Managing a Successful Computing Project: Identifying Vulnerabilities in Internet Banking
VerifiedAdded on 2024/07/24
|29
|5572
|274
AI Summary
This report examines the vulnerabilities facing ABC International Bank Plc, a leading financial institution in Europe, due to their internet banking services. It outlines a comprehensive project management plan to address these security concerns, including a work breakdown structure, Gantt chart, and risk assessment. The report also delves into a small-scale research project using qualitative and quantitative methods to analyze the vulnerabilities and their impact on the bank's operations. The research findings are then used to formulate recommendations for improving the bank's security posture and mitigating future risks.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
MANAGING A SUCCESSFUL
COMPUTING PROJECT
COMPUTING PROJECT
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
TABLE OF CONTENTS
Introduction......................................................................................................................................1
LO1.................................................................................................................................................. 2
P1 Devise project aims and objectives for a chosen scenario.....................................................2
P2 Produce a project management plan.......................................................................................4
P3 Produce a work breakdown structure and a Gantt chart to provide timeframes and stages
for completion..............................................................................................................................6
M1 Produce a comprehensive project management plan............................................................8
LO2.................................................................................................................................................. 9
P4 Carry out small-scale research by applying qualitative and quantitative research methods. .9
M2 Evaluate the accuracy and reliability of different research methods applied......................12
LO3................................................................................................................................................ 13
P5 Analyse research and data using appropriate tools and techniques......................................13
P6 Communicate appropriate recommendations as a result of research and data analysis to
draw valid and meaningful conclusions....................................................................................17
M3 Evaluate the selection of appropriate tools and techniques for accuracy and authenticity. 18
LO4................................................................................................................................................ 19
P7 Reflect on the value of undertaking the research to meet stated objectives and own learning
and performance........................................................................................................................19
M4 Evaluate the value of the project management process......................................................20
Conclusion..................................................................................................................................... 21
References......................................................................................................................................22
Appendix........................................................................................................................................24
Project logbook.......................................................................................................................... 24
Introduction......................................................................................................................................1
LO1.................................................................................................................................................. 2
P1 Devise project aims and objectives for a chosen scenario.....................................................2
P2 Produce a project management plan.......................................................................................4
P3 Produce a work breakdown structure and a Gantt chart to provide timeframes and stages
for completion..............................................................................................................................6
M1 Produce a comprehensive project management plan............................................................8
LO2.................................................................................................................................................. 9
P4 Carry out small-scale research by applying qualitative and quantitative research methods. .9
M2 Evaluate the accuracy and reliability of different research methods applied......................12
LO3................................................................................................................................................ 13
P5 Analyse research and data using appropriate tools and techniques......................................13
P6 Communicate appropriate recommendations as a result of research and data analysis to
draw valid and meaningful conclusions....................................................................................17
M3 Evaluate the selection of appropriate tools and techniques for accuracy and authenticity. 18
LO4................................................................................................................................................ 19
P7 Reflect on the value of undertaking the research to meet stated objectives and own learning
and performance........................................................................................................................19
M4 Evaluate the value of the project management process......................................................20
Conclusion..................................................................................................................................... 21
References......................................................................................................................................22
Appendix........................................................................................................................................24
Project logbook.......................................................................................................................... 24
LIST OF TABLES
Table 1: Gantt chart.........................................................................................................................7
Table 2: Distribution of activities as per time.................................................................................7
Table 3: Milestone plan...................................................................................................................8
Table 4: Schedule plan.....................................................................................................................8
Table 5: Performance review.........................................................................................................20
Table 6: Project logbook................................................................................................................24
Table 1: Gantt chart.........................................................................................................................7
Table 2: Distribution of activities as per time.................................................................................7
Table 3: Milestone plan...................................................................................................................8
Table 4: Schedule plan.....................................................................................................................8
Table 5: Performance review.........................................................................................................20
Table 6: Project logbook................................................................................................................24
LIST OF FIGURES
Figure 1: ABC international bank....................................................................................................1
Figure 2: Work breakdown structure............................................................................................... 6
Figure 1: ABC international bank....................................................................................................1
Figure 2: Work breakdown structure............................................................................................... 6
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Introduction
Effective and successful computing project is essential to be created so that actual result in the
positive manner can be generated by the project manager. The computing project will be related
to identify the vulnerabilities facing by the bands when they will provide internet banking
services to their clients. The report will create the project plan and also conduct the research
through which security issues which are facing by the ABC international bank Plc will be
identified. ABC international bank is the leading financial institution based in the Europe and
provides internet banking services due to which some of the security issues are facing by them.
The report will effectively create the project plan through which they can implement the project
and achieve the set project purpose. The report will also conduct the research by researcher
through which opinion of the respondents through questionnaire survey will also be identified.
Figure 1: ABC international bank
(Source: www.bank-abc.com, 2018)
1
Effective and successful computing project is essential to be created so that actual result in the
positive manner can be generated by the project manager. The computing project will be related
to identify the vulnerabilities facing by the bands when they will provide internet banking
services to their clients. The report will create the project plan and also conduct the research
through which security issues which are facing by the ABC international bank Plc will be
identified. ABC international bank is the leading financial institution based in the Europe and
provides internet banking services due to which some of the security issues are facing by them.
The report will effectively create the project plan through which they can implement the project
and achieve the set project purpose. The report will also conduct the research by researcher
through which opinion of the respondents through questionnaire survey will also be identified.
Figure 1: ABC international bank
(Source: www.bank-abc.com, 2018)
1
LO1
P1 Devise project aims and objectives for a chosen scenario
Project description
The project is about to identify the vulnerabilities in the services of the internet banking which is
provided by the ABC international bank PLC which provides their financial services in all
around the Europe, North Africa and Middle East. The banking institutions have various
computing resources which they use to provide some internet banking services to their clients but
due to some vulnerabilities and security attacks their internet banking services may get disturbed.
Issues in the organization
It is evaluated that current ABC bank provide various types of the financial and other banking
services to their clients in which internet banking services are also covered (Khrais, 2015). They
provide banking services through computing resources or digital tools under which their major
concern is related to the data and information of their client’s security. The current issue which is
faced by the organization is related to the vulnerability attacks due to which they lost the
confidential information of their client’s and organization also. The client of the bank lost their
personal information due to the lack of the logical security in the computer devices.
Expectations from the research project
After discussing the issues which by the ABC bank clients it is important for the project to
discuss about the expectations through which issues can be reduced. The project is conducted by
the project manager of the organization which has the expectation to resolve the security attacks
from their computing devices or resources. The main expectation of the project manager is
related to manage the confidential information of the client’s and protect the reputation of the
organization also (Genge and Enăchescu, 2016).
Project aims and objectives
The research project is conducted by the research specialist and the topic is selected by the
research specialist which is related to analyze the vulnerabilities in the services of internet
banking that is provided by the ABC international bank. The project is all about to identify the
security issues facing by the bank due to the impact of the vulnerabilities on their internet
banking services.
2
P1 Devise project aims and objectives for a chosen scenario
Project description
The project is about to identify the vulnerabilities in the services of the internet banking which is
provided by the ABC international bank PLC which provides their financial services in all
around the Europe, North Africa and Middle East. The banking institutions have various
computing resources which they use to provide some internet banking services to their clients but
due to some vulnerabilities and security attacks their internet banking services may get disturbed.
Issues in the organization
It is evaluated that current ABC bank provide various types of the financial and other banking
services to their clients in which internet banking services are also covered (Khrais, 2015). They
provide banking services through computing resources or digital tools under which their major
concern is related to the data and information of their client’s security. The current issue which is
faced by the organization is related to the vulnerability attacks due to which they lost the
confidential information of their client’s and organization also. The client of the bank lost their
personal information due to the lack of the logical security in the computer devices.
Expectations from the research project
After discussing the issues which by the ABC bank clients it is important for the project to
discuss about the expectations through which issues can be reduced. The project is conducted by
the project manager of the organization which has the expectation to resolve the security attacks
from their computing devices or resources. The main expectation of the project manager is
related to manage the confidential information of the client’s and protect the reputation of the
organization also (Genge and Enăchescu, 2016).
Project aims and objectives
The research project is conducted by the research specialist and the topic is selected by the
research specialist which is related to analyze the vulnerabilities in the services of internet
banking that is provided by the ABC international bank. The project is all about to identify the
security issues facing by the bank due to the impact of the vulnerabilities on their internet
banking services.
2
Objectives:
The project is about to analyze the vulnerabilities in the ABC international banking
services which they are providing through internet (Liao et al, 2016).
Objective is also to analyze the various measures to avoid and overcome the security
issues that are occurred in the internet banking services.
The main purpose and objective of the research project is to meet the manager
expectation which is related to achieve integrity, confidentiality and availability of the
data in the software system used by the ABC bank.
3
The project is about to analyze the vulnerabilities in the ABC international banking
services which they are providing through internet (Liao et al, 2016).
Objective is also to analyze the various measures to avoid and overcome the security
issues that are occurred in the internet banking services.
The main purpose and objective of the research project is to meet the manager
expectation which is related to achieve integrity, confidentiality and availability of the
data in the software system used by the ABC bank.
3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
P2 Produce a project management plan
Project introduction: The case of this project is related to identify the security issues currently
facing by the ABC international bank along with identifying the vulnerabilities occurred in the
internet banking or software system that are used by the organization. They are currently using
Microsoft Windows system and its main function is to protect the confidential information of
their clients. Addition to this, they are facing issues of computing system security and that
disturb the need to data confidentiality, integrity and availability.
Importance of project management: This is important as it ensure the project manager and its
team to set the proper expectation to deliver the positive outcome from the project to the
organization. The efficient project manager negotiates the reasonable or achievable milestone
and deadlines around stakeholders and management team. There are various stages which are
covered under the project plan which are effective for the organization to get the positive result
after completion of the project. The stages are important to complete the project with quality and
estimated time (Fleming and Koppelman, 2016).
Following is the project management plan for ABC international bank:
Project scoping
Objective: The main and key objective of this project is only related to analyze the security
issues faced by the ABC bank on their internet banking services because of the vulnerabilities.
Scope: Scope of this project is very large and huge as it helps the organization to identify the
measures through which they can overcome the client’s issues and security concern of their
clients.
Purpose: The main purpose of the project manager is to overcome the security attacks and data
damage from their software system by effective tools and techniques.
Deliverables: The project delivers the positive results in the favour of the ABC international
banking institutions. The project delivers small scale research in which views of the users can be
analyzed to overcome the vulnerabilities impact on computing resources (Harrison and Lock,
2017).
4
Project introduction: The case of this project is related to identify the security issues currently
facing by the ABC international bank along with identifying the vulnerabilities occurred in the
internet banking or software system that are used by the organization. They are currently using
Microsoft Windows system and its main function is to protect the confidential information of
their clients. Addition to this, they are facing issues of computing system security and that
disturb the need to data confidentiality, integrity and availability.
Importance of project management: This is important as it ensure the project manager and its
team to set the proper expectation to deliver the positive outcome from the project to the
organization. The efficient project manager negotiates the reasonable or achievable milestone
and deadlines around stakeholders and management team. There are various stages which are
covered under the project plan which are effective for the organization to get the positive result
after completion of the project. The stages are important to complete the project with quality and
estimated time (Fleming and Koppelman, 2016).
Following is the project management plan for ABC international bank:
Project scoping
Objective: The main and key objective of this project is only related to analyze the security
issues faced by the ABC bank on their internet banking services because of the vulnerabilities.
Scope: Scope of this project is very large and huge as it helps the organization to identify the
measures through which they can overcome the client’s issues and security concern of their
clients.
Purpose: The main purpose of the project manager is to overcome the security attacks and data
damage from their software system by effective tools and techniques.
Deliverables: The project delivers the positive results in the favour of the ABC international
banking institutions. The project delivers small scale research in which views of the users can be
analyzed to overcome the vulnerabilities impact on computing resources (Harrison and Lock,
2017).
4
Steps or documentation to start the project
Cost: Before initiating the project it is essential for project manager to estimate the budget
required. According to the expectations the project requires at least budget of $20,000 and apart
from this some additional amount of $2,000 is needed to overcome the risk issues. Within the
budget of $20,000 some resources are covered such as- hardware and software, human resources,
engineer as expert, security design, quality technique and other resources.
Timescale: As per the expectations this project need at least time of 2 month to complete. All the
activities including sub-activities need to be covered within the specified time only. Some of the
time issues must be solved in the also week only. Timescale and activities must be decided with
the help of work breakdown structure (WBS) and Gantt chart.
Risk: The project also have some risk due to which time delay issues and lack of positive
outcome must be occurred. Time management, cost control, proper allocation of the resources
are the risks that are involved under this project.
Quality: Quality assurance and management is also need to be managed by the project manager
by solving the risk identified in the project. Time issue can be solved by using prioritization
strategy, cost issues by budget control strategy and resources allocation issue can be solved by
equal distribution of resources. These strategies to reduce the risk help the project manager to
cover the quality assurance (Kerzner and Kerzner, 2017).
Communication: In the last, the project manager needs to conduct the official meeting with the
investors, stakeholders and other project management team. In that meeting all the points and
details related to the project must be discussed and communicated to the members. This will help
to identify the changes required along with the potential suggestion from the members.
Communication can also be done by the video conferences, e-mail and phone calls also.
5
Cost: Before initiating the project it is essential for project manager to estimate the budget
required. According to the expectations the project requires at least budget of $20,000 and apart
from this some additional amount of $2,000 is needed to overcome the risk issues. Within the
budget of $20,000 some resources are covered such as- hardware and software, human resources,
engineer as expert, security design, quality technique and other resources.
Timescale: As per the expectations this project need at least time of 2 month to complete. All the
activities including sub-activities need to be covered within the specified time only. Some of the
time issues must be solved in the also week only. Timescale and activities must be decided with
the help of work breakdown structure (WBS) and Gantt chart.
Risk: The project also have some risk due to which time delay issues and lack of positive
outcome must be occurred. Time management, cost control, proper allocation of the resources
are the risks that are involved under this project.
Quality: Quality assurance and management is also need to be managed by the project manager
by solving the risk identified in the project. Time issue can be solved by using prioritization
strategy, cost issues by budget control strategy and resources allocation issue can be solved by
equal distribution of resources. These strategies to reduce the risk help the project manager to
cover the quality assurance (Kerzner and Kerzner, 2017).
Communication: In the last, the project manager needs to conduct the official meeting with the
investors, stakeholders and other project management team. In that meeting all the points and
details related to the project must be discussed and communicated to the members. This will help
to identify the changes required along with the potential suggestion from the members.
Communication can also be done by the video conferences, e-mail and phone calls also.
5
P3 Produce a work breakdown structure and a Gantt chart to provide timeframes and stages for
completion
Figure 2: Work breakdown structure
(Source: Author, 2018)
6
Computing project
Planning
Hand on machines
User and system
analysis
Document the
strategy
Identify skills
Requirement
specification
Meetings
Focus on issues
Ouline solutions
Risk identification
Pre-design
Communication
for project
requirement
Finalization of
solutions
Contract and
agreement
Revise cost and
time
Designing
Logical design
Physical resources
Protyping and risk
managment
Implementation
Configuration of
device and
software
additional
installation
Documentation
Testing
Configuration
testing
Physical
installation
Quality
analysis
Post-
implementation
Maintenance guide
Recommendations
Training and
development
Resource handover
Project closure
completion
Figure 2: Work breakdown structure
(Source: Author, 2018)
6
Computing project
Planning
Hand on machines
User and system
analysis
Document the
strategy
Identify skills
Requirement
specification
Meetings
Focus on issues
Ouline solutions
Risk identification
Pre-design
Communication
for project
requirement
Finalization of
solutions
Contract and
agreement
Revise cost and
time
Designing
Logical design
Physical resources
Protyping and risk
managment
Implementation
Configuration of
device and
software
additional
installation
Documentation
Testing
Configuration
testing
Physical
installation
Quality
analysis
Post-
implementation
Maintenance guide
Recommendations
Training and
development
Resource handover
Project closure
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table 1: Gantt chart
Project actions Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8
Planning
Requirement identification
Project Pre-designing
Project Designing
Implement
Project testing
Project post-
implementation
Table 2: Distribution of activities as per time
Actions Time needed
Planning: Includes- security parameter, CIA features knowledge,
resource arrangement and create the concept behind project
In week 1
Requirement identification: Includes- identify the project
impact, identify the impact of vulnerabilities and team
communication.
In week 2
Project Pre-designing: Includes- solution creation and
management of resources
In week 3
Project Designing: verification of needs, design the project
Prototyping and final design
In week 4
Implementation of plan: Includes- Configure the hardware and
software and update the components
In week 5
Project testing: Includes- module test and functions. In week 6
Project post-implementation: provide training for employees
development and end the project
In week 7 and 8
7
Project actions Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8
Planning
Requirement identification
Project Pre-designing
Project Designing
Implement
Project testing
Project post-
implementation
Table 2: Distribution of activities as per time
Actions Time needed
Planning: Includes- security parameter, CIA features knowledge,
resource arrangement and create the concept behind project
In week 1
Requirement identification: Includes- identify the project
impact, identify the impact of vulnerabilities and team
communication.
In week 2
Project Pre-designing: Includes- solution creation and
management of resources
In week 3
Project Designing: verification of needs, design the project
Prototyping and final design
In week 4
Implementation of plan: Includes- Configure the hardware and
software and update the components
In week 5
Project testing: Includes- module test and functions. In week 6
Project post-implementation: provide training for employees
development and end the project
In week 7 and 8
7
M1 Produce a comprehensive project management plan
Table 3: Milestone plan
Actions for project Status of action plan Time needed as action
Planning Finished 5 days
Requirement identification Finished 12 days
Project Pre-designing Finished 6 days
Project designing Only part is completed 4 days
Implementation Some areas are still not completed 6 days
Testing of project Some are still not finished 4 days
Project post-implementation Ready to complete due some areas are dew 3 days
Table 4: Schedule plan
Actions and weeks 1st 2nd 3rd 4th 5th 6th 7th 8th
Collect data for project
Interact with
stakeholders
Risk identification
Plan for project proposal
Element planning
Decide budget
Conduct research
Create questionnaire
Organize team
Complete the project
8
Table 3: Milestone plan
Actions for project Status of action plan Time needed as action
Planning Finished 5 days
Requirement identification Finished 12 days
Project Pre-designing Finished 6 days
Project designing Only part is completed 4 days
Implementation Some areas are still not completed 6 days
Testing of project Some are still not finished 4 days
Project post-implementation Ready to complete due some areas are dew 3 days
Table 4: Schedule plan
Actions and weeks 1st 2nd 3rd 4th 5th 6th 7th 8th
Collect data for project
Interact with
stakeholders
Risk identification
Plan for project proposal
Element planning
Decide budget
Conduct research
Create questionnaire
Organize team
Complete the project
8
LO2
P4 Carry out small-scale research by applying qualitative and quantitative research methods
The researcher has conducted the small scale research in which research has used mixed research
method and that include quantitative method and qualitative method. With these methods both
type of research has conducted through which numerical and non-numerical data are collected.
Qualitative research has provided information in quality and in this secondary data collection
method is used through which information from books or magazines or journals are collected on
the same topic. Quantitative research has provided the information in quantity which is
represented in the numerical form and primary data collection methods are used in this research.
Following are both research which has been conducted by the researcher:
Qualitative research
It is identified that vulnerabilities is one of the weaknesses that creates problems in the
organization and disturb the security system and management within the computing services.
According to the Khrais, (2015), vulnerabilities are the attacks in the computing resources which
exploit the resources, unauthenticated access and data modification. There are various types of
impact which are faced by the organization due to which they may loss their client confidential
information. Due to the occurred security issues in the organization the data is lost from the
computer system from they may deliver the inaccurate and inconsistent information or data of
their clients.
According to the Aljawarneh, (2017), the organization main requirement is related to security so
that can maintain the availability, confidentiality and integrity of the client information which are
stored in the computing devices. The integrity of the client information is the major concern and
this is created on the decision making process of the organization because due to the lack of data
integrity the processing of the data also become slow and they can gain incorrect results which is
not effective for the organization. According to the Kaur, (2015), it is very important for the
organization to install or configure some of the effective software according to the organization
standard and also apply some rules in respect of the system accessibility. This type of measures
may reduce the security attacks and they can avoid the data theft and damage from the systems.
9
P4 Carry out small-scale research by applying qualitative and quantitative research methods
The researcher has conducted the small scale research in which research has used mixed research
method and that include quantitative method and qualitative method. With these methods both
type of research has conducted through which numerical and non-numerical data are collected.
Qualitative research has provided information in quality and in this secondary data collection
method is used through which information from books or magazines or journals are collected on
the same topic. Quantitative research has provided the information in quantity which is
represented in the numerical form and primary data collection methods are used in this research.
Following are both research which has been conducted by the researcher:
Qualitative research
It is identified that vulnerabilities is one of the weaknesses that creates problems in the
organization and disturb the security system and management within the computing services.
According to the Khrais, (2015), vulnerabilities are the attacks in the computing resources which
exploit the resources, unauthenticated access and data modification. There are various types of
impact which are faced by the organization due to which they may loss their client confidential
information. Due to the occurred security issues in the organization the data is lost from the
computer system from they may deliver the inaccurate and inconsistent information or data of
their clients.
According to the Aljawarneh, (2017), the organization main requirement is related to security so
that can maintain the availability, confidentiality and integrity of the client information which are
stored in the computing devices. The integrity of the client information is the major concern and
this is created on the decision making process of the organization because due to the lack of data
integrity the processing of the data also become slow and they can gain incorrect results which is
not effective for the organization. According to the Kaur, (2015), it is very important for the
organization to install or configure some of the effective software according to the organization
standard and also apply some rules in respect of the system accessibility. This type of measures
may reduce the security attacks and they can avoid the data theft and damage from the systems.
9
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Quantitative research
This research is also conducted by the researcher who is appointed by the ABC international
bank and in this primary data collection method is used to get the new and accurate information.
The research has conducted the questionnaire survey in which 30 respondents are selected
between which the questions are asked by the researcher survey and get the opinion of the
respondents regarding vulnerabilities and security issues in the internet banking. Following are
the questions which are asked by the researcher from the respondents in the questionnaire
survey:
1) Do you ever access the server as the user and have you ever access the server to get
the required outcome as the roles or liabilities of you in the organization or
business?
a) Yes b) No
2) Do you understand about encryption and are there any encryption occurred on the
directory of the user so that organization may reduce the chances of
unauthenticated access?
a) Yes b) No
3) Do you think that the permission user get from the data sources is sometimes
unmodified by some changes in the system?
a) Yes b) No
4) Have you have any about sources of the data all the time on the system to get
ensured about the accessibility and availability of the data?
a) Yes b) No
5) Do you think or have any idea about that the team may access the computer
hardware in the organization that may be used within the networking system or
services which is not assigned to the person?
a) Yes b) No
6) How much time you will take to determine or submit the infected information or
files issues as the expert?
a) 0-25 b) 26-50 c) more than 50 d) Never
7) As per the infrastructure of the organization do you think it is effective to put
security on the computing resources of the organization?
10
This research is also conducted by the researcher who is appointed by the ABC international
bank and in this primary data collection method is used to get the new and accurate information.
The research has conducted the questionnaire survey in which 30 respondents are selected
between which the questions are asked by the researcher survey and get the opinion of the
respondents regarding vulnerabilities and security issues in the internet banking. Following are
the questions which are asked by the researcher from the respondents in the questionnaire
survey:
1) Do you ever access the server as the user and have you ever access the server to get
the required outcome as the roles or liabilities of you in the organization or
business?
a) Yes b) No
2) Do you understand about encryption and are there any encryption occurred on the
directory of the user so that organization may reduce the chances of
unauthenticated access?
a) Yes b) No
3) Do you think that the permission user get from the data sources is sometimes
unmodified by some changes in the system?
a) Yes b) No
4) Have you have any about sources of the data all the time on the system to get
ensured about the accessibility and availability of the data?
a) Yes b) No
5) Do you think or have any idea about that the team may access the computer
hardware in the organization that may be used within the networking system or
services which is not assigned to the person?
a) Yes b) No
6) How much time you will take to determine or submit the infected information or
files issues as the expert?
a) 0-25 b) 26-50 c) more than 50 d) Never
7) As per the infrastructure of the organization do you think it is effective to put
security on the computing resources of the organization?
10
a) Average b) Poor c) Excellent d) Effective
8) If you stay far away from the computer devices then do you think the data may be
uncompromised?
a) Yes b) No
11
8) If you stay far away from the computer devices then do you think the data may be
uncompromised?
a) Yes b) No
11
M2 Evaluate the accuracy and reliability of different research methods applied
Accuracy and reliability of the data which are achieved after conducting research method can be
identified by the outcome generated from the research in the numerical form. It is analyzed that
the conducted research helped the researcher to get the accurate data from the research because
the data collected from the books and journals which are already published by any author or
expert researcher so accuracy and reliability of data is quite high in the research. The researcher
has also got the fresh data from the questionnaire through which unbiased and accurate data is
collected from the respondents (Bryman and Bell, 2015).
The secondary and primary both data provides accurate and reliable data as the results clarified
the impact of the vulnerabilities on the internet banking services which are provided by the
banks. The collected is stored in the Microsoft Excel which done correct calculation about the
percentage and review of the respondents. The research analysis is accurate and reliable because
respondents are selected randomly and provide the statistical data and theoretical research results
are provided from the secondary data which is also accurate as per the past documents and
results.
12
Accuracy and reliability of the data which are achieved after conducting research method can be
identified by the outcome generated from the research in the numerical form. It is analyzed that
the conducted research helped the researcher to get the accurate data from the research because
the data collected from the books and journals which are already published by any author or
expert researcher so accuracy and reliability of data is quite high in the research. The researcher
has also got the fresh data from the questionnaire through which unbiased and accurate data is
collected from the respondents (Bryman and Bell, 2015).
The secondary and primary both data provides accurate and reliable data as the results clarified
the impact of the vulnerabilities on the internet banking services which are provided by the
banks. The collected is stored in the Microsoft Excel which done correct calculation about the
percentage and review of the respondents. The research analysis is accurate and reliable because
respondents are selected randomly and provide the statistical data and theoretical research results
are provided from the secondary data which is also accurate as per the past documents and
results.
12
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
LO3
P5 Analyse research and data using appropriate tools and techniques
With the findings and analysis of the research it has identified vulnerabilities and security attacks
damage the confidential information and personal data of the ABC clients due to which they are
losing their clients trust. To analyze the data and research the researcher has used various tools
and techniques such as- questionnaire survey, secondary sources or authenticated books. It is
analyzed that ABC international bank is validated from the vulnerabilities impact on their
computing devices and resources which need to be reduced by the organization. It is also
analyzed that with the help of the synthesis process they may eliminate the unwanted data from
their research and that may improve the performance and quality of their project (Kaur, 2015).
It has analyzed that most of the respondents know and understand about the vulnerabilities and
its impact on the computing devices that are currently used by the ABC bank. The survey is
conducted between 30 respondents and the results shows the positive result that most of the
respondents wants to reduce the impact and provide the security measures to the organization.
On the basis of the small scale research following is the graphical presentation of the
questionnaire survey which show the exact and accurate numerical data about the selected topic
from the respondents:
Yes No
0
5
10
15
20
25
Do you ever access the server as the user and have you ever ac-
cess the server to get the required outcome as the roles or liabilit-
ies of you in the organization or business?
13
P5 Analyse research and data using appropriate tools and techniques
With the findings and analysis of the research it has identified vulnerabilities and security attacks
damage the confidential information and personal data of the ABC clients due to which they are
losing their clients trust. To analyze the data and research the researcher has used various tools
and techniques such as- questionnaire survey, secondary sources or authenticated books. It is
analyzed that ABC international bank is validated from the vulnerabilities impact on their
computing devices and resources which need to be reduced by the organization. It is also
analyzed that with the help of the synthesis process they may eliminate the unwanted data from
their research and that may improve the performance and quality of their project (Kaur, 2015).
It has analyzed that most of the respondents know and understand about the vulnerabilities and
its impact on the computing devices that are currently used by the ABC bank. The survey is
conducted between 30 respondents and the results shows the positive result that most of the
respondents wants to reduce the impact and provide the security measures to the organization.
On the basis of the small scale research following is the graphical presentation of the
questionnaire survey which show the exact and accurate numerical data about the selected topic
from the respondents:
Yes No
0
5
10
15
20
25
Do you ever access the server as the user and have you ever ac-
cess the server to get the required outcome as the roles or liabilit-
ies of you in the organization or business?
13
Yes No
0
5
10
15
20
25
30
Do you understand about encryption and are there any encryp-
tion occurred on the directory of the user so that organization
may reduce the chances of unauthenticated access?
Yes No
0
5
10
15
20
25
Do you think that the permission user get from the data
sources is sometimes unmodified by some changes in the sys-
tem?
Yes No
0
5
10
15
20
25
30
Have you have any about sources of the data all the time on
the system to get ensured about the accessibility and availabil-
ity of the data?
14
0
5
10
15
20
25
30
Do you understand about encryption and are there any encryp-
tion occurred on the directory of the user so that organization
may reduce the chances of unauthenticated access?
Yes No
0
5
10
15
20
25
Do you think that the permission user get from the data
sources is sometimes unmodified by some changes in the sys-
tem?
Yes No
0
5
10
15
20
25
30
Have you have any about sources of the data all the time on
the system to get ensured about the accessibility and availabil-
ity of the data?
14
Yes No
0
5
10
15
20
25
30
Do you think or have any idea about that the team may access the
computer hardware in the organization that may be used within the
networking system or services which is not assigned to the person?
0-25 26-50 more than 50 Never
0
2
4
6
8
10
12
14
16
18
How much time you will take to determine or submit the infected
information or files issues as the expert?
15
0
5
10
15
20
25
30
Do you think or have any idea about that the team may access the
computer hardware in the organization that may be used within the
networking system or services which is not assigned to the person?
0-25 26-50 more than 50 Never
0
2
4
6
8
10
12
14
16
18
How much time you will take to determine or submit the infected
information or files issues as the expert?
15
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Poor Average Effective Excellent
0
2
4
6
8
10
12
14
As per the infrastructure of the organization do you think it is effective
to put security on the computing resources of the organization
Yes No
0
5
10
15
20
25
If you stay far away from the computer devices then do you think
the data may be uncompromised?
16
0
2
4
6
8
10
12
14
As per the infrastructure of the organization do you think it is effective
to put security on the computing resources of the organization
Yes No
0
5
10
15
20
25
If you stay far away from the computer devices then do you think
the data may be uncompromised?
16
P6 Communicate appropriate recommendations as a result of research and data analysis to draw
valid and meaningful conclusions
Recommendation is always provided after identifying main issues and problems that are faced by
the organization so that according to the problem measures can be suggested to the organization
and their team. Following are some recommendations which need to be considered by the ABC
bank to reduce the security issues and impact of the vulnerabilities:
According to the research project it has identified that security issues are occurred in the ABC
internet banking services due to which clients confidential information are unauthorized used by
the user so to reduce this issue they can use encryption system on their computer systems. This
system prevents the accessibility of the unauthorized users and protects the client’s information.
They can also use Centralized access management technique in which before using the system
the user need to take the permission and this will restrict the user if they have no valid ID to
access the system (Bradford et al, 2014). To avoid the security issues it is essential for
organization to conduct the regular data audit through which data security can be monitored by
the team of the organization.
Conclusion
According to the above conducted research and project it has concluded that vulnerabilities
occurred in the organization due to which security of the data becomes one of the problem. The
report has also concluded that the security issues can be used by suggested recommendations and
reduce the vulnerabilities impact from the internet banking services. The report has also
discussed about the importance of confidentiality of data, availability of data and integrity of
data so that organization can effective store and share their data with the authorized users.
17
valid and meaningful conclusions
Recommendation is always provided after identifying main issues and problems that are faced by
the organization so that according to the problem measures can be suggested to the organization
and their team. Following are some recommendations which need to be considered by the ABC
bank to reduce the security issues and impact of the vulnerabilities:
According to the research project it has identified that security issues are occurred in the ABC
internet banking services due to which clients confidential information are unauthorized used by
the user so to reduce this issue they can use encryption system on their computer systems. This
system prevents the accessibility of the unauthorized users and protects the client’s information.
They can also use Centralized access management technique in which before using the system
the user need to take the permission and this will restrict the user if they have no valid ID to
access the system (Bradford et al, 2014). To avoid the security issues it is essential for
organization to conduct the regular data audit through which data security can be monitored by
the team of the organization.
Conclusion
According to the above conducted research and project it has concluded that vulnerabilities
occurred in the organization due to which security of the data becomes one of the problem. The
report has also concluded that the security issues can be used by suggested recommendations and
reduce the vulnerabilities impact from the internet banking services. The report has also
discussed about the importance of confidentiality of data, availability of data and integrity of
data so that organization can effective store and share their data with the authorized users.
17
M3 Evaluate the selection of appropriate tools and techniques for accuracy and authenticity
It is important for the ABC international bank to achieve customer trust and reliability towards
its banking services by eliminating the impact of vulnerabilities issues on the computing devices
in which customer data and information are kept. It is also important for the Barclays bank to
analyze the accuracy and authenticity of the data and information collected by conducting
different research methods such as qualitative and quantitative. In the qualitative research
method, researcher can use secondary source of data to collect information such as magazines,
articles, newspaper and books of the different authors. This method ensures the accuracy and
authenticity of the data as information is collected by authenticates and authorised writers and
authors. Secondary source is reliable as data and information is assess properly then recorded
and written in the books and articles (Merriam and Tisdell, 2015).
The researchers can also conduct quantitative research to analyze accuracy and authenticity of
data and information collected by using primary source of data in which researchers can use
personal interaction and questionnaire tools. In this, researchers can randomly select the
respondents among the managers and employees of the ABC bank and asked them questions
related to the vulnerabilities impacts through questionnaire. This research method also has high
level of accuracy, reliability and authenticity of data collected as researchers collect information
and data by personally interacting with the respondents such as employees and managers of the
bank. Therefore, it is realised that information and data collected by using both qualitative as
well as quantitative research methods is accurate and authenticate.
18
It is important for the ABC international bank to achieve customer trust and reliability towards
its banking services by eliminating the impact of vulnerabilities issues on the computing devices
in which customer data and information are kept. It is also important for the Barclays bank to
analyze the accuracy and authenticity of the data and information collected by conducting
different research methods such as qualitative and quantitative. In the qualitative research
method, researcher can use secondary source of data to collect information such as magazines,
articles, newspaper and books of the different authors. This method ensures the accuracy and
authenticity of the data as information is collected by authenticates and authorised writers and
authors. Secondary source is reliable as data and information is assess properly then recorded
and written in the books and articles (Merriam and Tisdell, 2015).
The researchers can also conduct quantitative research to analyze accuracy and authenticity of
data and information collected by using primary source of data in which researchers can use
personal interaction and questionnaire tools. In this, researchers can randomly select the
respondents among the managers and employees of the ABC bank and asked them questions
related to the vulnerabilities impacts through questionnaire. This research method also has high
level of accuracy, reliability and authenticity of data collected as researchers collect information
and data by personally interacting with the respondents such as employees and managers of the
bank. Therefore, it is realised that information and data collected by using both qualitative as
well as quantitative research methods is accurate and authenticate.
18
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
LO4
P7 Reflect on the value of undertaking the research to meet stated objectives and own learning
and performance
The main purpose behind conducting the project research is to identify the vulnerabilities
impacts on the computing resources and enhancing the customer trust and faith towards the
banking services by gaining integrity, confidentiality and availability of the computer software
and technology to secure and protect the customer data. The research project has improve my
own skills and understandings about the use of different methods and techniques for proper
management of the resources, time and cost for performing different tasks and activities to
accomplish project (Kaur, 2015).
The researchers have used different strategies and methods such as work breakdown structure,
timeframes and Gantt chart to analyze the estimated cost, time and resources that will be required
to execute and complete the project. the researchers in the ABC bank has used these strategies
and methods for optimum utilization of the resources and effectively manage the cost and time
for completing project successfully. Therefore, all the research methods has greater advantage
for the ABC bank to gather information about the vulnerabilities issue impacts and provide
proper safety to the clients data.
Own learning and performance
The current research project has taught me a lot about the effectively manage and control all the
activities of the project to achieve desired objectives (Liao et al, 2016). It has developed my own
learning about the use of different methods to manage the project such as resource, cost and time
management strategies by using cost effective methods, timescales and optimum utilization of
the resources. I have learned that how the ABC international bank has achieved its customer trust
and faith by eliminating the impacts of vulnerabilities issues and other threat on the computer
systems in which customer data and information are saved.
The project research has also improve my own performance as it has taught me that how to make
use of different methods and techniques to effectively manage the activities of the project. It has
improved my personal as well as managerial skills through applying time management, cost
management and resource management strategies to achieve the objectives of the project.
19
P7 Reflect on the value of undertaking the research to meet stated objectives and own learning
and performance
The main purpose behind conducting the project research is to identify the vulnerabilities
impacts on the computing resources and enhancing the customer trust and faith towards the
banking services by gaining integrity, confidentiality and availability of the computer software
and technology to secure and protect the customer data. The research project has improve my
own skills and understandings about the use of different methods and techniques for proper
management of the resources, time and cost for performing different tasks and activities to
accomplish project (Kaur, 2015).
The researchers have used different strategies and methods such as work breakdown structure,
timeframes and Gantt chart to analyze the estimated cost, time and resources that will be required
to execute and complete the project. the researchers in the ABC bank has used these strategies
and methods for optimum utilization of the resources and effectively manage the cost and time
for completing project successfully. Therefore, all the research methods has greater advantage
for the ABC bank to gather information about the vulnerabilities issue impacts and provide
proper safety to the clients data.
Own learning and performance
The current research project has taught me a lot about the effectively manage and control all the
activities of the project to achieve desired objectives (Liao et al, 2016). It has developed my own
learning about the use of different methods to manage the project such as resource, cost and time
management strategies by using cost effective methods, timescales and optimum utilization of
the resources. I have learned that how the ABC international bank has achieved its customer trust
and faith by eliminating the impacts of vulnerabilities issues and other threat on the computer
systems in which customer data and information are saved.
The project research has also improve my own performance as it has taught me that how to make
use of different methods and techniques to effectively manage the activities of the project. It has
improved my personal as well as managerial skills through applying time management, cost
management and resource management strategies to achieve the objectives of the project.
19
M4 Evaluate the value of the project management process
The project management process included the various steps such as determining the objectives,
planning, organizing and implementing the plan to manage the various activities of the project to
accomplish it. The project management process is very helpful for the managers and researchers
as it guide them how to execute, perform and complete the project by managing resources, cost
and time effectively and efficiently. The project manager has developed modules which will be
allotted to the employees to perform the different tasks in efficient way.
The project management process is also very helpful for quality management of the project by
performing all the activities in the systematic way and as per the defined procedures. It also helps
in managing human resources which are engaged in the project for performing different tasks.
Table 5: Performance review
Questions about the performance Yes No
Are data and information collected proper and effective for
completing the project?
Are resources properly arranged as per the need of the project?
Is the research project identifies the impacts of the vulnerabilities on
the computing resources effectively?
Are suggested recommendations effective to overcome the impacts
of vulnerabilities issue on the computing resources?
20
The project management process included the various steps such as determining the objectives,
planning, organizing and implementing the plan to manage the various activities of the project to
accomplish it. The project management process is very helpful for the managers and researchers
as it guide them how to execute, perform and complete the project by managing resources, cost
and time effectively and efficiently. The project manager has developed modules which will be
allotted to the employees to perform the different tasks in efficient way.
The project management process is also very helpful for quality management of the project by
performing all the activities in the systematic way and as per the defined procedures. It also helps
in managing human resources which are engaged in the project for performing different tasks.
Table 5: Performance review
Questions about the performance Yes No
Are data and information collected proper and effective for
completing the project?
Are resources properly arranged as per the need of the project?
Is the research project identifies the impacts of the vulnerabilities on
the computing resources effectively?
Are suggested recommendations effective to overcome the impacts
of vulnerabilities issue on the computing resources?
20
Conclusion
This report has conducted the research project through which it has concluded that banking
services that are provided through internet by the banks may face many security issues due to the
vulnerabilities on the computing devices. The report has covered the discussion through which
security issues in the ABC international bank Plc can be analyzed through the successful
computing project. The research is also conducted by the research through which data has been
analyzed regarding vulnerabilities on the internet banking services. The report has been
effectively conducted as the successful outcome is generated through which actual and set aims
and objectives of the research are achieved.
21
This report has conducted the research project through which it has concluded that banking
services that are provided through internet by the banks may face many security issues due to the
vulnerabilities on the computing devices. The report has covered the discussion through which
security issues in the ABC international bank Plc can be analyzed through the successful
computing project. The research is also conducted by the research through which data has been
analyzed regarding vulnerabilities on the internet banking services. The report has been
effectively conducted as the successful outcome is generated through which actual and set aims
and objectives of the research are achieved.
21
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
References
Books and Journals
Aljawarneh, S.A., 2017. Analysis of Data Validation Techniques for Online Banking
Services. In Online Banking Security Measures and Data Protection (pp. 127-139). IGI
Global.
Bradford, M., Earp, J.B. and Grabski, S., 2014. Centralized end-to-end identity and
access management and ERP systems: A multi-case analysis using the Technology
Organization Environment framework. International Journal of Accounting Information
Systems, 15(2), pp.149-165.
Bryman, A. and Bell, E., 2015. Business research methods. Oxford University Press,
USA.
Fleming, Q.W. and Koppelman, J.M., 2016, December. Earned value project
management. Project Management Institute.
Genge, B. and Enăchescu, C., 2016. ShoVAT: Shodan‐based vulnerability assessment
tool for Internet‐facing services. Security and communication networks, 9(15), pp.2696-
2714.
Harrison, F. and Lock, D., 2017. Advanced project management: a structured approach.
Routledge.
Kaur, N., 2015. A survey on online banking system attacks and its
countermeasures. International Journal of Computer Science and Network Security
(IJCSNS), 15(3), p.57.
Kerzner, H. and Kerzner, H.R., 2017. Project management: a systems approach to
planning, scheduling, and controlling. John Wiley & Sons.
Khrais, L.T., 2015. Highlighting the vulnerabilities of online banking system. The
Journal of Internet Banking and Commerce, 20(3).
Liao, C., Huang, Y.J. and Hsieh, T.H., 2016. Factors influencing internet banking
adoption. Social Behavior and Personality: an international journal, 44(9), pp.1443-
1455.
22
Books and Journals
Aljawarneh, S.A., 2017. Analysis of Data Validation Techniques for Online Banking
Services. In Online Banking Security Measures and Data Protection (pp. 127-139). IGI
Global.
Bradford, M., Earp, J.B. and Grabski, S., 2014. Centralized end-to-end identity and
access management and ERP systems: A multi-case analysis using the Technology
Organization Environment framework. International Journal of Accounting Information
Systems, 15(2), pp.149-165.
Bryman, A. and Bell, E., 2015. Business research methods. Oxford University Press,
USA.
Fleming, Q.W. and Koppelman, J.M., 2016, December. Earned value project
management. Project Management Institute.
Genge, B. and Enăchescu, C., 2016. ShoVAT: Shodan‐based vulnerability assessment
tool for Internet‐facing services. Security and communication networks, 9(15), pp.2696-
2714.
Harrison, F. and Lock, D., 2017. Advanced project management: a structured approach.
Routledge.
Kaur, N., 2015. A survey on online banking system attacks and its
countermeasures. International Journal of Computer Science and Network Security
(IJCSNS), 15(3), p.57.
Kerzner, H. and Kerzner, H.R., 2017. Project management: a systems approach to
planning, scheduling, and controlling. John Wiley & Sons.
Khrais, L.T., 2015. Highlighting the vulnerabilities of online banking system. The
Journal of Internet Banking and Commerce, 20(3).
Liao, C., Huang, Y.J. and Hsieh, T.H., 2016. Factors influencing internet banking
adoption. Social Behavior and Personality: an international journal, 44(9), pp.1443-
1455.
22
Merriam, S.B. and Tisdell, E.J., 2015. Qualitative research: A guide to design and
implementation. John Wiley & Sons.
Online references
ABC international bank, 2018 [Online] [Assessed through] <https://www.bank-
abc.com/En/Pages/default.aspx>, [Assessed on 23th August, 2018]
23
implementation. John Wiley & Sons.
Online references
ABC international bank, 2018 [Online] [Assessed through] <https://www.bank-
abc.com/En/Pages/default.aspx>, [Assessed on 23th August, 2018]
23
Appendix
Project logbook
Table 6: Project logbook
Name of the person:
Project title: Identify vulnerabilities on internet banking
Date:
What is achieved from the report and give update about research:
The conducted project and research effectively produced the positive outcomes through which set aims
and objectives are achieved which is related to analyze the vulnerabilities on the internet banking. As per
the weekly updates it has identified that this project reduce the security issues of the ABC bank.
What are identified risk in the project:
The project is effective and efficient but still two major risks are there in the project such as- time
management risk and budget control risk.
What are identified issues in the project:
The project along with the risk has some issues also which are related to the communication gap between
the projects management team due to which equal distribution of the roles also get disturbed.
What are new ideas or plan for improvement:
Some new ideas and plans are required to reduce the impact of the risk and issues occurred in the project.
To avoid the time risk they may consider time management strategies which are critical path analysis,
budget control technique is also used to avoid the cost issues and proper communication plan is required
to avoid communication problem.
What I as the researcher learned from the research project:
From this research I as the researcher have learned many things that are related to proper use of the tools
and techniques along with the time management and skill management. I also learned to conduct the
research by using the suggestions of respondents and complete the research
Current project status:
The project is not yet completed
Supervisor review or comments:
It is essential to reduce the risk and for this suggested techniques, tools and strategies need to be used so
that aims of the project can be achieved. It is also important for the project team to enhance their
interpersonal connection so that communication gap can be reduced.
24
Project logbook
Table 6: Project logbook
Name of the person:
Project title: Identify vulnerabilities on internet banking
Date:
What is achieved from the report and give update about research:
The conducted project and research effectively produced the positive outcomes through which set aims
and objectives are achieved which is related to analyze the vulnerabilities on the internet banking. As per
the weekly updates it has identified that this project reduce the security issues of the ABC bank.
What are identified risk in the project:
The project is effective and efficient but still two major risks are there in the project such as- time
management risk and budget control risk.
What are identified issues in the project:
The project along with the risk has some issues also which are related to the communication gap between
the projects management team due to which equal distribution of the roles also get disturbed.
What are new ideas or plan for improvement:
Some new ideas and plans are required to reduce the impact of the risk and issues occurred in the project.
To avoid the time risk they may consider time management strategies which are critical path analysis,
budget control technique is also used to avoid the cost issues and proper communication plan is required
to avoid communication problem.
What I as the researcher learned from the research project:
From this research I as the researcher have learned many things that are related to proper use of the tools
and techniques along with the time management and skill management. I also learned to conduct the
research by using the suggestions of respondents and complete the research
Current project status:
The project is not yet completed
Supervisor review or comments:
It is essential to reduce the risk and for this suggested techniques, tools and strategies need to be used so
that aims of the project can be achieved. It is also important for the project team to enhance their
interpersonal connection so that communication gap can be reduced.
24
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
25
1 out of 29
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.