MSCP Sample
MSCP Sample
Student’s name
List which assessment Pass Merit Distinction
criteria the Assessor has
awarded.
INTERNAL VERIFIER CHECKLIST
Do the assessment criteria awarded match
those shown in the assignment brief? Y/N
• Constructive?
Y/N
• Linked to relevant assessment
criteria? Y/N
Give details:
Internal Verifier
Date
signature
Programme Leader
Date
signature (if required)
LO4. Create and use a Test Plan to review the performance and design of a multipage website.
Pass, Merit & Distinction P7 P8 M5 D3
Descripts
Resubmission Feedback:
Important Points:
1. Check carefully the hand in date and the instructions given with the assignment. Late submissions will not be
accepted.
2. Ensure that you give yourself enough time to complete the assignment by the due date.
3. Don’t leave things such as printing to the last minute – excuses of this nature will not be accepted for failure
to hand in the work on time.
4. You must take responsibility for managing your own time effectively.
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as my own
without attributing the sources in the correct way. I further understand what it means to copy another’s work.
LO2 Conduct small-scale research, information gathering and data collection to generate knowledge to
support the project.
LO3 Present the project and communicate appropriate recommendations based on meaningful
conclusions drawn from the evidence findings and/or analysis.
LO4 Reflect on the value gained from conducting the project and its usefulness to support sustainable
A large retail organization maintaining an Online Shopping Cart System, needed to do an in-depth check
on their system security situation and assess their vulnerability to hackers and other threats. They
recruited a trusted IT security advisory team, to handle the assessment and make recommendations of
how to improve their security for Online Shopping Cart. The expected solution of the project is a
vulnerability assessment and action plan which includes. Issues of varying severity were discovered
quickly, and the team notify Online Shopping Cart System management officials so they could take action
immediately, rather than wait for the final report.
The IT security advisory team experts test security infrastructure devices, network servers, operational
systems (including Windows and Linux), physical security of buildings, and wireless internet security.
They look at policies, procedures, network entry points, and network infrastructure. The project spanned
06 months in order to provide the Online Shopping Cart System with an accurate snapshot of their current
security posture. The IT security advisory team look for vulnerability trends and recurring issues that
needed attention. This team has a lot of experience working in the Online Shopping Cart System field.
The role as a trusted IT advisory team means that they are not trying to perform a specific solution to any
problem case. We make expert recommendations, based on our proven assessment methodology, that are
in the best interest of the specific project of an Online Shopping Cart Systems IT security.
Assume that you are the Project Manager of the IT security advisory team with 06 members who are
working towards achieving the goal of the Online Shopping Cart Systems Vulnerability Assessment
Project.
The IT security advisory team find issues of varying severity in many areas. As issues were uncovered the
team notified Online Shopping Cart System management officials so they could take action immediately,
rather than wait for the final report. The main problem discovered was that the Online Shopping Cart
System needed a standard way of installing, configuring, and maintaining servers and infrastructure
equipment. With a large organization, this is a common problem, as different department managers and
staff tend to have different ways of managing their IT. Introduction of a set of procedures for the entire
Online Shopping Cart System helps eliminate threats.
Another benefit was a greater awareness among the entire staff about how any vulnerability or weakness
in any functional area affects the overall security posture of the Online Shopping Cart System at large.
Team gave the Online Shopping Cart System management staff a full report on what we found and helped
to educate their staff on what they could change to improve their security situation. They developed an
action plan for how to keep up with regular assessments to keep their environment secure.
TASK – 01
1.1 Explain the project management process for the above scenario. Identify the aims and objectives
of the above-mentioned project.
1.2 Prepare a comprehensive project management plan with Milestones, that covers the cost
management, scope management, quality management, communication, risk and resources
management for the above scenario.
1.3 Produce a work breakdown structure and draw a Gantt Chart to provide timeframes and stages for
completion.
TASK – 02
2.1 Explain qualitative and quantitative research methods of data collection to support the above
project.
2.2 Perform small-scale research by applying qualitative and quantitative research methods
appropriate for meeting project aims and objectives for the above scenario. Discuss the accuracy
and reliability of different research methods applied.
TASK – 03
3.1 Explain the common data analytical techniques. Analyse the collected data using appropriate tools
and techniques.
3.2 Report appropriate recommendations as a result of research and data analysis to draw valid and
meaningful conclusions.
3.3 Prepare a report to present the result of the above research and data analysis to draw valid and
meaningful conclusions with the appropriate recommendations. Justify the selection of appropriate
tools and techniques for accuracy and authenticity to support and recommendations.
TASK – 04
4.1. Provide a reflection on the value of undertaking the research related to the task1,2 and 3 to
Discuss the project outcomes, the decision-making process and changes or developments of the initial
project management plan to support justification of recommendations and learning during the project.
Explain the value gained from conducting the project and its usefulness to support sustainability of
the given organization and its’ performance.
TASK 01...................................................................................................................................14
1.1.1 Project plan for security assessment of the Online Shopping System............................................17
TASK 02...................................................................................................................................24
TASK 03...................................................................................................................................27
3.2 Recommendations..................................................................................................................................31
TASK 04...................................................................................................................................33
References................................................................................................................................37
List of Figures
Figure 1:WBS Source: (Author Develop)........................................................................................................24
Figure 2: Gantt Chart Source: (Author Develop).............................................................................................25
Figure 3: Stats of network security Source: (Author Develop)........................................................................29
Figure 4: Stats of server security Source: (Author Develop)...........................................................................30
Figure 5: Stats of backups Source: (Author Develop).....................................................................................30
Figure 6: Stats of web application security Source: (Author Develop)...........................................................31
Figure 7: Stats of physical security Source: (Author Develop)........................................................................32
List of Tables
Table 1: List of milestones Source: (Author Develop).....................................................................................20
Table 2: Timeline Source: (Author Develop)...................................................................................................20
Table 3: Contact Information Source: (Author Develop).................................................................................21
Table 4: Schedule Source: (Author Develop)...................................................................................................22
Table 5: Risk Management Source: (Author Develop)....................................................................................22
Table 6: Cost Management Source: (Author Develop)....................................................................................23
Table 7: Recommendations Source: (Author Develop)...................................................................................33
2. Planning
3. Execution
5. Closing
- Business case document: this document justifies the need for the project and includes an estimate of
possible financial benefits.
- Feasibility study: this is an evaluation of the objectives, schedule and costs of the project to
determine if the project should be executed. Balance the project requirements with the resources
available to see if it makes sense to follow the project.
The teams abandon the proposed projects that are labeled as unprofitable and / or unfeasible. However,
projects that pass these two tests can be assigned to a designated project team or project office.[ CITATION
vil19 \l 1033 ]
- Budget management
- Timeline management
- Resource planning
- Change management
- Risk management
- Quality management
- Internal deliverable reviews
- Communications and facilitation
- Meeting management
- Educate and increase user awareness on what they could change to improve their security situation in
order to build confidence of using the shopping cart web system
- Provide solutions for the found security threats and for potential threats
Task/Milestone Description
Setup the vulnerability assessment - Begin documentation
- Update and Configure tools
Scope
The project team will cover the following tests to complete the safety assessment requested by the online
cart system management.
1. Testing the Online Shopping Cart web application
- Front-end
- Back-end
- Payment portals
- Database
- Server configurations
4. Physical security
Timeline
Resource
Team members,
- Project manager
- Tech lead
- Junior testers
Communication
This Communications Management Plan sets the communications framework for this project. It will serve
as a guide for communications throughout the life of the project and will be updated as communication
needs change. Included communications schedule which maps the communication requirements of this
project. A guide for conducting meetings describes both the communications rules and how the meetings
will be conducted, ensuring successful meetings during the project period.
Communication schedule
- Overall progress,
Project team - Security Weekly Face-to-face Tech lead
vulnerabilities
Online Shopping
- Security When
System email Tech lead
vulnerabilities needed
management
- Overall status
Project manager Weekly email Tech lead
- Current task
Online Shopping
Overall status of the Project
System Fortnight email
project manager
management
Table 4: Schedule Source: (Author Develop)
Risk management
A risk management plan is to help the project’s stakeholders aware of potential threats and be assured that
the project team has sufficient and efficient plan of risk mitigation.
Possible risks for this project
1. Unexpected software bugs
2. Exceeding allocated time periods
3. Lack of stakeholder involvement
4. Changes in the project scope
5. Missing team members
- Risk reducing
Cost management
This is the process of planning and controlling the budget of the project. It contains planning, estimating,
managing and controlling the cost to complete the project within the approved budget. Following steps are
the key components of this process,
1. Cost estimating
2. Cost budgeting
3. Cost controlling
Costing is the process of estimating the cost of a project or task. When creating a cost estimate, you should
consider the resources that will be used in the project, such as equipment, services, facilities and jobs ...
The cost budget is the process of creating a baseline of information on the cost of the project. This depends
on the duration and scope of the project.
When controlling the cost, the status quo activities to control the cost.
Task Cost
Tasks Months
1 2 3 4 5 6
Setup the
vulnerability
assessment
Testing web
application
- Back-end
- Payment
portals
Server &
software
- Database
- Server
configuration
s
Network
equipment testing
Physical security
Vulnerability
analysis
Reporting
Finishing
TASK 02
- Text Analysis
- Focus groups
- Questionnaires
- Polls
According to the descriptions, these two methods are the most important methods of data collection. In this
project, the entire system and its current situation must be identified to perform an adequate safety
assessment. Therefore, to collect information about the online shopping cart system, a search must be
performed. These two methods can make the process of data collection in the online shopping cart system
more accurate and reliable. You can know the ideas of the employee and also identify the weekly points of
the system. Through the use of a questionnaire, employee data can be collected and an overview of the
current system can be obtained. And as a method of quantitative research with individual interviews,
employees can obtain information directly from the system.
2. Are there encrypted protocols for all internal traffic that carries confidential information? (Yes/No)
Servers
6. Does the server admin has a low privilege account for day-to-day tasks (Yes/No)
Backups
7. Is there a backup plan? (Yes/No)
Web application
1. 1. Were validation rules used for the input fields? (Yes/No)
10. 2. Do you use HTTPS on websites that contain and transfer sensitive data? (Yes/No)
11. 3. Are you using encryption methods when saving passwords? (Yes/No)
Physical security
2. Are all facilities used exclusively by the company, or are some shared? (Yes/No)
- Trend analysis
- Coding
Typology
“A typology is a set of categories used for classification. A typology generally has non-overlapping
categories that exhaust all possibilities so that there is one category available for each observation and each
observation only fits one category”.[ CITATION Ash16 \l 1033 ]
Trend analysis
“Trend analysis quantifies and explains trends and patterns in a “noisy” data over time. A “trend” is an
upwards or downwards shift in a data set over time.”[ CITATION Ste18 \l 1033 ]
Descriptive Statistics
According to the pie chart (figure 3) network security is good but still needs attention on it.
Backup stats
3.2 Recommendations
According to the above conducted research there are four main categories had considered in this research.
Those are,
- Network
- Server
- Backup
- Web application
- Physical security
The research found that there were positive and negative comments in these categories. In the network
category, it was 66.67% secure and 33.33% (Figure 2) uncertain. Therefore, you still have to be careful to be
100% sure. As a recommendation, the firewall must first be configured correctly to avoid security threats.
Therefore, you must configure a network monitoring system to detect and prevent such threats.100% secure
server security (Figure 3). Therefore, there are no recommendations for server security.
Category Recommendations
The main objective of this project was to conduct an in-depth safety assessment of the online shopping cart
system. As mentioned earlier, these were the results that could be achieved with the start of the safety
6. Take action
- Identify decision
Identifies that need to make a decision and clearly define its nature.
- Gather relevant information
Gather pertinent information before make the decision. Decide what information is needed and best sources
of information.
- Identify the alternatives
Evaluate whether the decision identified in step one would be met through the use identified alternatives.
List-down the alternatives in a priority order.
- Choose among alternatives
This is the last step. In this step, consider the results of the decision you made and evaluate whether the
problems identified in the first step have been resolved or not. If this is not the case, the process must be
repeated.
After the decision process mentioned above, one can make a correct decision without much effort. It helps to
make the right decision using alternative paths by evaluating each one. Therefore, the risk in decision
making may decrease. Therefore, this process can be used as necessary to make a decision in the project,
with less risk of making a wrong decision. This process was useful when decisions were made about the
online purchasing system in the initiated project.
References