Managing a Successful Computing Project: A Case Study of Barclays Bank

Verified

Added on  2024/07/03

|26
|4689
|338
AI Summary
This report presents a comprehensive project management plan for addressing security vulnerabilities within Barclays Bank's computing systems. The project aims to improve data confidentiality, integrity, and availability by analyzing vulnerabilities and implementing appropriate security measures. The report includes a detailed work breakdown structure, Gantt chart, qualitative and quantitative research findings, data analysis, and recommendations for enhancing Barclays Bank's security posture. The project management process is evaluated, highlighting the value of effective planning, resource allocation, and communication in achieving project objectives.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
MANAGING A SUCCESSFUL
COMPUTING PROJECT

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
TABLE OF CONTENTS
Introduction
......................................................................................................................................1
Task 1
...............................................................................................................................................2
P1 Devise project aims and objectives for a chosen scenario
......................................................2
P2 Produce a project management plan
....................................................................................... 4
P3 Produce a work breakdown structure and a Gantt chart to provide timeframes and stages for

completion
...................................................................................................................................6
M1
Produce a comprehensive project management plan............................................................8
Task 2
...............................................................................................................................................9
P4
Carry out small-scale research by applying qualitative and quantitative research methods. .9
M2 Evaluate the accuracy and reliability of different research methods applied
......................11
Task 3
.............................................................................................................................................12
P5 Analyse research and data using appropriate tools and techniques
......................................12
P6 Communicate appropriate recommendations as a result of research and data analysis to

draw valid and meaningful conclusions
....................................................................................15
M3 Evaluate the selection of appropriate tools and techniques for accuracy and authenticity
. 16
Task 4
.............................................................................................................................................17
P7 Reflect on the value of undertaking the research to meet stated objectives and own learning

and performance
........................................................................................................................17
M4 Evaluate the value of the project management process
.......................................................18
Conclusion
..................................................................................................................................... 19
References
......................................................................................................................................20
Appendix
........................................................................................................................................21
Project logbook
.......................................................................................................................... 21
Document Page
LIST OF TABLES
Table 1: Gantt chart
.........................................................................................................................7
Table 2: Milestone plan
...................................................................................................................8
Table 3: Project schedule
.................................................................................................................8
Table 4: Performance review template
.......................................................................................... 18
Table 5: Project logbook
................................................................................................................21
Document Page
LIST OF FIGURES
Figure 1: Work breakdown structure
............................................................................................... 6

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Introduction
Security of the customers and employees information and detail is one of the biggest

responsibilities of all the organization but sometimes due to the vulnerability impact they may

face security issues which reduce their data confidentiality and integrity. The below report and

research project will cover the security issues occurring in the Barclays Bank which is based in

the UK and provide banking services to their customers. The report will cover the project plan,

logbook, work breakdown structure, Gantt chart, small-scale research, data analysis, reflection

part and performance review for concluding the project. The report will effectively provide the

findings about impact of vulnerabilities on the computing systems of Barclay’s organization due

to which they face security issues.

1
Document Page
Task 1
P1 Devise project aims and objectives for a chosen scenario

Background of organization

Barclays is one of the largest banking sector organizations which provide banking facilities and

other financial help to their customers. Barclay’s organization is based in the UK and has large

number of customer base in the market which shows their brand image at huge scale. They need

to manage the confidential details and information of their customers and for this they need to

protect their information system from vulnerabilities. It is also essential for them to manage the

reliability, security and confidentiality of their customers details so that they can maintain their

customers trust and achieve data availability (Maina, 2017).

Project description

This project mainly focuses on
vulnerability assessment within the Barclays organization that put
impact on the data accuracy, reliability and security with the data availability and confidentiality.

In the organization some computing resources can be vulnerable towards the attacks, damage

and unauthenticated access

Problem statement

Currently organization is facing security issues in their business due to which loss in the

customer information is faced by them. They are facing
attacks and unauthenticated access
issues due to which security and confidentiality of the information is getting disturbed. . It is

important for them to analyze the vulnerabilities and its impact so that changes can be

implemented to achieve the data security at high level (Abomhara and Køien, 2015).

Project aim

The project goal or aim is only to analyze the
vulnerabilities upon the computing resources that
are currently using by Barclays organization. This project goal helps them to improve their data

accuracy, reliability, confidentiality and security. The goal of this project is just to improve the

organization security by considering the business scope and capabilities.

2
Document Page
Project objectives
Is to understand the importance of availability, integrity and confidentiality of data in the
context of the Barclays organization.

Is to evaluate the vulnerabilities impact and sources which put impact on the security and
management of the data.

Is to justify the implementation of some recommendation just to reduce the impact of
vulnerabilities.

3

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
P2 Produce a project management plan
Barclays bank can attain the security desire with the help of the project management plan. The

project planning is one of the process for initiating the concept, resources planning, framework

design and approach implementation. They need to focus on quality management and

monitoring. Following is the
project management plan for Barclays bank:
Cost:
Every organization need to make their budget before starting project or completing
project. It is identified that this project requires $20,000 of budget to start and finish the project.

In the budget major areas are covered like- technical hardware or software, resources, designing

of security framework and quality assurance with the various approaches. They need to reserve

some additional amount also for risk management such as- $2,000.

Project scope:
This project manages the reliable and accurate information in effective manner.
With this project, the Barclays bank also achieves data
confidentiality and security that improve
decision making process and operational activities (Puthal et al, 2015).

Duration or time:
to start and finish this project at least 2 months are required as the project
time. It is essential for organization to manage their resources availability and
delays in last two
weeks so that project must be completed on time and with effectiveness. The management of

time is quite constraint with the policies and business operation role management.

Project quality:
TQM (Total Quality Management) is the approach which can be used by
organization to manage the project quality. This will help to consider the
time, efforts and cost
and organization need to ensure out the outcomes to prevent the vulnerable activities. The

organization need to monitor and measure the project quality for achieving project baseline.

Communication:
Personal interaction and mails are some channels which can be used by
organization to communicate the project details with other members and stakeholders. The can

use services of mail to report about the routine progress with the team members. This will help

them avoid the conflicts and they can resolve issues and also monitor the project progress

together (
Hussain et al, 2017).
4
Document Page
Project risk: Time and cost management is one of the risks which are associated with this
project which is required to be overcome and avoid by the Barclays Bank and their team. The

resources
unavailability and delay at the work to avoid risk and to achieve quality outcomes.
This is required to secure data, resources use and risk which is effective for this project.

Project resources:
Barclays Bank has the technical department that can conduct system audit
and security management. The organization needs resources to plan the resources and quality

assurance. They need at least five employees who can implement this project and between them

work need to be equally distributed for achieving goal (Islam et al, 2016).

5
Document Page
P3 Produce a work breakdown structure and a Gantt chart to provide timeframes and stages for
completion

Work breakdown structure is required to plan
manageable modules of project goals which they
need to be communicated with team members with the high quality of performance. Following is

the WBS for Barclays Bank project:

Figure
1: Work breakdown structure
Gantt chart is required to set the project activities and then implement as per the time required.

This is effective to analyze the progress of the project as per the defined duration. Following is

the Gantt chart with activities and time:

6

Computing project
Planning
Hand on
machines
User and
system
analysis
Document
the strategy
Identify
skills
Requirement
specification
Meeting
s
Focus on
issues
Ouline
solutions
Risk
identification
Pre-design
Communicati
on for project
requirement
Finalization
of solutions
Contract and
agreement
Revise cost
and time
Designing
Logical
design
Physical
resources
Protyping
and risk
managment
Implement
ation
Configuratio
n of device
and software
additional
installation
Docume
ntation
Testing
Configurat
ion testing
Physical
installation
Quality
analysis
Post-
implementation
Maintenan
ce guide
Recomme
ndations
Training and
development
Resource
handover
Project
closure

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table 1: Gantt chart
Project activities
Timescale
Planning activity

Existing parameter of security (1 day)
Understand the feature of CIA (1 day)
Resource planning (2 days)
Creation of project concept (3 days)
First week

Specification of requirements

Analyze the impact (2 days)
Analyze the vulnerabilities (1 day)
Communication with internal team (2 days)
Second week

Pre-design

Contracting (1.5 days)
Solution forming (1 day)
Resource management (2.5 days)
Third week

Designing

Requirement verification (1 day)
Design the Prototyping (3 days)
Final the project design (1 day)
Fourth week

Implementation

Install hardware and software (3 days)
Configuration (2 days)
Update the current components (1 day)
Fifth week

Testing

Testing based on module (1 day)
Testing of functions (2 days)
Sixth week

Post-implementation

Training and development (3 days)
Seventh week

7
Document Page
Close the project (1 day)
M1
Produce a comprehensive project management plan
Table
2: Milestone plan
Activities
Time Current status
Planning
Need 5 days Activity is complete
Designing
Need 12 days Activity is complete
Implementation
Need 6 days Only partial complete
Testing
Need 4 days Some areas are due
Post implementation
Need 6 days Started but not complete
Table
3: Project schedule
Activities
Timescale
Plan
30 days
Engineering needs
30 days
Communication pre-design plan
12 days
Designing
40 days
Implementation
10 days
Testing
20 days
Post-implementation
15 days
Working days
157 days
Recovery of risk
13 days
Total days
170 days
8
Document Page
Task 2
P4
Carry out small-scale research by applying qualitative and quantitative research methods
Qualitative research

As per the
Carroll (2014), weaknesses of vulnerabilities within the management of computer
security are those which can exploit systems for resource damage, data modification and

unauthenticated access. The impact of vulnerabilities on the organization put on the data

availability so that unauthorized users cannot access the data on time when they need to access.

The data security loss can also deliver inconsistent and inaccurate data. Integrity put major on

the organization decision making process and also on the data processing because this will

further lead the incorrect outcomes or results. According to the Hsiao et al (2014), this is

essential for organization to configure and install the computing resources as per the standard

practices and rules are needed for applying the accessibility of the users for achieving the data

security.

Quantitative research

The Barclays bank can also use questionnaire for conducting the research by providing survey to

the employees. The questionnaire survey is very useful for collecting the statistical data through

the business, support of employees and devices which give support to decision making process.

Following are the questions which are related to the selected topic:

1.
Have you as the user access to server and desired sources according to the liabilities
and roles in the business?

a) Yes
b) No
2.
Is there any encryption on user’s directory which effective to prevent the
unauthenticated access?

a) Yes
b) No
3.
Are the permission on sources of data are unmodified with the system changes?
a) Yes
b) No
4.
Is the sources of data are available for all the time just to ensure about the
availability of the data?

9

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
a) Yes b) No
5.
Have the team or you access the computer hardware which is being used in the
services of networking which is out of your own role?

a) Yes
b) No
6.
Is all the devices and the data are uncompromised even if you stay away from the
computer system?

a) Yes
b) No
7.
Give you opinion regarding infrastructural security upon the computing resources?
a) Average
b) Poor c) Excellent d) Effective
8.
In how much time you will determine and submitted infected file system issues?
a) 0-25
b) 26-50 c) more than 50 d) Never
10
Document Page
M2 Evaluate the accuracy and reliability of different research methods applied
In the project the researcher has used quantitative and qualitative research approaches for

understanding the impact of the vulnerabilities in the business. Barclays Bank is providing

proper banking services in that data monitoring and availability is the core function which need

to be focused. This project has considered qualitative research in which researcher has take help

of articles, journals and books so that all the data available within the organization can easily

processed to make the proper decision making process. The records and documents from

business are used on devices and also about their performance which is used to meet the

requirements. This research is quite accurate when the data of business is used to take the

effective decision (Csikszentmihalyi and Larson, 2014).

The data analysis and consideration on vulnerabilities is evaluated through journals and books

which helped for providing reliable data with the security. This project has also used quantitative

research which is more accurate and reliable due to direct communication with target

respondents. For example: project has also used questionnaire survey for collecting the data from

the Barclays employees. This questionnaire survey is beneficial for organization just to achieve

accurate data from their employees on their selected options and interview is also provided to get

the detailed suggestions. But quantitative research is more time consuming and need advice of

some experts so that objective of the research can be achieved (Noble and Smith, 2015).

Quantitative research provides the numerical and accurate information to get the conclusion in

proper manner. With this statistical data is generated that was complex in theoretical research of

qualitative research.

11
Document Page
Task 3
P5 Analyse research and data using appropriate tools and techniques

The findings of the research project are required for understanding the data nature. The

organization collects the data with the help of the secondary sources such as- journals and books

that can be validated and processed by using the authenticated books. The Barclays Bank also

validated the impact of the vulnerabilities with the analysis of the business but they require

synthesis process for eliminating the unwanted data from research which improve the project

quality and performance.

So for analyzing the data of questionnaire survey the project need to make data analysis

approach. The respondents selected in this questionnaire is 30 as they are distributed as per their

departments, age, roles and knowledge about the information management and computer

systems and after this organization can easily generate the map and sample to their all the

employees. This will also help just to complete the survey with the limited number of employees

but they scale all the resources in effective manner to get the appropriate decision making

process.

Yes
No
0

5

10

15

20

25

Is there any encryption on user’s
directory which effective to prevent
the unauthenticated access?

Yes
No
0

5

10

15

20

25

30

Have you as the user access to server and
desired sources according to the liabilities
and roles in the business?

12

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Yes No
0

5

10

15

20

25

Are the permission on sources of data
are unmodified with the system
changes?

Yes
No
0

5

10

15

20

25

30

Is the sources of data are available for
all the time just to ensure about the
availability of the data?

Yes
No
0

5

10

15

20

25

30

Have the team or you access the com-
puter hardware which is being used in the
services of networking which is out of
your own role?

Yes
No
0

5

10

15

20

25

Is all the devices and the data are
uncompromised even if you stay
away from the computer system?

13
Document Page
Poor Average Effective Excellent
0

2

4

6

8

10

12

14

Give you opinion regarding infrastruc-
tural security upon the computing re-
sources?

0-25
26-50 more
than 50
Never
0

2

4

6

8

10

12

14

16

18

In how much time you will determ-
ine and submitted infected file sys-
tem issues?

14
Document Page
P6 Communicate appropriate recommendations as a result of research and data analysis to draw
valid and meaningful conclusions

This research has provided the results and outcomes which organization can consider for

understanding the impact of vulnerabilities on the data security. This research is effective for

Barclay’s organization to get the conclusion on effective security on their computing resources

and also high information
availability. The research has also determined that Barclay’s
organization needs some improvement in their vulnerabilities impact identification during the

data sharing and on their systems with monitoring and awareness (
McCusker and Gunaydin,
2015
). So this research is effective as it has determined that Barclays Bank need to implement
the security for ensuring about the high performance and confidentiality. It has analyzed that

Barclays is currently facing many issues which are related to their data security due to which

information and details of their customers may be used by unauthorized user. For reducing these

issues or security problems from their business them there are some recommendation which they

need to implement such as-

They can use encryption and also permission management through they can prevent the
accessibility to the directories of users. This will protect the confidential information of

the Bank which is related to the customers.

They need to review the roles and responsibilities of the users through which they can
achieve the desire resources access.

Centralized access management system can also be used in the Barclays so that their
users can take permission before accessing the information.

They can also implement regular auditing of data security and monitoring so achieving
security goals.

Conclusion

The above discussion has concluded that suggested recommendations are effective for Barclays

Bank through which they can ensure about the data and information security. This research has

helped them to identify the impact of the vulnerabilities on their computing resources so that

effective solutions can be identified to get
the data confidentiality, integrity and availability
during their storage, sharing and operations.

15

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
M3 Evaluate the selection of appropriate tools and techniques for accuracy and authenticity
The research project has used mixed research approach for their data analysis and that is based

on the data analysis and through this decision can be made. This is effective for the organization

to achieve the authenticated and accurate data. This project research has also used secondary

research under which researcher has used images, articles and author books which are justified

with authenticated journals and books. This has also helped for ensuring about the collected data

on the impact of vulnerabilities and their accurate solutions. The data is collected in statistical

format from the customer experience and documents of business that is varied by the help of the

analysis user role and available format (Terrell, 2012).

This research has also ensured that all collected data from secondary research is accurate during

its collection, processing and also in analysis as this was collected from the reliable resources or

sources. The research project has also used data sampling method for analysing the quantitative

data with this research. The questionnaire is also prepared by using sources of statistical data and

given to the trusted employees of Barclays so that accurate and reliable information can be

gathered in the questions. This has also helped for collected data and processing data in the

specific time and process for making proper decision.

16
Document Page
Task 4
P7 Reflect on the value of undertaking the research to meet stated objectives and own learning

and performance

The objectives and goals of the project are to understand the data confidentiality, availability and

integrity requirement in the Barclays organization by analysing the impact of the vulnerabilities.

The research undertaking
has given me the value to explore techniques and tools related to the
project management. The research also helped me to experience and understands process and

structure for preparing the effective outcomes outline. In this research I have applied some

needed constraints that are related to the time, efforts and cost just to complete this project

effectively (Lock, 2017).

The research also undertaking some empowered for using tools of project management such as-

Gantt chart and work breakdown structure so that all the activities has been completed on time.

The research has also understood the data authenticity and accuracy sources are used. This

research also gives value to the goals for understanding the map capabilities and requirements

but in the systematic manner due to which aim of the project has achieved.

Learning and performance

In the research, I have also learned about the requirement of the data
availability, integrity and
confidentiality within the business. I have experience how the Barclays bank can ensure about

the data security with the effective configuration and installation of device along with the

changes required in the business approaches and practices. While considering the point about

learning which is achieved to understand the planning project and need audit of computing

resources. The computer system and network resources are analyzed and examined for security

threats and effective improvement for reducing the loss.

17
Document Page
M4 Evaluate the value of the project management process
The process of product management is applied in this research so that goals of business and

objectives are achieved. The project management is effective to create the modules of project

which are later
assigned towards their employees for accomplishing the activities inn effective
manner. This is effective to standardize all the data collection process and project processing.

This is also effective to properly use the resources, cost and time so that this project can be

accomplished in the constraints of business. The process of project management also helps me to

understand the tools and techniques which reduce the time and meet the objectives.

During conducting this project management process the quality of the project managed with the

monitoring process. The Barclays organization can also use quality measures for meeting their

cost and time values in the activities. This is helpful for the organization to learn about the

management of the quality to improve the productivity of the organization. The project plan also

helps the organization to learn about the resources of motivation so that with the help of team

they can generate effective results or outcomes (Csikszentmihalyi and Larson, 2014).

Table
4: Performance review template
Questions related to performance
Yes No
Do the outcome or findings of the research are effective and proper

for achieving the set aims and objective of the project?


Do you think all the resources are properly gathered as per the

requirement of the project and use effectively?


Is the research has identified the impact of the vulnerabilities on the

performance and functions of Barclays bank?


Do you think all employees and project management team members

properly perform their individual roles and responsibilities?


Do you think suggested recommendations are effective for

organization through which their security purpose can be achieved?


18

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Conclusion
The above project and conducted research is done in the context of the Barclays which is the

leading banking sector organization based in the UK. The project research is done by setting aim

and objective which is related to impact of the vulnerabilities due to which security issues are

faced by the organization. The report has concluded that by implementing the proper security

measures they can avoid the issues related to the security of data and confidentiality of the data.

The project has also discussed about the effectiveness of mixed research method to get the

accurate and reliable data. In the end the report has also provided reflection part in which

learning of the project team has provided.

19
Document Page
References
Books and Journals

Abomhara, M. and Køien, G.M., 2015. Cyber security and the internet of things:
vulnerabilities, threats, intruders and attacks.
Journal of Cyber Security, 4(1), pp.65-88.
Carroll, J.M., 2014. Computer security. Butterworth-Heinemann.
Csikszentmihalyi, M. and Larson, R., 2014. Validity and reliability of the experience-
sampling method. In
Flow and the foundations of positive psychology (pp. 35-54).
Springer, Dordrecht.

Hsiao, D.K., Kerr, D.S. and Madnick, S.E., 2014. Computer security. Academic Press.
Hussain, S.A., Fatima, M., Saeed, A., Raza, I. and Shahzad, R.K., 2017. Multilevel
classification of security concerns in cloud computing.
Applied Computing and
Informatics
, 13(1), pp.57-65.
Islam, T., Manivannan, D. and Zeadally, S., 2016. A classification and characterization of
security threats in cloud computing.
Int. J. Next-Gener. Comput, 7(1).
Lock, D., 2017. The essentials of project management. Routledge.
Maina, J., 2017. Effects of Environmental Factors on Performance: A Case of Barclays
Bank
(Doctoral dissertation, United States International University-Africa).
McCusker, K. and Gunaydin, S., 2015. Research using qualitative, quantitative or mixed
methods and choice based on the research.
Perfusion, 30(7), pp.537-542.
Noble, H. and Smith, J., 2015. Issues of validity and reliability in qualitative
research.
Evidence-Based Nursing, pp.ebnurs-2015.
Puthal, D., Sahoo, B.P.S., Mishra, S. and Swain, S., 2015, January. Cloud computing
features, issues, and challenges: a big picture. In
Computational Intelligence and
Networks (CINE), 2015 International Conference on
(pp. 116-123). IEEE.
Terrell, S.R., 2012. Mixed-methods research methodologies. The qualitative
report
, 17(1), pp.254-280.
20
Document Page
Appendix
Project logbook

Table
5: Project logbook
Weeks
Time Actions required for each week
1
st 12th sept-19th Sept 2017 Monitor project progress and implement needed changes
2
nd 20th sept-27th Sept 2017 Draw some project proposal and create project design
Hire team to distribute roles and responsibilities of project

3
rd 28st sept-4th Oct 2017 Create Gantt chart and WBS and Log book also for project
4
th 5 sept-12th Oct 2017 Conduct research by appointing researcher and conduct data findings
and analysis

Evaluate the research progress and make regular report

5
th 13th oct-20th Oct 2017 Execute some modification required by taking stakeholders
suggestions

6
th 21th oct-28 Oct 2017 Organize one official meeting with organization stakeholders and
communicate all the report details with them

7
th 29th oct-5th Nov 2017 Create the conclusion of the project and implement the project in
effective manner as per organization security requirement

21

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
22
1 out of 26
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]