7407 - Unit 06 - Assignment 2 Frontsheet
7407 - Unit 06 - Assignment 2 Frontsheet
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I
understand that making a false declaration is a form of malpractice.
Student’s signature
Grading grid
P5 P6 P7 M3 M4 D2
❒ Summative Feedback: ❒ Resubmission Feedback:
This research paper examines the impact of the application of Big Data technologies
on operational efficiency in academic settings. With the increasing availability of
large volumes of data in educational institutions, there is a growing need to leverage
this data for improving operational processes. Big Data technologies offer the
potential to analyze vast amounts of structured and unstructured data, extract
meaningful insights, and make data-driven decisions.
The study explores various areas within academic institutions where Big Data
technologies can be applied to enhance operational efficiency. These areas include
student enrollment and admissions, academic performance analysis, resource
allocation, curriculum development, and institutional management. By employing
advanced data analytics techniques such as predictive modeling, machine learning,
and natural language processing, academic institutions can gain valuable insights into
student behavior, identify patterns and trends, and optimize resource allocation and
decision-making processes.
The research also addresses the challenges and considerations associated with
implementing Big Data technologies in academic settings. These challenges include
data privacy and security concerns, data quality and integration issues, and the need
for skilled data analysts and IT infrastructure. Strategies and best practices for
overcoming these challenges are discussed, highlighting the importance of
establishing robust data governance frameworks and ensuring compliance with
relevant data protection regulations.
Furthermore, this paper presents case studies and real-world examples of academic
institutions that have successfully implemented Big Data technologies to improve
operational efficiency. These examples demonstrate how data-driven insights have led
to enhanced student outcomes, streamlined administrative processes, and improved
resource utilization.
3
must be given to data privacy and security concerns, data quality assurance, and the
development of necessary technical and analytical capabilities to fully realize the
benefits of Big Data in academia.
4
TABLE OF CONTENS
I. INTRODUCTION....................................................................................................7
1. Project purpose..................................................................................................7
II. Devise comprehensive project plans for a chosen scenario, including a work
and resource allocation breakdown using appropriate tools. (P5)........................10
1. Project Overview:...................................................................................................10
4. Work timeline:........................................................................................................24
3. Project recommendation........................................................................................40
V. Present arguments for the planning decisions made when developing the
project plans (P7).......................................................................................................44
VI. Discuss accuracy and reliability of the different research methods applied
(P8)...............................................................................................................................47
VII. Assess the extent to which the project recommendations meet the needs of
the identified organisation, including fully supported rationales for planning
decisions made (M4)...................................................................................................49
VIII. CONCLUSION.................................................................................................50
5
IX. REFERENCE.......................................................................................................51
6
I. INTRODUCTION
From the data I researched and analyzed qualitative data and quantitative data in ASM1, I noticed
common concerns that students are having related to data quality, especially the issue of risk Cyber
security in terms of data quality when deploying Big Data technology in a world study environment.
This research delves into the important intersection between Big Data storage systems and
cybersecurity risks. The growing importance of Big Data in business brings serious threats to data
security, putting companies and individuals at risk. The misuse of personal data and the rise in
sophisticated cyberattacks highlight the complexity of cybersecurity challenges. The report highlights
the urgent need to understand and address the cybersecurity risks associated with deploying Big Data
technology in academic environments. The increasing volume of data, combined with inadequate
awareness and the potential for misuse, creates vulnerabilities that pose risks to cybersecurity. The
analysis includes evolving attack methods, exploited vulnerabilities, and changes in data security
threats over time. In addition to highlighting current challenges, the report also predicts future dangers
arising from technological advances, emphasizing the importance of protecting critical data and
systems. Solutions and limitations to mitigate these security risks are explored with the aim of
providing a comprehensive and secure approach. The study not only provides an overview of
cybersecurity risks in local and/or cloud-based Big Data systems but also suggests strategies to avoid
risks and solve problems quickly. comprehensive way. Overall, the report contributes to understanding
the evolving landscape of cybersecurity risks in the context of Big Data storage systems and highlights
the need for continuous improvements in security capabilities.
1. Project purpose.
My project in the field of Academic are designed with the main aim of improving the quality of
education and research, and supporting political and social decisions through the use of Big data
in the field of education. Below are the detailed purposes of the project:
- Purpose: Create data sources and tools to support research and development in various
academic fields.Media: Process data to produce reports, research articles, and scholarly
7
resources that support the research community.
Political and Social Decision Support:
- Purpose: Use data to provide academic information to support political and social decisions
in the field of education.
- Means: Analyze data on academic performance, educational quality, and other
educational issues to make assessments and policy recommendations.
Explore New Thinking and Creative Perspectives:
- Purpose: Search and develop new aspects in the academic field through the use of big data.
- Means: Analyze data to identify trends, relationships, and creative thinking abilities,
thereby creating new ideas and different perspectives.
This project's main aim is to make a positive contribution to the academic field, providing tools
to support both teaching and research processes, and supporting political and social decisions in
improving the system education.
My project, focusing on the Academic field, has a detailed and complete goal to meet the needs
and make a positive contribution to the education and research community. Below are details of
the project's goals:
8
- Goal: Use data to provide academic information to support political and social
decisions in making policies and decisions in the field of education.
- Implementation Plan: Analyze data related to educational quality, learning
motivation, and specific educational issues to make assessments and propose
educational policies.
Explore New Thinking and Creative Perspectives:
- Goal: Find and develop new aspects in the academic field through the use of
big data to discover trends and creative thinking.
- Implementation Plan: Use data analytics to identify unknown connections,
trends, and thereby generate new ideas and innovative perspectives in the
academic field.
Creating Smart Tools for Educational Management:
- Goal: Develop an application or tool that uses artificial intelligence to support
educational management, make performance predictions and suggest improvement
measures.
- Implementation Plan: Use machine learning algorithms to predict academic
performance, provide suggestions for improving educational quality, and support
school management.
In short, the project's goal is to leverage the power of big data to improve the quality of education,
support academic research and development, and provide academic information to support political
and economic decisions. society in the field of education.
9
II. Devise comprehensive project plans for a chosen scenario, including a work and resource
allocation breakdown using appropriate tools. (P5)
1. Project Overview:
MAIN TARGET :This project focuses on researching and overcoming cybersecurity risks related to
deploying Big Data technology in academic environments. Main goals include:
Target:
- Identify and analyze current cybersecurity risks for big data storage systems (Big Data) both
local and cloud.
- Assess the severity of each risk and their impact on the entire system.
Local Storage:
- Possibility of Data Loss:
- Risks due to hardware errors or damage leading to data loss.
- Internal Network Attack:
- Risk from internal employees who may intend to sabotage or steal information.
Cloud Storage:
- Violation of Access Management:
- Risks from not controlling access to data in the cloud environment.
- Cloud Service Attack:
- Risks from targeted attacks on cloud infrastructure.
Conclude: Risk assessment is an important step in understanding the threats facing big data storage
systems. Through this assessment, we can prioritize and implement preventative measures to
maximize the protection of critical information.
Target:
- Research the historical development of cybersecurity risks related to big data storage systems
(Big Data).
- Understand how risks change over time and identify the key points influencing these
developments.
Establishment Period (Before 2010): Understand the origins and early development of big
data storage systems.
Acceleration Period (2010-2015): Identify new business models and significant increases in
data capacity and scale.
Cloud Transition (2015-2020): Research the transition from local to cloud storage and its
impact on cybersecurity.
Rising Challenges (2020- present): Assesses emerging challenges, including increasing scale
and complexity of attacks.
Prepare a detailed report analyzing historical developments and the most important insights.
Share reports with stakeholders and dialogue to ensure common understanding and
engagement in aligning cybersecurity strategy.
Conclude:
Analyzing the historical evolution of cybersecurity risks in the big data storage sector will
provide an in-depth understanding of risk and volatility in the industry. This helps
organizations be better prepared and more effective in facing today's cybersecurity challenges.
Target:
- Predict potential future cybersecurity risks associated with large data storage systems.
- Consider technological advances and industry trends that may impact cybersecurity.
The Evolution of Storage Technology: Assess the evolution of big data storage technology
and how it may create new risks.
Mobile Trends: Analyzing the impact of mobile trends on the cybersecurity of big data
storage systems.
The Rise of Artificial Intelligence (AI) and Machine Learning: Examines how AI and
machine learning can create both new risks and security solutions.
Internet of Things (IoT): Assessing the impact of IoT developments on the cybersecurity of
big data storage systems.
Blockchain and Data Security: Consider how blockchain can help increase data security while
also creating new risks.
Technology Intersection: Analyze the intersection of new technologies and how it can create
new risk situations.
Target: Identify and implement security measures to mitigate current risks and prevent future
vulnerabilities to big data storage systems.
Data Encryption: Apply full data encryption during transmission and storage to prevent
unauthorized access.
Firewall and Virtual Private Network (VPN): Use a firewall and connect via VPN to protect
your network from outside attacks.
Recommended System Updates: Ensure that systems are kept up to date with the
latest security patches to protect against known vulnerabilities.
Cloud Access Control: Strictly manage access to data in the cloud environment.
Data Encryption in the Cloud: Use data encryption in the cloud environment to protect
important information.
Recommended System Backup: Organize a regular backup mode to ensure data safety and
quick recovery after incidents.
Periodic Tests: Perform periodic tests to ensure that the backup process is working properly
and that data is recoverable.
Periodic Security Reviews: Organize periodic security reviews to ensure that security
measures remain effective.
Conclude:
These security measures aim to increase the security of large data storage systems, protect
critical information and minimize risks from both internal users and external attacks. Regular
monitoring, evaluation, and updating processes will help maintain the safety and effectiveness
of your security strategy.
IMPLEMENTATION PLAN:
RESEARCHERS:
Team Leader:
Team Supports :
Duties: Identify and analyze large data storage structures, recommend improvements to the storage
system.
Mission: Research and deploy security solutions for cloud environments, ensuring compatibility.
Task: Analyze specifically the structure and relationships between data in the system.
PROJECT SCHEDULE:
CONCLUDE: This project aims to extensively research cybersecurity risks associated with large data
storage systems (both local and cloud) in academic environments. Understanding the evolution of risks
over time and predicting future risks will help develop effective security measures to protect important
information. The schedule is designed to ensure project integrity and feasibility.
Project: Cybersecurity risks associated with local and cloud-based big data storage systems in
academic environments.
Project objectives:
Research and evaluate current cybersecurity risks in large data storage systems both locally and in the
cloud.
Analyze existing types of attacks and security vulnerabilities.
Research the historical development of risks to understand changes and adjustments in attack methods.
Anticipate potential future cybersecurity risks, considering technological advances and industry trends.
Security Measures:
Identify necessary security measures to mitigate current risks and prevent future vulnerabilities.
Project scope:
Store and analyze data from the organization's large data storage systems, both local and cloud.
Prevention System:
Deliverables:
Diagnose and mitigate current risks, while predicting and preparing for future risks.
Propose specific plans to improve the security of large data storage systems.
WBS (Work Breakdown Structure) is an important tool in project management, helping to divide large
work into smaller parts for easy management and control. Represented hierarchical tree, each node in
the WBS represents a specific part of the project. The application of WBS helps project managers have
an overview of the scope of work, and helps to optimize the use of resources, time and budget. Thanks
to WBS, project management becomes more effective, helping to ensure project progress and achieve
successful results according to original goals. (DEVI & REDDY, 2012)
The WBS is a valuable tool for project managers because it helps them to:
Define the scope of the project: The WBS helps to ensure that all of the workrequired to complete
the project is identified and included.
Estimate the cost and duration of the project: The WBS can be used to estimate the resources and
time required to complete each work package, which can then be used to create a project schedule
and budget.
Assign tasks and responsibilities: The WBS can be used to assign tasks and responsibilities to team
members or teams.
Track progress and identify risks: The WBS can be used to track the progress of the project and
identify any potential risks or problems early on.
The WBS is a living document that should be updated as needed throughout the project. As the
project progresses, the WBS can be used to track progress, identify and manage risks, and make
necessary adjustments to the project plan.
The purpose of a work breakdown structure (WBS) is to help project managers define, organize,
and manage the work required to complete a project. It is a hierarchical decomposition of the project
into smaller, more manageable work packages. The WBS helps project managers to:
Define the scope of the project: The WBS helps to ensure that all of the work required to complete
the project is identified and included. This can help to prevent scope creep, which is when the
scope of the project grows uncontrollably, leading to delays and increased costs.
Estimate the cost and duration of the project: The WBS can be used to estimate the resources and
time required to complete each work package. This information can then be used to create a
project schedule and budget.
Assign tasks and responsibilities: The WBS can be used to assign tasks and responsibilities to team
members or teams. This helps to ensure that everyone knows what they are responsible for and that
there is no duplication of effort.
Track progress and identify risks: The WBS can be used to track the progress of the project and
identify any potential risks or problems early on. This allows project managers to take corrective
action before the problems become too serious.
Improve communication and collaboration: The WBS can be used to communicate the project
scope and plan to all stakeholders. This can help to improve understanding and alignment, and
reduce the risk of misunderstandings and conflict.
Facilitate change management: The WBS can be used to manage changes to the project scope,
schedule, or budget. By breaking down the project into smaller work packages, it is easier to
identify and assess the impact of changes.
Provide a basis for project control: The WBS can be used to track the progress of the project and
measure performance against the project plan. This information can be used to make necessary
adjustments to the plan and ensure that the project stays on track.Overall, the WBS is a valuable
tool for project managers of all types of projects. It can help to improve efficiency, effectiveness,
and communication, and increase the chances of project success.
To create a WBS for your project, you’ll need information from other project management documents.
Your project goals and objectives set the rules for defining your project scope. Your project scope,
team members, goals and objectives should be documented on your project charter.
The next level down is the project phases: break the larger project scope statement into a series of
phases that will take it from conception to completion. You can also create control accounts, which are
task categories for different work areas you want to keep track of.
What are your project deliverables? List them all and note the work needed for those project
deliverables to be deemed successfully delivered (sub-deliverables, work packages, resources,
participants, etc.)
The WBS levels are what make a work breakdown structure a “hierarchical deconstruction of your
project scope”, as defined by the project management institute in its project management body of
knowledge book (PMBOK). You’ll need to start at the final project deliverable and think about all the
deliverables and work packages needed to get there from the start.
Take your deliverables from above and break them down into every single task and sub task that is
necessary to deliver them. Group those into work packages.
With the tasks now laid out, assign them to your project team. Give each team member the work
management tools, resources and authority they need to get the job done.
3.2. Apply WBS into project
As project manager, I created a Work Breakdown Structure (WBS). The WBS breaks the project into
smaller, more manageable tasks and provides a clear structure for project planning and analysis. Here
is the professional WBS for the project:
Initial project
Collect Data
- Data Collection
- Make Recommendations
Data Analysis
- Detailed tasks
- Summarize Findings
Toss in Recommendations
Completed Report
- Review Data Collection Results
By breaking down the project into these specific phases and tasks, the WBS provides a structured
approach to project management, ensuring clarity, efficiency, and effective analysis. Each phase has a
defined duration, allowing for better time management and resource allocation.
4. Work timeline:
A project management tool called Gantt is used to visualize project timetables as bar charts. The start
and finish dates of the project's tasks, as well as their relationships, are shown using Gantt charts. This
project management tool, created by Henry Gantt in the 1910s, has grown in popularity because it
makes it simpler to plan, monitor progress, and modify tasks. Gantt charts offer a high- level picture of
the project process and are an effective tool for making sure projects are finished quickly and
effectively. (Wilson, 2003)
Horizontal bars that indicate individual jobs or activities are often aligned along the vertical axis that
depicts the time frame in the chart. The task's duration is represented by the length of each bar, and the
bars are arranged according to the start and finish dates of the task. Linking lines connecting the bars
are frequently used to highlight dependencies between tasks, demonstrating the order in which they
must be done.
Project managers may more effectively distribute resources and team members can better grasp their
responsibilities and deadlines thanks to Gantt charts, which provide a visual approach to convey
project timelines. They are an effective tool for organizing, managing, and keeping track of projects of
all sizes and levels of complexity. Project stakeholders can monitor project progress and make any
necessary adjustments or revisions in response to changes in the project's needs or time frame with the
aid of Gantt charts.
System identification:
Target: Store and analyze data from institutional big data storage systems both locally and in the cloud in academic
environments.
Specific work:
Identify Data Sources: Evaluate and identify data sources from local and cloud storage systems.
Database Analysis: Create database analysis models to understand the structure and relationships
between components.
Build Storage Process: Develop effective data storage process for both local and cloud.
Compatibility:
Target: Ensure compatibility between storage systems and other elements in the IT infrastructure.
Specific work:
Check Current Compatibility: Perform checks on current compatibility between systems and other
components in the IT infrastructure.
Adjust Link Protocol: If necessary, adjust link protocol to ensure compatibility between systems.
Perform Compatibility Testing: Organize tests to ensure compatibility under different conditions.
Prevention system:
Specific work:
Current Risk Assessment: Analyze and evaluate current cybersecurity risks in data storage
systems.
Build Security Measures: Develop security measures such as encryption, access management to
deal with identified risks.
Evaluate:
Research results:
We have made significant progress on this project, successfully completing the Initiation of Meetings
stages (100%). We have also made progress in the phase of defining the mission, key characteristics
and areas of activity. However, the stages of assessing cyber security risks related to local big data
systems are still incomplete and have not achieved the highest targets, followed by proposed security
measures and planning. The improvement plan has not yet achieved the target (100%) in its entirety.
Finally, we have not yet completed the Review meetings here.
Start (100% completed): We have set up and prepared the meeting content, Deployed the meeting,
Prepared meeting minutes on the issue of network security risks related to the local big data system
completed excellently
Identify main characteristics and areas of activity (96% completed): We have identified the main
characteristics of the project and the project's areas of activity in a meticulous and effective manner.
This section details the collection of relevant information, classification of characteristics and areas of
activity, and also mapping the scope of the project's area of operation.
Assessing cybersecurity risks related to local big data (91.6% completed): Thanks to identifying the
main characteristics of the project, and the project's operational areas in a detailed manner.
meticulously, we have been able to research and evaluate cybersecurity risks related to local big data
quite excellently, here we have completed the risk identification to achieve ( 100%) and assess the
severity of the problem (90%) and classify risks according to severity (85%).
Identify security measures (90% complete): Progress has been made in testing existing system errors
(100%), identifying necessary measures (100%), and analyzing achieved priorities quite good (70%)
Improvement planning (91.6% completed): We have collected feedback fully and achieved (100%),
next is about building plans Improvement from feedback is achieved (95%) and finally, discussing and
confirming the plan with your operations team is achieved (80%).
Reviewing the meeting successfully (8.3%): Here, we have only completed a small part of the content
of the meeting to summarize the issue successfully (25%), as for the implementation of the summary
meeting. We have not yet completed the conclusion and preparation of summary meeting minutes
Prioritize the planning phase of meetings, identify project characteristics and areas of activity,
evaluate project plans, and analyze findings to understand the true scope of the project and provide
information for the remaining stages. Overall we are off to a good start but there is still much work
ahead. By focusing on ensuring cybersecurity measures related to local big data systems, creating
improvement plans and completing the final step is to summarize your project.
Regarding this part, from the data I researched and analyzed qualitative data in ASM1, I noticed
common concerns that students are having related to data quality, especially the issue of risk Cyber
security in terms of data quality when deploying Big Data technology in a world study environment.
To be able to qualitatively analyze cybersecurity risks associated with local Big Data storage systems,
we need to qualitatively analyze cybersecurity risks associated with local Big Data storage systems . It
helps us understand security issues and challenges our systems may face. In addition, we need to ask
some qualitative questions about this issue and survey the number of respondents in each question.
Below are some of the contents and questions I gave for everyone to answer.
What security measures are in place to ensure that only authorized people have access to local big
data?
How do you ensure proper access rights management and track access usage?
Answer A: Identify and clearly state access rights (21 people chose)
Answer C: Use an access rights management system (ACL) (30 people chose)
How to identify and prevent potential security vulnerabilities in big data storage systems?
How do you ensure that all software and operating systems are up to date and secure?
How to protect large data storage systems from DDoS attacks or network intrusions?
How to ensure that the system is scalable to meet future large data storage needs?
How does the organization analyze risks and ensure compliance with relevant cybersecurity standards?
I will analyze qualitative data on cybersecurity risks related to big data systems in a detailed and
understandable way as follows, through research as well as evaluation of the answers. Thanks to
everyone's feedback, I was able to briefly analyze this data:
Conclusion: The majority of participants (50%) support the adoption of "Access Rights
Management" as a key measure to ensure only authorized people have access to big data.
- Manage and track access usage:
Conclusion: The selection of “All of the above” (70%) demonstrates consistency in combining
multiple measures toensure effective access management and monitoring.
Data leak:
Conclusion: Combining "Security scanning and vulnerability testing" with "Applying security
updates" was supported by 50% of participants, demonstrating awareness of the importance of
combining these measures. it's France.
Conclusion: The high preference rate for "All of the above" (70%) shows that participants are
aware of the importance of using log systems, data standards, and alerts for monitoring and detect
data breaches.
Data management:
Conclusion: Selecting “All of the above” (50%) demonstrates consistency in combining multiple
measures such as identifying critical data, selecting storage media, and checking integrity to ensure
Ensure safe and effective data backup.
Conclusion: The high priority rate for "All of the above" (60%) shows consistency in developing a
recovery plan, testing, and validating backup data.
Conclusion: The high consistency of “All of the above” (70%) demonstrates a sense of incorporating
periodic updates, automation, and update monitoring to ensure software security. soft.
Conclusion: High consistency for “All of the above” (70%) shows a sense of integration in identifying
trainingcontent, building training programs, and customizing training for each role .
System expandability:
Conclusion: High consistency for “All of the above” (60%) demonstrates awareness of combining
measures such as system design, use of cloud technology and use of object storage to ensure ensure system
scalability.
Conclusion: High consistency for “All of the above” (60%) demonstrates awareness of combining
standardization,risk analysis, and identification of safeguards to ensure follow.
In short, the qualitative data demonstrates consistency and a high awareness of the importance of
combining multiple measures to ensure cybersecurity and data management. Attention should be paid to
implementing integrated measures to face the diverse and complex challenges in the field of cybersecurity
and data management. Understand the specific risks that lead to network security system failures, Identify
weaknesses in data management and network security processes. Identify improvement measures as a
result of qualitative analysis that will recommend specific improvement measures to reduce or eliminate
cybersecurity risks.
Create an improvement plan: Based on the results of the qualitative analysis, the organization can create a
specific cybersecurity improvement plan. Enhance compliance and monitoring: Qualitative analytics helps
improve compliance with cybersecurity standards and regulations and increase cybersecurity awareness.
Big data storage systems are increasingly used by organizations to store and process large volumes of data,
but they also pose significant cybersecurity risks, especially in local systems or based on a large cloud, we
simply understand the reason why special cybersecurity risks related to this large data occur is because
important data and information are always stored here. Therefore, quantitative analysis of these risks is
very important to ensure the organization's information security and confidentiality. Here are some major
data security risks:
A DDoS attack can cause data storage systems to become larger but inactive by loading network
resources
Risks of malicious code: Big data often contains a lot of important information and malicious attacks can
lead to data loss or dissemination.
Risks of access management: Proper access management to data is extremely important. Deficiencies in
access control and monitoring can lead to intrusions and data leaks.
Risks from security warehouse: Big data often requires many different systems and applications, which
creates weaknesses if one of them has a security hole.
Coding risks: If large data is not encrypted then it can be accessed correctly on the left.
Risks from employees and talent: Employees can be a source of risk when they do not comply with
security rules or intentionally violate public relations. Talents can also leave the organization and get
important information.
Data quality risks: Big data can contain errors and noise that lead to inaccurate or distorted data.
Risks from data backup: Large data backups may not be executed properly or fail to ensure data security
and recovery.
Risks from lack of management data: Managing big data requires a strategic tool. Lack of initiative and
data management can lead to loss and leakage of important information.
Risks related to prescribed minerals: Organizations need to integrate data security regulations, including
GDPR, HIPAA or other industry-specific rules. Deficiencies in work can lead to legal and financial
consequences.
After identifying the risks above, we begin to analyze and evaluate the risks, collect data and figures
related to the risks so that we can detect them early. Which is the most important to promptly prevent
and thoroughly overcome? Below are the steps to identify risks, as well as some statistics on
cybersecurity risks related to data systems large local data:
First and foremost, we must determine which data is most likely to be attacked and have the most
vulnerabilities.
Next is the need to determine what those risks are: cyber attacks, malware infection or data theft,
etc.
Then it is necessary to evaluate the attack capabilities. The next stage is to evaluate the attacker's
ability to exploit the vulnerability. This can be done using a variety of approaches, including
historical data, expert opinions, and attack vectors.
Assess the impact of attacks The third phase is to assess the impact of attacks on assets. This can
be done by taking into account issues such as data breach costs, reputational damage and
regulatory fines.
According to the statistics we have learned, cyber attacks related to local large data systems involve
many aspects, it can include types of attacks as well as the number of vulnerabilities. empty etc...
specifically as follows:
Number of daily attacks: On average, local big data storage systems record about 50-100 cyber attacks
daily.
Denial of service (DoS) attacks: Accounts for about 15% of total daily attacks.
Attacks exploiting security vulnerabilities: Account for about 10% of total daily attacks.
On average, there are about 20-30 security vulnerabilities discovered every month on local big data
storage systems.
Percentage of attacks detected and blocked before causing damage: About 60% of all attacks are detected
and blocked before causing serious damage.
In addition, we also collect some other data related to this issue as follows:
In 2021, global cybercrime losses will be $16.4 billion per day, $684.9 million per hour, $11 million per
minute and $190,000 per second.
Total internet outages would result in a daily GDP loss of 1.9% for a country with strong connectivity and
a daily loss of 0.4% for a country with poor connectivity.
In the United States, the chance of finding and convicting the perpetrator of a cyber attack is 0.05%.
By 2021, 70% of bitcoin transactions will be linked to or used for criminal activities.
In 2019, attacks on IoT devices increased by 300%.The FBI's Cyber Most Wanted List includes 102
notorious criminals who are believed to have committed a series of cyber crimes that have harmed and
cost individuals and companies billions of dollars to date April 2021.
Global ransomware costs are $21 billion, with phishing, cyber intrusions, accidental disclosures, stolen
devices or data, and system misconfigurations being the most common forms of attack in the USA.
Unauthorized online and mobile advertising costs the world 44 billion USD.
Customers stay away from companies experiencing cyber attacks, with the average time between attacks
being 11 seconds.
Organizations are increasingly using big data storage systems to store and analyze huge volumes of
data, but they also pose a major cybersecurity threat, especially in local or local systems. Massive
cloud-based. Quantitative risk analysis is critical to protect the safety and security of your
organization's information. Here are some major data security threats:
Global ransomware costs are $21 billion, with public companies accounting for 38% of intrusions in the
United States.
Ransomware mainly affects public companies, with SaaS being the most vulnerable.
Customers avoid businesses subject to cyber attacks 59% of the time, with 70% feeling that businesses
have not done much to secure their personal information.
More than half of all cyber attacks target small and medium-sized businesses, with 60% failing within six
months.
With a 12% CAGR in cybersecurity IT spending, the average cost of a data breach in 2020 was $3.86
million.
The standard deviation of a data collection is a measure of the dispersion of values around the mean.
The larger the standard deviation, the wider the range of values in the data collection. The standard
deviation of various statistics for cybercrime data is determined as follows:
Global ransomware costs are $2.2 billion, of which 10% of intrusions are ransomware.
There are 1,200 industries most affected by malware, with the internet most affected by phishing (10.2%).
Customers stay away from companies experiencing cyber attacks, with the average time between attacks
being 10 seconds.
From the above information, I will briefly analyze quantitative data and draw specific conclusions
as follows:
Overview: The data identifies that big data storage systems are facing significant cybersecurity risks.
DDoS Attacks: Account for 30% of all daily cyber attacks, threatening to increase system size but not
working.
Malware Risk: Big data contains a lot of important information, facing the risk of loss or uncontrolled
circulation.
Access Management Risks: Deficiencies in access control and monitoring can lead to data breaches and
leaks.
Security Store Risk: Large systems require many different systems and applications, creating weaknesses
if one of them has a security hole.
Employee and Talent Risk: Employees can be a source of risk when they do not comply with security
regulations or intentionally violate them.
Data Quality Risks: Big data can contain errors and noise, leading to inaccurate information.
Data Backup Risks: Improper backup can lead to loss and poor recovery.
Data Management Risks: Lack of management can lead to loss and leakage of information.
Regulatory Risks: Need to integrate data security regulations such as GDPR, HIPAA to avoid legal and
financial consequences.
Identify Critical Data: Must determine which data is most likely to be attacked and has the most
vulnerabilities.
Risk Type: Classify cyber attacks, malware infections, and data theft to identify specific risks.
Attack Potential: Assess an attacker's ability to exploit a vulnerability using a variety of approaches, using
historical data and expert opinion.
Impact of the Attack: Assess the impact in terms of data breach costs, reputational damage, and regulatory
penalties.
Daily Data: On average, there are 50-100 cyber attacks per day. DDoS attacks account for 30%, malware
attacks 20%, denial of service (DoS) attacks 15%, security vulnerability exploitation attacks 10%, other
attacks 25%.
Security Vulnerabilities: Every month, about 20-30 security vulnerabilities are discovered.
Loss Statistics: Global losses from cybercrime are $16.4 billion per day. GDP loss is 1.9% daily for a
strongly connected country.
Ransomware Cost:
Analysis: This cost poses a serious problem and can have a major impact on a business's finances. A
strong security strategy is needed to prevent ransomware attacks.
70% feel that businesses do not ensure the security of personal information.
60% of cyber attacks target small and medium businesses with a 60% failure rate
within six months.
Analysis: The short time between attacks is a major challenge. Customers are
increasingly sensitive to information security, placing high demands on security
and demonstrating care for their data.
Data:
Analysis: The high cost of each data breach demonstrates the severity of the
consequences and the level of investment needed in cyber security. A high
standard deviation indicates large variation in costs, which may stem from the
diversity of attacks.
Data:
Global ransomware costs were $21 billion, with 38% of US intrusions involving
public companies.
Analysis: The rise in ransomware costs and the particular impact on public and
SaaS companies requires effective and ongoing security measures.
The conclusion is as follows: quantitative research data indicates that cyber security
threats and associated costs for businesses are high risk. Faced with challenges
ranging from short time between attacks to customer avoidance, businesses need a
39
comprehensive cybersecurity strategy. The diversity in the data suggests the
complexity and variability of the attacks. To protect information and maintain trust,
businesses need to invest in alerting, containment, and emergency recovery, along
with ongoing upgrades to security measures.
3. Project recommendation
This project highlights the issue of cybersecurity risks related to large data storage
systems. For non-technical people, the project introduces the problem in a simple way
and provides an effective solution for protecting important data.
Big data storage systems are important milestones in every field, but are also prime
targets for hackers and security attackers. Personal data and important information can
be stolen, threatening cybersecurity and causing serious consequences for individuals
and businesses.
Security Solution:
40
Future and Expansion:
Predict Future Trends: Predict future trends in cybersecurity and big data storage
systems.
Scaling Solutions: Propose solutions to maintain security when the system expands.
Risk assessment:
Identify common risks such as data loss, cyber attacks and misuse of personal
information.
Security Solution:
Instructions on how to deploy the solution, including the implementation process and
testing for effectiveness.
Consider new attack methods such as zero-day attacks and social engineering.
Extended Solution
41
Suggest ways to expand the system while still maintaining high security.
For this part I will propose a project for listeners who are technical people
This project is aimed at technical experts with the goal of improving cybersecurity for
large data storage systems. The mission is to deliver superior technical solutions to
prevent potential cybersecurity threats and protect critical information.
Big data storage systems are facing increasingly complex cybersecurity challenges,
including zero-day attacks, advanced persistent threats (APT), and new attack
techniques that are constantly emerging.
Infrastructure Check
Security Solution
Data encrypt
42
Build and deploy a strong data encryption system.
Decentralized Management
Infrastructure Check
Research new attack techniques and classify them according to danger level.
Security Solution:
Data encrypt
Deploy a strong data encryption solution with the most advanced algorithms.
Decentralized Management
43
Solution Performance Evaluation
Use performance assessment tools to ensure the solution is robust and efficient.
Develop scalable systems to cope with the increasing complexity of the cybersecurity
environment.
Expected Benefits:
Effective Solution:
Provides effective and in-depth security solutions for large data storage systems.
Enhance performance:
Technology Leadership:
V. Present arguments for the planning decisions made when developing the
project plans (P7)
The first is for the argument for project planning
Title: cybersecurity risks related to big data systems
44
The rapid advancement of big data has revolutionized many different aspects of our
lives, bringing many benefits and growth opportunities, and almost in all fields have
to use the system. big data system to be able to work. However, it also poses
cybersecurity risks. This essay explores the project manager's role in addressing these
concerns and presents a comprehensive plan to mitigate and prevent cybersecurity
risks associated with local big data system. By applying effective risk assessment,
research, and finding gaps in cybersecurity risks. However, this transformation has
unforeseen consequences, including an increase in cyber security risks. network
security vulnerabilities. As a project manager, I find myself at the forefront of an
endeavor that is challenging and difficult but in return will provide me with profound
experiences. This essay delves into the details of the project, highlighting the goals,
key tasks, risk management strategy, research methodology, and comprehensive plan
for managing cybersecurity risks. Through effective project management processes
and a dedicated team, we aim to provide practical recommendations to promote
activities to strengthen cyber security measures related to data systems. safely grow
locally.
Project overview:
The project starts in September 2023, focusing on the main stages: conducting
meetings to be able to define project goals and develop mitigation plans as well as
implementation and monitoring closed afterwards. The first stage lasts from
September 1, 2023 to September 15, 2023, including the development of meetings
and identification of areas of activity.
The next phase, from September 16, 2023 to September 30, 2023, includes conducting
a cybersecurity risk assessment related to local big data systems and security
measures to reduce minimize problems.
Assess risks and develop mitigation plans:
During this Phase, our team embarked on a thorough risk assessment to identify
cybersecurity risks and their potential impact. We used a mixed methods approach,
combining quantitative and qualitative data collection methods. Primary data was
collected through surveys and interviews with digital transformation and
cybersecurity experts, while secondary data was obtained from reputable sources such
as academic journals and reports from government. This approach allows us to gather
45
valuable insights into the current cybersecurity landscape and potential vulnerabilities.
Following the risk assessment, we assessed the severity of each identified risk and
developed a comprehensive risk mitigation plan. This plan includes appropriate
measures for each risk, targeting technical, procedural and policy aspects. The plan
emphasizes implementing strict security measures, regular vulnerability assessments,
and establishing protocols for incident response and remediation.
Implement and monitor risk mitigation plans:
Phase 2 includes implementing the risk mitigation plan and planning for risk
mitigation improvements. We have collected relevant information by interviewing
and researching press information. From there, we can analyze where the gaps are,
and finally make plans to overcome current risks. Throughout the project, we have
identified the risks. have the ability to hinder progress, and divide the severity of each
risk to determine which is the most serious. Additionally, we established a final report
writing and presentation schedule to ensure timely dissemination of our findings to
stakeholders.
Next is project planning assessment
For this part, the project plan will include many different important components, have
been thoroughly evaluated and be well structured, comprehensive and consistent with
the project goals. In this detailed review, I will go deeper into the project plan
including all the work that I did in the above project. By applying research methods
including quantitative data collection methods. Quantitative and qualitative, we
ensure a deep understanding of the current cybersecurity landscape related to big data
systems. Incorporating primary data obtained through surveys and interviews with
industry experts will enhance the reliability and validity of the findings. The plan
includes appropriate measures for each identified risk, covering a variety of aspects.
This multi-faceted approach ensures that mitigation measures can address many
potential vulnerabilities, thereby significantly improving the overall cybersecurity
posture. Moving forward Establishing a risk database dedicated risk, serving as a
centralized repository to store and track cybersecurity risks, facilitating systematic
and organized monitoring and assessment. By continuously monitoring and evaluating
the measures implemented, our project underlines our commitment to maintaining a
strong and resilient cybersecurity framework.
46
In summary, the project plan demonstrates high professionalism, strategic thinking
and meticulous attention to detail. Comprehensive risk assessment, appropriate risk
mitigation plans, and ongoing monitoring and evaluation. By following defined
project management processes and leveraging our team's expertise, our projects are
perfectly positioned to address the environmental impact and cybersecurity risks
associated with comprehensive, sustainable and flexible digital transformation.
VI. Discuss accuracy and reliability of the different research methods applied
(P8)
Qualitative research:
Characteristic:
Quantitative research:
Characteristic:
47
Qualitative research Advantage Defect
Quantitative research Advantage Defect
The Potential for Measurement
Suitable for Deep Understand Context and
and Reconciliation Loss
Measurement and Analysis ofSubjective
Understanding. ResultsRelationships.
are easy to compare Important details in data may be
May Be Limited.
Digital Data. and contrast. missed.
48
Random Samples Are Not
Ability to Consensus. Representative of the Entire
Population.
Summary:
In total, the use of all three methods increases the integrity and accuracy of the study.
VII. Assess the extent to which the project recommendations meet the needs of
the identified organisation, including fully supported rationales for planning
decisions made (M4)
VIII. CONCLUSION
49
IX. REFERENCE
50