to each work package for easy identification and reference during project
management.
Step 7: Check and Confirm with Stakeholders
- Review the WBS with stakeholders to ensure clear understanding and consensus on its structure
and details.
Creating a WBS is a relatively flexible process, but most importantly, it must fully and
accurately reflect the work to be done in the project.
b. Results:
2. Assess Risks When Accessing the Network ( September 10, 2023 – September 20, 2023)
approach to project management, ensuring clarity, efficiency, and effective analysis. Each phase
has a defined duration, allowing for better time management and resource allocation.
c. Summary:
We have made significant progress on this project, successfully completing the Initiation of
Meetings stages (100%). We have also made progress in the phase of defining the mission, key
characteristics and areas of activity. However, the stages of assessing cyber security risks related
to local big data systems are still incomplete and have not achieved the highest targets, followed
by proposed security measures and planning. The improvement plan has not yet achieved the
target (100%) in its entirety. Finally, we have not yet completed the Review meetings here.
➢ Start (100% completed): We have set up and prepared the meeting content,
Deployed the meeting, Prepared meeting minutes on the issue of network security
risks related to the local big data system completed excellently
➢ Assessing cybersecurity risks related to local big data (91.6% completed): Thanks to
identifying the main characteristics of the project, and the project's operational areas in a
detailed manner. meticulously, we have been able to research and evaluate cybersecurity
risks related to local big data quite excellently, here we have completed the risk
identification to achieve ( 100%) and assess the severity of the problem (90%) and
classify risks according to severity (85%).
Document shared on https://www.docsity.com/en/unit-06-planning-a-computing-project/10871070/
Downloaded by: bui-thi-hoai-btec-hn (hoaibtbh01141@fpt.edu.vn)
➢ Identify security measures (90% complete): Progress has been made in testing
existing system errors (100%), identifying necessary measures (100%), and analyzing
achieved priorities quite good (70%)
➢ Reviewing the meeting successfully (8.3%): Here, we have only completed a small
part of the content of the meeting to summarize the issue successfully (25%), as for the
implementation of the summary meeting. We have not yet completed the conclusion and
preparation of summary meeting minutes
• Prioritize the planning phase of meetings, identify project characteristics and areas of activity, evaluate
project plans, and analyze findings to understand the true scope of the project and provide
information for the remaining stages. Overall we are off to a good start but there is still much
work ahead. By focusing on ensuring cybersecurity measures related to local big data systems,
creating improvement plans and completing the final step is to summarize your project.
• To be able to qualitatively analyze cybersecurity risks associated with local Big Data storage
systems, we need to qualitatively analyze cybersecurity risks associated with local Big Data
storage systems . It helps us understand security issues and challenges our systems may
face. In addition, we need to ask some qualitative questions about this issue and survey
the number of respondentsDocument
in each question. Below are some of the contents and
shared on https://www.docsity.com/en/unit-06-planning-a-computing-project/10871070/
Downloaded by: bui-thi-hoai-btec-hn (hoaibtbh01141@fpt.edu.vn)
questions I gave for everyone to answer.
➢ What security measures are in place to ensure that only authorized people have access to
local big data?
▪ Answer A: Access control (30 people choose)
➢ How do you ensure proper access rights management and track access usage?
▪ Answer A: Identify and clearly state access rights (21 people chose)
▪ Answer C: Use an access rights management system (ACL) (30 people chose)
➢ How to identify and prevent potential security vulnerabilities in big data storage systems?
Answer A: Identify
important data (29
people chose) Answer B:
Choose a storage
medium (13 people
chose) Answer C: Check
data integrity (30 people
choose) Answer D: All
the above answers (50
people choose)
➢ How to recover large data safely and effectively?
➢ How do we ensure that employees are trained on cybersecurity and privacy regulations?
➢ How does the organization analyze risks and ensure compliance with relevant cybersecurity
standards?
• From Asm 1, I will analyze qualitative data on cybersecurity risks related to big data systems in a
detailed and understandable way as follows, through research as well as evaluation of the answers.
Thanks to everyone's feedback, I was able to briefly analyze this data:
✓ Conclusion: The selection of “All of the above” (70%) demonstrates consistency in combining
multiple measures to
Document shared on https://www.docsity.com/en/unit-06-planning-a-computing-project/10871070/
Downloaded by: bui-thi-hoai-btec-hn (hoaibtbh01141@fpt.edu.vn)
ensure effective access management and monitoring.
2. Data leak:
✓ Conclusion: The high preference rate for "All of the above" (70%)
shows that participants are aware of the importance of using log systems,
data standards, and alerts for monitoring and detect data breaches.
3. Data management:
✓ Conclusion: The high priority rate for "All of the above" (60%) shows
consistency in developing a recovery plan, testing, and validating backup
data.
▪ Conclusion: The high consistency of “All of the above” (70%) demonstrates a sense of
incorporating periodic
Document shared on https://www.docsity.com/en/unit-06-planning-a-computing-project/10871070/
Downloaded by: bui-thi-hoai-btec-hn (hoaibtbh01141@fpt.edu.vn)
updates, automation, and update monitoring to ensure software security. soft.
✓ Conclusion: Prioritizing “All of the above” (60%) shows consistency in combining DDoS
mitigation solutions, CDN
setup, and network traffic monitoring to protect systems.
✓ Conclusion: High consistency for “All of the above” (70%) shows a sense of integration in
identifying training
content, building training programs, and customizing training for each role .
➢ System expandability:
✓ Conclusion: High consistency for “All of the above” (60%) demonstrates awareness of
combining measures such as
system design, use of cloud technology and use of object storage to ensure ensure
system scalability.
✓ Conclusion: High consistency for “All of the above” (60%) demonstrates awareness of
combining standardization,
risk analysis, and identification of safeguards to ensure follow.
• In short, the qualitative data demonstrates consistency and a high awareness of the importance of
Document shared on https://www.docsity.com/en/unit-06-planning-a-computing-project/10871070/
combining multiple measures to ensure cybersecurity and data management. Attention should be
Downloaded by: bui-thi-hoai-btec-hn (hoaibtbh01141@fpt.edu.vn)
paid to implementing integrated measures to face the diverse and complex challenges in the
field of cybersecurity and data management. Understand the specific risks that lead to network
security system failures, Identify weaknesses in data management and network security
processes. Identify improvement measures as a result of qualitative analysis that will
recommend specific improvement measures to reduce or eliminate cybersecurity risks. Create
an improvement plan: Based on the results of the qualitative analysis, the organization can
create a specific cybersecurity improvement plan. Enhance compliance and monitoring:
Qualitative analytics helps improve compliance with cybersecurity standards and regulations
and increase cybersecurity awareness.
• Big data storage systems are increasingly used by organizations to store and process large volumes of
data, but they also pose significant cybersecurity risks, especially in local systems or based on a
large cloud, we simply understand the reason why special cybersecurity risks related to this
large data occur is because important data and information are always stored here. Therefore,
quantitative analysis of these risks is very important to ensure the organization's information
security and confidentiality. Here are some major data security risks:
• A DDoS attack can cause data storage systems to become larger but inactive by loading network resources.
➢ Risks of malicious code: Big data often contains a lot of important information and
malicious attacks can lead to data loss or dissemination.
➢ Risks from security warehouse: Big data often requires many different
systems and applications, which creates weaknesses if one of them has a
security hole.
➢ Coding risks: If large data is not encrypted then it can be accessed correctly on the left.
Document shared on https://www.docsity.com/en/unit-06-planning-a-computing-project/10871070/
Downloaded by: bui-thi-hoai-btec-hn (hoaibtbh01141@fpt.edu.vn)
➢ Risks from employees and talent: Employees can be a source of risk when they
do not comply with security rules or intentionally violate public relations. Talents
can also leave the organization and get important information.
➢ Data quality risks: Big data can contain errors and noise that lead to inaccurate or distorted
data.
➢ Risks from data backup: Large data backups may not be executed properly or fail to ensure
data security and recovery.
➢ Risks from lack of management data: Managing big data requires a strategic tool.
Lack of initiative and data management can lead to loss and leakage of important
information.
• After identifying the risks above, we begin to analyze and evaluate the risks, collect
data and figures related to the risks so that we can detect them early. Which is the
most important to promptly prevent and thoroughly overcome? Below are the
steps to identify risks, as well as some statistics on cybersecurity risks related to
data systems large local data
• First and foremost, we must determine which data is most likely to be attacked and have the
most vulnerabilities.
• Next is the need to determine what those risks are: cyber attacks, malware infection or data theft,
etc.
• Then it is necessary to evaluate the attack capabilities. The next stage is to evaluate the
attacker's ability to exploit the vulnerability. This can be done using a variety of
approaches, including historical data, expert opinions, and attack vectors.
• Assess the impact of attacks The third phase is to assess the impact of attacks on assets. This can
be done by taking
Document shared on https://www.docsity.com/en/unit-06-planning-a-computing-project/10871070/
into account issues such as data breach costs, reputational damage and regulatory fines.
Downloaded by: bui-thi-hoai-btec-hn (hoaibtbh01141@fpt.edu.vn)
• According to the statistics we have learned, cyber attacks related to local large data systems involve many
aspects, it can
include types of attacks as well as the number of vulnerabilities. empty etc... specifically as
follows:
• Number of daily attacks: On average, local big data storage systems record about 50-100 cyber
attacks daily. • DDoS
attacks: Account for about 30% of total daily attacks.
• Denial of service (DoS) attacks: Accounts for about 15% of total daily attacks.
• Attacks exploiting security vulnerabilities: Account for about 10% of total daily attacks.
• Percentage of attacks detected and blocked before causing damage: About 60% of all attacks are
detected and
blocked before causing serious damage.
• In addition, we also collect some other data related to this issue as follows:
• In 2021, global cybercrime losses will be $16.4 billion per day, $684.9 million per hour, $11
million per minute and
$190,000 per second.
• Total internet outages would result in a daily GDP loss of 1.9% for a country with strong
connectivity and a daily loss
of 0.4% for a country with poor connectivity.
• By 2021, 70% of bitcoin transactions will be linked to or used for criminal activities.
• In 2019, attacks on IoT devices increased by 300%.The FBI's Cyber Most Wanted
List includes 102 notorious criminals who are believed to have committed a
series of cyber crimes that have harmed and cost individuals and companies
billions of dollars to date. April 2021
• Global ransomware costs are $21 billion, with phishing, cyber intrusions, accidental disclosures,
stolen devices or
data, and system misconfigurations being the most common forms of attack in the USA.
• Unauthorized online and mobile advertising costs the world 44 billion USD.
• Customers stay away from companies experiencing cyber attacks, with the average time between
attacks being 11seconds.
• Organizations are increasingly using big data storage systems to store and analyze huge
volumes of data, but they also pose a major cybersecurity threat, especially in local or
local systems. Massive cloud-based. Quantitative risk analysis is critical to protect the
safety and security of your organization's information. Here are some major data
security threats:
• Global ransomware costs are $21 billion, with public companies accounting for 38% of
intrusions in the United
States.
• Ransomware mainly affects public companies, with SaaS being the most vulnerable.
• Customers avoid businesses subject to cyber attacks 59% of the time, with 70% feeling that
businesses have not Document shared on https://www.docsity.com/en/unit-06-planning-a-computing-project/10871070/
Downloaded by: bui-thi-hoai-btec-hn (hoaibtbh01141@fpt.edu.vn)
done much to secure their personal information.
• More than half of all cyber attacks target small and medium-sized businesses, with 60%
failing within six months.
• With a 12% CAGR in cybersecurity IT spending, the average cost of a data breach in 2020 was
$3.86 million.
• The standard deviation of a data collection is a measure of the dispersion of values around
the mean. The larger the standard deviation, the wider the range of values in the
data collection. The standard deviation of various statistics for cybercrime data is
determined as follows:
• Global ransomware costs are $2.2 billion, of which 10% of intrusions are ransomware.
• There are 1,200 industries most affected by malware, with the internet most affected by phishing
(10.2%).
• Customers stay away from companies experiencing cyber attacks, with the average time between
attacks being 10
seconds.
• From the above information, I will briefly analyze quantitative data and draw specific conclusions
as follows:
1. Overview:
The data identifies that big data storage systems are facing significant cybersecurity risks.
➢ DDoS Attacks: Account for 30% of all daily cyber attacks, threatening to increase system
size but not working.
uncontrolled circulation.
➢ Access Management Risks: Deficiencies in access control and monitoring can lead to data
breaches and leaks.
➢ Security Store Risk: Large systems require many different systems and
applications, creating weaknesses if one of them has a security hole.
➢ Employee and Talent Risk: Employees can be a source of risk when they do
not comply with security regulations or intentionally violate them.
➢ Data Quality Risks: Big data can contain errors and noise, leading to inaccurate information.
➢ Data Backup Risks: Improper backup can lead to loss and poor recovery.
➢ Data Management Risks: Lack of management can lead to loss and leakage of information.
➢ Identify Critical Data: Must determine which data is most likely to be attacked and has the
most vulnerabilities.
➢ Risk Type: Classify cyber attacks, malware infections, and data theft to identify specific risks.
➢ Impact of the Attack: Assess the impact in terms of data breach costs, reputational damage,
and regulatory penalties.
➢ Daily Data: ▪ On average, there are 50-100 cyber attacks per day.
▪ DDoS attacks account for 30%, malware attacks 20%, denial of service
(DoS) attacks 15%, security vulnerability exploitation attacks 10%, other
attacks 25%.
➢ Security Vulnerabilities: Every month, about 20-30 security vulnerabilities are discovered.
✓ About 60% of attacks are detected and stopped before causing serious damage.
➢ Loss Statistics:
• 5. Ransomware Cost:
➢ Analysis: This cost poses a serious problem and can have a major impact on a
business's finances. A strong security strategy is needed to prevent ransomware
attacks.
✓ 70% feel that businesses do not ensure the security of personal information.
✓ 60% of cyber attacks target small and medium businesses with a 60% failure rate
within six months.
➢ Analysis: The short time between attacks is a major challenge. Customers are
increasingly sensitive to information security, placing high demands on security
and demonstrating care for their data.
➢ Data:
➢ Analysis: The high cost of each data breach demonstrates the severity of the
consequences and the level of investment needed in cyber security. A high standard
deviation indicates large variation in costs, which may stem from the diversity of
attacks.
Document shared on https://www.docsity.com/en/unit-06-planning-a-computing-project/10871070/
• 8. Big Data Security Threats: Downloaded by: bui-thi-hoai-btec-hn (hoaibtbh01141@fpt.edu.vn)
➢ Data:
▪ Global ransomware costs were $21 billion, with 38% of US intrusions involving public
companies.
▪ Ransomware primarily affects public companies, especially SaaS.
➢ Analysis: The rise in ransomware costs and the particular impact on public and
SaaS companies requires effective and ongoing security measures.
• The conclusion is as follows: quantitative research data indicates that cyber security threats and
associated costs for businesses are high risk. Faced with challenges ranging from short time
between attacks to customer avoidance, businesses need a comprehensive cybersecurity
strategy. The diversity in the data suggests the complexity and variability of the attacks. To
protect information and maintain trust, businesses need to invest in alerting, containment, and
emergency recovery, along with ongoing upgrades to security measures.
3. Project recommendation
➢ This project highlights the issue of cybersecurity risks related to large data
storage systems. For non-technical people, the project introduces the
problem in a simple way and provides an effective solution for protecting
important data.
➢ Big data storage systems are important milestones in every field, but are
Document shared on https://www.docsity.com/en/unit-06-planning-a-computing-project/10871070/
also prime targets for hackers and security attackers. Personal data and
Downloaded by: bui-thi-hoai-btec-hn (hoaibtbh01141@fpt.edu.vn)
➢ Security Solution:
✓ Predict Future Trends: Predict future trends in cybersecurity and big data
storage systems.
➢ Risk assessment:
✓ Identify common risks such as data loss, cyber attacks and misuse of personal
information.
➢ Security Solution:
✓ Consider new attack methods such as zero-day attacks and social engineering.
✓ Extended Solution
✓ Suggest ways to expand the system while still maintaining high security.
Document shared on https://www.docsity.com/en/unit-06-planning-a-computing-project/10871070/
Downloaded by: bui-thi-hoai-btec-hn (hoaibtbh01141@fpt.edu.vn)
• For this part I will propose a project for listeners who are technical people
✓ Infrastructure Check:
➢ Security Solution:
✓ Data encrypt:
✓ Decentralized Management:
Security Risk
Analysis:
✓ Infrastructure
Check:
✓ Test each component in your infrastructure to identify weaknesses that can be
exploited.
✓ Research new attack techniques and classify them according to danger level.
➢ Security Solution:
✓ Data encrypt:
✓ Deploy a strong data encryption solution with the most advanced algorithms.
✓ Decentralized Management:
✓ Use performance assessment tools to ensure the solution is robust and efficient.
✓ Predicting Future
DocumentTrends:
shared on https://www.docsity.com/en/unit-06-planning-a-computing-project/10871070/
Downloaded by: bui-thi-hoai-btec-hn (hoaibtbh01141@fpt.edu.vn)
➢ Effective Solution:
✓ Provides effective and in-depth security solutions for large data storage systems.
➢ Enhance performance:
➢ Technology Leadership:
IV. Present arguments for the planning decisions made when developing the project
plans (P7)
bringing many benefits and growth opportunities, and almost in all fields have to use the system.
big data system to be able to work. However, it also poses cybersecurity risks. This essay
explores the project manager's role in addressing these concerns and presents a comprehensive
plan to mitigate and prevent cybersecurity risks associated with local big data system. By
applying effective risk assessment, research, and finding gaps in cybersecurity risks. However,
this transformation has unforeseen consequences, including an increase in cyber security risks.
network security vulnerabilities. As a project manager, I find myself at the forefront of an
endeavor that is challenging and difficult but in return will provide me with profound
experiences. This essay delves into the details of the project, highlighting the goals, key tasks,
risk management strategy, research methodology, and comprehensive plan for managing
cybersecurity risks.
Through effective project management processes and a dedicated team, we aim to provide practical
recommendations to promote activities to strengthen cyber security measures related to data systems.
safely grow locally.
• Project overview:
The project starts in September 2023, focusing on the main stages: conducting meetings
to be able to define project goals and develop mitigation plans as well as implementation
and monitoring. closed afterwards. The first stage lasts from September 1, 2023 to
September 15, 2024, including the development of meetings and identification of areas
of activity.
The next phase, from September 16, 2023 to September 30, 2023, includes conducting a
cybersecurity risk assessment related to local big data systems and security measures to reduce
minimize problems.
During this Phase, our team embarked on a thorough risk assessment to identify cybersecurity
risks and their potential impact. We used a mixed methods approach, combining quantitative and
qualitative data collection methods. Primary data was collected through surveys and interviews
with digital transformation and cybersecurity experts, while secondary data was obtained from
reputable sources such as academic journals and reports from government. This approach allows
us to gather valuable insights Document
into the current
shared on cybersecurity landscape and potential
https://www.docsity.com/en/unit-06-planning-a-computing-project/10871070/
Downloaded by: bui-thi-hoai-btec-hn (hoaibtbh01141@fpt.edu.vn)
vulnerabilities. Following the risk assessment, we assessed the severity of each identified risk
and developed a comprehensive risk mitigation plan. This plan includes appropriate measures for
each risk, targeting technical, procedural and policy aspects. The plan emphasizes implementing
strict security measures, regular vulnerability assessments, and establishing protocols for incident
response and remediation.
• For this part, the project plan will include many different important components, have been thoroughly
evaluated and be well structured, comprehensive and consistent with the project goals. In this
detailed review, I will go deeper into the project plan including all the work that I did in the
above project. By applying research methods including quantitative data collection methods.
Quantitative and qualitative, we ensure a deep understanding of the current cybersecurity
landscape related to big data systems. Incorporating primary data obtained through surveys and
interviews with industry experts will enhance the reliability and validity of the findings. The
plan includes appropriate measures for each identified risk, covering a variety of aspects. This
multi-faceted approach ensures that mitigation measures can address many potential
vulnerabilities, thereby significantly improving the overall cybersecurity posture. Moving
forward Establishing a risk database dedicated risk, serving as a centralized repository to store
and track cybersecurity risks, facilitating systematic and organized monitoring and assessment.
By continuously monitoring and evaluating the measures implemented, our project underlines
our commitment to maintaining a strong and resilient cybersecurity framework.
• In summary, the project plan demonstrates high professionalism, strategic thinking and meticulous
attention to detail. Comprehensive risk assessment, appropriate risk mitigation plans, and
Document shared on https://www.docsity.com/en/unit-06-planning-a-computing-project/10871070/
Qualitative research:
Characteristic:
- Focuses on a deep understanding of the causes, relationships, and context of the problem.
- Use means such as interviews, observations, and content analysis.
- Great for capturing opinions, perspectives, and subjective insights.
Quantitative research:
Characteristic:
- Focus on measuring and analyzing numerical data to identify patterns and trends.
- Use means such as surveys, numerical experiments, and statistical analysis.
- Useful in measuring and comparing the influence of variables.
Suitable for Deep Understand Context and The Potential for Measurement
Understanding. Subjective Relationships. and Reconciliation Loss May
Be
Limited.
Document shared on https://www.docsity.com/en/unit-06-planning-a-computing-project/10871070/
Measurement and Results are easy to compare Important details in data may
Analysis of Digital and contrast. be missed.
Data.
Controlling Peripheral Enables Statistical Analysis. Potential Loss of Details
Variables. and Quality.
Accurate Calculation Easily Identify Data Difficulty in Understanding
and Fast Speed. Relationships Between Context and Subjective
Variables. Correlations.
Qualitative Analysis Deep Understanding of Opinion and Potential Loss of Measurement and
Context. Comparison.
Ability to Consensus. Random Samples Are
Representative of the Entire
Population.
Summary:
Each method contributes a unique perspective, taking advantage of the advantages and
minimizing the disadvantages of each method.
In total, the use of all three methods increases the integrity and accuracy of the study.
VI. References: