Managing a Successful Computing Project: A Case Study of Barclays Bank
VerifiedAdded on 2024/07/03
|26
|4689
|338
AI Summary
This report presents a comprehensive project management plan for addressing security vulnerabilities within Barclays Bank's computing systems. The project aims to improve data confidentiality, integrity, and availability by analyzing vulnerabilities and implementing appropriate security measures. The report includes a detailed work breakdown structure, Gantt chart, qualitative and quantitative research findings, data analysis, and recommendations for enhancing Barclays Bank's security posture. The project management process is evaluated, highlighting the value of effective planning, resource allocation, and communication in achieving project objectives.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
MANAGING A SUCCESSFUL
COMPUTING PROJECT
COMPUTING PROJECT
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
TABLE OF CONTENTS
Introduction......................................................................................................................................1
Task 1...............................................................................................................................................2
P1 Devise project aims and objectives for a chosen scenario......................................................2
P2 Produce a project management plan....................................................................................... 4
P3 Produce a work breakdown structure and a Gantt chart to provide timeframes and stages for
completion...................................................................................................................................6
M1 Produce a comprehensive project management plan............................................................8
Task 2...............................................................................................................................................9
P4 Carry out small-scale research by applying qualitative and quantitative research methods. .9
M2 Evaluate the accuracy and reliability of different research methods applied......................11
Task 3.............................................................................................................................................12
P5 Analyse research and data using appropriate tools and techniques......................................12
P6 Communicate appropriate recommendations as a result of research and data analysis to
draw valid and meaningful conclusions....................................................................................15
M3 Evaluate the selection of appropriate tools and techniques for accuracy and authenticity. 16
Task 4.............................................................................................................................................17
P7 Reflect on the value of undertaking the research to meet stated objectives and own learning
and performance........................................................................................................................17
M4 Evaluate the value of the project management process.......................................................18
Conclusion..................................................................................................................................... 19
References......................................................................................................................................20
Appendix........................................................................................................................................21
Project logbook.......................................................................................................................... 21
Introduction......................................................................................................................................1
Task 1...............................................................................................................................................2
P1 Devise project aims and objectives for a chosen scenario......................................................2
P2 Produce a project management plan....................................................................................... 4
P3 Produce a work breakdown structure and a Gantt chart to provide timeframes and stages for
completion...................................................................................................................................6
M1 Produce a comprehensive project management plan............................................................8
Task 2...............................................................................................................................................9
P4 Carry out small-scale research by applying qualitative and quantitative research methods. .9
M2 Evaluate the accuracy and reliability of different research methods applied......................11
Task 3.............................................................................................................................................12
P5 Analyse research and data using appropriate tools and techniques......................................12
P6 Communicate appropriate recommendations as a result of research and data analysis to
draw valid and meaningful conclusions....................................................................................15
M3 Evaluate the selection of appropriate tools and techniques for accuracy and authenticity. 16
Task 4.............................................................................................................................................17
P7 Reflect on the value of undertaking the research to meet stated objectives and own learning
and performance........................................................................................................................17
M4 Evaluate the value of the project management process.......................................................18
Conclusion..................................................................................................................................... 19
References......................................................................................................................................20
Appendix........................................................................................................................................21
Project logbook.......................................................................................................................... 21
LIST OF TABLES
Table 1: Gantt chart.........................................................................................................................7
Table 2: Milestone plan...................................................................................................................8
Table 3: Project schedule.................................................................................................................8
Table 4: Performance review template.......................................................................................... 18
Table 5: Project logbook................................................................................................................21
Table 1: Gantt chart.........................................................................................................................7
Table 2: Milestone plan...................................................................................................................8
Table 3: Project schedule.................................................................................................................8
Table 4: Performance review template.......................................................................................... 18
Table 5: Project logbook................................................................................................................21
LIST OF FIGURES
Figure 1: Work breakdown structure............................................................................................... 6
Figure 1: Work breakdown structure............................................................................................... 6
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Introduction
Security of the customers and employees information and detail is one of the biggest
responsibilities of all the organization but sometimes due to the vulnerability impact they may
face security issues which reduce their data confidentiality and integrity. The below report and
research project will cover the security issues occurring in the Barclays Bank which is based in
the UK and provide banking services to their customers. The report will cover the project plan,
logbook, work breakdown structure, Gantt chart, small-scale research, data analysis, reflection
part and performance review for concluding the project. The report will effectively provide the
findings about impact of vulnerabilities on the computing systems of Barclay’s organization due
to which they face security issues.
1
Security of the customers and employees information and detail is one of the biggest
responsibilities of all the organization but sometimes due to the vulnerability impact they may
face security issues which reduce their data confidentiality and integrity. The below report and
research project will cover the security issues occurring in the Barclays Bank which is based in
the UK and provide banking services to their customers. The report will cover the project plan,
logbook, work breakdown structure, Gantt chart, small-scale research, data analysis, reflection
part and performance review for concluding the project. The report will effectively provide the
findings about impact of vulnerabilities on the computing systems of Barclay’s organization due
to which they face security issues.
1
Task 1
P1 Devise project aims and objectives for a chosen scenario
Background of organization
Barclays is one of the largest banking sector organizations which provide banking facilities and
other financial help to their customers. Barclay’s organization is based in the UK and has large
number of customer base in the market which shows their brand image at huge scale. They need
to manage the confidential details and information of their customers and for this they need to
protect their information system from vulnerabilities. It is also essential for them to manage the
reliability, security and confidentiality of their customers details so that they can maintain their
customers trust and achieve data availability (Maina, 2017).
Project description
This project mainly focuses on vulnerability assessment within the Barclays organization that put
impact on the data accuracy, reliability and security with the data availability and confidentiality.
In the organization some computing resources can be vulnerable towards the attacks, damage
and unauthenticated access
Problem statement
Currently organization is facing security issues in their business due to which loss in the
customer information is faced by them. They are facing attacks and unauthenticated access
issues due to which security and confidentiality of the information is getting disturbed. . It is
important for them to analyze the vulnerabilities and its impact so that changes can be
implemented to achieve the data security at high level (Abomhara and Køien, 2015).
Project aim
The project goal or aim is only to analyze the vulnerabilities upon the computing resources that
are currently using by Barclays organization. This project goal helps them to improve their data
accuracy, reliability, confidentiality and security. The goal of this project is just to improve the
organization security by considering the business scope and capabilities.
2
P1 Devise project aims and objectives for a chosen scenario
Background of organization
Barclays is one of the largest banking sector organizations which provide banking facilities and
other financial help to their customers. Barclay’s organization is based in the UK and has large
number of customer base in the market which shows their brand image at huge scale. They need
to manage the confidential details and information of their customers and for this they need to
protect their information system from vulnerabilities. It is also essential for them to manage the
reliability, security and confidentiality of their customers details so that they can maintain their
customers trust and achieve data availability (Maina, 2017).
Project description
This project mainly focuses on vulnerability assessment within the Barclays organization that put
impact on the data accuracy, reliability and security with the data availability and confidentiality.
In the organization some computing resources can be vulnerable towards the attacks, damage
and unauthenticated access
Problem statement
Currently organization is facing security issues in their business due to which loss in the
customer information is faced by them. They are facing attacks and unauthenticated access
issues due to which security and confidentiality of the information is getting disturbed. . It is
important for them to analyze the vulnerabilities and its impact so that changes can be
implemented to achieve the data security at high level (Abomhara and Køien, 2015).
Project aim
The project goal or aim is only to analyze the vulnerabilities upon the computing resources that
are currently using by Barclays organization. This project goal helps them to improve their data
accuracy, reliability, confidentiality and security. The goal of this project is just to improve the
organization security by considering the business scope and capabilities.
2
Project objectives
Is to understand the importance of availability, integrity and confidentiality of data in the
context of the Barclays organization.
Is to evaluate the vulnerabilities impact and sources which put impact on the security and
management of the data.
Is to justify the implementation of some recommendation just to reduce the impact of
vulnerabilities.
3
Is to understand the importance of availability, integrity and confidentiality of data in the
context of the Barclays organization.
Is to evaluate the vulnerabilities impact and sources which put impact on the security and
management of the data.
Is to justify the implementation of some recommendation just to reduce the impact of
vulnerabilities.
3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
P2 Produce a project management plan
Barclays bank can attain the security desire with the help of the project management plan. The
project planning is one of the process for initiating the concept, resources planning, framework
design and approach implementation. They need to focus on quality management and
monitoring. Following is the project management plan for Barclays bank:
Cost: Every organization need to make their budget before starting project or completing
project. It is identified that this project requires $20,000 of budget to start and finish the project.
In the budget major areas are covered like- technical hardware or software, resources, designing
of security framework and quality assurance with the various approaches. They need to reserve
some additional amount also for risk management such as- $2,000.
Project scope: This project manages the reliable and accurate information in effective manner.
With this project, the Barclays bank also achieves data confidentiality and security that improve
decision making process and operational activities (Puthal et al, 2015).
Duration or time: to start and finish this project at least 2 months are required as the project
time. It is essential for organization to manage their resources availability and delays in last two
weeks so that project must be completed on time and with effectiveness. The management of
time is quite constraint with the policies and business operation role management.
Project quality: TQM (Total Quality Management) is the approach which can be used by
organization to manage the project quality. This will help to consider the time, efforts and cost
and organization need to ensure out the outcomes to prevent the vulnerable activities. The
organization need to monitor and measure the project quality for achieving project baseline.
Communication: Personal interaction and mails are some channels which can be used by
organization to communicate the project details with other members and stakeholders. The can
use services of mail to report about the routine progress with the team members. This will help
them avoid the conflicts and they can resolve issues and also monitor the project progress
together (Hussain et al, 2017).
4
Barclays bank can attain the security desire with the help of the project management plan. The
project planning is one of the process for initiating the concept, resources planning, framework
design and approach implementation. They need to focus on quality management and
monitoring. Following is the project management plan for Barclays bank:
Cost: Every organization need to make their budget before starting project or completing
project. It is identified that this project requires $20,000 of budget to start and finish the project.
In the budget major areas are covered like- technical hardware or software, resources, designing
of security framework and quality assurance with the various approaches. They need to reserve
some additional amount also for risk management such as- $2,000.
Project scope: This project manages the reliable and accurate information in effective manner.
With this project, the Barclays bank also achieves data confidentiality and security that improve
decision making process and operational activities (Puthal et al, 2015).
Duration or time: to start and finish this project at least 2 months are required as the project
time. It is essential for organization to manage their resources availability and delays in last two
weeks so that project must be completed on time and with effectiveness. The management of
time is quite constraint with the policies and business operation role management.
Project quality: TQM (Total Quality Management) is the approach which can be used by
organization to manage the project quality. This will help to consider the time, efforts and cost
and organization need to ensure out the outcomes to prevent the vulnerable activities. The
organization need to monitor and measure the project quality for achieving project baseline.
Communication: Personal interaction and mails are some channels which can be used by
organization to communicate the project details with other members and stakeholders. The can
use services of mail to report about the routine progress with the team members. This will help
them avoid the conflicts and they can resolve issues and also monitor the project progress
together (Hussain et al, 2017).
4
Project risk: Time and cost management is one of the risks which are associated with this
project which is required to be overcome and avoid by the Barclays Bank and their team. The
resources unavailability and delay at the work to avoid risk and to achieve quality outcomes.
This is required to secure data, resources use and risk which is effective for this project.
Project resources: Barclays Bank has the technical department that can conduct system audit
and security management. The organization needs resources to plan the resources and quality
assurance. They need at least five employees who can implement this project and between them
work need to be equally distributed for achieving goal (Islam et al, 2016).
5
project which is required to be overcome and avoid by the Barclays Bank and their team. The
resources unavailability and delay at the work to avoid risk and to achieve quality outcomes.
This is required to secure data, resources use and risk which is effective for this project.
Project resources: Barclays Bank has the technical department that can conduct system audit
and security management. The organization needs resources to plan the resources and quality
assurance. They need at least five employees who can implement this project and between them
work need to be equally distributed for achieving goal (Islam et al, 2016).
5
P3 Produce a work breakdown structure and a Gantt chart to provide timeframes and stages for
completion
Work breakdown structure is required to plan manageable modules of project goals which they
need to be communicated with team members with the high quality of performance. Following is
the WBS for Barclays Bank project:
Figure 1: Work breakdown structure
Gantt chart is required to set the project activities and then implement as per the time required.
This is effective to analyze the progress of the project as per the defined duration. Following is
the Gantt chart with activities and time:
6
Computing project
Planning
Hand on
machines
User and
system
analysis
Document
the strategy
Identify
skills
Requirement
specification
Meeting
s
Focus on
issues
Ouline
solutions
Risk
identification
Pre-design
Communicati
on for project
requirement
Finalization
of solutions
Contract and
agreement
Revise cost
and time
Designing
Logical
design
Physical
resources
Protyping
and risk
managment
Implement
ation
Configuratio
n of device
and software
additional
installation
Docume
ntation
Testing
Configurat
ion testing
Physical
installation
Quality
analysis
Post-
implementation
Maintenan
ce guide
Recomme
ndations
Training and
development
Resource
handover
Project
closure
completion
Work breakdown structure is required to plan manageable modules of project goals which they
need to be communicated with team members with the high quality of performance. Following is
the WBS for Barclays Bank project:
Figure 1: Work breakdown structure
Gantt chart is required to set the project activities and then implement as per the time required.
This is effective to analyze the progress of the project as per the defined duration. Following is
the Gantt chart with activities and time:
6
Computing project
Planning
Hand on
machines
User and
system
analysis
Document
the strategy
Identify
skills
Requirement
specification
Meeting
s
Focus on
issues
Ouline
solutions
Risk
identification
Pre-design
Communicati
on for project
requirement
Finalization
of solutions
Contract and
agreement
Revise cost
and time
Designing
Logical
design
Physical
resources
Protyping
and risk
managment
Implement
ation
Configuratio
n of device
and software
additional
installation
Docume
ntation
Testing
Configurat
ion testing
Physical
installation
Quality
analysis
Post-
implementation
Maintenan
ce guide
Recomme
ndations
Training and
development
Resource
handover
Project
closure
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table 1: Gantt chart
Project activities Timescale
Planning activity
Existing parameter of security (1 day)
Understand the feature of CIA (1 day)
Resource planning (2 days)
Creation of project concept (3 days)
First week
Specification of requirements
Analyze the impact (2 days)
Analyze the vulnerabilities (1 day)
Communication with internal team (2 days)
Second week
Pre-design
Contracting (1.5 days)
Solution forming (1 day)
Resource management (2.5 days)
Third week
Designing
Requirement verification (1 day)
Design the Prototyping (3 days)
Final the project design (1 day)
Fourth week
Implementation
Install hardware and software (3 days)
Configuration (2 days)
Update the current components (1 day)
Fifth week
Testing
Testing based on module (1 day)
Testing of functions (2 days)
Sixth week
Post-implementation
Training and development (3 days)
Seventh week
7
Project activities Timescale
Planning activity
Existing parameter of security (1 day)
Understand the feature of CIA (1 day)
Resource planning (2 days)
Creation of project concept (3 days)
First week
Specification of requirements
Analyze the impact (2 days)
Analyze the vulnerabilities (1 day)
Communication with internal team (2 days)
Second week
Pre-design
Contracting (1.5 days)
Solution forming (1 day)
Resource management (2.5 days)
Third week
Designing
Requirement verification (1 day)
Design the Prototyping (3 days)
Final the project design (1 day)
Fourth week
Implementation
Install hardware and software (3 days)
Configuration (2 days)
Update the current components (1 day)
Fifth week
Testing
Testing based on module (1 day)
Testing of functions (2 days)
Sixth week
Post-implementation
Training and development (3 days)
Seventh week
7
Close the project (1 day)
M1 Produce a comprehensive project management plan
Table 2: Milestone plan
Activities Time Current status
Planning Need 5 days Activity is complete
Designing Need 12 days Activity is complete
Implementation Need 6 days Only partial complete
Testing Need 4 days Some areas are due
Post implementation Need 6 days Started but not complete
Table 3: Project schedule
Activities Timescale
Plan 30 days
Engineering needs 30 days
Communication pre-design plan 12 days
Designing 40 days
Implementation 10 days
Testing 20 days
Post-implementation 15 days
Working days 157 days
Recovery of risk 13 days
Total days 170 days
8
M1 Produce a comprehensive project management plan
Table 2: Milestone plan
Activities Time Current status
Planning Need 5 days Activity is complete
Designing Need 12 days Activity is complete
Implementation Need 6 days Only partial complete
Testing Need 4 days Some areas are due
Post implementation Need 6 days Started but not complete
Table 3: Project schedule
Activities Timescale
Plan 30 days
Engineering needs 30 days
Communication pre-design plan 12 days
Designing 40 days
Implementation 10 days
Testing 20 days
Post-implementation 15 days
Working days 157 days
Recovery of risk 13 days
Total days 170 days
8
Task 2
P4 Carry out small-scale research by applying qualitative and quantitative research methods
Qualitative research
As per the Carroll (2014), weaknesses of vulnerabilities within the management of computer
security are those which can exploit systems for resource damage, data modification and
unauthenticated access. The impact of vulnerabilities on the organization put on the data
availability so that unauthorized users cannot access the data on time when they need to access.
The data security loss can also deliver inconsistent and inaccurate data. Integrity put major on
the organization decision making process and also on the data processing because this will
further lead the incorrect outcomes or results. According to the Hsiao et al (2014), this is
essential for organization to configure and install the computing resources as per the standard
practices and rules are needed for applying the accessibility of the users for achieving the data
security.
Quantitative research
The Barclays bank can also use questionnaire for conducting the research by providing survey to
the employees. The questionnaire survey is very useful for collecting the statistical data through
the business, support of employees and devices which give support to decision making process.
Following are the questions which are related to the selected topic:
1. Have you as the user access to server and desired sources according to the liabilities
and roles in the business?
a) Yes b) No
2. Is there any encryption on user’s directory which effective to prevent the
unauthenticated access?
a) Yes b) No
3. Are the permission on sources of data are unmodified with the system changes?
a) Yes b) No
4. Is the sources of data are available for all the time just to ensure about the
availability of the data?
9
P4 Carry out small-scale research by applying qualitative and quantitative research methods
Qualitative research
As per the Carroll (2014), weaknesses of vulnerabilities within the management of computer
security are those which can exploit systems for resource damage, data modification and
unauthenticated access. The impact of vulnerabilities on the organization put on the data
availability so that unauthorized users cannot access the data on time when they need to access.
The data security loss can also deliver inconsistent and inaccurate data. Integrity put major on
the organization decision making process and also on the data processing because this will
further lead the incorrect outcomes or results. According to the Hsiao et al (2014), this is
essential for organization to configure and install the computing resources as per the standard
practices and rules are needed for applying the accessibility of the users for achieving the data
security.
Quantitative research
The Barclays bank can also use questionnaire for conducting the research by providing survey to
the employees. The questionnaire survey is very useful for collecting the statistical data through
the business, support of employees and devices which give support to decision making process.
Following are the questions which are related to the selected topic:
1. Have you as the user access to server and desired sources according to the liabilities
and roles in the business?
a) Yes b) No
2. Is there any encryption on user’s directory which effective to prevent the
unauthenticated access?
a) Yes b) No
3. Are the permission on sources of data are unmodified with the system changes?
a) Yes b) No
4. Is the sources of data are available for all the time just to ensure about the
availability of the data?
9
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
a) Yes b) No
5. Have the team or you access the computer hardware which is being used in the
services of networking which is out of your own role?
a) Yes b) No
6. Is all the devices and the data are uncompromised even if you stay away from the
computer system?
a) Yes b) No
7. Give you opinion regarding infrastructural security upon the computing resources?
a) Average b) Poor c) Excellent d) Effective
8. In how much time you will determine and submitted infected file system issues?
a) 0-25 b) 26-50 c) more than 50 d) Never
10
5. Have the team or you access the computer hardware which is being used in the
services of networking which is out of your own role?
a) Yes b) No
6. Is all the devices and the data are uncompromised even if you stay away from the
computer system?
a) Yes b) No
7. Give you opinion regarding infrastructural security upon the computing resources?
a) Average b) Poor c) Excellent d) Effective
8. In how much time you will determine and submitted infected file system issues?
a) 0-25 b) 26-50 c) more than 50 d) Never
10
M2 Evaluate the accuracy and reliability of different research methods applied
In the project the researcher has used quantitative and qualitative research approaches for
understanding the impact of the vulnerabilities in the business. Barclays Bank is providing
proper banking services in that data monitoring and availability is the core function which need
to be focused. This project has considered qualitative research in which researcher has take help
of articles, journals and books so that all the data available within the organization can easily
processed to make the proper decision making process. The records and documents from
business are used on devices and also about their performance which is used to meet the
requirements. This research is quite accurate when the data of business is used to take the
effective decision (Csikszentmihalyi and Larson, 2014).
The data analysis and consideration on vulnerabilities is evaluated through journals and books
which helped for providing reliable data with the security. This project has also used quantitative
research which is more accurate and reliable due to direct communication with target
respondents. For example: project has also used questionnaire survey for collecting the data from
the Barclays employees. This questionnaire survey is beneficial for organization just to achieve
accurate data from their employees on their selected options and interview is also provided to get
the detailed suggestions. But quantitative research is more time consuming and need advice of
some experts so that objective of the research can be achieved (Noble and Smith, 2015).
Quantitative research provides the numerical and accurate information to get the conclusion in
proper manner. With this statistical data is generated that was complex in theoretical research of
qualitative research.
11
In the project the researcher has used quantitative and qualitative research approaches for
understanding the impact of the vulnerabilities in the business. Barclays Bank is providing
proper banking services in that data monitoring and availability is the core function which need
to be focused. This project has considered qualitative research in which researcher has take help
of articles, journals and books so that all the data available within the organization can easily
processed to make the proper decision making process. The records and documents from
business are used on devices and also about their performance which is used to meet the
requirements. This research is quite accurate when the data of business is used to take the
effective decision (Csikszentmihalyi and Larson, 2014).
The data analysis and consideration on vulnerabilities is evaluated through journals and books
which helped for providing reliable data with the security. This project has also used quantitative
research which is more accurate and reliable due to direct communication with target
respondents. For example: project has also used questionnaire survey for collecting the data from
the Barclays employees. This questionnaire survey is beneficial for organization just to achieve
accurate data from their employees on their selected options and interview is also provided to get
the detailed suggestions. But quantitative research is more time consuming and need advice of
some experts so that objective of the research can be achieved (Noble and Smith, 2015).
Quantitative research provides the numerical and accurate information to get the conclusion in
proper manner. With this statistical data is generated that was complex in theoretical research of
qualitative research.
11
Task 3
P5 Analyse research and data using appropriate tools and techniques
The findings of the research project are required for understanding the data nature. The
organization collects the data with the help of the secondary sources such as- journals and books
that can be validated and processed by using the authenticated books. The Barclays Bank also
validated the impact of the vulnerabilities with the analysis of the business but they require
synthesis process for eliminating the unwanted data from research which improve the project
quality and performance.
So for analyzing the data of questionnaire survey the project need to make data analysis
approach. The respondents selected in this questionnaire is 30 as they are distributed as per their
departments, age, roles and knowledge about the information management and computer
systems and after this organization can easily generate the map and sample to their all the
employees. This will also help just to complete the survey with the limited number of employees
but they scale all the resources in effective manner to get the appropriate decision making
process.
Yes No
0
5
10
15
20
25
Is there any encryption on user’s
directory which effective to prevent
the unauthenticated access?
Yes No
0
5
10
15
20
25
30
Have you as the user access to server and
desired sources according to the liabilities
and roles in the business?
12
P5 Analyse research and data using appropriate tools and techniques
The findings of the research project are required for understanding the data nature. The
organization collects the data with the help of the secondary sources such as- journals and books
that can be validated and processed by using the authenticated books. The Barclays Bank also
validated the impact of the vulnerabilities with the analysis of the business but they require
synthesis process for eliminating the unwanted data from research which improve the project
quality and performance.
So for analyzing the data of questionnaire survey the project need to make data analysis
approach. The respondents selected in this questionnaire is 30 as they are distributed as per their
departments, age, roles and knowledge about the information management and computer
systems and after this organization can easily generate the map and sample to their all the
employees. This will also help just to complete the survey with the limited number of employees
but they scale all the resources in effective manner to get the appropriate decision making
process.
Yes No
0
5
10
15
20
25
Is there any encryption on user’s
directory which effective to prevent
the unauthenticated access?
Yes No
0
5
10
15
20
25
30
Have you as the user access to server and
desired sources according to the liabilities
and roles in the business?
12
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Yes No
0
5
10
15
20
25
Are the permission on sources of data
are unmodified with the system
changes?
Yes No
0
5
10
15
20
25
30
Is the sources of data are available for
all the time just to ensure about the
availability of the data?
Yes No
0
5
10
15
20
25
30
Have the team or you access the com-
puter hardware which is being used in the
services of networking which is out of
your own role?
Yes No
0
5
10
15
20
25
Is all the devices and the data are
uncompromised even if you stay
away from the computer system?
13
0
5
10
15
20
25
Are the permission on sources of data
are unmodified with the system
changes?
Yes No
0
5
10
15
20
25
30
Is the sources of data are available for
all the time just to ensure about the
availability of the data?
Yes No
0
5
10
15
20
25
30
Have the team or you access the com-
puter hardware which is being used in the
services of networking which is out of
your own role?
Yes No
0
5
10
15
20
25
Is all the devices and the data are
uncompromised even if you stay
away from the computer system?
13
Poor Average Effective Excellent
0
2
4
6
8
10
12
14
Give you opinion regarding infrastruc-
tural security upon the computing re-
sources?
0-25 26-50 more
than 50 Never
0
2
4
6
8
10
12
14
16
18
In how much time you will determ-
ine and submitted infected file sys-
tem issues?
14
0
2
4
6
8
10
12
14
Give you opinion regarding infrastruc-
tural security upon the computing re-
sources?
0-25 26-50 more
than 50 Never
0
2
4
6
8
10
12
14
16
18
In how much time you will determ-
ine and submitted infected file sys-
tem issues?
14
P6 Communicate appropriate recommendations as a result of research and data analysis to draw
valid and meaningful conclusions
This research has provided the results and outcomes which organization can consider for
understanding the impact of vulnerabilities on the data security. This research is effective for
Barclay’s organization to get the conclusion on effective security on their computing resources
and also high information availability. The research has also determined that Barclay’s
organization needs some improvement in their vulnerabilities impact identification during the
data sharing and on their systems with monitoring and awareness (McCusker and Gunaydin,
2015). So this research is effective as it has determined that Barclays Bank need to implement
the security for ensuring about the high performance and confidentiality. It has analyzed that
Barclays is currently facing many issues which are related to their data security due to which
information and details of their customers may be used by unauthorized user. For reducing these
issues or security problems from their business them there are some recommendation which they
need to implement such as-
They can use encryption and also permission management through they can prevent the
accessibility to the directories of users. This will protect the confidential information of
the Bank which is related to the customers.
They need to review the roles and responsibilities of the users through which they can
achieve the desire resources access.
Centralized access management system can also be used in the Barclays so that their
users can take permission before accessing the information.
They can also implement regular auditing of data security and monitoring so achieving
security goals.
Conclusion
The above discussion has concluded that suggested recommendations are effective for Barclays
Bank through which they can ensure about the data and information security. This research has
helped them to identify the impact of the vulnerabilities on their computing resources so that
effective solutions can be identified to get the data confidentiality, integrity and availability
during their storage, sharing and operations.
15
valid and meaningful conclusions
This research has provided the results and outcomes which organization can consider for
understanding the impact of vulnerabilities on the data security. This research is effective for
Barclay’s organization to get the conclusion on effective security on their computing resources
and also high information availability. The research has also determined that Barclay’s
organization needs some improvement in their vulnerabilities impact identification during the
data sharing and on their systems with monitoring and awareness (McCusker and Gunaydin,
2015). So this research is effective as it has determined that Barclays Bank need to implement
the security for ensuring about the high performance and confidentiality. It has analyzed that
Barclays is currently facing many issues which are related to their data security due to which
information and details of their customers may be used by unauthorized user. For reducing these
issues or security problems from their business them there are some recommendation which they
need to implement such as-
They can use encryption and also permission management through they can prevent the
accessibility to the directories of users. This will protect the confidential information of
the Bank which is related to the customers.
They need to review the roles and responsibilities of the users through which they can
achieve the desire resources access.
Centralized access management system can also be used in the Barclays so that their
users can take permission before accessing the information.
They can also implement regular auditing of data security and monitoring so achieving
security goals.
Conclusion
The above discussion has concluded that suggested recommendations are effective for Barclays
Bank through which they can ensure about the data and information security. This research has
helped them to identify the impact of the vulnerabilities on their computing resources so that
effective solutions can be identified to get the data confidentiality, integrity and availability
during their storage, sharing and operations.
15
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
M3 Evaluate the selection of appropriate tools and techniques for accuracy and authenticity
The research project has used mixed research approach for their data analysis and that is based
on the data analysis and through this decision can be made. This is effective for the organization
to achieve the authenticated and accurate data. This project research has also used secondary
research under which researcher has used images, articles and author books which are justified
with authenticated journals and books. This has also helped for ensuring about the collected data
on the impact of vulnerabilities and their accurate solutions. The data is collected in statistical
format from the customer experience and documents of business that is varied by the help of the
analysis user role and available format (Terrell, 2012).
This research has also ensured that all collected data from secondary research is accurate during
its collection, processing and also in analysis as this was collected from the reliable resources or
sources. The research project has also used data sampling method for analysing the quantitative
data with this research. The questionnaire is also prepared by using sources of statistical data and
given to the trusted employees of Barclays so that accurate and reliable information can be
gathered in the questions. This has also helped for collected data and processing data in the
specific time and process for making proper decision.
16
The research project has used mixed research approach for their data analysis and that is based
on the data analysis and through this decision can be made. This is effective for the organization
to achieve the authenticated and accurate data. This project research has also used secondary
research under which researcher has used images, articles and author books which are justified
with authenticated journals and books. This has also helped for ensuring about the collected data
on the impact of vulnerabilities and their accurate solutions. The data is collected in statistical
format from the customer experience and documents of business that is varied by the help of the
analysis user role and available format (Terrell, 2012).
This research has also ensured that all collected data from secondary research is accurate during
its collection, processing and also in analysis as this was collected from the reliable resources or
sources. The research project has also used data sampling method for analysing the quantitative
data with this research. The questionnaire is also prepared by using sources of statistical data and
given to the trusted employees of Barclays so that accurate and reliable information can be
gathered in the questions. This has also helped for collected data and processing data in the
specific time and process for making proper decision.
16
Task 4
P7 Reflect on the value of undertaking the research to meet stated objectives and own learning
and performance
The objectives and goals of the project are to understand the data confidentiality, availability and
integrity requirement in the Barclays organization by analysing the impact of the vulnerabilities.
The research undertaking has given me the value to explore techniques and tools related to the
project management. The research also helped me to experience and understands process and
structure for preparing the effective outcomes outline. In this research I have applied some
needed constraints that are related to the time, efforts and cost just to complete this project
effectively (Lock, 2017).
The research also undertaking some empowered for using tools of project management such as-
Gantt chart and work breakdown structure so that all the activities has been completed on time.
The research has also understood the data authenticity and accuracy sources are used. This
research also gives value to the goals for understanding the map capabilities and requirements
but in the systematic manner due to which aim of the project has achieved.
Learning and performance
In the research, I have also learned about the requirement of the data availability, integrity and
confidentiality within the business. I have experience how the Barclays bank can ensure about
the data security with the effective configuration and installation of device along with the
changes required in the business approaches and practices. While considering the point about
learning which is achieved to understand the planning project and need audit of computing
resources. The computer system and network resources are analyzed and examined for security
threats and effective improvement for reducing the loss.
17
P7 Reflect on the value of undertaking the research to meet stated objectives and own learning
and performance
The objectives and goals of the project are to understand the data confidentiality, availability and
integrity requirement in the Barclays organization by analysing the impact of the vulnerabilities.
The research undertaking has given me the value to explore techniques and tools related to the
project management. The research also helped me to experience and understands process and
structure for preparing the effective outcomes outline. In this research I have applied some
needed constraints that are related to the time, efforts and cost just to complete this project
effectively (Lock, 2017).
The research also undertaking some empowered for using tools of project management such as-
Gantt chart and work breakdown structure so that all the activities has been completed on time.
The research has also understood the data authenticity and accuracy sources are used. This
research also gives value to the goals for understanding the map capabilities and requirements
but in the systematic manner due to which aim of the project has achieved.
Learning and performance
In the research, I have also learned about the requirement of the data availability, integrity and
confidentiality within the business. I have experience how the Barclays bank can ensure about
the data security with the effective configuration and installation of device along with the
changes required in the business approaches and practices. While considering the point about
learning which is achieved to understand the planning project and need audit of computing
resources. The computer system and network resources are analyzed and examined for security
threats and effective improvement for reducing the loss.
17
M4 Evaluate the value of the project management process
The process of product management is applied in this research so that goals of business and
objectives are achieved. The project management is effective to create the modules of project
which are later assigned towards their employees for accomplishing the activities inn effective
manner. This is effective to standardize all the data collection process and project processing.
This is also effective to properly use the resources, cost and time so that this project can be
accomplished in the constraints of business. The process of project management also helps me to
understand the tools and techniques which reduce the time and meet the objectives.
During conducting this project management process the quality of the project managed with the
monitoring process. The Barclays organization can also use quality measures for meeting their
cost and time values in the activities. This is helpful for the organization to learn about the
management of the quality to improve the productivity of the organization. The project plan also
helps the organization to learn about the resources of motivation so that with the help of team
they can generate effective results or outcomes (Csikszentmihalyi and Larson, 2014).
Table 4: Performance review template
Questions related to performance Yes No
Do the outcome or findings of the research are effective and proper
for achieving the set aims and objective of the project?
Do you think all the resources are properly gathered as per the
requirement of the project and use effectively?
Is the research has identified the impact of the vulnerabilities on the
performance and functions of Barclays bank?
Do you think all employees and project management team members
properly perform their individual roles and responsibilities?
Do you think suggested recommendations are effective for
organization through which their security purpose can be achieved?
18
The process of product management is applied in this research so that goals of business and
objectives are achieved. The project management is effective to create the modules of project
which are later assigned towards their employees for accomplishing the activities inn effective
manner. This is effective to standardize all the data collection process and project processing.
This is also effective to properly use the resources, cost and time so that this project can be
accomplished in the constraints of business. The process of project management also helps me to
understand the tools and techniques which reduce the time and meet the objectives.
During conducting this project management process the quality of the project managed with the
monitoring process. The Barclays organization can also use quality measures for meeting their
cost and time values in the activities. This is helpful for the organization to learn about the
management of the quality to improve the productivity of the organization. The project plan also
helps the organization to learn about the resources of motivation so that with the help of team
they can generate effective results or outcomes (Csikszentmihalyi and Larson, 2014).
Table 4: Performance review template
Questions related to performance Yes No
Do the outcome or findings of the research are effective and proper
for achieving the set aims and objective of the project?
Do you think all the resources are properly gathered as per the
requirement of the project and use effectively?
Is the research has identified the impact of the vulnerabilities on the
performance and functions of Barclays bank?
Do you think all employees and project management team members
properly perform their individual roles and responsibilities?
Do you think suggested recommendations are effective for
organization through which their security purpose can be achieved?
18
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Conclusion
The above project and conducted research is done in the context of the Barclays which is the
leading banking sector organization based in the UK. The project research is done by setting aim
and objective which is related to impact of the vulnerabilities due to which security issues are
faced by the organization. The report has concluded that by implementing the proper security
measures they can avoid the issues related to the security of data and confidentiality of the data.
The project has also discussed about the effectiveness of mixed research method to get the
accurate and reliable data. In the end the report has also provided reflection part in which
learning of the project team has provided.
19
The above project and conducted research is done in the context of the Barclays which is the
leading banking sector organization based in the UK. The project research is done by setting aim
and objective which is related to impact of the vulnerabilities due to which security issues are
faced by the organization. The report has concluded that by implementing the proper security
measures they can avoid the issues related to the security of data and confidentiality of the data.
The project has also discussed about the effectiveness of mixed research method to get the
accurate and reliable data. In the end the report has also provided reflection part in which
learning of the project team has provided.
19
References
Books and Journals
Abomhara, M. and Køien, G.M., 2015. Cyber security and the internet of things:
vulnerabilities, threats, intruders and attacks. Journal of Cyber Security, 4(1), pp.65-88.
Carroll, J.M., 2014. Computer security. Butterworth-Heinemann.
Csikszentmihalyi, M. and Larson, R., 2014. Validity and reliability of the experience-
sampling method. In Flow and the foundations of positive psychology (pp. 35-54).
Springer, Dordrecht.
Hsiao, D.K., Kerr, D.S. and Madnick, S.E., 2014. Computer security. Academic Press.
Hussain, S.A., Fatima, M., Saeed, A., Raza, I. and Shahzad, R.K., 2017. Multilevel
classification of security concerns in cloud computing. Applied Computing and
Informatics, 13(1), pp.57-65.
Islam, T., Manivannan, D. and Zeadally, S., 2016. A classification and characterization of
security threats in cloud computing. Int. J. Next-Gener. Comput, 7(1).
Lock, D., 2017. The essentials of project management. Routledge.
Maina, J., 2017. Effects of Environmental Factors on Performance: A Case of Barclays
Bank (Doctoral dissertation, United States International University-Africa).
McCusker, K. and Gunaydin, S., 2015. Research using qualitative, quantitative or mixed
methods and choice based on the research. Perfusion, 30(7), pp.537-542.
Noble, H. and Smith, J., 2015. Issues of validity and reliability in qualitative
research. Evidence-Based Nursing, pp.ebnurs-2015.
Puthal, D., Sahoo, B.P.S., Mishra, S. and Swain, S., 2015, January. Cloud computing
features, issues, and challenges: a big picture. In Computational Intelligence and
Networks (CINE), 2015 International Conference on (pp. 116-123). IEEE.
Terrell, S.R., 2012. Mixed-methods research methodologies. The qualitative
report, 17(1), pp.254-280.
20
Books and Journals
Abomhara, M. and Køien, G.M., 2015. Cyber security and the internet of things:
vulnerabilities, threats, intruders and attacks. Journal of Cyber Security, 4(1), pp.65-88.
Carroll, J.M., 2014. Computer security. Butterworth-Heinemann.
Csikszentmihalyi, M. and Larson, R., 2014. Validity and reliability of the experience-
sampling method. In Flow and the foundations of positive psychology (pp. 35-54).
Springer, Dordrecht.
Hsiao, D.K., Kerr, D.S. and Madnick, S.E., 2014. Computer security. Academic Press.
Hussain, S.A., Fatima, M., Saeed, A., Raza, I. and Shahzad, R.K., 2017. Multilevel
classification of security concerns in cloud computing. Applied Computing and
Informatics, 13(1), pp.57-65.
Islam, T., Manivannan, D. and Zeadally, S., 2016. A classification and characterization of
security threats in cloud computing. Int. J. Next-Gener. Comput, 7(1).
Lock, D., 2017. The essentials of project management. Routledge.
Maina, J., 2017. Effects of Environmental Factors on Performance: A Case of Barclays
Bank (Doctoral dissertation, United States International University-Africa).
McCusker, K. and Gunaydin, S., 2015. Research using qualitative, quantitative or mixed
methods and choice based on the research. Perfusion, 30(7), pp.537-542.
Noble, H. and Smith, J., 2015. Issues of validity and reliability in qualitative
research. Evidence-Based Nursing, pp.ebnurs-2015.
Puthal, D., Sahoo, B.P.S., Mishra, S. and Swain, S., 2015, January. Cloud computing
features, issues, and challenges: a big picture. In Computational Intelligence and
Networks (CINE), 2015 International Conference on (pp. 116-123). IEEE.
Terrell, S.R., 2012. Mixed-methods research methodologies. The qualitative
report, 17(1), pp.254-280.
20
Appendix
Project logbook
Table 5: Project logbook
Weeks Time Actions required for each week
1st 12th sept-19th Sept 2017 Monitor project progress and implement needed changes
2nd 20th sept-27th Sept 2017 Draw some project proposal and create project design
Hire team to distribute roles and responsibilities of project
3rd 28st sept-4th Oct 2017 Create Gantt chart and WBS and Log book also for project
4th 5 sept-12th Oct 2017 Conduct research by appointing researcher and conduct data findings
and analysis
Evaluate the research progress and make regular report
5th 13th oct-20th Oct 2017 Execute some modification required by taking stakeholders
suggestions
6th 21th oct-28 Oct 2017 Organize one official meeting with organization stakeholders and
communicate all the report details with them
7th 29th oct-5th Nov 2017 Create the conclusion of the project and implement the project in
effective manner as per organization security requirement
21
Project logbook
Table 5: Project logbook
Weeks Time Actions required for each week
1st 12th sept-19th Sept 2017 Monitor project progress and implement needed changes
2nd 20th sept-27th Sept 2017 Draw some project proposal and create project design
Hire team to distribute roles and responsibilities of project
3rd 28st sept-4th Oct 2017 Create Gantt chart and WBS and Log book also for project
4th 5 sept-12th Oct 2017 Conduct research by appointing researcher and conduct data findings
and analysis
Evaluate the research progress and make regular report
5th 13th oct-20th Oct 2017 Execute some modification required by taking stakeholders
suggestions
6th 21th oct-28 Oct 2017 Organize one official meeting with organization stakeholders and
communicate all the report details with them
7th 29th oct-5th Nov 2017 Create the conclusion of the project and implement the project in
effective manner as per organization security requirement
21
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
22
1 out of 26
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.