0% found this document useful (0 votes)
19 views60 pages

Early Assign

pscp assignment

Uploaded by

chanuthhansana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
19 views60 pages

Early Assign

pscp assignment

Uploaded by

chanuthhansana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 60
ESOFT METRO CAMPUS #3, De Fonseka Road, Colombo 04. Higher National Diploma in Computing & Systems Development / Business Management Name Name of Group Members (if ESOFT Reg. No Applicable) Edexcel No Module Name Managing a Successful Computing Project Name of the Lecturer Date Due Date Submitted Fine Email-Address Contact No Check List(V) [CD | | Assignment Formatting Sheet Harvard Referencing Brief Signature on] _ | Signature on Student Declaration Coversheet Herewith [agree for the given terms and conditions on plagiarism & Academic dishonesty also I declare the work submitted doesn’t breach these regulation. Nove: Keep the softcopy ofthe assignment with you until the official results released by ESOFT. ESOFT has al ights to request the softeapy again st amy time, oo Signature Date Higher National Diploma in Computing & Systems Development / Business Management Name Student Reg. No Edexcel No Module Name Managing a Successful Computing Project Name of the Lecturer Date Due I Date Submitted Fine Email-Address I ‘Contact No Check tist (V) | CD Assignment Formatting Sheet Harvard Referencing Brief Signature on] | Signature on Student Declaration Coversheet L will keep the copy of this sheet until I receive the Results of my Submitted work Signature Date Higher Nationals Internal verification of assessment decisions — BTEC (ROF) INTERNAL VERIFICATION ~ ASSESSMENT DECISIONS Programme ttle [BTEC Higher National Diploma in Computing Assessor Internal Verifier Unit(s) [Unit 6 Managing # Successful Computing Project SRST julnerablity Assessment = Manag jement Information System (MS) Project Student’sname st which assesement Past Distinction criteria the Assessor has awarded. INTERNAL VERIFIER CHECKLIST Do the assessment criteria awarded match ‘those shown in the assignment brief? YN Is the Pase/Mert/Disincion grade awarded justified by the assessor's comments onthe ~ student work? Has the work been assessed accurately? w Inthe feedback to the student: Give details * Constructive? vn * Linked to relevant assessment criteria? vn + Identifying opportunities for improved performance? vn + Agresing actions? vn Does the assessment decsion need amending? a Assessor signature Internal Verifier signature Programme Leader signature(if required) Higher Nationals - Summative AssignmentFeedback Form [Unit 6 Managing a Successful Computing Projea [assessor Feedbace LOI, Assess risks to IT security a C]) we C] mC] oj LOZ. Describe IT security solutions. Mumm oo a * es LC) ms CC) mL] o2L) L04. Create and use a Test Plan to review the performance and design of a multipage website, coe Te ee Grade: ‘Assessor Signature: Date: ResubmissionFaedback: Grade: ‘Assessor Signature: Date: Internal Verfier’s Comments: Signature & Date: * Please note hat grade decors ae provisional: Thay are only confimed once internal and extemal mederton har aken place ana grades desione ave been agreed at theasessment board BTEC Pearson Higher Nationals in Computing Unit 6: Managing a Successful Computing Project General Guidelines 1. A Cover page or title page ~ You should always attach a title page to your assignment. Use previous page as ‘your cover sheet and be sure to fill the details correctly. 2. This entire brief should be attached in first before you start answering 3. All the assignments should prepare using word processing software. 4, Allthe assignments should print in AA sized paper, and make sure to only use one side printing, 5. Allow 1” margin on each side of the paper. But an the left side yau will need to leave room for binging Word Processing Rules 1._Use a font type that will make easy for your examiner to read. The font size should be 12 point, and should be in the style of Time New Roman, 2. Use 1.5 line word-processing. Left justify all paragraphs. 3. Ensure that all headings are consistent in terms of size and font style. 4, Use footer function on the word processor to insert Your Name, Subject, Assignment No, and Page Number on each page. This is useful if individual sheets become detached for any reason. 5. Use word processing application spell check and grammar check function to help edit your assignment. Important Points: 0 Check carefully the hand in date and the instructions given withthe assignment. Late submissions will nt be accepted. Ensure that you give yourself enough time to complete the assignment by the due date. Don’t leave things such as printing tothe last minute ~ excuses of this nature will nat be accepted for failure ‘to hand in the work on time. You must take responsibilty for managing your own time effectively. If you are unable to hand in your assignment on time and have valid ceasons such as illness, you may apply (in writing) for an extension. Failure to achieve atleast @ PASS grade will esult ina REFERRAL grade being given. ission of work without valid reasons will lead to an automatic REFERRAL. You will then be asked to complete an alternative assignment. Take great care that if you use other people’s work or ideas in your assignment, you properly reference ‘them, using the HARVARD referencing system, in you text and any bibliography, otherwise you may be guilty of plagiarism. If you are caught plagiarsing you could have your grade reduced to A REFERRAL or at worst you could be excluded from the course Non-subr Student Declaration | hereby, declare that | know what plagiarism entails, namely to use another's work and to present it as my own without attributing the sources in the correct way. | further understand what it means to copy another's work. 1. know that plagiarism is @ punishable offence because it constitutes theft | understand the plagiarism and copying policy of the Edexcel UK 3. I know what the consequences will be if I plagiaries or copy another's work in any of the assignments for this, program. 4. | declare therefore that all work presented by me for every aspects of my program, will be my own, and ‘where | have made use of another's work, | will attribute the source in the correct way. 5. | acknowledge that the attachment of this document signed or not, constitutes a binding agreement between myself and Edexcel UK. 6. | understand that my assignment will not be considered as submitted if this document is not attached to the attached Student's Signature Date: (Provide E-mail ID) (Provide Submission Date) Assignment Brief. Student Name /ID Number Academic Year 2017/2018 Unit Tutor Issue Date ‘Submission Date IV Name & Date The submission is in the form of an individual written report. This should be written in a concise, formal business style using single spacing and font size 12. You are required to make use of headings, paragraphs and subsections as appropriate, and all work must be supported with research and referenced using the Harvard referencing system. Please also provide an end list of references using the Harvard referencing system. L01 Establish project aims, objectives and timeframes based on the chosen theme. 102 Conduct small-scale research, information gathering and data collection to generate knowledge to support the project. 103 Present the project and communicate appropriate recommendations based on meaningful conclusions drawn from the evidence findings and/or analysis. LO4 Reflect on the value gained from conducting the project and its usefulness to support sustainable organizational performance. Assignment Brief and Guidance: ‘Vulnerability Assessment - Management Information System (MIS) Project Management Information Systems (MIS) plays a very important role in today’s organizations; it creates an impact on the organization’s functions, performance and productivity. A Management Information System (MIS) ensures that an appropriate data is collected from the various sources, processed and send farther to all the needy destinations. A system is expected to fulfill the information needs of an individual, a group of individuals, management functionaries, managers and top management to improve efficiency and productivity. On contrary, any system can be compromised with vulnerability issues. This is mostly in area of confidentiality, integrity and availability (security triangle). You're advised to provide solutions for improvements for a selected Management Information System's in a selected organization in the area of how to improve aspects of confidentiality, integrity and availability (security triangle) through a vulnerability study assessment. ‘You should investigate the causes and impacts of vulnerabilities within computing systems and explore the solutions to the problems presented in order to make recommendations to improve their security for Management Information System. The expected solution of the project is a vulnerability assessment and action plan which includes, issues of varying severity. In general, the vulnerability assessment may focus on a test of security infrastructure devices, network servers, operational systems (including Windows and Linux), physical security of buildings, and wireless internet security. You have to mainly focus on how can vulnerabilities in an existing system be identified and counteracted, + Discover unknown entry points both physical and electronic — that is threat to the overall confidentiality, integrity, and availability of network data and resources. + Problem can be discovered in the areas of installing, configuring, and maintaining servers and infrastructure equipment as well as practices of different department managers and staff tend to have different ways of managing their IT + Recommendations for standardization of upcoming infrastructure installations, configurations, and ‘maintenance. ‘+ Educate and increase user awareness on what they could change to improve their security situation in order to build confidence of using the Management Information System + Anaction plan to keep their environment secure. Your role as a student researcher means that you are not trying to perform a specific solution to any vulnerability problem case. You have to make expert recommendations on how to tighten security controls, based on a proven assessment methodology, that are in the best interest of the specific project of Management Information System which may eliminate unnecessary entry points that would greatly reduce the threat. Introducing of a set of policies and procedures for the entire Management Information System help eliminate threats through network entry points and infrastructure. The vulnerability trends and recurring issues that needed careful attention. The project span 03 months in order to provide an accurate snapshot of their current security posture. The benefit of the project is that it provides a greater awareness among the entire staff about how any vulnerability or weakness in any functional area affects the overall security posture of the Management Information System at large. You are required to provide a full report on vulnerabilities you found and how you educate the Management Information System staff on what they could change to improve their security situation with an action plan to keep their environment secure. TASK-01 1.1 Describe aims and objectives for vulnerability assessment project which you're introducing. Your explanation should include a brief introduction about the company, the MIS and other relevant information to the assessment project. 1.2 Produce a comprehensive project management plan, the plan should include milestone schedule and project schedule for monitoring and completing the aims and objectives of the project that includes cost, scope, time, quality, communication, and risk and resources management. 1.3 Produce a work breakdown structure and a Gantt chart to provide timeframes and stages for completion. TASK-02 2.1 Explain qualitative and quantitative research methods appropriate for meeting project aims and objectives which you produced as vulnerability assessment project. 2.2 Evaluate the project's management process and appropriate research methodologies applied, the accuracy and reliability of different research methods applied for the small scale research TASK -03 3.1 Analyze research data using appropriate tools and techniques, 3.2 Describe appropriate recommendations as a result of research and data analysis to draw valid and ‘meaningful conclusions. 3.3 Evaluate the selection of appropriate tools and techniques for accuracy and authenticity to support and justify recommendations. TASK-04 4.1. Provide a reflection on the value of undertaking the research to meet stated objectives with your own learning and performance which includes a discussion of the project outcomes, its usefulness to support sustainability of the given organization and its’ performance, the decision- making process and changes or developments of the initial project management plan to support justification of recommendations and learning during the project. 4.2. Evaluate the value of the project management process and use of quality research to meet stated objectives and support own learning and performance. P2 Produce & project management plan hat covets aspects of ost, scope time, quality, communicavon, rik and resources, PD Produce = work bresisown structure and » Gantt Chart rove timelrames and stages for companion. Mt Produce « comprehensive project management plan, milestone schedule and project schedule for monitoring and completing the ‘ime and objetves ofthe projec ‘PA Cary out emall-seale research by aplying ausitaive ana quanbtaive research methods appropriate for mesting. project Sime and objectives ‘M2 Evaluate the accuracy and relabliey of dierent research ‘methods apales ‘DE Giiically evaluate the project management process and Analy reaearch and data using appropiate tools and techniques. 5 Communicate appropiate recommendations as result of research and data analy to draw vald and meaningful conclusions. 'M& Evaluate the selection f appropriate tools and techriques for accuracy and authentity to support and just recommendations. PT Rafect on the value of undertaiing the resenrch to meet Stated objectives and own learning ané performance. ‘Ni Evalate the value ofthe project management process and use of quality research to meet stated objectives and support own learning and performance, 12 Critically evaluate and reed on the proiet outcomes, the ‘ecision making process and changes or developments ofthe ital project management pan to suppor ustfiation of recommendations and learning during the project. Acknowledgment I would like to express my special thanks of gratitude to my teacher who gave me the excellent opportunity to do this wonderful network assignment, which also helped me to doing a lot of Research, and I came to know about so many new things. I am really thankful to them. Secondly, I would also like to thank my parents and friends who helped me a lot in finalizing this project within the limited period V.DINOJAN MSCP Assignment Ni Table of Contents Introduction ‘assessment project aims and objectives with a brief introduction 6 1.2 Produce @ comprehensive project management plan, milestone schedule and project schedule for monitoring and completing the aims and objectives of the project that includes cost, scope, time, quality, communication, risk and resources management. sui Introduction to the Risk Management Plan Template .. Scope Schedule Management plan . Risk Management Processe: 1.1 Identify vulnerabilities. 1.2 Analyze Risks 1.3. Risk Response Planning . 1.3. Risk Monitoring and Control. Cost Management. Communications Management Resource Management. 1.3 Produce a work breakdown structure and a Gantt chart to provide timeframes and 2.1 Explain qualitative and quantitative research methods appropriate for meeti aims and objectives. 2.2 Evaluate the project management process and appropriate research methodologies applied, the accuracy and reliability of different research methods applied for the small scale research. TASK -03.. 3.1 Analyze research data using appropriate tools and techniques. 3.2 Describe appropriate recommendations as a result of research and data analysis to draw valid and meaningful conclusions.. 3.3 Evaluate the selection of appropriate tools and techniques for accuracy and authenticity to support and justify recommendations.. 4.1, Provide a reflection on the value of undertaking the research to meet stated objectives with your own learning and performance which includes a discussion of the project outcomes, its usefulness to support sustainability of the given organi performance, the decision-making process and changes or developments of the project management plan to support justification of recommendations and learning during the project... jon and its’ ial V.DINOJAN ‘MSCP Assignment No: 1 it V.DINOJAN TT ‘MSCP Assignment No: 1 iv ‘MSCP Assignment No: 1 Introduction Risk management is one of the most important aspects in creating information systems. The most frequent reason for project failure is uncontrolled risk management where risks were not analyzed at all or insufficiently or counter-measure to reduce or eliminate potential risks was not adopted. The authors describe the approach that is based on the method of scenarios and the method of structured interviews but further quantifies the obtained information and, by creating a hierarchy of potential risks based on the probability of their materialization and the level of their impact, provides a clear instruction as to where to ‘mostly focus in minimizing such risks. The fundamental precept of information security is to support the mission of the organization. All organizations are exposed to uncertainties, some of which impact the organization in a negative manner. In order to support the organization, IT security professionals must be able to help their organizations’ management understand and manage these uncertainties. Managing uncertainties is not an easy task. Limited resources and an ever-changing landscape of threats and ‘vulnerabilities make completely mitigating all risks impossible. Therefore, IT security professionals must have a toolset to assist them in sharing a commonly understood view with IT and business managers concerning the potential impact of various IT security related threats to the mission. This toolset needs to be consistent, repeatable, and cost-effective and reduce risks to a reasonable level. Risk management is nothing new. There are many tools and techniques available for managing organizational risks. There are even a ‘number of tools and techniques that focus on managing risks to information systems. MSCP Assignment No: 1 5 TASK-01 11 Describe vulnerability assessment project aims and objectives with a brief introduction of company profile. ‘Vulnerability assessment Vulnerability assessment it is a security analysis that has the goal of identifying all the potential ‘vulnerabilities of systems and applications. Highly qualified personnel, in a second moment, integrate and verify the results through manval activities. The testing process used to identify and assign severity levels to as many security defects as possible in a given timeframe. This process may involve automated and manual techniques with varying degrees of rigor and an emphasis on comprehensive coverage. These activities have the purpose of refining the research highlighting eventual errors during the process. A vulnerability assessment Using a risk-based approach, vulnerability assessments may target different layers of technology, ‘the most common being host-, network, and application-layer assessments. (Swascan, 2017) About company Maharaja Food Private Limited Is A Local Food Manufacturer That Serves Local And Intemational ‘Customers Across Numerous Spheres In Their Lives With Supreme Quality Food Products. In 1958 start at “Lanka Stores”. Today This Company Take In Pride Offering High Quality And Affordable Products And Services Specialized Arenas Of Retail, Logistics, Courier Services, Currency Exchange, Business Consultancy And E-Commerce. This is established in 2005 under the name Maharaja Food with the aim of food security to the mass consumer. This Company located at Maharaja Foods (Private) limited, $13, Galle Road, Colombo-06, Sri Lanka. MSCP Assignment No: 1 6 Project aims and objectives The impact of security vulnerability could allow an attacker to compromise the integrity, availability, or confidentiality of an organization. The main objective of this vulnerability assessment project is to examine ‘the multi dimensions of vulnerabilities in a management Information System from the standpoint of a student researcher. Also investigate the causes and impacts of vulnerabilities within computing systems and explore the solutions to the problems presented in order to make recommendations to improve black lily’s security for management information system, Following are the aims and objectives of vulnerability assessment project. ‘+ Research about the different kind of Vulnerability and their impact in an organisation.To assesses vulnerabilities, first should get a well knowledge about the process of the select project area. ‘© Identifying the problems that can be discovered in the areas of installing, configuring, and ‘maintaining service and infrastructure equipment ‘+ Identify the problem can be occur during the practice of different Apartment managers and staff tend to have different ways of managing it ‘+ Anaction plan to keep black Lilly's environment secure. Recommend solution for identifying issues through a document that list what steps must be taken in order to mitigate Vulnerabilities and to secure for black Lilly’s informational assets MSCP Assignment No: 1 7 Management Information System ‘An organized approach to the study of the information needs of an organization's management at every level in making operational, tactical, and strategic decisions. In a management information system, modem, computerized systems continuously gather relevant data, both from inside and outside an organization. This data is then processed, integrated, and stored in a centralized database where it is constantly updated and made available to all who have the authority to access it, in a form that suits their purpose. (MyAccountingCourse, 2018) Security Triangle Confidentiality, integrity and availability, also known as the CIA triad, is a model designed to guide policies for information security within an organization. The elements of the triad are considered the three most crucial components of security. These three together are referred to as the security triad, the CIA triad, and the AIC triad. This article provides an overview of common means to protect against loss of confidentiality, integrity, and availability. (Gibson, 2011) ity Confidenti Confidentiality is roughly equivalent to privacy. Measures undertaken to ensure confidentiality are designed to prevent sensitive information from reaching the wrong people, while making sure that the right people can in fact get it: Information has value, especially in today’s world. Bank account statements, personal information, credit card numbers, trade secrets, government documents, Everyone has information they wish to keep a secret, Protecting such information is a very major part of information security Integrity Integrity of information refers to protecting information from being modified by unauthorized parties. Data must not be changed in transit, and steps must be taken to ensure that data cannot be altered by unauthorized people. Integrity involves maintaining the consistency, accuracy, and trustworthiness of data over its entire life cycle. Backups or redundancies must be available to restore the affected data to its comect state. Availability Availability of information refers to ensuring that authorized parties are able to access the information when needed. It’s also important to keep current with all necessary system upgrades. Providing adequate ‘communication bandwidth and preventing the occurrence of bottlenecks are equally important. Other factors that could lead to lack of availability to important information may include accidents such as power outages or natural disasters such as floods. MSCP Assignment No: 1 8 1.2 Produce a comprehensive project management plan, milestone schedule and project schedule for monitoring and completing the aims and objectives of the project that includes cost, scope, time, ‘quality, communication, risk and resources management. Managing a Successful Computing Research Project Management Plan MSCP Assignment No: 1 9 TABLE OF CONTENTS Introduction to the Risk Management Plan Template. Scope ‘Schedule Management plan. Risk Management Processes. 1.1 Identify vuinerabitities 12 Analyze Risks 1.3. Risk Response Planning.. 1.3. Risk Monitoring and Control Cost agement. ‘Communications Management. Resource Management. MSCP Assignment No: 1 10 Introduction to the Risk Management Plan Template Risk management can be defined as the processes and structures that are directed towards realizing potential opportunities, while simultaneously managing possible adverse impacts. From a project management perspective, risk management is a continuous activity conducted throughout the life of the project. It seeks to identify potential risks, evaluate their likely impact, develop mitigation plans, and monitor progress. The Risk Management Plan is typically created early in the project's Planning Process Phase. Risk management planning is the process of defining how to conduct risk management activities for a project. The plan includes how the organization will identify and address events or occurrences that could negatively or positively affect the success of a project. The plan outlines a methodology to identify, analyze, track, and mitigate risks during the project lifecycle. Identifying and managing risk increases the chance of a successful project completion by reducing uncertainty associated with the project. This template provides the suggested structure for the Risk Management Plan along with instructions and descriptions to guide the reader in understanding how to complete it Project Aims and Objectives The objective of security planning is to improve the protection of information system resources. The protection of a system must be documented in an Information Technology (IT) Security Plan, Scope Risk Management Plan consists of the process and timing for identifying Vulnerability, mitigation actions required, and organizational responsibility for monitoring and managing the Vulnerability throughout the entire lifecycle. MSCP Assignment No: 1 uu ‘Schedule Management plan Work Breakdown Structure ier tr te “intiton paring Section ‘sie 11 Define process 2. Project plan 31 Brainstorming 4.1 Project Analysis forging sevdoonst eres reqenent ‘2 Prieto Trane TiWorbeaown Sone sequent suture a 13 Project Charter ine cape anton Tb Developement Taree ener 07001 MSCP Assignment No: PROJECT LOG SHEET Projet Date Project Name Prepared By 01s ‘Managing a Successful Computing | Dinan Research Project : Performance Review 25/7/2018 | 13/8/2018 | 1. Initiation 28/7/2018 | 1/8/2018 | 1.1 Define process for gathering requirement 28/2018 | 6/8/2018 | 1.2 Analyze requirements 7/8/2018 | 10/8/2018 | 1.3 Project Charter Development 12/8/2018 | 13/8/2018 | 1.4 Planning T4S2018 | DUBOIG | 2. Project plan development 19/8/2018 | 22/8/2018 | 2.1 Work breakdown structure 25/8/2018 | 25/8/2018 | 2.2 Gantt Chart 27/8/2018 | 11/9/2018 | 2.3 Execution 31/8/2018 / 49/2018 | 3 Brainstorming Vulnerabilities 59/2018 | 69/2018 | 3.1 Solicitation 7/9/2018 | 11/9/2018 | 3.2 Vulnerabilities Research tool Development 1292018 | 2692018 | 4 Closure 15/9/2018 | 19/9/2018 2092018 | 26/9/2018 | 4.2 Project Report <]<}. sf sts} <} 4] «| <] <1. <] <}.<] < MSCP Assignment No: 1 B Roles and Responsibilities Role Responsibilities Participant(s) Project Sponsor Ultimate decision-maker and tie- breaker Provide project oversight and gnidance Review/approve some project elements Dingjaa “Manages project in accordance to the project plan Serves as liaison to the Steering Committee Receive guidance from Steering Committee Supervises consultants Supervise vendor(s) Provide overall project direction Direct/lead team members toward project objectives Handle problem resolution ‘Manages the project budget Dinojan Chief Information Officer The Chief Taformation Officer (CIO) is the agency official responsible for developing and maintaining an agency-wide information security program. ‘Mr. Tharaka Subject Matter Experts Tend expertise and guidance as needed ‘Ms. Sumudu MSCP Assignment No: 1 4 Risk Management Processes In the Risk Management Processes section of Risk Management Plan, describe the method for conducting risk management that includes: identifying risks, documenting risks, analyzing risks, planning and implementing risk responses, and controlling risks. Define the Risk Management Process clearly enough to identify the necessary steps, activities, and responsibilities to manage risk for the entire project lifecycle. 1.1 Identify vulnerabilities Risk identification is the first step in the risk management process that projects should employ. Risk identification involves identifying risks, identifying which of those risks are likely to affect the project and documenting characteristics of those risks, All ‘Project’ team members including Stakeholders, end users, subject matter experts, customers and sponsors are encouraged to identify and report potential risks to the project immediately upon detection utilizing a Risk Submittal Form. Identifying risks is an iterative process because new risks may become known as the project progresses through its project life cycle. Risk information can initially be gathered from the business case, accumulated Lessons Learned and an initial Risk Brainstorming Session, There are a number of Risk Identification techniques including reviewing project documentation, brainstorming, interviewing, root cause analysis, checklist analysis, assumption analysis, cause and effect diagrams, process flow charts, SWOT analysis, and expert judgment. Crucial to risk identification is the input of project team members and other Stakeholders to recognize and report risks as soon as possible. Risks can also be identified during project team meetings and should therefore be incorporated into the meeting agenda and minutes templates for all project meetings. 1.1 Risk Identification ‘* Unique identifier for each risk, # Description of each potential risk event and how it could affect the project. ‘* Assessment of the likelihood of occurrence and the impact/seriousness if it does. ‘© Grading of each risk according to a Risk Scoring Matrix. MSCP Assignment No: 1 15 1.2. Analyze Risks ‘The main focus of analyzing risks is to examine each identified risk to assess the likelihood of the risk event ‘occurring, and the probability outcomes associated with the risk event in order to determine its potential impact on the success of the project. This in turn provides the ability to prioritize each risk to ensure that the risks with the greatest potential impact to the project are dealt with first. The organization can then improve ‘upon project performance by focusing on high priority risks. In the Analyze Risks section, describe the specific approaches the project will take to analyze risks and establish priorities for development of risk responses. The probability of the risk occurring is assessed and given a rating. Then using these ratings in conjunction with the Risk Scoring Matrix, the risks can be graded to provide @ measure of the project’s risk exposure for each. The table below is an example of a simple Risk Scoring Matrix that provides a standard method to calculate ‘grading based upon combination of probability and impact ratings. Impact (Seriousness) Very Low Low Medium ‘High Very High i Probability VeryHiigh ikelibood) High 4 Medium 3 Low 2 Very Low 1 MSCP Assignment No: 1 16 1.3. Risk Response Planning ‘Negative Risks: Positive risks or opportuni Avoid: Risk Avoidance involves changing the project management plan to eliminate the threat posed by the risk, Some risks can be avoided by clarifying requirements, obtaining additional information, improving communication or acquiring expertise. ‘Transfer: Transferring a risk requires moving, shifting or reassigning some or all of the negative impact and ownership to a third party. This does not eliminate the risk but gives another party the responsibility to manage it. Mitigate: Risk Mitigation implies a reduction in the probability and/or impact of a negative risk. Reducing the probability and/or impact of a risk occurring is often more effective than dealing with the risk after it has occurred, Accept: This strategy indicates that the project team has decided not to change the project ‘management plan: schedule, approach or reduce project scope or is unable to identify another suitable response strategy. Exploit: This strategy may be selected for risks with positive impacts where the organization wishes to ensure that the opportunity is realized. This strategy eliminates the uncertainty associated with a positive risk by ensuring that the opportunity definitely happens, Share: Sharing a positive risk involves allocating some or all of the ownership of the opportunity to a third party who is best able to capture the opportunity for the benefit ofthe project. Enhance: This strategy is used to increase the probability and or the positive impact of an opportunity, identifying and maximizing key drivers of positive risks. Accept: Accepting a positive risk or opportunity is being willing to take advantage of it should the opportunity come along. 1.3 Risk Monitoring and Control Risk Monitoring Activities Assess currently defined risks Determine actions to be taken Evaluate effectiveness of actions taken Report on the status of actions to be taken Validate previous risk assessment Identify new vulnerability Risk Control Activities ‘Validate mitigation strategies and alternatives Assess impact on the ‘Project’ of actions taken (scope, cost, time, schedule, & resources) Identify new risks resulting from risk mitigation actions Ensure that the projects’ Risk Management Plan is maintained Revise Risk Response plan MSCP Assignment No: 1 7 Cost Management Plan cost management is the process of establishing policies, procedures, and documentation for planning, ‘managing, expanding and controlling project costs. There will be several project resources in a project and several different types of materials will be needed, there might be necessary tool and equipment as well Plan cost management process aims to plan. Cost details Cost Travel charge 2000.00 Stationery cost 1000.00 print out cost 300.00 Total cost 300.000 Communications Management ‘The purpose of the Communications Management Plan is to define the communication requirements for the project and how information will be distributed to ensure project success. You should give considerable ‘thought to how you want to manage communications on every project. Type of 7 fare tio COmmunicatio Communication a oe Comiunientio “7 Schedale eaaaiea Initiator Recipier Status Report every Monday meeting Project Manager Project teacher WhatsApp Week days chat Project Manager Friends web Free times Search about Project Manager Web page project Resource Management Resource management is the process by which businesses manage their various resources effectively. Those resources can be intangible ~ people and time — and tangible ~ equipment, materials, and finances. Resource management plan A resource management plan is a tool project managers use to manage their resources. Typically, a resource ‘management plan is used to manage the most important resource in every project: the human resource. A project team is comprised of people with assigned roles and responsibilities for a project. 18 MSCP Assignment Ni RESOURCE CALENDAR Resource Calendar is a part of project plan. The resource calendar identifies key resources needed for the project and the times/durations they'll be needed. Z a ee Mice ters bose ot een ot pee TT Ee eH Lown eas ey —= 2 engi Kage SATE wa — tegenare a a et Farms tame Ta wae ee eco 2 Lares Se Sas = san ? ae Tai sears — - ap Set met au 2 ination oy sete sewn . 2 newt owt iy Sow seer ” 7 Soepo tas enna MAE —<—

You might also like