0% found this document useful (0 votes)
34 views10 pages

Asm 2 66

Uploaded by

vucuong1024
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views10 pages

Asm 2 66

Uploaded by

vucuong1024
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

ASSIGNMENT 2 FRONT SHEET

Qualification BTEC Level 5 HND Diploma in Computing


Unit number and title Unit 06: Planning a computing project
Submission date Date Received 1st submission
Re-submission Date Date Received 2nd submission
Student Name NGUYEN VU CUONG Student ID BH00904

Class Assessor name

Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand
that making a false declaration is a form of malpractice.
Student’s signature CUONG
Grading grid

P5 P6 P7 P8 M3 M4 D2
❒ Summative Feedback: ❒ Resubmission Feedback:

Grade: Assessor Signature: Date:


IV Signature:
I. INTRODUCTION
This research delves into the important intersection between Big Data storage systems and
cybersecurity risks. The growing importance of Big Data in business brings serious threats to data
security, putting companies and individuals at risk. The misuse of personal data and the rise in
sophisticated cyberattacks highlight the complexity of cybersecurity challenges. The report highlights
the urgent need to understand and address cybersecurity risks associated with both cloud-based and
local Big Data storage systems. The increasing volume of data, combined with inadequate awareness
and the potential for misuse, creates vulnerabilities that pose risks to cybersecurity. The analysis
includes evolving attack methods, exploited vulnerabilities, and changes in data security threats over
time. In addition to highlighting current challenges, the report also predicts future dangers arising
from technological advances, emphasizing the importance of protecting critical data and systems.
Solutions and limitations to mitigate these security risks are explored with the aim of providing a
comprehensive and secure approach. The study not only provides an overview of cybersecurity risks
in local and/or cloud-based Big Data systems but also suggests strategies to avoid risks and solve
problems quickly. comprehensive way. Overall, the report contributes to understanding the evolving
landscape of cybersecurity risks in the context of Big Data storage systems and highlights the need
for continuous improvements in security capabilities.

1. Project purpose:

Our projects in the field of Academic are designed with the main aim of improving the quality of
education and research, and supporting political and social decisions through the use of big data. .
Below are the detailed purposes of the project:

 Improve the quality of education:


- Purpose: Develop tools and methods to use big data to improve the quality of education at all
levels.
- Means: Use data on academic activities, test results, and study habits to analyze trends and
recommend curriculum and training improvements.
 Support for Research and Academic Development:
- Purpose: Create data sources and tools to support research and development in various academic
fields.
- Media: Process data to produce reports, research articles, and scholarly resources that support
the research community.
 Political and Social Decision Support:
- Purpose: Use data to provide academic information to support political and social decisions in the
field of education.
- Means: Analyze data on academic performance, educational quality, and other educational issues
to make assessments and policy recommendations.
 Explore New Thinking and Creative Perspectives:
- Purpose: Search and develop new aspects in the academic field through the use of big data.
- Means: Analyze data to identify trends, relationships, and creative thinking abilities, thereby
creating new ideas and different perspectives.
This project's main aim is to make a positive contribution to the academic field, providing tools to
support both teaching and research processes, and supporting political and social decisions in
improving the system education.
2. Project Objectives:

Our project, focusing on the Academic field, has a detailed and complete goal to meet the needs and
make a positive contribution to the education and research community. Below are details of the
project's goals:

 Improving the Quality of Education:


- Goal: Develop a large data system to track and evaluate student learning performance, helping
schools and teachers better understand challenges and opportunities in the teaching process.
- Implementation Plan: Collect data on scores, learning activities, and class participation to create
an easy-to-read dashboard that provides detailed information about student progress.
 Support for Research and Academic Development:
- Goal: Build a large academic database to support research and development in diverse fields,
from social sciences to natural sciences.
- Implementation Plan: Organize data from diverse sources such as scientific articles, academic
research, and statistical data to create a diverse and reliable academic resource
 Political and Social Decision Support:
- Goal: Use data to provide academic information to support political and social decisions in
making policies and decisions in the field of education.
- Implementation Plan: Analyze data related to educational quality, learning motivation, and
specific educational issues to make assessments and propose educational policies.
 Explore New Thinking and Creative Perspectives:
- Goal: Find and develop new aspects in the academic field through the use of big data to discover
trends and creative thinking.
- Implementation Plan: Use data analytics to identify unknown connections, trends, and thereby
generate new ideas and innovative perspectives in the academic field.
 Creating Smart Tools for Educational Management:
- Goal: Develop an application or tool that uses artificial intelligence to support educational
management, make performance predictions and suggest improvement measures.
- Implementation Plan: Use machine learning algorithms to predict academic performance, provide
suggestions for improving educational quality, and support school management.
In short, the project's goal is to leverage the power of big data to improve the quality of education,
support academic research and development, and provide academic information to support political
and economic decisions. society in the field of education.
II. Devise comprehensive project plans for a chosen scenario, including a
work and resource allocation breakdown using appropriate tools.
(P5)
1. Overview:
a. Project Overview:

MAIN TARGET

This project focuses on researching and evaluating cybersecurity risks related to large data storage
systems on both local and cloud. Main goals include:

 Cyber Security Risk Assessment - Big Data Storage Systems:

Target:

- Identify and analyze current cybersecurity risks for big data storage systems (Big Data) both local and
cloud.
- Assess the severity of each risk and their impact on the entire system.

Step 1: Collect Information

 Local Big Data Storage System:


- Determine the local system architecture.
- Collect information about current security measures.
- Determine the type of big data stored.
 Cloud Big Data Storage System:
- Identify cloud service provider and system architecture.
- Check the cloud provider's security infrastructure.
- Multi-site infrastructure evaluation.

Step 2: Risk Classification

 Local Storage:
- Possibility of Data Loss:
- Risks due to hardware errors or damage leading to data loss.
- Internal Network Attack:
- Risk from internal employees who may intend to sabotage or steal information.
 Cloud Storage:
- Violation of Access Management:
- Risks from not controlling access to data in the cloud environment.
- Cloud Service Attack:
- Risks from targeted attacks on cloud infrastructure.
Step 3: Assess Severity
 Determine Evaluation Criteria:
- Evaluated according to criteria such as economic impact, reputation, and legal compliance.
 Severity Rating:
- Determine the severity of each risk based on assessment criteria.
- Prioritize risks with high severity.
Step 4: Build an Evaluation Table

Number Risk Classify Severity Precautions


1 Data Loss Due to Hardware Local Storage High Regular backups,
Failure testing and
maintenance
2 Internal Network Attack Local Storage Medium Manage access
rights, educate
employees
3 Violation of Access Control Local Storage High Strict access
control, event
tracking
4 Cloud Service Attack Local Storage Medium Use anti-DDoS
protection and data
encryption services

Step 5: Summary and Report

- Summary of severity assessment results and detailed analysis for each risk.
- Develop a risk assessment report to share with stakeholders and recommend specific preventive
measures.

Step 6: Propose Preventive Measures

- Recommend specific preventive measures for each risk to minimize their severity and risk of
occurrence.
- List the limitations and potential risks when implementing preventative measures.

Conclude:
Risk assessment is an important step in understanding the threats facing big data storage systems.
Through this assessment, we can prioritize and implement preventative measures to maximize the
protection of critical information.

PROJECT SCOPE:

SYSTEM IDENIFICATION:

 Target: Store and analyze data from the organization's large data storage systems both locally
and in the cloud.

Specific work:

 Identify Data Sources: Evaluate and identify data sources from local and cloud storage systems.
 Database Analysis: Create database analysis models to understand the structure and relationships
between components.
 Build Storage Process: Develop effective data storage process for both local and cloud.

COMPATIBILITY:

 Target: Ensure compatibility between storage systems and other elements in the IT infrastructure.
 Specific work:
 Check Current Compatibility: Perform checks on current compatibility between systems and other
components in the IT infrastructure.
 Adjust Link Protocol: If necessary, adjust link protocol to ensure compatibility between systems.
 Perform Compatibility Testing: Organize tests to ensure compatibility under different conditions.

PREVENTION SYSTEM:

 Target: Develop preventative measures to minimize cybersecurity risks.


 Specific work:
- Current Risk Assessment: Analyze and evaluate current cybersecurity risks in data storage systems.
- Build Security Measures: Develop security measures such as encryption, access management to deal with
identified risks.
- Deploy Preventive Technology: Implement preventive technologies such as firewall and behavioral
monitoring to protect the system.

EVALUATE:

 Research results:
- Evaluate the success of data storage and analysis.
- Check compatibility between systems and other elements.
- Evaluate the performance of preventive measures and make improvements if necessary.
 Rapport and Communication:
- Prepare detailed reports on results and suggestions for improvement.
- Communicate with stakeholders to share information and receive feedback.

IMPLEMENTATION PLAN:

 Phase 1 (February 15, 2023 - February 28, 2023): System Identification

Identify data sources and analyze the database.

 Phase 2 (March 1, 2023 - March 10, 2023): Compatibility

Check current compatibility and adjust link protocol.

 Phase 3 (March 11, 2023 - March 20, 2023): Prevention System


- Assess risks and develop security measures.
- Deploy prevention technology.
 Phase 4 (March 21, 2023 - March 30, 2023): Evaluation and Report
- Evaluate results and performance.
- Prepare detailed reports and communicate with stakeholders.

RESEARCHERS:

Team Leader:

You might also like