P5: Analyze research and data using appropriate tools and techniques.
Introduction
        I work as trainee as an IT security specialist for leading security consultancy. As a part of my role, I
        have to carry out small scale research in order to recognize and discover a range of software
        vulnerability that potentially impacts on range of businesses. In this task, I am going to analyze the
        documents of questionnaire which I have collected in previous tasks using appropriate tools and
        techniques. Research is basically a term used for a systematic search for getting relevant answers on
        any taken-up topic (Anon., n.d.). Various research was done and, in this task, I analyzed the research
        and data carried using appropriate analytical tools and techniques. The evaluation of the selected
        analysis tools and techniques considering accuracy and authenticity with proper justification has
        been carried out.
Tools and Techniques used for research analysis
        Various tools are there for doing research and they are used according to the need and suitability.
        Appropriate analysis techniques must be used so as to get the desired results which can be
        forecasted, problem scan be identified and resolved and rationale decision can be made that
        enhance the reliability and productivity of the project. As there can be various problem while doing
        research, the use of research analysis tools varies according to the problems occurred and variables
        involved. As various research on security vulnerabilities of the company are done and some of the
        research analysis techniques used during the project are:
Percentage technique
Percentage technique is a technique from which information are converted in numerical form of percent. I
converted the answer of the company and converted it into percentage. For example:
                      Male                   Female                 Not Specified          Total
How many              55%                    45%                    0%
employees are
there in your
company?
In this way, we can convert the answer to percentage and we can achieve total point of data or information
collection. Using a filer is another useful tool for modeling data. Filtering means narrowing your focus to
one particular subgroup and filtering out the others. So instead of comparing subgroups to one another,
here we’re just looking at how one subgroup answered the question. From this tool we can numerically
evaluate the percentage and convert it into a numerical value, so we know how many companies have
vulnerability and how can they recognize, discover and solve the vulnerability. Our data collection is from
random selection of company. So, data may not be same but most of the company can tick in the same
answer so common answer will be in priority.
  2.    Using Microsoft excel for analyzing my data collection
Companies which was not accepting hardcopy of the questionnaire, for these companies I had sent the
document of questionnaire to the company’s email. For softcopy of the document, I have analyzed the
collected data from excel. It is very easy to analyze questionnaire data from excel. There are five steps to
analyze the questionnaire from excel that are:
    •   Step 1: Create an Excel database
    •   Step 2: Code data
    •   Step 3: Enter data
    •   Step 4: Clean data
    •   Step 5: Analyze data
Conclusion
This task is all about tools and techniques used for analyzing the collected data and information. Tools and
techniques in research are the statistical methods of collection, analysis, interpretation, and organization of
data. Statistics provides numerous tools and techniques to analyze the data and interpret the results of the
analysis. Data analysis is collecting and organizing of data so that a researcher can come to a conclusion. So,
in this task, I have discussed about tools and technique used for my data analyzing like percentage
techniques or tool and data analyzing using Microsoft excel or spreadsheet.
P6: Communicate appropriate recommendations as a result of research and data analysis to draw valid
and meaningful conclusion.
Introduction
        As being IT specialist, this research was done so as to find out various security vulnerabilities in an
        organization. This research has got its own aims and objectives. Various tools, techniques, methods
        and resources are used while doing research so as to produce suitable result. As knowledge of
        various tools and techniques can be generated research helps in learning process as the skills can be
        used and applied. In previous task, I have already analyzed my collected information or data using
        two techniques one is percentage technique and other is analyze from Microsoft Excel.
Using research Effectively
        As this research was carried out in company or organization it was a challenging task to keep track of
        the progress, meet the aims and objective of the project and address all the vital aspects necessary
        for project. As various members were involved in this research it focuses on learning processes
        where researcher gain knowledge about different skills and experience. As it was carried out in IT
        related areas various security vulnerabilities present in the system are examined. Some amount of
        budget was estimated so as to carry out the project and it helped to analyze whether the project
        plan can be carried under that estimated budget or not.
Project Management Process and quality research
        Project management is a process that includes planning, putting the project plan into action, and
        measuring progress and performance. Project management is the application of knowledge, skills,
        tools,   and   techniques   applied   to   project   activities   in   order   to   meet   the   project
        requirements[ CITATION Adr18 \l 1033 ]. Achieving the goals of the project depends on a number of
        factors such as the project environment, levels of organizational effectiveness, budgeting and
        planning frameworks, having the right culture and values, the size and complexity of the projects
        being undertaken, and having the right people with the requisite skills, attitudes, and experience.
        Quality research provides evidence that is robust, ethical, stands up to scrutiny and is adhered to
        principles of professionalism, transparency, accountability and auditability. Similarly, it provides
        information of the strengths and limitations of the methodology, data collected and findings.
Applying
After completing the analysis of collected data or information, I needed to start interpreting the findings to
develop some recommendations. I needed to apply the analysis finding into some recommendations. This
means that I needed to put into use or find a purpose for the analytical results. For example, my analysis
showed that the main vulnerability of the software is “weaknesses in authentication, authorization or
cryptographic practices”. So that to solve these vulnerabilities I have to focus on coding and testing of
authentication, authorization or cryptographic and make software better and vulnerability free.
Drawing Conclusions
After completing the analysis of data or information suggested or gathered to make importance out of what
isn't plainly expressed. I needed to apply the analysis finding into some recommendations. This means that
I needed to put into use or find a purpose for the analytical results. For example, my analysis showed that
the main vulnerability of the software is “weaknesses in authentication, authorization or cryptographic
practices”. So that to solve these vulnerabilities I have to focus on coding and testing of authentication,
authorization or cryptographic and make software better and vulnerability free.
So, from saying my experience, every company has at least little vulnerability in the software or system. So
nowadays there are many vulnerabilities in the software like memory safety violations such as buffer
overflows and over-reads etc., input validation errors (such as Code injection), privilege (confusion bugs
such as clickjacking), Race conditions (such as symlink races, side channel attack, timing attack etc.) and user
interface failures etc. these are the main vulnerabilities of the software or system but after I collect
information or data with the help of questionnaire. I found that most of the company feels bugs and
vulnerability and most of the company face authentication, authorization and cryptographic errors. So, this
is the common vulnerability in most of the companies. Besides these there are also vulnerability in code as
error or bugs and this is also main vulnerability of the software. For analyzing the answers of the
quantitative research, I use tools and techniques like percentage techniques from which I was able to
change answers from questionnaire to percentage value and after I found percentage of answer, I
converted it into numeric value. There was also Microsoft excel from which I was able to analyze the
collected data by making spreadsheet.
Conclusion
As the project has got various aims and objective the research helps to achieve aims and objective.
Similarly, the knowledge gained after the completion of the project was fruitful. Various tools and
techniques were used and they were suitable. I was communicating appropriate recommendations as result
of research and data analysis, for this I drawing valid and meaningful conclusion that what I have done after
collect information and what I have found out in whole project. So, in this way, this task has been
completed.