MSCP Assignment
MSCP Assignment
M denuvan
Assessor Internal Verifier
Unit 06: Managing a Successful Computing Project
Unit(s)
Managing a Project on cyber security risks due to Remote working
Assignment title
G.H.A.S.S Ganegoda
Student’s name
List which assessment criteria Pass Merit Distinction
the Assessor has awarded.
LO1.Establish project aims, objectives and time frames based on the chosen theme
LO3. Present the project and communicate appropriate recommendations based on meaningful conclusions
drawn from the evidence findings and/or analysis.
Pass, Merit & Distinction P5 P6 M3 D2
Descripts
LO4. Reflect on the value gained from conducting the project and its usefulness to support sustainable
organisational performance
Pass, Merit & Distinction P7 M4 D3
Descripts
Resubmission Feedback:
3
G.H.A.S.S Ganegoda MSCP
Assignment Feedback
Formative Feedback: Assessor to Student
Action Plan
Summative feedback
4
G.H.A.S.S Ganegoda MSCP
Pearson
Higher Nationals in
Computing
Unit 6: Managing a Successful Computing Project
5
G.H.A.S.S Ganegoda MSCP
General Guidelines
1. A Cover page or title page – You should always attach a title page to your assignment. Use previous page as
your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom, right margins and 1.25” for the left margin of each page.
1. The font size should be 12 point and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and Page
Number on each page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help editing your assignment.
Important Points:
6
G.H.A.S.S Ganegoda MSCP
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the compulsory
information. eg: Figures, tables of comparison etc. Adding text boxes in the body except for the before
mentioned compulsory information will result in rejection of your work.
2. Carefully check the hand in date and the instructions given in the assignment. Late submissions will not be
accepted.
3. Ensure that you give yourself enough time to complete the assignment by the due date.
4. Excuses of any nature will not be accepted for failure to hand in the work on time.
5. You must take responsibility for managing your own time effectively.
6. If you are unable to hand in your assignment on time and have valid reasons such as illness, you may apply (in
writing) for an extension.
7. Failure to achieve at least PASS criteria will result in a REFERRAL grade.
8. Non-submission of work without valid reasons will lead to an automatic REFERRAL. You will then be asked
to complete an alternative assignment.
9. If you use other people’s work or ideas in your assignment, reference them properly using HARVARD
referencing system to avoid plagiarism. You have to provide both in-text citation and a reference list.
10. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be reduced to A
REFERRAL or at worst you could be expelled from the course
7
G.H.A.S.S Ganegoda MSCP
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as my own
without attributing the sources in the correct way. I further understand what it means to copy another’s work.
8
G.H.A.S.S Ganegoda MSCP
Higher National Diploma in Computing
Assignment Brief
Student Name /ID Number
Unit Tutor
Issue Date
Submission Date
Submission Format:
The submission should be in the form of an individual report written in a concise, formal business style
using single spacing (refer to the assignment guidelines for more details). You are required to make use
of headings, paragraphs, and subsections as appropriate, and all work must be supported with research
9
G.H.A.S.S Ganegoda MSCP
and referenced using Harvard referencing system. Please provide in-text citation and a list of references
using Harvard referencing system.
Please note that this is an individual assessment and your report should include evidences to that you
have conducted a research to collect relevant data individually.
10
G.H.A.S.S Ganegoda MSCP
Unit Learning Outcomes:
LO1 Establish project aims, objectives and timeframes based on the chosen theme.
LO2 Conduct small-scale research, information gathering and data collection to generate knowledge to
support the project.
LO3 Present the project and communicate appropriate recommendations based on meaningful
conclusions drawn from the evidence findings and/or analysis.
LO4 Reflect on the value gained from conducting the project and its usefulness to support sustainable
organizational performance.
11
G.H.A.S.S Ganegoda MSCP
Research Theme: Remote working
Research Topic: What are the key cyber security risks of working remotely e.g. employees
downloading unsecure apps or sharing their work devices with family members?
“The option to work remotely was already being embraced by some businesses in the pre-pandemic era.
These businesses were making some progress to adapt their working practices to accommodate remote
working by allowing those in certain job roles to take the opportunity to work from home, albeit a day or
two a week. However, on the whole there had been a reluctance to have staff working remotely and this
has largely centred around productivity concerns, security implications and technology issues.
The global pandemic however necessitated and accelerated the move to remote working. The vast
majority of businesses have now shifted some or all of their operations online, and almost all of their staff
are working from home. The enabling force behind this necessary shift has been the different
technologies and platforms that facilitate workers to achieve business goals remotely. This sudden shift to
remote working took place within weeks and months and has not been without issues. Several surveys
conducted during this period cited business leaders complaining about how technology problems have
impacted their business and employees while working remotely. The biggest issues remote workers face
are being frequently disconnected from corporate networks, slow file downloads, poor quality of video
meetings and long response times when loading apps. As a result, building secure, effective and
integrated technology capability, to continue this flexibility in the workforce, has now become a priority
for all organisations”. (Pearson, 2020)
You are expected to carry out a small-scale research in order to explore the cyber security risks of
working remotely due to the pandemic, from the standpoint of a computing professional. The
research that you carry out can be based on an organization that you have access to gather sufficient
information to investigate the cyber security risks of remote working.
12
G.H.A.S.S Ganegoda MSCP
A comprehensive project management plan
Evaluation of data collection methods and data analysis tools and/or techniques
should be provided
Appropriate recommendations should be provided
Reflect on the value gained from conducting the project and its usefulness to
support sustainable organisational performance
TASK – 01
1.1Define the scope of the project and devise aims and objectives of the project that
you are going to carry out. You also should include a brief introduction to the
selected company, remote working process and technologies used, explanation to
the project and other relevant information about the research.
Cost, scope, time, quality, communication, risk, and resources management plan
Comprehensive Work Breakdown Structure (WBS) with clearly defined activities
and milestones
Gannt chart to illustrate project schedule with realistic time allocated for each
activity and clearly defined deadlines for milestones.
TASK – 02
Carry out a research to investigate the cyber security risks of remote working by applying appropriate
qualitative and quantitative research methodologies and critically evaluate the reliability, accuracy and the
appropriateness of the research methods applied. your answer also should include a critical evaluation of
the project management process and a justification to the selected research methodologies.
13
G.H.A.S.S Ganegoda MSCP
TASK – 03
3.1Analyse research data collected to support your research project using appropriate
tools, techniques and critically evaluate how selected tools, techniques uphold
authenticity and the accuracy of the data collected.
3.2Draw valid conclusions and recommendations from the research data analysed and
communicate your recommendations to the top management of the organization
through an action plan. The action plan should include a justification to the
recommendations suggested.
TASK – 04
4.1. Reflect on the objectives of the cyber security risks project and your own learning experience
gained through following a quality research and the project management process. Critically evaluate the
ways in which the research project carried out supports the organization to sustain its performance/
security in a remote working environment and how the project supported you to improve your own
learning and performance.
14
G.H.A.S.S Ganegoda MSCP
15
G.H.A.S.S Ganegoda MSCP
Grading Rubric
LO1 Establish project aims, objectives and timeframes based on the chosen
theme
P1 Devise project aims and objectives for a chosen scenario.
16
G.H.A.S.S Ganegoda MSCP
LO3 Present the project and communicate appropriate recommendations
based on meaningful conclusions drawn from the evidence findings and/or
analysis
17
G.H.A.S.S Ganegoda MSCP
Table of Contents
Chapter 1........................................................................................................................................19
1.1 Background of the project...................................................................................................20
1.2 types of cyber security risks................................................................................................20
1.2.1 remote work security risk for employees......................................................................21
1.2.2 remote work security risk for companies......................................................................21
1.3 goals of the research............................................................................................................22
1.4 objective of the research......................................................................................................22
1.5. problem identification.........................................................................................................22
1.6 problem justification............................................................................................................23
1.7 conceptual framework.........................................................................................................24
1.8 Breakdown Structure Chart Work.......................................................................................24
1.9 Time frame...........................................................................................................................25
Chapter 2........................................................................................................................................26
2.1. cyber security......................................................................................................................26
2.1.1 benefits of cyber security..............................................................................................27
2.1.2 advantages of cyber security.........................................................................................27
2.1.3 disadvantages of cyber security....................................................................................27
2.2 remote working....................................................................................................................27
2.2.1 benefits of remote working...........................................................................................28
2.2.2 advantages of remote working......................................................................................28
2.2.3 disadvantages of remote working.................................................................................28
2.2.4 specific company of using remote working..................................................................28
2.3 explanation of cyber security risk in remote working.........................................................29
Chapter 3........................................................................................................................................32
3.1 introduction..........................................................................................................................32
3.2 qualitative & quantitative....................................................................................................32
3.2.1 quantitative research.....................................................................................................32
3.2.2 qualitative research.......................................................................................................32
3.3 research approach................................................................................................................32
3.4 research design.....................................................................................................................33
3.5 research site selection..........................................................................................................33
18
G.H.A.S.S Ganegoda MSCP
3.6 population and sampling......................................................................................................34
3.7. Method of Data Collection..............................................................................................34
3.8. Method of Data Analysis................................................................................................34
3.9. Research Role and Ethics................................................................................................34
CHAPTER 4..................................................................................................................................35
4.1 ANALYSIS AND DISCUSSION.......................................................................................35
4.1.1 Introduction...................................................................................................................35
4.1.2 Data Presentation..........................................................................................................35
4.1.3Gender............................................................................................................................36
4.1.4Age.................................................................................................................................36
4.1.5Educational Qualifications.............................................................................................37
4.1.6Work Experience...........................................................................................................38
4.1.7Reliability Analysis.......................................................................................................38
4.1.8Model Summary............................................................................................................39
4.1.9 Enova............................................................................................................................40
4.1.10Coefficients..................................................................................................................40
4.1.11 Histogram...................................................................................................................41
4.2 Chapter Summery................................................................................................................42
Chapter 5 (Conclusion and Recommendations)............................................................................43
5.1 Introduction..........................................................................................................................43
5.2 Conclusion...........................................................................................................................43
5.3 Recommendations................................................................................................................43
CHAPTER 6..................................................................................................................................44
6.1 Personal reflection...............................................................................................................44
6.2 Project outcomes..................................................................................................................45
6.3 Cost Control.........................................................................................................................45
6.4 Own learnings and performances........................................................................................45
6.5 Skills in research..................................................................................................................46
6.6 Risk management skills:......................................................................................................46
6.7Communication skills...........................................................................................................46
Google Form..................................................................................................................................47
References......................................................................................................................................54
19
G.H.A.S.S Ganegoda MSCP
Table of Figures
20
G.H.A.S.S Ganegoda MSCP
Chapter 1.
The focus of the research is Online remote working cyber security risk the primary motivation
behind choosing this topic is online employment. Remote working is very simple and clear
method to done day to day works. But sometimes the peoples had to face some security
problems. both peoples are not known about this risk. However, the researcher hopes to explain
the risk of the remote working and the method can use to protect security of remote working.
The researcher chose on Polonnaruwa’s ESoft Metro College for this study. One of Sri Lanka's
most well-known private educational institutions is the ESoft Company. It provides academic
and professional degrees in English, Engineering, Hospitality, Business & Management, and
Computing. The business, which was founded in 2000, currently has 40 branches around the
country.
The Polonnaruwa branch has a large staff. The researcher decided to connect with employees at
the Polonnaruwa ESoft office to learn more about their security when working remotely. The
fact that majority of the staff members at this organization work remotely is the reason to choose
them.
Also, due to the pandemic condition, remote working is widespread worldwide. Therefore, it is
important to understand the risks associated with remote working.
21
G.H.A.S.S Ganegoda MSCP
1.2 types of cyber security risks
Organizations may have a fully remote workforce, employees who occasionally work from
home, or employees who normally travel for business. Managing their security is definitely more
difficult than managing your on-site devices. Managing their security is definitely more difficult
than managing your on-site devices. Here are five bad habits that remote employees may have
that could harm the company.
22
G.H.A.S.S Ganegoda MSCP
1.2.2 remote work security risk for companies
Your company's data may be at risk due to the remote workers, who may not even be aware of it.
Working from home has the potential to lead to identity theft, data breaches, and a host of other
issues.
1. Weakened Security Controls
2. Scams via email
3. Threats Everywhere
- define how an internet connection affects the remote working environment's cyber security.
- define how weak security measures affect the online safety of remote working.
- define how email scams affect remote workers' cyber security.
23
G.H.A.S.S Ganegoda MSCP
issue's underlying cause. The researcher wants to describe the cyber security risk associated with
remote work and how it would influence the security of ESoft employees.
The researcher should come up with solutions after identifying the issue. The primary cause of
this issue is the COVID 19 pandemic condition. In problem justification, the researcher looks for
several solutions and considers how they may be applied to the issue at hand. The researcher
employs a few techniques for problem justification. Among them are,
The project should be utilized to address a particular issue. The issue should be identified at the
project's beginning. The researcher should have a specific issue to discuss.
After making a statement, the researcher must be given a justification. This is why it's important
to outline the risk of remote employment for the ESoft Company.
The risk of cyber security when working remotely has already been the subject of numerous
studies. In the literature review, it will be discussed. The researcher intends to make a strong
point about the cybersecurity risk of remote labor in this study. The majority of Polonnaruwa
24
G.H.A.S.S Ganegoda MSCP
ESoft employees work online. This is the reason the researcher picked this business. However,
the researcher hopes to have identified a precise answer to this issue by the end of this study.
The researcher also wants to explain how to safeguard the confidentiality of employee and
company data at ESoft.
Weakened Security
Controls
Weakened Security
Controls
Authentication with
Several Factors
25
G.H.A.S.S Ganegoda MSCP
1.8 Breakdown Structure Chart Work.
Research Topic
Submit Project
26
G.H.A.S.S Ganegoda MSCP
Chapter 2
The technique of protecting networks, computers, servers, mobile devices, electronic systems,
and data from hostile intrusions is known as cyber security. It is often referred to as electronic
information security or information technology security. The phrase can be broken down into a
few basic categories and is used in a wide range of applications, including business and mobile
computing.
Its objectives are to lower the danger of cyberattacks and safeguard against the unauthorized use
of technology, networks, and systems. (kasperskey, 2022)
critical infrastructure organizations are mostly vulnerable to attack more than others. because
these are (SCADA) often based on older software.
2. network security
The act of protecting a computer network from attackers, including malicious software that
seizes opportunities or targeted attacks, is known as network security.
3. cloud security
4. IoT security
secure smart devices and networks that connected to the IOT, include to IoT security. smart
fire alarms, lights, thermostats and other devices are including to IoT when the devices
connected to internet.
5. application security
27
G.H.A.S.S Ganegoda MSCP
2.1.1 benefits of cyber security
i. for maintained the security, the system should be update new software.
ii. it is expensive for normal users (cart, 2021).
iii. it is difficult to configure firewall correctly.
iv. wrong configure firewall can be blocked users until configure firewall correctly.
v. the system can be slower than before.
Working remotely enables professionals to conduct their business away from the confines of an
office setting. It is predicated on the idea that work need not be carried out in a certain location to
be successful. (remote, 2022)
Consider it this way: Remote workers can complete their projects and achieve their objectives
wherever they wish, as opposed to having to commute to an office each day to work from a
specific desk. People have the freedom to plan their days in a way that allows their work and
personal life to coexist harmoniously and to the fullest extent possible. And also, this corvid 19
pandemic situation is one of the most important point to using remote working. more companies
had to stop their work because this pandemic situation. therefore, all over the world peoples are
used the remote working done their work (Huynh, 2021).
28
G.H.A.S.S Ganegoda MSCP
2.2.1 benefits of remote working
i. LinkedIn company.
ii. Apple company.
iii. Microsoft company.
iv. slack company.
29
G.H.A.S.S Ganegoda MSCP
v. Spotify company.
vi. twitter company.
vii. Upwork company.
viii. Quora company.
ix. Pinterest.
x. shopify company.
1. Effect of an insecure home network connection on the online security of remote work
Unsecured personal networks are one of the main causes of an increase in cyber security threats
when working from home. Employees might remember to update their computers and antivirus
software, but they frequently forget to update their home router software. Personal routers that
aren't updated frequently are prone to security flaws that could result in data leaks. Additionally,
firewalls will be installed on business networks to monitor traffic and stop any harmful activities.
Many home routers lack a firewall, which may result in possible security holes in the network.
2. The cyber security of remote working is impacted by increased use of internet tools.
Businesses are far more vulnerable to cyber dangers as a result of a growing reliance on
technology and internet resources. From cloud storage to emails, attachments, instant
messengers, and third-party services and platforms like Teams, Zoom, Hangouts, and Asana,
more and more work are being accomplished online. Obviously, this gives thieves more ways to
access company accounts.
3. Employees can’t spot scams effect to the cyber security of remote working
Unfortunately, one of the most frequent security threats associated with remote work is posed by
employees. Employees may accidentally provide cybercriminals access to their computers or
company files due to negligence, fatigue, or ignorance.
30
G.H.A.S.S Ganegoda MSCP
Typically, employees are far too busy with daily chores to think about cyber security concerns,
especially if they haven't been trained to. It should not be surprising that employees occasionally
fall for these ruses because cybercriminals are always developing and adopting new methods to
con people and steal data. Employee ignorance of security dangers when working from home is
one of the most significant ones due to the pandemic's exponential rise in scams and phishing
emails.
4. Staff fail to recognize how remote working's impact on cyber security raises security problems
Even if your business has taken the time to train employees on cyber security dangers, there is a
possibility that they will overlook or forget these worries when working from home. Because of
the daily workload, IT security might become a low priority for some, and without managers
there to supervise their behavior, employees are more prone to disregard security procedures.
Additionally, because of the pandemic's duration and economic consequences, some workers
may be concerned about their financial situation or career prospects. According to studies, many
employees were planning for the worst-case scenario, which is that they would lose their jobs or
their firm would go bankrupt. In fact, a Deloitte analysis indicated that 26% of survey
respondents admitted to having the need to generate backup copies of crucial firm data. The need
of corporations acting to prevent the loss of corporate data, intellectual property, and, more
broadly, to address the danger of corporate theft is amply demonstrated by the need to store
internal company data against the worst-case scenario.
Employees that use weak passwords on their accounts could put your organization at risk even if
your company has firewalls, VPNs, and security software. Cybercriminals will initially attempt
to compromise accounts with potentially weak passwords rather than attempting to breach tight
security architecture. To accomplish this, they employ a number of tools, including password
generators and coding bots, which they use to repeatedly try to guess passwords and check
accounts for password repetition.
6. The impact of phishing and ransomware on the online safety of remote work
Phishing and ransomware attacks are two other significant risks that remote workers must deal
with. Cybercriminals created these ruses to dupe users into disclosing private information or
downloading dangerous software onto their devices. Workers should previously be aware of this
31
G.H.A.S.S Ganegoda MSCP
concern, but since the pandemic, the frequency of these attacks has significantly increased.
Phishing emails have increased by almost 600 percent since the end of February, according to a
database, as cybercriminals try to profit off the anxiety and uncertainty caused by the COVID-19
outbreak.
They operate by tricking the victim into divulging critical information or login credentials by
impersonating a reliable source, typically over email. Then the criminal will either steal the data
or lock it and demand a ransom.
While businesses might think to encrypt files saved on their network, they might not think to
encrypt files when sending data between locations. Your business cannot afford for
cybercriminals to intercept shared files, as they could contain sensitive information such as client
account information, customer data, and financial information. This type of file theft can result in
theft, ransomware, and identity theft.
Some of your employees may have started utilizing their personal gadgets for work when
everyone started working from home when the epidemic struck. One of the biggest problems this
poses is the absence of an IT security infrastructure, whether it be for computers, printers,
tablets, or mobile phones used in place of a work phone. Many employees won't think to make
sure these are encrypted, whether they are using mobile devices to access corporate accounts,
receiving critical client calls, or having voicemails in their inbox that contain crucial information.
32
G.H.A.S.S Ganegoda MSCP
Chapter 3
3.1 introduction
This chapter provides an overview of the research methods used in the study. It contains
information about the participants, such as the study's eligibility requirements, who the
participants were, and how they were sampled. The researcher explains why the researcher
adopted the research design he used for this study. The data collection tool is also explained, as
well as the protocols employed to conduct the study. The data analysis procedures are also
discussed by the researcher. Finally, the method' ethical difficulties are examined (wiredspace,
n.d.).
33
G.H.A.S.S Ganegoda MSCP
from employees in ESoft company. the purpose of this research is, find out the method that
reduce the risks of remote working in employees of ESoft company in Polonnaruwa.
The research design will be defined by the type of research issue that a business is experiencing,
not the other way around. The study's design phase defines which tools to employ and how they
should be used (questionpro, 2022).
34
G.H.A.S.S Ganegoda MSCP
3.6 population and sampling
According to the researcher it will be easy to collect data about remote working cyber security
risk of ESoft company. there are 38 employees in ESoft. both males and females are work among
them. and also, there are 1 manager in this Branch. the purpose of this project is, identify the
factors that affected to remote working cyber security risk of ESoft company in Polonnaruwa.
the researcher chooses all employees of ESoft company's for population of this research.
There are 38 employees in ESoft company. according to the Morgan table, the researcher should
select 28 employees for this research. the sample size was chosen with the 90% confidence level
using the published table of survey calculator.
A google sheet will be used to collect data about cyber security risks that the employees of this
had faced. To limit the harm to people who engage in the study, the research must be conducted
in an ethical Manner. When performing the study, variables were developed for the benefit of
both the researcher and the participants and the research findings were reported in a moral and
responsible manner.
35
G.H.A.S.S Ganegoda MSCP
CHAPTER 4
4.1.1 Introduction
In this chapter, the researcher discusses the study's findings. In the first half of this chapter, the
researcher examines the demographic makeup of individual respondents. After that, the
researcher reviews all of the findings, including correlation, validity, and reliability tests.
as well as a study descriptive analysis. Finally, the researcher shows how this can be done. The
study aided in the achievement of research objectives.
Figure 6gender
The demographic makeup of individual respondents was revealed in the next section of the
questionnaire. The gender distribution of the responders is depicted in the diagram above. It
shows that females made up 33.3% of all responders, while men made up 66.7%.
36
G.H.A.S.S Ganegoda MSCP
4.1.4Age
Figure 7age
The above picture shows that the all type of ages are equal
4.1.5Educational Qualifications
The above picture shows the composition of the sample according to the education
qualifications. Most of the sample (66.7%) represent employees who are completed Government
37
G.H.A.S.S Ganegoda MSCP
university degree level. 0% of the sample represent the employees who are completed private
university degree. 33.3% sample represent the employees who are did HND or Diplomas.
4.1.6Work Experience
Figure 9work ex
The above picture shows the composition of the sample according to the working experience.
Most of the sample (66.7%) represent employees who are in a service period of <1. 33.3% of the
sample represent 1-5 years respectively.
4.1.7Reliability Analysis
Figure 10relibility
38
G.H.A.S.S Ganegoda MSCP
The features of measuring scales and the pieces that make up the scales may be investigated
using reliability analysis. The reliability analysis technique generates a number of commonly
used balance dependability metrics as well as information on the relationships between specific
balance elements. Infraclass correlation coefficients can be used to assess inter-rater reliability.
The researcher's data from the Google form was found to be reliable, as previously stated.
Cronbach's alpha value for data collected from ESoft personnel was determined to be .267 As a
result, the survey data is dependable since Cronbach's alpha value in the study supplied by the
research has a high percentage of dependability.
4.1.8Model Summary
The above is a model summary table of research data presented by research. If its "R square"
value is greater than 0.5, the probability that the research is positive research increases.
Therefore, the "R Square" value of this research conducted by the researcher is .524 as
mentioned above table. Therefore, this research is considered as positive research, and it is likely
to be accepted and this will have an impact on research.
39
G.H.A.S.S Ganegoda MSCP
4.1.9 Enova
Figure 12anova
ANOVA is a statistical approach that splits a data set's observed aggregate variability into two
components. Random and systematic impacts have no statistical impact on the data set supplied,
but systematic influences do. Analysts use the regression equation in a regression analysis.
The ANOVA test is used to determine how independent variables affect the dependent variable.
When the "P" value is less than 0.005, it numerically describes the reaction model. anticipates
what will happen if the variables are changed.
4.1.10Coefficients
Figure 13coefficients
40
G.H.A.S.S Ganegoda MSCP
If the p value is less than 0.001, it clarifies that this independent variable is significantly
connected to Dependent variable. So, rending to above consequences only one independent
variable.
Less security and email scams are not having significant positive relatives to cyber security risks.
Connection problems and using personal devices having significant positive relative to cyber
security risks during remote working. Consequently, get independent variable values are
connection problems 0.064, using personal devices 0.011, less security 0.809 and email scams
0.078
4.1.11 Histogram
Figure 14histogram
A histogram is a graphical representation of statistical data that uses rectangles to depict the
frequency of data items in numerical intervals of equal size. In the most basic form, the
41
G.H.A.S.S Ganegoda MSCP
independent variable is plotted along the horizontal axis, while the dependent variable is
represented along the vertical axis. A histogram in its most popular form. The data is provided in
a colored or shaded manner. rectangles of various sizes.
The fourth chapter's introduction outlines data collecting, processing, and interpretation ideas.
The number of questionnaires distributed, collected, utilized for analysis, and invalid is
explained in the response overview. The rationale for removing all employees from the
Production Department The department in the survey's target group is explained in the sample
profile. The measure of dependability Cronbach's alpha values were used to interpret the results
for the variables. Then there was the Employees affiliated to the Factory Production Section
were used to examine job history. Employees' job experience is examined in broad terms using
demographic data such as gender, age, and educational credentials.
The association was then examined using Pearson correlation at a significance threshold of 0.01.
We looked at the central tendency and dispersion of independent and dependent variables.
Gradually regression analysis was carried out to identify the cyber security risks in remote
working of ESoft Polonnaruwa.
42
G.H.A.S.S Ganegoda MSCP
Chapter 5 (Conclusion and Recommendations)
5.1 Introduction
this section can be dividing by 2 sections. there are conclusion and recommendations. The
conclusion summarizes the entire study, with a focus on data analysis as a means of achieving
the research goals. the recommendation describes by researcher, the solution that can be
implement to reduce the remote working cyber security risk in ESoft.
5.2 Conclusion
In present, Remote working cyber security risk is spread out all over the world. the researcher
chooses ESoft College for get a solution for this risk. because the ESoft company is one of the
important Education institute in Polonnaruwa. because this reason, the ESoft company managers
cannot reach their goals. The ESoft company is always using remote working for done they’re
some of works. but the employees (Students) have no idea about the risk of using remote
working. the risk is impacting the ESoft employee (Students) and their company's privacy.
therefore, the researcher target was reduced remote working cyber security risk in ESoft
company at Polonnaruwa. so, this research focused on the following three issues.
- Use unsafe WIFI
- Malware Attacks
- Email scams
researcher create formal process for devised to reduce cyber security risk. The approach for
reducing cyber security risk was meant to be near to a successful degree of efficiency.
5.3 Recommendations
Recommendations are based on the Author's research results and guide readers to specific
activities or instructions. The following are the suggestions provided by the researcher to the
ESoft College.
To avoid connectivity issues, the researcher mentions various security safeguards. Employees
may connect to a secure wireless network and utilize strong passwords for their wireless
connections. Employees can also upgrade firewalls and utilize robust wireless connections. Also,
effective virus defenses are available.
43
G.H.A.S.S Ganegoda MSCP
Using personal devices for work, less security and email scams is also a cyber security risk in
this company. Agencies owner can Training workers on cyber-attack prevention and informing
them of current cyber assaults is one of the most effective strategies to guard against cyber-
attacks and all forms of data breaches. Cyber assaults frequently occur because the systems or
software are out of current, exposing vulnerabilities. Hackers take advantage of these flaws, and
cybercriminals take advantage of them to get access to the agencies network. It's sometimes too
late to take precautionary measures after they've gotten in.
To combat this, it's a good idea to invest in a patch management system that will keep track of all
software and system upgrades, ensuring that the system is secure and up to date.
Employees might be advised to utilize a powerful virus protection and strong passwords to the
system by the company's owners. Not only that, but staff have access to the company's data
backup system. They can also manage access to the work device and use secure passwords.
Properly following the recommendations given by the author, can reduce the cyber security risks
inn remote working in ESoft College – Polonnaruwa.
CHAPTER 6
The main objective of the research project was to identify the cyber security risks in remote
working of ESoft College – Pollonnaruwa.
A literature review was essential in creating the success of cyber security risks in remote
working applications and comprehending cyber security risks such as connection issues, lack of
security, email scams, and the use of personal devices for work. There has been a lot of earlier
research and data on the usage of remote working. The study effort assisted in identifying firms
44
G.H.A.S.S Ganegoda MSCP
in Sri Lanka that employ remote working. The study enabled the growth of a sound strategy for
achieving the project's goals. It also assisted in identifying the firms that use remote working the
most, as well as the cyber security dangers. The author's conclusion and recommendations were
aided by these findings. To accomplish the project's goals, quantitative research methodologies
are used effectively.
The investigations assisted in determining the most secure countermeasures and approaches to
strengthen the organization's security. The study's findings are as follows:
After performing an in-depth analysis into the dependability of installing apps and other
countermeasures to guard against cyber security concerns, ESoft College- Polonnaruwa was able
to strategically pick countermeasures programs to deploy. The quantitative research data analysis
aided the firm in building a systematic long-term planning strategy to strengthen the
organization's security. The study effort also gave a thorough understanding of the cyber security
threats associated with the project management process for remote workers.
The researcher was able to acquire information on effective cost management strategies in cyber
security hazards of remote working through this study project.
Because of the research project, the researcher was able to learn how to conduct a research
project utilizing the project management approach. As a researcher, I learned a lot about the
cyber security dangers associated with remote work. The Researcher believes that the knowledge
gained because of this study project will assist him in progressing in his research career and
reducing cyber security hazards at ESoft College in Polonnaruwa.
45
G.H.A.S.S Ganegoda MSCP
6.5 Skills in research
The Researcher has no prior research or statistical analysis experience. After all was said and
done, the Researcher had gained a large amount of information regarding project management
and statistical data analysis.
Because the study was done during a pandemic, the author ran across a number of issues. The
researcher was able to effectively finish the study project despite the hazards.
6.7Communication skills
Is Effective communication skills being one of the most important talents learned. The researcher
was able to successfully convey the study's principles and outcomes thanks to the
communication skills he gained during the research endeavor. It will increase the researcher's
self-assurance while also supporting them. researcher in the pursuit of Long-term professional
aims of researchers.
46
G.H.A.S.S Ganegoda MSCP
Google Form
Researcher make a google form to know the cyber security risks in remote working in ESoft
Metro College Polonnaruwa branch. There have six sections in that form.
47
G.H.A.S.S Ganegoda MSCP
Figure 16google form 2
48
G.H.A.S.S Ganegoda MSCP
Figure 17google form 3
49
G.H.A.S.S Ganegoda MSCP
Figure 18google form 4
50
G.H.A.S.S Ganegoda MSCP
Figure 19google form 5
51
G.H.A.S.S Ganegoda MSCP
Figure 20google form 6
52
G.H.A.S.S Ganegoda MSCP
Figure 21google form after submit
53
G.H.A.S.S Ganegoda MSCP
References
bsigroup, 2021. bsigroup.com. [Online]
Available at: https://www.bsigroup.com/en-GB/Cyber-Security/
[Accessed 12 06 2022].
cart, s., 2021. isc2central.blogspot.com. [Online]
Available at: https://isc2central.blogspot.com/2021/01/the-advantages-and-disadvantages-of.html
[Accessed 2 1 2022].
cdc, 2019. cdc.gov. [Online]
Available at: https://www.cdc.gov/policy/polaris/policyprocess/problem-identification/
index.html
[Accessed 10 06 2022].
escalla, 2019. escalla.co.uk. [Online]
Available at: https://escalla.co.uk/blog-remote-working-5-benefits-challenges/
[Accessed 12 06 2022].
heimdal, 2021. [Online]
Available at: https://heimdalsecurity.com/blog/cybersecurity-issues-with-remote-work/
[Accessed 10 06 2022].
Huynh, C., 2021. remoteyear.com. [Online]
Available at: https://www.remoteyear.com/blog/what-is-remote-work
[Accessed 12 06 2022].
itgovernance, 2021. itgovernance.co.uk. [Online]
Available at: https://www.itgovernance.co.uk/what-is-cybersecurity
[Accessed 11 06 2022].
janza, n., 2020. spica.com. [Online]
Available at: https://www.spica.com/blog/remote-work-advantages-disadvantages
[Accessed 12 06 2022].
kasperskey, 2022. What is Cyber Security?. [Online]
Available at: https://www.kaspersky.com/resource-center/definitions/what-is-cyber-security
[Accessed 11 06 2022].
questionpro, 2022. questionpro.com. [Online]
Available at: https://www.questionpro.com/blog/research-design/
[Accessed 17 1 2022].
remote, 2022. What is remote work?. [Online]
Available at: https://www.remoteyear.com/blog/what-is-remote-work
[Accessed 12 06 2022].
54
G.H.A.S.S Ganegoda MSCP
shea, s., n.d. .techtarget.com. [Online]
Available at: https://www.techtarget.com/searchsecurity/definition/cybersecurity
[Accessed 1 1 2022].
wiredspace, n.d. wiredspace.wits.ac.za. [Online]
Available at: https://.wits.ac.za/bitstream/handle/10539/1492/04Chapter3.pdf?
sequence=4&isAllowed=y
[Accessed 12 06 2022].
55
G.H.A.S.S Ganegoda MSCP