Remarkable University has been intending on implementing digitization in the field of result declaration system. The major concern of Remarkable University is to increase the efficiency of the result distribution among the students of Remarkable University. During the implementation of digitalized data base, the major concern for Remarkable University was the security related issues that are present in the course of data management proper transcription of the security processes are implemented and software that are implemented. For implementing security framework in the processing of the database proper implementation of the hardware and software For increasing the robustness of the platform of the result providing system ensures that the data management is done with the help security measures must be implemented and this is the sole reason that the security planning finds its importance in the way of accomplishment of the project. This paper will start with providing the scope of the project, which will take into consideration the scenario analysis and this will also help in understanding the goal of the project that is to be completed. This report will also provide the risk assessment that will confirm the circumstance that the data analysis will be done with the help of risk register. Risk assessment that is present in the course of data management will also help in understanding the progression of the data management and will help in understanding the risks that might approach the framework of the digital result providing system. This report will also state the security strategies that must be implemented in order to mitigate the security and privacy related risks. This report will also help in procuring the processing’s that will ensure that the data that are existing in the database of the system stays protected from the imposters, guiding to the circumstance that the data administration will be completed with highest efficiency. This paper will also deliver the residual risks that are existing in the progress of the data management in the processing of result distribution in a digital stage. This paper will also deliver a detailing of the resources that will be prerequisite for the accomplishment of the project. This report will also provide the basic drills that will be required for completion of the training of the employees who will be in charge of handling the security issues of data base.
Providing proper security to the networking system acts as the main scope of the project. Deployment of the security measures are one of the major scope of this project. This project includes the methodologies that must be deployed for the mitigating risks that might arise on the processing of the data managing in the data base of the digital platform. These are considered too be the major scope of the project. Residual scope pf the project is that this report will focus on the problems that might arise due to non-robust platform. This is the because of that the executing of the data management is also taken into consideration as the processing of the data will be proving the security measures that must be taken in order to keep the platform protected.
Performing Risk assessment includes the terminologies that directly affects the executing of the data management. This is due to the circumstance that the data management that is executed taking into consideration of the terminologies namely User Authentication, Access Control, Server Security and Software security (Gouhar, 2017). Hence discussing the risks that are present in the processing of these methodologies will be completed with better and distinctive understanding of the security related issues that are present in the processing of the data handling.
User Authentication: User authentication plays a huge role in the completion of the mission with proper security. In case there is no proper user authentication, the users whose data are present in the course of the platform, they face a severe security issue. This is due to the circumstance that the data prosecution will be completed with the assistance of loop holes that are present in the data centre of the business. This leads to the fact that the data handling gets affected in a negative way. The imposters who are present in the data networking platform ensures the fact that the data projection gets better with the assistance of the organization of the loop holes that are existing in the networking system of the database. In case authentication security is not present in the course of the data administration and no proper authentication is provided in the data base, the frauds can effortlessly gain entry to the data that are present in the system that is created by the Remarkable University (Li, 2014). This fact that the imposters can harm the students of Remarkable University, leading to the fact that the data that are grades that are stored in the data base are manipulated by the imposters. In case a student fails in the exam and the same gets published in their portal that is present in the framework of Remarkable University. In case the student that has failed wants to commit unfair means for passing the exams, they can gain access of the portal illegally and change the grades that are present in the processing, leading to the circumstance that the data that are present in the course of result providing stage is changed and the student that has failed passes the exam without prior deserving results
Access Control: Access control is also one of the major factor that will include the processing of the data centre with utmost efficiency. This is due to the fact that the controlling the access regarding the portal that is created by the Remarkable University that will make the portal robust in nature. In case the portal that is created by the database is not robust in nature, personnel’s who are not allowed to gain entry to the records that are stored in the data base gains access and the data that are existing in the database can be modulated, leading to the circumstance that the information that are authenticated in nature gets distorted and this is the main cause that executing of the access must be maintained. In case an imposter gets access to the control of the data centre, the processing of the portal is completely dependent on the persons that access the data centre. In case the personnel that are unauthenticated in nature gets access to the data that are present in the portal of the Remarkable University. This leads to the circumstance that the information that are present in the system gets altered without any proper authentication. This is the reason that access control is one of the major reasons of prosecuting the data centre. A reference must be built for better prosecution of the data centre. This leads to the fact that the information that are present in the database that are present in the portal. This is the reason that access control must be present in the portal managing of the data centre of the Remarkable University (Yang, Zhang & Xie, 2013).
Server Security Server security is one of the most important aspect of the keeping the data safe and secured. This is due to the fact that the information that are existing in the server can be retrieved by the imposters, leading to the fact that the authenticated users might face difficulties in operating the server and this might lead to the fact that the data processing might be done with highest efficiency. This will lead to the fact that the servers gets accessed by the imposters. In case a server is accessed by the imposters who are not authorized to gain admittance to the information that are existing in the course of data management (Baca, Petersen & Lundberg, 2014). This will include the methodologies that will procure the statistic that the data management will be completed with utmost proficiency and after completion of the analysis of the loop holes that are present in the servers are used in a negative sense, leading to the statistic that the data management will be completed more professionally by the imposters as they will be well aware of the loop holes that are present in the server and they can attacked using the weak points that are present in the course of accomplishment of the project. This is the sole goal that the server security acts as one of the major part in the processing of completion of data management. This is the only reason that the data interpretation is done using the server of the communication platform that is targeted for completion of a security glitch related projects that are performed by the imposters (Hoekstra & Del Cuvillo, 2014).
Software security: Software security acts as one of the main problems that are existing in the portal system that is created by the Remarkable University for completion the online gradation system. This is due to the fact that the platform that is being used for the accomplishment of the project stays secured and the information that are existing in the data base stays secured in nature. In case the software is secured, the major advantage that a personnel will enjoy is that the executing of data management will be completed with utmost efficiency. This leads to the fact imposters cannot access the information that is present in the data base as he cannot operate the software due to authentication problems. This is one of the main reasons that lead to the prosecution of data that are existing in the database. In case the software is not secured in nature, the major aspect that is present in the course of the data management will lose its proficiency and the imposter will easily get through the software (Baca, Petersen & Lundberg, 2014). Only if the software is protected with proper authentication, the imposter cannot go through the wall and this is the only reason that the data processing efficiency will be maintained. Software security acts as the filtering stage, this leads to the circumstance that the data that are present in the database stays protected. Another problem that the organization will be facing in completion of their project after the procuring of security barrier that are present in the data base. This is the only reason that the information that are present in the portal, leading to the fact that the data present in the data base stays protected and this will safeguard the data that are present in the database stays protected with proper filtering of the imposters that can approach the data base of the system.
Risk |
Likeliness |
Impact |
User Authentication |
Likeliness of issues that are caused due to the lack of user authentication are very high as in case of lack of robustness the imposters can easily access the portal on behalf of the original student and modulate the system terminologies |
The impact of lack of User authentication in the processing of data management is very high as the data that is stored in the data base can be illegally modulated and altered |
Access Control |
Issues caused due to lack of robustness on the controlling of Accessing to the portal can cause huge problem and the likeliness of its occurrence is very high |
Impact of Access Control is very high, leading to the fact that the data management of the business processing will be hampered and alteration of data that is present in the data base can be made. Another issue that is related to the processing of data management is that the data prosecution will be made is that the accessing of the genuine clients can be stopped. |
Server Security |
Server security issues that are present in the data base are very likely, this also proves that the data management will be processed with the help of the proper data management |
Impact of server security is very high, leading to the fact that the data protection of the business management will be made by the imposters and the servers that are present might get affected in a negative way. Impact of this security glitch is very high |
Software Security |
Software security issues that are processed in the completion of the storage of data that are present can get affected and this leafs t the fact that the data that are stored in the data base that are likely get affected and the likeliness of its occurrence is very high |
Software related issues are one of the major problems that are present in the course of the data management. This leads to the fact that the data procurement can be done easily by the imposters and this causes the main massacre in the projection of data orientation. Hence the impact is very high |
Input Values
Cost-Benefit – INPUT VALUES |
|
Hardware |
$ 50,000.00 |
Software |
$ 30,000.00 |
Development team salaries |
$ 20,000.00 |
Training |
$ 20,000.00 |
Total Development Cost |
$ 120,000.00 |
Hardware |
$ 2,000.00 |
Software |
$ 3,000.00 |
Operational Labor |
$ 4,000.00 |
Total Operational Cost |
$ 9,000.00 |
Approximate salary savings |
$ 54,000.00 |
Reduced operating cost |
$ 60,000.00 |
Total Benefit |
$ 114,000.00 |
Cost benefit analysis
Economic Benefit |
$0.00 |
$ 114,000.00 |
$ 114,000.00 |
$ 114,000.00 |
$ 114,000.00 |
$ 114,000.00 |
||
Discount Rate |
1.0000 |
0.9434 |
0.8900 |
0.8396 |
0.7921 |
0.7473 |
||
PV of Benefits |
$0.00 |
$107,547.17 |
$101,459.59 |
$95,716.60 |
$90,298.68 |
$85,187.43 |
||
NPV of all BENEFITS |
$0.00 |
$ 107,547.17 |
$ 209,006.76 |
$ 304,723.36 |
$ 395,022.04 |
$ 480,209.47 |
$ 480,209.47 |
|
One-Time COSTS |
########### |
|||||||
Recurring Costs |
$0.00 |
$ (9,000.00) |
$ (9,000.00) |
$ (9,000.00) |
$ (9,000.00) |
$ (9,000.00) |
||
Discount Rate |
1.0000 |
0.9434 |
0.8900 |
0.8396 |
0.7921 |
0.7473 |
||
PV of Recurring Costs |
$0.00 |
$ (8,490.57) |
$ (8,009.97) |
$ (7,556.57) |
$ (7,128.84) |
$ (6,725.32) |
||
NPV of all COSTS |
########### |
$(128,490.57) |
$(136,500.53) |
$ (144,057.11) |
$ (151,185.95) |
$ (157,911.27) |
$ (157,911.27) |
|
Overall NPV |
$ 322,298.20 |
|||||||
Overall ROI |
||||||||
2.0410 |
||||||||
Break-even Analysis |
||||||||
Yearly NPV Cash FLOW |
########### |
$ 99,056.60 |
$ 93,449.63 |
$ 88,160.02 |
$ 83,169.83 |
$ 78,462.11 |
||
Overall NPV Cash FLOW |
########### |
$ (20,943.40) |
$ 72,506.23 |
$ 160,666.25 |
$ 243,836.09 |
$ 322,298.20 |
From the above Cost benefit analysis, it can be stated that it takes a minimum of 2 years to earn back the amount that is invested in building the digital gradation system due to security issues that are present in the development of data management. This guides to the fact that the data management must be performed with utmost efficiency for better and proper acknowledgement of the data centre. Major strategic implementations that are to be made for completion of the data management are as follows: –
Residual risks are termed as the risks that are existing in the sequence of the data management after completion of risk mitigation techniques (Shropshire, Warkentin & Sharma, 2015). This guides to the statistic that the data management is procured in the processing of data management and this leads to the fact that the risks that are not mitigated even after implementation of risk mitigation are taken into consideration in this risk mitigation technique. Major residual risks that are present in the course of the completion of the on line grading system that is initiated by Remarkable university are as follows: –
Implementation of tools that are required for implementation of security in the online grading system of Remarkable University are as follows: –
For this case the system maintenance is required because by the maintenance process the organization can improve the total security system, efficiency and productivity of the organization. Also, it is mandatory for the IT systems to maintain it regularly. Without proper maintenance the system will fail to give proper output. This type of maintenance are done by some professionals manually. Often, this maintenance are done poorly which lead the whole system to the failure. Beside that many times this maintenance performed on after the schedule time. This also make the system weak. In such cases automation technology can be used. In this technology the system will automatically throw an alert for the maintenance schedule (Lowry & Moody, 2015). By analysing of the alert type the administration can perform a proper maintenance of the system. The basic type of maintaining activity are the:
With that the main benefits of the automation technology is that:
Conclusion
From the above report it can be concluded that Remarkable University is planning to implement a grading system that will be digitized in nature. Remarkable University wants to shift their focus from manual provisioning of results to digital procurement of the results. Digital platform of result provisioning brings several advantages but the major disadvantage that is existing in the course of completion of this project efficiently is that the security glitches which is existing in the commencing of the project. This is the sole reason that the Remarkable University is bothered about the security problems that may be affecting the goodwill of the University md the privacy regarding the data of the students will be affected in a negative way. This is the major reason that the completion of the project will require implementation of security plans and this is the major reason that leads to efficient completion of the project. Another major reason of implementing the project security plan is to keep the data of students secured and this is the only reason that includes the fact that the completion of the project management is done with highest robustness.
References
[1] Griffith Information Security Policy: https://policies.griffith.edu.au/pdf/Information Security Policy.pdf
[2] Griffith Information Security Policy Schedule: https://policies.griffith.edu.au/pdf/InformationSecurity-Policy-Schedule-A-Roles-Standards-Operational-Procedures.pdf
Apel, S., Kästner, C., & Lengauer, C. (2013). Language-independent and automated software composition: The FeatureHouse experience. IEEE Transactions on Software Engineering, 39(1), 63-79.
Arachchilage, N. A. G., & Love, S. (2014). Security awareness of computer users: A phishing threat avoidance perspective. Computers in Human Behavior, 38, 304-312.
Baca, D., Petersen, K., & Lundberg, L. (2014). Improving software security with static automated code analysis in an industry setting. Software: Practice and Experience, 43(3), 259-279.
Becker, R., Gray, W., & Marvakov, J. (2013). Nber-ces manufacturing industry database: Technical notes. NBER Working Paper, 5809.
Bhoraskar, R., & Wetherall, D. (2014, August). Brahmastra: Driving Apps to Test the Security of Third-Party Components. In USENIX Security Symposium (pp. 1021-1036).
Bilal, K., Manzano, M., Khan, S. U., Calle, E., Li, K., & Zomaya, A. Y. (2013). On the characterization of the structural robustness of data center networks. IEEE Transactions on Cloud Computing, 1(1), 1-1.
?isar, P., & ?isar, S. M. (2016, November). The framework of runtime application self-protection technology. In Computational Intelligence and Informatics (CINTI), 2016 IEEE 17th International Symposium on (pp. 000081-000086). IEEE.
Dukes, L., Yuan, X., & Akowuah, F. (2013, April). A case study on web application security testing with tools and manual testing. In Southeastcon, 2013 Proceedings of IEEE (pp. 1-6). IEEE.
Fierke, K. M. (2015). Critical approaches to international security. John Wiley & Sons.
We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.
Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.
Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.
Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.
Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.
Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.
We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.
Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.
You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.
Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.
Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.
You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.
You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.
Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.
We create perfect papers according to the guidelines.
We seamlessly edit out errors from your papers.
We thoroughly read your final draft to identify errors.
Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!
Dedication. Quality. Commitment. Punctuality
Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.
We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.
We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.
We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.
We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.