ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Managing a Successful Computing Project: Identifying Vulnerabilities in Internet Banking

Verified

Added on  2024/07/24

|29
|5572
|274
AI Summary
This report examines the vulnerabilities facing ABC International Bank Plc, a leading financial institution in Europe, due to their internet banking services. It outlines a comprehensive project management plan to address these security concerns, including a work breakdown structure, Gantt chart, and risk assessment. The report also delves into a small-scale research project using qualitative and quantitative methods to analyze the vulnerabilities and their impact on the bank's operations. The research findings are then used to formulate recommendations for improving the bank's security posture and mitigating future risks.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
MANAGING A SUCCESSFUL
COMPUTING PROJECT

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
TABLE OF CONTENTS
Introduction
......................................................................................................................................1
LO1
.................................................................................................................................................. 2
P1 Devise project aims and objectives for a chosen scenario
.....................................................2
P2 Produce a project management plan
.......................................................................................4
P3 Produce a work breakdown structure and a Gantt chart to provide timeframes and stages

for completion
..............................................................................................................................6
M1
Produce a comprehensive project management plan............................................................8
LO2
.................................................................................................................................................. 9
P4
Carry out small-scale research by applying qualitative and quantitative research methods. .9
M2 Evaluate the accuracy and reliability of different research methods applied
......................12
LO3
................................................................................................................................................ 13
P5 Analyse research and data using appropriate tools and techniques
......................................13
P6 Communicate appropriate recommendations as a result of research and data analysis to

draw valid and meaningful conclusions
....................................................................................17
M3 Evaluate the selection of appropriate tools and techniques for accuracy and authenticity
. 18
LO4
................................................................................................................................................ 19
P7 Reflect on the value of undertaking the research to meet stated objectives and own learning

and performance
........................................................................................................................19
M4 Evaluate the value of the project management process
......................................................20
Conclusion
..................................................................................................................................... 21
References
......................................................................................................................................22
Appendix
........................................................................................................................................24
Project logbook
.......................................................................................................................... 24
Document Page
LIST OF TABLES
Table 1: Gantt chart
.........................................................................................................................7
Table 2: Distribution of activities as per time
.................................................................................7
Table 3: Milestone plan
...................................................................................................................8
Table 4: Schedule plan
.....................................................................................................................8
Table 5: Performance review
.........................................................................................................20
Table 6: Project logbook
................................................................................................................24
Document Page
LIST OF FIGURES
Figure 1: ABC international bank
....................................................................................................1
Figure 2: Work breakdown structure
............................................................................................... 6

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Introduction
Effective and successful computing project is essential to be created so that actual result in the

positive manner can be generated by the project manager. The computing project will be related

to identify the vulnerabilities facing by the bands when they will provide internet banking

services to their clients. The report will create the project plan and also conduct the research

through which security issues which are facing by the ABC international bank Plc will be

identified. ABC international bank is the leading financial institution based in the Europe and

provides internet banking services due to which some of the security issues are facing by them.

The report will effectively create the project plan through which they can implement the project

and achieve the set project purpose. The report will also conduct the research by researcher

through which opinion of the respondents through questionnaire survey will also be identified.

Figure
1: ABC international bank
(Source: www.bank-abc.com, 2018)

1
Document Page
LO1
P1 Devise project aims and objectives for a chosen scenario

Project description

The project is about to identify the vulnerabilities in the services of the internet banking which is

provided by the ABC international bank PLC which provides their financial services in all

around the Europe, North Africa and Middle East. The banking institutions have various

computing resources which they use to provide some internet banking services to their clients but

due to some vulnerabilities and security attacks their internet banking services may get disturbed.

Issues in the organization

It is evaluated that current ABC bank provide various types of the financial and other banking

services to their clients in which internet banking services are also covered (Khrais, 2015). They

provide banking services through computing resources or digital tools under which their major

concern is related to the data and information of their client’s security. The current issue which is

faced by the organization is related to the vulnerability attacks due to which they lost the

confidential information of their client’s and organization also. The client of the bank lost their

personal information due to the lack of the logical security in the computer devices.

Expectations from the research project

After discussing the issues which by the ABC bank clients it is important for the project to

discuss about the expectations through which issues can be reduced. The project is conducted by

the project manager of the organization which has the expectation to resolve the security attacks

from their computing devices or resources. The main expectation of the project manager is

related to manage the confidential information of the client’s and protect the reputation of the

organization also (Genge and Enăchescu, 2016).

Project aims and objectives

The research project is conducted by the research specialist and the topic is selected by the

research specialist which is related to analyze the vulnerabilities in the services of internet

banking that is provided by the ABC international bank. The project is all about to identify the

security issues facing by the bank due to the impact of the vulnerabilities on their internet

banking services.

2
Document Page
Objectives:
The project is about to analyze the vulnerabilities in the ABC international banking
services which they are providing through internet (Liao et al, 2016).

Objective is also to analyze the various measures to avoid and overcome the security
issues that are occurred in the internet banking services.

The main purpose and objective of the research project is to meet the manager
expectation which is related to achieve integrity, confidentiality and availability of the

data in the software system used by the ABC bank.

3

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
P2 Produce a project management plan
Project introduction:
The case of this project is related to identify the security issues currently
facing by the ABC international bank along with identifying the vulnerabilities occurred in the

internet banking or software system that are used by the organization. They are currently using

Microsoft Windows system and its main function is to protect the confidential information of

their clients. Addition to this, they are facing issues of computing system security and that

disturb the need to data confidentiality, integrity and availability.

Importance of project management:
This is important as it ensure the project manager and its
team to set the proper expectation to deliver the positive outcome from the project to the

organization. The efficient project manager negotiates the reasonable or achievable milestone

and deadlines around stakeholders and management team. There are various stages which are

covered under the project plan which are effective for the organization to get the positive result

after completion of the project. The stages are important to complete the project with quality and

estimated time (Fleming and Koppelman, 2016).

Following is the project management plan for ABC international bank:

Project scoping

Objective:
The main and key objective of this project is only related to analyze the security
issues faced by the ABC bank on their internet banking services because of the vulnerabilities.

Scope:
Scope of this project is very large and huge as it helps the organization to identify the
measures through which they can overcome the client’s issues and security concern of their

clients.

Purpose:
The main purpose of the project manager is to overcome the security attacks and data
damage from their software system by effective tools and techniques.

Deliverables:
The project delivers the positive results in the favour of the ABC international
banking institutions. The project delivers small scale research in which views of the users can be

analyzed to overcome the vulnerabilities impact on computing resources (Harrison and Lock,

2017).

4
Document Page
Steps or documentation to start the project
Cost:
Before initiating the project it is essential for project manager to estimate the budget
required. According to the expectations the project requires at least budget of $20,000 and apart

from this some additional amount of $2,000 is needed to overcome the risk issues. Within the

budget of $20,000 some resources are covered such as- hardware and software, human resources,

engineer as expert, security design, quality technique and other resources.

Timescale:
As per the expectations this project need at least time of 2 month to complete. All the
activities including sub-activities need to be covered within the specified time only. Some of the

time issues must be solved in the also week only. Timescale and activities must be decided with

the help of work breakdown structure (WBS) and Gantt chart.

Risk:
The project also have some risk due to which time delay issues and lack of positive
outcome must be occurred. Time management, cost control, proper allocation of the resources

are the risks that are involved under this project.

Quality:
Quality assurance and management is also need to be managed by the project manager
by solving the risk identified in the project. Time issue can be solved by using prioritization

strategy, cost issues by budget control strategy and resources allocation issue can be solved by

equal distribution of resources. These strategies to reduce the risk help the project manager to

cover the quality assurance (Kerzner and Kerzner, 2017).

Communication:
In the last, the project manager needs to conduct the official meeting with the
investors, stakeholders and other project management team. In that meeting all the points and

details related to the project must be discussed and communicated to the members. This will help

to identify the changes required along with the potential suggestion from the members.

Communication can also be done by the video conferences, e-mail and phone calls also.

5
Document Page
P3 Produce a work breakdown structure and a Gantt chart to provide timeframes and stages for
completion

Figure
2: Work breakdown structure
(Source: Author, 2018)

6

Computing project
Planning
Hand on machines
User and system
analysis
Document the
strategy
Identify skills
Requirement
specification
Meetings
Focus on issues
Ouline solutions
Risk identification
Pre-design
Communication
for project
requirement
Finalization of
solutions
Contract and
agreement
Revise cost and
time
Designing
Logical design
Physical resources
Protyping and risk
managment
Implementation
Configuration of
device and
software
additional
installation
Documentation
Testing
Configuration
testing
Physical
installation
Quality
analysis
Post-
implementation
Maintenance guide
Recommendations
Training and
development
Resource handover
Project closure

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table 1: Gantt chart
Project actions
Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8
Planning

Requirement identification

Project Pre-designing

Project Designing

Implement

Project testing

Project post-

implementation

Table
2: Distribution of activities as per time
Actions
Time needed
Planning:
Includes- security parameter, CIA features knowledge,
resource arrangement and create the concept behind project

In week 1

Requirement identification:
Includes- identify the project
impact, identify the impact of vulnerabilities and team

communication.

In week 2

Project Pre-designing:
Includes- solution creation and
management of resources

In week 3

Project Designing:
verification of needs, design the project
Prototyping and final design

In week 4

Implementation of plan:
Includes- Configure the hardware and
software and update the components

In week 5

Project testing:
Includes- module test and functions. In week 6
Project post-implementation:
provide training for employees
development and end the project

In week 7 and 8

7
Document Page
M1 Produce a comprehensive project management plan
Table
3: Milestone plan
Actions for project
Status of action plan Time needed as action
Planning
Finished 5 days
Requirement identification
Finished 12 days
Project Pre-designing
Finished 6 days
Project designing
Only part is completed 4 days
Implementation
Some areas are still not completed 6 days
Testing of project
Some are still not finished 4 days
Project post-implementation
Ready to complete due some areas are dew 3 days
Table
4: Schedule plan
Actions and weeks
1st 2nd 3rd 4th 5th 6th 7th 8th
Collect data for project

Interact with

stakeholders

Risk identification

Plan for project proposal

Element planning

Decide budget

Conduct research

Create questionnaire

Organize team

Complete the project

8
Document Page
LO2
P4
Carry out small-scale research by applying qualitative and quantitative research methods
The researcher has conducted the small scale research in which research has used mixed research

method and that include quantitative method and qualitative method. With these methods both

type of research has conducted through which numerical and non-numerical data are collected.

Qualitative research has provided information in quality and in this secondary data collection

method is used through which information from books or magazines or journals are collected on

the same topic. Quantitative research has provided the information in quantity which is

represented in the numerical form and primary data collection methods are used in this research.

Following are both research which has been conducted by the researcher:

Qualitative research

It is identified that vulnerabilities is one of the weaknesses that creates problems in the

organization and disturb the security system and management within the computing services.

According to the Khrais, (2015), vulnerabilities are the attacks in the computing resources which

exploit the resources, unauthenticated access and data modification. There are various types of

impact which are faced by the organization due to which they may loss their client confidential

information. Due to the occurred security issues in the organization the data is lost from the

computer system from they may deliver the inaccurate and inconsistent information or data of

their clients.

According to the Aljawarneh, (2017), the organization main requirement is related to security so

that can maintain the availability, confidentiality and integrity of the client information which are

stored in the computing devices. The integrity of the client information is the major concern and

this is created on the decision making process of the organization because due to the lack of data

integrity the processing of the data also become slow and they can gain incorrect results which is

not effective for the organization. According to the Kaur, (2015), it is very important for the

organization to install or configure some of the effective software according to the organization

standard and also apply some rules in respect of the system accessibility. This type of measures

may reduce the security attacks and they can avoid the data theft and damage from the systems.

9

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Quantitative research
This research is also conducted by the researcher who is appointed by the ABC international

bank and in this primary data collection method is used to get the new and accurate information.

The research has conducted the questionnaire survey in which 30 respondents are selected

between which the questions are asked by the researcher survey and get the opinion of the

respondents regarding vulnerabilities and security issues in the internet banking. Following are

the questions which are asked by the researcher from the respondents in the questionnaire

survey:

1)
Do you ever access the server as the user and have you ever access the server to get
the required outcome as the roles or liabilities of you in the organization or

business?

a) Yes
b) No
2)
Do you understand about encryption and are there any encryption occurred on the
directory of the user so that organization may reduce the chances of

unauthenticated access?

a) Yes
b) No
3)
Do you think that the permission user get from the data sources is sometimes
unmodified by some changes in the system?

a) Yes
b) No
4)
Have you have any about sources of the data all the time on the system to get
ensured about the accessibility and availability of the data?

a) Yes
b) No
5)
Do you think or have any idea about that the team may access the computer
hardware in the organization that may be used within the networking system or

services which is not assigned to the person?

a) Yes
b) No
6)
How much time you will take to determine or submit the infected information or
files issues as the expert?

a) 0-25
b) 26-50 c) more than 50 d) Never
7)
As per the infrastructure of the organization do you think it is effective to put
security on the computing resources of the organization?

10
Document Page
a) Average b) Poor c) Excellent d) Effective
8)
If you stay far away from the computer devices then do you think the data may be
uncompromised?

a) Yes
b) No
11
Document Page
M2 Evaluate the accuracy and reliability of different research methods applied
Accuracy and reliability of the data which are achieved after conducting research method can be

identified by the outcome generated from the research in the numerical form. It is analyzed that

the conducted research helped the researcher to get the accurate data from the research because

the data collected from the books and journals which are already published by any author or

expert researcher so accuracy and reliability of data is quite high in the research. The researcher

has also got the fresh data from the questionnaire through which unbiased and accurate data is

collected from the respondents (Bryman and Bell, 2015).

The secondary and primary both data provides accurate and reliable data as the results clarified

the impact of the vulnerabilities on the internet banking services which are provided by the

banks. The collected is stored in the Microsoft Excel which done correct calculation about the

percentage and review of the respondents. The research analysis is accurate and reliable because

respondents are selected randomly and provide the statistical data and theoretical research results

are provided from the secondary data which is also accurate as per the past documents and

results.

12

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
LO3
P5 Analyse research and data using appropriate tools and techniques

With the findings and analysis of the research it has identified vulnerabilities and security attacks

damage the confidential information and personal data of the ABC clients due to which they are

losing their clients trust. To analyze the data and research the researcher has used various tools

and techniques such as- questionnaire survey, secondary sources or authenticated books. It is

analyzed that ABC international bank is validated from the vulnerabilities impact on their

computing devices and resources which need to be reduced by the organization. It is also

analyzed that with the help of the synthesis process they may eliminate the unwanted data from

their research and that may improve the performance and quality of their project (Kaur, 2015).

It has analyzed that most of the respondents know and understand about the vulnerabilities and

its impact on the computing devices that are currently used by the ABC bank. The survey is

conducted between 30 respondents and the results shows the positive result that most of the

respondents wants to reduce the impact and provide the security measures to the organization.

On the basis of the small scale research following is the graphical presentation of the

questionnaire survey which show the exact and accurate numerical data about the selected topic

from the respondents:

Yes
No
0

5

10

15

20

25

Do you ever access the server as the user and have you ever ac-
cess the server to get the required outcome as the roles or liabilit-
ies of you in the organization or business?

13
Document Page
Yes No
0

5

10

15

20

25

30

Do you understand about encryption and are there any encryp-
tion occurred on the directory of the user so that organization
may reduce the chances of unauthenticated access?

Yes
No
0

5

10

15

20

25

Do you think that the permission user get from the data
sources is sometimes unmodified by some changes in the sys-
tem?

Yes
No
0

5

10

15

20

25

30

Have you have any about sources of the data all the time on
the system to get ensured about the accessibility and availabil-
ity of the data?

14
Document Page
Yes No
0

5

10

15

20

25

30

Do you think or have any idea about that the team may access the
computer hardware in the organization that may be used within the
networking system or services which is not assigned to the person?

0-25
26-50 more than 50 Never
0

2

4

6

8

10

12

14

16

18

How much time you will take to determine or submit the infected
information or files issues as the expert?

15

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Poor Average Effective Excellent
0

2

4

6

8

10

12

14

As per the infrastructure of the organization do you think it is effective
to put security on the computing resources of the organization

Yes
No
0

5

10

15

20

25

If you stay far away from the computer devices then do you think
the data may be uncompromised?

16
Document Page
P6 Communicate appropriate recommendations as a result of research and data analysis to draw
valid and meaningful conclusions

Recommendation is always provided after identifying main issues and problems that are faced by

the organization so that according to the problem measures can be suggested to the organization

and their team. Following are some recommendations which need to be considered by the ABC

bank to reduce the security issues and impact of the vulnerabilities:

According to the research project it has identified that security issues are occurred in the ABC

internet banking services due to which clients confidential information are unauthorized used by

the user so to reduce this issue they can use encryption system on their computer systems. This

system prevents the accessibility of the unauthorized users and protects the client’s information.

They can also use Centralized access management technique in which before using the system

the user need to take the permission and this will restrict the user if they have no valid ID to

access the system (Bradford et al, 2014). To avoid the security issues it is essential for

organization to conduct the regular data audit through which data security can be monitored by

the team of the organization.

Conclusion

According to the above conducted research and project it has concluded that vulnerabilities

occurred in the organization due to which security of the data becomes one of the problem. The

report has also concluded that the security issues can be used by suggested recommendations and

reduce the vulnerabilities impact from the internet banking services. The report has also

discussed about the importance of confidentiality of data, availability of data and integrity of

data so that organization can effective store and share their data with the authorized users.

17
Document Page
M3 Evaluate the selection of appropriate tools and techniques for accuracy and authenticity
It is important for the ABC international bank to achieve customer trust and reliability towards

its banking services by eliminating the impact of vulnerabilities issues on the computing devices

in which customer data and information are kept. It is also important for the Barclays bank to

analyze the accuracy and authenticity of the data and information collected by conducting

different research methods such as qualitative and quantitative. In the qualitative research

method, researcher can use secondary source of data to collect information such as magazines,

articles, newspaper and books of the different authors. This method ensures the accuracy and

authenticity of the data as information is collected by authenticates and authorised writers and

authors. Secondary source is reliable as data and information is assess properly then recorded

and written in the books and articles (Merriam and Tisdell, 2015).

The researchers can also conduct quantitative research to analyze accuracy and authenticity of

data and information collected by using primary source of data in which researchers can use

personal interaction and questionnaire tools. In this, researchers can randomly select the

respondents among the managers and employees of the ABC bank and asked them questions

related to the vulnerabilities impacts through questionnaire. This research method also has high

level of accuracy, reliability and authenticity of data collected as researchers collect information

and data by personally interacting with the respondents such as employees and managers of the

bank. Therefore, it is realised that information and data collected by using both qualitative as

well as quantitative research methods is accurate and authenticate.

18

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
LO4
P7 Reflect on the value of undertaking the research to meet stated objectives and own learning

and performance

The main purpose behind conducting the project research is to identify the vulnerabilities

impacts on the computing resources and enhancing the customer trust and faith towards the

banking services by gaining integrity, confidentiality and availability of the computer software

and technology to secure and protect the customer data. The research project has improve my

own skills and understandings about the use of different methods and techniques for proper

management of the resources, time and cost for performing different tasks and activities to

accomplish project (Kaur, 2015).

The researchers have used different strategies and methods such as work breakdown structure,

timeframes and Gantt chart to analyze the estimated cost, time and resources that will be required

to execute and complete the project. the researchers in the ABC bank has used these strategies

and methods for optimum utilization of the resources and effectively manage the cost and time

for completing project successfully. Therefore, all the research methods has greater advantage

for the ABC bank to gather information about the vulnerabilities issue impacts and provide

proper safety to the clients data.

Own learning and performance

The current research project has taught me a lot about the effectively manage and control all the

activities of the project to achieve desired objectives (Liao et al, 2016). It has developed my own

learning about the use of different methods to manage the project such as resource, cost and time

management strategies by using cost effective methods, timescales and optimum utilization of

the resources. I have learned that how the ABC international bank has achieved its customer trust

and faith by eliminating the impacts of vulnerabilities issues and other threat on the computer

systems in which customer data and information are saved.

The project research has also improve my own performance as it has taught me that how to make

use of different methods and techniques to effectively manage the activities of the project. It has

improved my personal as well as managerial skills through applying time management, cost

management and resource management strategies to achieve the objectives of the project.

19
Document Page
M4 Evaluate the value of the project management process
The project management process included the various steps such as determining the objectives,

planning, organizing and implementing the plan to manage the various activities of the project to

accomplish it. The project management process is very helpful for the managers and researchers

as it guide them how to execute, perform and complete the project by managing resources, cost

and time effectively and efficiently. The project manager has developed modules which will be

allotted to the employees to perform the different tasks in efficient way.

The project management process is also very helpful for quality management of the project by

performing all the activities in the systematic way and as per the defined procedures. It also helps

in managing human resources which are engaged in the project for performing different tasks.

Table
5: Performance review
Questions about the performance
Yes No
Are data and information collected proper and effective for

completing the project?


Are resources properly arranged as per the need of the project?

Is the research project identifies the impacts of the vulnerabilities on

the computing resources effectively?


Are suggested recommendations effective to overcome the impacts

of vulnerabilities issue on the computing resources?


20
Document Page
Conclusion
This report has conducted the research project through which it has concluded that banking

services that are provided through internet by the banks may face many security issues due to the

vulnerabilities on the computing devices. The report has covered the discussion through which

security issues in the ABC international bank Plc can be analyzed through the successful

computing project. The research is also conducted by the research through which data has been

analyzed regarding vulnerabilities on the internet banking services. The report has been

effectively conducted as the successful outcome is generated through which actual and set aims

and objectives of the research are achieved.

21

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
References
Books and Journals

Aljawarneh, S.A., 2017. Analysis of Data Validation Techniques for Online Banking
Services. In
Online Banking Security Measures and Data Protection (pp. 127-139). IGI
Global.

Bradford, M., Earp, J.B. and Grabski, S., 2014. Centralized end-to-end identity and
access management and ERP systems: A multi-case analysis using the Technology

Organization Environment framework.
International Journal of Accounting Information
Systems
, 15(2), pp.149-165.
Bryman, A. and Bell, E., 2015. Business research methods. Oxford University Press,
USA.

Fleming, Q.W. and Koppelman, J.M., 2016, December. Earned value project
management. Project Management Institute.

Genge, B. and Enăchescu, C., 2016. ShoVAT: Shodanbased vulnerability assessment
tool for Internet
facing services. Security and communication networks, 9(15), pp.2696-
2714.

Harrison, F. and Lock, D., 2017. Advanced project management: a structured approach.
Routledge.

Kaur, N., 2015. A survey on online banking system attacks and its
countermeasures.
International Journal of Computer Science and Network Security
(IJCSNS)
, 15(3), p.57.
Kerzner, H. and Kerzner, H.R., 2017. Project management: a systems approach to
planning, scheduling, and controlling
. John Wiley & Sons.
Khrais, L.T., 2015. Highlighting the vulnerabilities of online banking system. The
Journal of Internet Banking and Commerce
, 20(3).
Liao, C., Huang, Y.J. and Hsieh, T.H., 2016. Factors influencing internet banking
adoption.
Social Behavior and Personality: an international journal, 44(9), pp.1443-
1455.

22
Document Page
Merriam, S.B. and Tisdell, E.J., 2015. Qualitative research: A guide to design and
implementation
. John Wiley & Sons.
Online references

ABC international bank, 2018 [Online] [Assessed through] <https://www.bank-
abc.com/En/Pages/default.aspx>, [Assessed on 23th August, 2018]

23
Document Page
Appendix
Project logbook

Table
6: Project logbook
Name of the person:

Project title: Identify vulnerabilities on internet banking

Date:

What is achieved from the report and give update about research:

The conducted project and research effectively produced the positive outcomes through which set aims

and objectives are achieved which is related to analyze the vulnerabilities on the internet banking. As per

the weekly updates it has identified that this project reduce the security issues of the ABC bank.

What are identified risk in the project:

The project is effective and efficient but still two major risks are there in the project such as- time

management risk and budget control risk.

What are identified issues in the project:

The project along with the risk has some issues also which are related to the communication gap between

the projects management team due to which equal distribution of the roles also get disturbed.

What are new ideas or plan for improvement:

Some new ideas and plans are required to reduce the impact of the risk and issues occurred in the project.

To avoid the time risk they may consider time management strategies which are critical path analysis,

budget control technique is also used to avoid the cost issues and proper communication plan is required

to avoid communication problem.

What I as the researcher learned from the research project:

From this research I as the researcher have learned many things that are related to proper use of the tools

and techniques along with the time management and skill management. I also learned to conduct the

research by using the suggestions of respondents and complete the research

Current project status:

The project is not yet completed

Supervisor review or comments:

It is essential to reduce the risk and for this suggested techniques, tools and strategies need to be used so

that aims of the project can be achieved. It is also important for the project team to enhance their

interpersonal connection so that communication gap can be reduced.

24

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
25
1 out of 29
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]