logo

Industry Project Plan Assessment

   

Added on  2022-08-22

13 Pages2351 Words21 Views
Running head: INDUSTRY PROJECT PLAN
Industry Project Plan
Name of Student-
Name of University-
Author’s Note-

INDUSTRY PROJECT PLAN1
Title: Strategies for Protecting Business Data from Unmanaged Devices
Introduction
Background
The organization that is included in this report is ChekRite. This is a data capturing
company that helps to store the data of the user securely. The main goal of ChekRite is creating a
safer, efficient and productive working environment and this is done by eliminating the admin,
recovering costs, and prioritize the risks. ChekRite helps to conduct digital inspections by
providing checklists, and can collect detailed information by asking clear questions, and annotate
photos and also enables the users to record notes over voice. After completion of the inspection,
ChekRite helps to sign, share and submit the inspection with single check. ChekRite has security
with the interface that they provide and they have secured iOS platform. But after expanding to
Android application, the security and usability of the app is to be increased. There are many
companies that has Bring Your Own Devices (BYOD) policies and for those companies
ChekRite needs to provide more secured interface.
Aim of project
The aim of this research project is to increase the security and usability of the android
mobile application provided by ChekRite and implement strategies to protect the business data
from some unmanaged devices. The android based application is not as secured as iOS
application and ChekRite needs to secure the information that are captured by the android
application.
Objective of the project
The objectives of this research project are

INDUSTRY PROJECT PLAN2
To study the current state of the unmanageable devices that are used in the business.
To speared technical knowledge, risk awareness and the data threat exposure to the users
using the unmanageable devices.
To specify different approaches that the software companies should take so that they can
manage the risk of the unmanaged devices and includes cost implications of those
approaches.
To provide technical solution in application design so that the data of the company can be
protected from unmanaged android devices.
Potential Impact
By developing this research project, the businesses using BYOD policies can store the
data securely in their businesses. There will be potential growth in the business as because they
will be able to store the data securely in the cloud.
Describe Project Scope
In-Scope
The in-scope of this research project includes
The technical solution for the android application will be provided in this research so that
the companies can protect their data.
Proper training will be provided to the employees of the companies to use the android
application as all the employees are not tech savvy.
Includes risk awareness for using the non-manageable devices in the organization.

INDUSTRY PROJECT PLAN3
Out-Scope
Any documentation for the training that are provided to the employee will not be
included in this research project.
Security policies will not be provided the users using the application.
The application intend to protect the data under some particular constraints and if data
breach occurs outside those constraints, that is not included in this research project.
Functional Requirements
ChekRite will help to create a profile for the users who uses the android application.
There will be option for the users to select that is they want to do inspection, pre-start or
can select the uncategorized option.
The users will be able to start the checking for a particular asset and they will be able to
calculate the price of the widgets that are used in the organization.
The customers will also have the accessibility to record the “to do tasks” so that they gets
reminded at the time to do the work.
The customers will have security and proper user interface to access the application.
Non-Functional Requirements
The application will have a user interface that is easy to use and users who are not tech
savvy can also use the application.
The application will have security so that the data can be stored safely in the application.
The application will be available 24 hours and will be robust and reliable for the users.
The application is capable of handling any exception error in the application.
The application will be able to support many concurrent users and the response time of
the interface is very less.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Mobile Application Threat Modeling
|14
|3127
|21

(PDF) Advanced programming language design
|14
|4570
|66

Aztek: IT Risk Management Bring Your Own Devices (BYOD)
|20
|5080
|285

Bring Your Own Device - (BYOD) Essay
|5
|827
|58

System Development: Functional and Non-Functional Requirements, Stakeholder Analysis, Use Case and Activity Diagrams
|12
|1373
|198

Bring Your Own Device (BYOD)
|4
|1699
|379