Asm 2 66
Asm 2 66
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand
that making a false declaration is a form of malpractice.
Student’s signature CUONG
Grading grid
P5 P6 P7 P8 M3 M4 D2
❒ Summative Feedback: ❒ Resubmission Feedback:
1. Project purpose:
Our projects in the field of Academic are designed with the main aim of improving the quality of
education and research, and supporting political and social decisions through the use of big data. .
Below are the detailed purposes of the project:
Our project, focusing on the Academic field, has a detailed and complete goal to meet the needs and
make a positive contribution to the education and research community. Below are details of the
project's goals:
MAIN TARGET
This project focuses on researching and evaluating cybersecurity risks related to large data storage
systems on both local and cloud. Main goals include:
Target:
- Identify and analyze current cybersecurity risks for big data storage systems (Big Data) both local and
cloud.
- Assess the severity of each risk and their impact on the entire system.
Local Storage:
- Possibility of Data Loss:
- Risks due to hardware errors or damage leading to data loss.
- Internal Network Attack:
- Risk from internal employees who may intend to sabotage or steal information.
Cloud Storage:
- Violation of Access Management:
- Risks from not controlling access to data in the cloud environment.
- Cloud Service Attack:
- Risks from targeted attacks on cloud infrastructure.
Step 3: Assess Severity
Determine Evaluation Criteria:
- Evaluated according to criteria such as economic impact, reputation, and legal compliance.
Severity Rating:
- Determine the severity of each risk based on assessment criteria.
- Prioritize risks with high severity.
Step 4: Build an Evaluation Table
- Summary of severity assessment results and detailed analysis for each risk.
- Develop a risk assessment report to share with stakeholders and recommend specific preventive
measures.
- Recommend specific preventive measures for each risk to minimize their severity and risk of
occurrence.
- List the limitations and potential risks when implementing preventative measures.
Conclude:
Risk assessment is an important step in understanding the threats facing big data storage systems.
Through this assessment, we can prioritize and implement preventative measures to maximize the
protection of critical information.
PROJECT SCOPE:
SYSTEM IDENIFICATION:
Target: Store and analyze data from the organization's large data storage systems both locally
and in the cloud.
Specific work:
Identify Data Sources: Evaluate and identify data sources from local and cloud storage systems.
Database Analysis: Create database analysis models to understand the structure and relationships
between components.
Build Storage Process: Develop effective data storage process for both local and cloud.
COMPATIBILITY:
Target: Ensure compatibility between storage systems and other elements in the IT infrastructure.
Specific work:
Check Current Compatibility: Perform checks on current compatibility between systems and other
components in the IT infrastructure.
Adjust Link Protocol: If necessary, adjust link protocol to ensure compatibility between systems.
Perform Compatibility Testing: Organize tests to ensure compatibility under different conditions.
PREVENTION SYSTEM:
EVALUATE:
Research results:
- Evaluate the success of data storage and analysis.
- Check compatibility between systems and other elements.
- Evaluate the performance of preventive measures and make improvements if necessary.
Rapport and Communication:
- Prepare detailed reports on results and suggestions for improvement.
- Communicate with stakeholders to share information and receive feedback.
IMPLEMENTATION PLAN:
RESEARCHERS:
Team Leader: