Friday, May 1, 2020

A Lexicographical Project Business Plan

Questions: This is a hypothetical case, therefore your team must decide what type of enterprise you will develop a Security preparedness plan for. Your team will review the five key topic areas presented in class and in the PowerPoints and research each of the key guidelines on these topics and guidelines to prepare and an organization for cyber security best practices including policies and procedure development, incidents response readiness, Disaster recovery and Contingency plan preparedness, corporate policy and governance. Remember the organization has hired your team to prepare them for these areas and be compliant with best practices and standards. Their current status is poor and they are in need organizing and incorporating a security infrastructure. 1. Your team should meet regularly to discuss and prepare scope for this project plan. a. Scope definition phase will occur where the team will decide the scope of this plan. b. A written executive scope statement should be prepared. 2 . Remember the key phases from your project Management class. a. Human resource management to define the roles and responsibilities of the project team. (remember assume you will have a large team of professional that will perform activities in the work breakdown structure) i. List the key skills required, their minimum training and education requirements ii. Will they be Hourly or salary b. Develop a Work Breakdown Structure and determine the work periods (days) for each activity. i. Your team will need to develop a phase plane for the activities in your WBS ii. Remember the strong dependencies or weak dependencies of activities to take place. iii. Remember to set a start date 3. Prepare a cost baseline for the activities in your plan a. What resources will be applied to all the activities (human and materials) and at what rate b. This will determine the budget for this project plan. Answers: Introduction: According to Lundkvist, Meiling and Sandberg, cyber security is one of the type of security that is applied to various computing devices like smart phones, computers etc. as well as various computer networks. It is a process in doing the application of various security measures in order to ensure integrity, confidentiality as well as availability of data. In this particular assignment, the enterprise from business sector is selected named Credit Union Bank. It also discusses about the development of security preparedness plan that includes development of policies and procedures, disaster recovery and the preparedness of the contingency plan. Executive Scope Statement: Lundkvist, Meiling and Sandberg argued that cyber security is one of the potential method of information technology security that allows in protecting the networks, computer, programs that running. Apart from that, implementation of cyber security will also allow to protect from unauthorized access and destruction that unintended. Therefore, implementation of Cyber Security in the banking system of Credit Union Bank will be very much effective to protect their information such as transactions, file sharing over networks, etc. As days passed, technology changes rapidly and the threats in internet become higher and higher throughout the world. Cyber crime is one of the potential threats for the bankers as well as for the other users. In terms of protecting the cyber threats as well as increased criminal activities, implementation of Cyber Security system will be effective (Torres et al.). Therefore, the scope of this project is to lead the attention in sharing business information from one to other in banking sector especially for the Credit Union Bank. Moreover, Cyber Security System is also known as the safeguard national security that mostly developed by the nations in terms of protecting the digital spying and attacks. Therefore, implementation of Cyber Crime Security has huge scope in protecting data for the Credit Union Bank. On the contrary, Alberts, cited that the business interests and national security of any country in the world depends on the cyber security in these modern days (Throndson et al.). Development or implementation of cyber security professionals in the business system of Credit Union Bank will be better to correlate the organizational daily security operations and broad security guidelines. Se iof security topologies will be effective and efficient in improving security system if Credit Union Bank. It not only helps in preventing the cyber breach of the organization but also helps in protecting the information from cyber threats or attack ers. Through the use of data loss prevention tools, Credit Union Bank will be able to protect their business information. This project will bring broad scope for Credit Union Bank because majority of organization especially the organization in banking sector faces challenges in protecting their information from the attackers (Eskerod and Jepsen). According to the 2008 market review, it has been analysed that in the banking sector of United State, organizations were face loss of more than $8.10 billion in a year. It highlighted the importance of Cyber Security System in the banking sector. Therefore, the undertaken project of Cyber Security System implementation for their online transferring system and data protection will be the best methodology. Overview of the organization: Credit Union Bank started their journey at 22nd March 2012 with a small number of accounts holder in California. Through providing better service, satisfying the customers, the company is increasing the customer base, and developing a brand name within the banking sector in United States. Credit Union Bank provides the variety of banking services such as personal banking, corporate banking, agricultural finance, financial trade, international banking, industrial finance, etc (Lock). The key stakeholders of the Credit Union Bank in United Sates are the small sized organization as well as industrial units. Moreover, the selected organization also has the customers of non-residential of California, multinational companies as well as exporters. After starting the business in financial banking sector, Credit Union Bank humbly started their business and has grown in their structure. The organization generates 3% revenue of overall financial activities within California. Apart from that, customers are also happy with the service that provided by the organization. The mission of the company is to generate more revenue and retain the customers through providing higher service. According to the management of the organization, Credit Union Bank firmly focuses on establishing their business successfully and becoming the leading banker in the banking sector of California. The vision of the company is to expand the market international and achieve higher revenue in the international banking sector. In order to provide better and efficient service to the customers, Credit Union Bank keeps their tune and changes their technologies more efficiently. It allows them in providing speedy service. For example, the company provided internet banking, mobile banking for quick fund transfer. Figure 1: Organizational Chart of Credit Union Bank (Created By author) Moreover, messaging facility for both credit and debit of the customers account allows in maintaining security for every transaction (Torres et al.). For the net banking purpose, Credit Union Bank uses latest technology such as One Time Password Methodology. The manager of the Credit Union Bank said that the company has taken major initiative in computerization in their overall process. Credit union Bank has more than 12 branches in all part of the California. Entire branches of the organization have been computerized (Throndson et al.). Credit union Bank provides all time banking with a impressive tagline Any Time, Any Where Banking to their customers. Through the implementation of centralized banking solution, Credit Union Bank introduced the latest technology and quick fund transfer for their customers. The organization generates large amount of customer related report and documents. Credit Union Bank introduced the FineDoc system for their Document Management System that assists them in creating a detail information database for the new customers (Yang). This electronics document form stored entire information of the new customers to provide the effective customer service and also avoiding the legal disputes. The main problems that faced by the Credit Union over the year is cyber crime. The company faced $75.3 million in the year of 2014 via cyber crime. As the entire system of Credit Union Bank is computerized, it was unable to manage the entire security system by the IT staffs. Moreover, the company also faced challenges in file sharing and documents sharing over their branches (Rose). Therefore, this project plan is developing for the implementation or integration of Cyber Security System including RSS algorithm over their computerized banking system. RSS algorithm will allow the selected organization in transmitting information with each branch in a safe way. The string encryption methodology of RSS algorithm will be effective for Credit Union Bank and maintain the security system. Project team members: Employee Name Job Description M/F Years of Experience Daily Cost Work Quality* Team Worker* Comms Skills* Work Behaviour Jenny Preece Programmer F 3 years 125 7 8 8 8 Ben Shneiderman Business Analyst M 6 years 190 8 6 6 7 Alan Dix IT Specialist M 14 years 210 5 4 5 7 Jakob Nielsen Test Engineer M 1 year 100 7 8 7 7 Steve Krug Network Specialist M 5 years 155 6 8 6 8 Paul Dourish Programmer M 7 years 205 9 3 4 8 Xristine Faulkner Developer F 6 years 145 7 7 9 7 Donald Norman Programmer M 5 years 130 7 7 6 8 Bruno Latour Developer M 11 years 195 8 7 5 7 Manuel De Landa IT Specialist M 3 years 150 6 4 4 6 Nicolas Negroponte Senior Programmer M 8 years 250 9 8 7 7 Brenda Laurel Developer F 9 years 120 5 9 8 8 Martin Heidegger Business Analyst M 1 year 80 8 5 8 7 Tim Breners-Lee Operations Expert M 2 years 180 8 6 7 8 Steve Wozniak Senior Analyst M 7 years 160 7 6 8 7 Michel Foucault Senior Developer M 7 years 185 9 9 9 6 Gilles Deleuze Test Engineer M 1 year 100 7 8 6 7 Bill Gates Business Analyst M 5 years 100 4 6 8 8 John Dewey Network Specialist M 4 years 155 8 5 8 7 Jimi Hendrix IT Specialist M 12 years 150 6 4 5 6 Walter White Network Analyst M 5 year 100 9 5 5 6 Bootsy Collins Programmer M 13 years 210 8 9 7 7 Project phases In terms of completing this project, project managers will follow the five phases of project management such as project initiation, project planning, project execution, project control and project finished. Project Initiation: In this particular phase, project manager examined the entire operation process of Credit Union Bank and their current security system. According to the current operation method, project manager will determine the benefits of the project for selected organization. During this particular phase, the decision making team will be develop for identifying the realistically of the project completion. The planning phase can be considered as a milestone task. Project Planning: In terms of developing this project, project manager will create a project charter and maintain the activity. Moreover, project manager will also design the scope for this particular project through writing the outline of the project work that to be performed. In terms of designing the scope of the project, one team including the senior analyst will be design that should be prioritizing. During this phase, project manager also calculate the initial project budget and prepare the gantt chart using MS Project including the determination of resources. Project Execution: During this phase, project manager will provide the roles and responsibilities to the team members I terms of successful implementation of cyber security system at Credit Union Bank. Moreover, the project related information will be defines and checking by the project manager, It will be effective approach of deliver the project just in time. Moreover, Torres et al. opined that during that project execution phase generation of important project information such as effective cyber security system, algorithm that will be appropriate, implementation of hardware as well as related software for cyber security system, etc. This phase can also be considered as a milestone phase. Project Control: During this particular phase, project manager will check the project progress report daily and will monitor the employee based on 360 degree performance monitoring strategy. It will be effective approach of controlling the entire project. Moreover, project manager of this project has to compare the current project progress report with the actual plan. It might be helpful in enhancing the work performance. It will also be helpful for adjusting project schedule according to necessity of the project. In case of control of projects, human resource interfaces and employee self-service are the milestone tasks of the given project. Project Close: In this phase, project manager will check the completion of all tasks that need to be finished. Moreover, project manager will also give preference the approval of the outcome of the project. Moreover, after completing the entire activities or tasks in this project, project manager will conduct a evaluation phase that requires for successful project management. There are several situations in several project processes. Therefore, project manager for this project will execute the performance and motivate them to give their best effort. It will help in designing the appropriate project plan as well as finish the project on time. In major cases it has been identified that project manager unable to execute the project according to given schedule and also the budget is increase. Therefore, proper management and appropriate scheduling of the project plan and performance measurement through 360 degree performance management approach will be effective way of project submission on time. The final testing of the project can be considered as the milestone task of the project. The main purpose of this milestone is to evaluate an appropriate critical path of the project. Project Schedule Task Name Duration Start Finish Predecessors Resource Name Cost1 Project Management Plan for Cyber Security System Integration 56 days Fri 6/26/15 Fri 9/11/15 Alan Dix $630.00 Risk assessment plan 5 days Sun 7/26/15 Thu 7/30/15 Ben Shneiderman $1,140.00 Threats and vulnerabilities 5 days Mon 7/27/15 Fri 7/31/15 Bill Gates $500.00 Implementation 41 days Fri 6/26/15 Fri 8/21/15 Bootsy Collin $660.00 HR Operations 5 days Fri 6/26/15 Thu 7/2/15 Brenda Laurel $630.00 Pay Roll 4 days Fri 7/3/15 Wed 7/8/15 5 Bruno Latour $1,170.00 Employee Self Service 3 days Thu 7/9/15 Mon 7/13/15 6 Gilles Deleuze $500.00 Training and awareness activities 10 days Mon 8/10/15 Fri 8/21/15 Jakob Nielson $600.00 Interfaces 9 days Tue 7/14/15 Fri 7/24/15 Jenny Preece $480.00 Pay Roll 6 days Tue 7/14/15 Tue 7/21/15 7 Jimi Hendrix $370.00 HR 2 days Wed 7/22/15 Thu 7/23/15 10 John Dewey $465.00 Conversion 1 day Fri 7/24/15 Fri 7/24/15 11 Manuel De Landa $900.00 Reporting 19 days Mon 7/27/15 Thu 8/20/15 Martin Heidegger $480.00 Pay Roll 8 days Mon 7/27/15 Wed 8/5/15 12 Benefits Administration 6 days Thu 8/6/15 Thu 8/13/15 14 HR 4 days Fri 8/14/15 Wed 8/19/15 15 Steve Wozniak $960.00 Development of policies 5 days Fri 7/24/15 Thu 7/30/15 11 Testing 19 days Fri 8/14/15 Wed 9/9/15 Paul Dourish $1,025.00 User Acceptance Test 4 days Thu 8/20/15 Tue 8/25/15 16 System Test 11 days Wed 8/26/15 Wed 9/9/15 19 Disaster and information procurement 10 days Fri 8/14/15 Thu 8/27/15 15 Launch 1 day Wed 9/9/15 Thu 9/10/15 Steve Krug $620.00 End of the Project 1 day Wed 9/9/15 Thu 9/10/15 20 Conclusion This particular project outlined the project planning activities of implementation of Cyber Security System in the banking process of Credit Union Bank. The analyst calculates project scheduling and budgeting during initiation phase. This study also demonstrated the organizational overview including the team members with job titles and roles. The selected organization for this project was the Credit Union Bank that operates in the banking sector at California. The company has several customers and revenue generation is also effective. The entire system of the organization is computerized. Therefore, the company faced enough loss via cyber crime. They also lost customer information from their server. Therefore, this project planning for implementation of cyber security system will be effective and efficient for the Credit union Bank in terms of maintaining their security in each operation of banking sector. Reference List Alberts, Maritta. 'The Importance Of A Business Plan When Planning A Lexicographical Project'.Lexikos9.1 (2012): n. pag. Web. Eskerod, Pernille, and Anna Lund Jepsen.Project Stakeholder Management. Farnham, Surrey, England: Gower, 2013. Print. Lock, Dennis.Naked Project Management. Farnham: Ashgate Publishing Ltd, 2013. Print. Lock, Dennis.Project Management. Burlington, VT: Gower, 2013. Print. Lundkvist, Robert, John Henrik Meiling, and Marcus Sandberg. 'A Proactive Plan-Do-Check-Act Approach To Defect Management Based On A Swedish Construction Project'.Construction Management and Economics32.11 (2014): 1051-1065. Web. Morales, Peter J, and Dennis Anderson.Process Simulation And Parametric Modeling For Strategic Project Management. New York, NY: Springer, 2013. Print. Rose, Kenneth H. 'Refining The Knowledge Production Plan: Knowledge Representations In Innovation Projects'.Project Management Journal43.6 (2012): 114-114. Web. Throndson, K. et al. 'N022 The 2C ECG Project: Identifying Factors That Influence Nurses Confidence And Competence With ECG Monitoring'.Canadian Journal of Cardiology28.5 (2012): S427. Web. Torres, J.L. et al. 'Energy Management Strategy For Plug-In Hybrid Electric Vehicles. A Comparative Study'.Applied Energy113 (2014): 816-824. Web. Yang, Tian Xiong. 'The Facilities Plan And Project Management Based On The Optimize Correlation Of Logistics And Production Construction'.AMR542-543 (2012): 339-343. Web.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.