Research Analysis of Cyber Security on Land Transport

Verified

Added on  2023/06/12

|11
|2628
|63
AI Summary
This research analysis report focuses on the cyber security issues of land transportation. It includes project requirements, stakeholder analysis, project procurement, and types of contracts that can be implied in the project.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: RESEARCH ANALYSIS REPORT
Research Analysis Report:
Research Analysis of Cyber Security
Name of the Student:
Student ID:
Name of the University:
Author’s note:

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1RESEARCH ANALYSIS REPORT
Table of Contents
Introduction......................................................................................................................................2
1. Requirements of the Project.........................................................................................................2
1.1 Project Background...............................................................................................................2
1.2 Benefit of Project...................................................................................................................3
2. Key Primary and Secondary Stakeholders of the Project............................................................4
3. Stakeholder Matrix of the Project................................................................................................5
4. Most Appropriate Project Procurement Method..........................................................................6
5. Types of Contracts in Project......................................................................................................7
Conclusion.......................................................................................................................................8
Bibliography....................................................................................................................................9
Document Page
2RESEARCH ANALYSIS REPORT
Introduction
The project of Research Analysis of Cyber Security on Land Transport is based for
analysing the various issues and problems related to the internet based electronic devices and
GPS system had been facing (Choo et al., 2017). The analysis would be based on the analysis of
the effective utilization of the literatures and articles for forming the final analysis of the project
plan development. The completion of the project would help in forming a distinct analysis of the
activities of the cyber technology implementation for land transportation and the impact of the
cyber security issues. The following assignment would involve the analysis of the project
fundamentals for the mentioned topic as it would form an analysis of the project requirements,
stakeholder analysis, project procurement, and types of contracts that can be implied in the
project. The completion of the project has been helpful for forming the initial information
transfer for the project operations.
1. Requirements of the Project
1.1 Project Background
The project of Research Analysis of Cyber Security on Land Transport is developed for
forming an analysis of the possible cyber security threats for land transportation system. The
project would involve the use of various articles and literatures for forming the analysis of the
final deliverable for the project. The implication of the effective development of the operations
would also be helpful for aligning the implication of the final reports development. The
implication of the technology had made it evitable for the development of the improved
operations in all fields. The study would involve the analysis of the various risks and threats for
the implication of the cyber technologies for the land transportation. The use of effective
Document Page
3RESEARCH ANALYSIS REPORT
reporting guidelines would be helpful for the implication of the activities favouring the future
study and analysis. The project would also include the prioritization of the factors of risk after
the analysis of the final project development.
1.2 Benefit of Project
The study of the cyber security issues of the land transportation would allow the users for
the development of the risk and threats list. The ranking of the risk factors would allow the use
of the risk mitigation planning method for the development of the secured land transportation
system. The use of study would help in forming some methods for the risk identified in the
study. The risk mitigation would help in forming the security of the land transportation in the
project. The deployment of the operations would also be helpful for the implementation of the
effective implication of the operations. The development of the activities would allow the
prioritizing the risk for forming the analysis of the cyber security threats and forming the
mitigation of the land transportation. The security of the passenger’s information would be
implied for the development of the effective risk mitigation operations. The continuation of the
risk operations had been successful for forming the utilization of the existing literatures and
articles supporting the implication of the risk mitigation for aviation industry. The aviation
security is experienced in forming the correct standards and sets for the implementation of the
security implementation. The use of the same literatures on the implication of the cyber security
for the aviation industry would allow the implication of the same strategies for the cyber security
implementation of the land transportation.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4RESEARCH ANALYSIS REPORT
2. Key Primary and Secondary Stakeholders of the Project
The project stakeholder is defined as an individual, organization, and group involved in
the project that can form an effect on the project or may be affected by the outcomes of the
project. The project team members, sponsors, and organization members are the key project
stakeholders of the project (Wells et al., 2014). The end users and customers of the project can
also be considered as the stakeholders. The primary stakeholders of the project are project
sponsor, project manager, client, and project team members. The secondary stakeholders of the
project are end user, supplier, and government.
Project Sponsor: The project sponsor for the study of the cyber security issues of the
land transportation is the one who would invest in the completion of the project study. The
sponsor would be responsible for the accumulation of the resources in the project.
Project Manager: The project manager is responsible for the completion of the project
activities of study of the cyber security issues of the land transportation and it would also be
helpful for forming the alignment of the activities so that the project can be completed while
maintaining the quality and operations.
Client: The client is the one for whom the study is being done for the project of study of
the cyber security issues of the land transportation. The client gets the benefit of the completion
of the project.
Project Team Members: The project team members are the list of members that would
be responsible for the execution of the project. The study and research, risk prioritization, and
mitigation plan development for the study of the cyber security issues of the land transportation
project are the responsibilities of the project team members.
Document Page
5RESEARCH ANALYSIS REPORT
End User: The end user is the person or group that would get the benefit of the project of
study of the cyber security issues of the land transportation. The passengers travelling by using
land transportation, the companies providing land transportation, and the state government are
end users that would get the benefit of the study.
Supplier: The various resources and articles required for the analysis of the cyber
security of aviation industry. The required resources for implying the mitigation strategies for the
project of study of the cyber security issues of the land transportation would be supplied by an
external individual or element (Internet Sources).
Government: The state government would be responsible for the alignment of the
activities favouring the utilization of work approval. The study of the cyber security issues of the
land transportation would also help the government for identifying the various cyber security
issues in the land transportation.
3. Stakeholder Matrix of the Project
Stakeholder Power Interest Role
Government High Low The state government would be responsible for the
alignment of the activities favouring the utilization of
work approval.
Supplier Low Low The supplier would provide the required resources for
implying the mitigation strategies
End User High The end user is the person or group that would get the
benefit from the completion of the project
Project Team
Members
Low The project team members are the list of members that
would be responsible for the execution of the project.
Project Manager Low High The project manager is responsible for the completion of
the project activities
Client High High The client gets the benefit of the completion of the
project.
Project Sponsors High High The sponsor would be responsible for the accumulation of
the resources in the project.
Document Page
6RESEARCH ANALYSIS REPORT
4. Most Appropriate Project Procurement Method
The project procurement method comprises of 5 major steps required for the development
of the final project of study of the cyber security issues of the land transportation. The 5 steps for
effective procurement method for the project are,
a. Specification: The specification is the step that involves the listing of the procurement
items for approval to the external vendor. The specification of the procurement item would be
helpful for the development of the final list for the procurement of the effective activity
development in projects.
b. Selection: The potential suppliers that can provide the procurement items identified in
the list phase is sorted and an analysis is being done based on selection criteria. The selection of
the suppliers would be based for the implication of the effective operation development for the
project procurement.
c. Contract Development: The contract developed must comprise of all the conditions
by both of the parties forming the contract. The development of the contract would also be
helpful for the formation of the negotiation among the two parties on behalf of the exchange of
services.
d. Control: The control of the processes of payment and delivery is a major factor that
must be done in the procurement process. The control of the processes would allow the
implication of the effective operation development for the users.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7RESEARCH ANALYSIS REPORT
e. Measurement: The use of key system indicators and performance measurement tools
for assessing the success and effectiveness of the entire process. The measurement of the
activities would also be helpful for the development of the final contract procurement.
5. Types of Contracts in Project
According to Saini et al. (2018), the types of contract that could be implied for the project
of Research Analysis of Cyber Security on Land Transport are fixed price (lump sum) contracts,
quantities or rates based contracts, cost reimbursable contracts, and guarantee maximum price
contracts. However, the cost reimbursable contract would be most appropriate for the
development of the project. The analysis of the cost reimbursable contract has been made in the
following section,
Cost Reimbursable Contracts: The cost reimbursable contract has involved the
payments of the actual costs along with an additional seller profit fee to the seller (O’Connell,
2012). This type of contract also includes the incentive clause that is being given to the seller for
exceeding the expected performance in selling the product (or meeting the project objective
selected as main). The incentive is also termed as a bonus for the seller in exchange of the
performance. It is of three types namely Cost-Plus-Fee (CPF) or Cost-Plus-Percentage of Cost
(CPPC), Cost-Plus-Fixed-Fee (CPFF), and Cost-Plus-Incentive-Fee (CPIF). The implication of
the cost reimbursable contracts would be helpful for the alignment of the activities favouring the
incentive scheme development. The Cost-Plus-Fee (CPF) or Cost-Plus-Percentage of Cost
(CPPC) pay works as no incentive scheme and it is based on the cost of the contractor. The Cost-
Plus-Fixed-Fee (CPFF) is a contract pay that includes the pre-determined fee agreed by the two
parties signing the contract. The Cost-Plus-Incentive-Fee (CPIF) has a larger fee award scheme
Document Page
8RESEARCH ANALYSIS REPORT
and it is based on the alignment of the fee awards for meeting and exceeding the performance
targets.
Conclusion
The project of Research Analysis of Cyber Security on Land Transport was developed for
forming an analysis of the possible cyber security threats for land transportation system. The
study had involved the analysis of the various risks and threats for the implication of the cyber
technologies for the land transportation. The use of effective reporting guidelines had been
helpful for the implication of the activities favouring the future study and analysis. The project
had included the prioritization of the factors of risk after the analysis of the final project
development.
Document Page
9RESEARCH ANALYSIS REPORT
Bibliography
Chertoff, M., & Simon, T. (2015). The impact of the dark web on internet governance and cyber
security.
Choo, K. K. R., Kermani, M. M., Azarderakhsh, R., & Govindarasu, M. (2017). Emerging
embedded and cyber physical system security challenges and innovations. IEEE
Transactions on Dependable and Secure Computing, 14(3), 235-236.
Dua, S., & Du, X. (2016). Data mining and machine learning in cybersecurity. CRC press.
Dumitras, T., & Neamtiu, I. (2011). Experimental Challenges in Cyber Security: A Story of
Provenance and Lineage for Malware. CSET, 11, 2011-9.
Fowler, S., Sweetman, C., Ravindran, S., Joiner, K. F., & Sitnikova, E. (2017). Developing
cyber-security policies that penetrate Australian defence acquisitions. Australian Defence
Force Journal, (202), 17.
Fowler, S., Sweetman, C., Ravindran, S., Joiner, K. F., & Sitnikova, E. (2017). Developing
cyber-security policies that penetrate Australian defence acquisitions. Australian Defence
Force Journal, (202), 17.
Friis, K., & Ringsmose, J. (Eds.). (2016). Conflict in Cyber Space: Theoretical, Strategic and
Legal Pespectives. Routledge.
Liu, J., Xiao, Y., Li, S., Liang, W., & Chen, C. P. (2012). Cyber security and privacy issues in
smart grids. IEEE Communications Surveys & Tutorials, 14(4), 981-997.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10RESEARCH ANALYSIS REPORT
Liu, J., Xiao, Y., Li, S., Liang, W., & Chen, C. P. (2012). Cyber security and privacy issues in
smart grids. IEEE Communications Surveys & Tutorials, 14(4), 981-99
Lubell, J., & Zimmerman, T. (2017, March). CHALLENGES TO AUTOMATING SECURITY
CONFIGURATION CHECKLISTS IN MANUFACTURING ENVIRONMENTS. In
International Conference on Critical Infrastructure Protection (pp. 225-241). Springer,
Cham.
Lynn, W. J. (2010). Defending a new domain: the Pentagon's cyberstrategy. Foreign Affairs,
89(5), 97-108.
O’Connell, M. E. (2012). Cyber security without cyber war. Journal of Conflict and Security
Law, 17(2), 187-209.
Saini, S., Beniwal, R. K., Kumar, R., Paul, R., & Saini, S. (2018). Modelling for improved cyber
security in Smart distribution system. International Journal on Future Revolution in
Computer Science & Communication Engineering, Accepted.
Wells, L. J., Camelio, J. A., Williams, C. B., & White, J. (2014). Cyber-physical security
challenges in manufacturing systems. Manufacturing Letters, 2(2), 74-77.
Yan, Y., Qian, Y., Sharif, H., & Tipper, D. (2012). A survey on cyber security for smart grid
communications. IEEE Communications Surveys and tutorials, 14(4), 998-1010.
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]