ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Managing Successful Computing Project: A Comprehensive Guide

Verified

Added on  2024/07/01

|25
|4597
|380
AI Summary
This report delves into the intricacies of managing a successful computing project, focusing on a real-world scenario involving BT Group, a leading telecommunications organization. It outlines the project's aims and objectives, encompassing vulnerability assessment, data security, and business continuity. The report meticulously details a comprehensive project management plan, encompassing cost, scope, time, quality, communication, risk, and resource allocation. It further explores the application of qualitative and quantitative research methods, including questionnaires and data analysis techniques, to identify and address vulnerabilities. The report concludes with a reflection on the value of the research process and its impact on personal learning and performance.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Managing successful computing
project

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
TABLE OF CONTENTS
Introduction
..................................................................................................................................................1
Task 1
...........................................................................................................................................................2
P1 Devise project aims and objectives for a chosen scenario
..................................................................2
P2 Produce a project management plan that covers aspects of cost, scope, time, quality,

communication, risk and resources
..........................................................................................................3
P3 Produce a work breakdown structure and a Gantt chart to provide timeframes and stages for

completion
............................................................................................................................................... 4
M1
Produce a comprehensive project management plan, milestone schedule and project schedule for
monitoring and completing the aims and objectives of the project
.........................................................7
Task 2
.........................................................................................................................................................10
P4
Carry out small-scale research by applying qualitative and quantitative research methods
appropriate for meeting project aims and objectives
............................................................................. 10
M2
Evaluate the accuracy and reliability of different research methods applied..................................11
Task 3
.........................................................................................................................................................13
P5
Analyse research and data using appropriate tools and techniques..................................................13
P6
Communicate appropriate recommendations as a result of research and data analysis to draw valid
and meaningful conclusions
.................................................................................................................. 15
M3
Evaluate the selection of appropriate tools and techniques for accuracy and authenticity to support
and justify recommendations
................................................................................................................. 16
Task 4
.........................................................................................................................................................17
P7
Reflect on the value of undertaking the research to meet stated objectives and own learning and
performance
........................................................................................................................................... 17
M4
Evaluate the value of the project management process and use of quality research to meet stated
objectives and support own learning and performance
.........................................................................17
Conclusion
................................................................................................................................................. 19
Document Page
References..................................................................................................................................................20
Document Page
LIST OF FIGURES
Figure 1: Work breakdown structure for the project
...................................................................................5

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
LIST OF TABLES
Table 1: Gantt chart
.....................................................................................................................................5
Table 2: Milestone
....................................................................................................................................... 7
Table 3: Schedule for project
.......................................................................................................................8
Document Page
Introduction
Computer systems are used to store, manage and process the data whereas the data also can be

communicated to the other users to support the fast execution of the operations in the business

environment. However, the system and the technology being used in the business might be impacted

with the vulnerabilities those are reduce the performance, compromise the data and damage the

resources. BT Group is a telecommunication organization has to store and manage the user, employees

and business data. The report will discuss the project goals and objectives of the organization regarding

vulnerability handling. Also, it will discuss the project planning factors including cost, time and scope.

Work breakdown and Gantt chart technology will be used to support the project planning. With a small

research and data analysis, the report will generate the decision making data. The accuracy and

authenticity of the data will be managed and analyzed. The report will also focus on the learning and

performance during the project management with recommendations for the further improvements in the

business context.

1
Document Page
Task 1
P1 Devise project aims and objectives for a chosen scenario

About the organization

BT Group is the leading British Multinational organization having services in 180 countries. The

organization is also largest service provider in mobile, fixed lines and broadband services in United

Kingdom. The expansion of the business is in the subscription based television and information

technology services. BT Group has to store and manage the customer details, their subscriptions and the

network information. The organization has to manage the security, reliability and confidentiality so that

customers’ trust and data availability can be achieved.

Project description

The project has major focus on the vulnerability assessment in the organization which can impact the

data security, accuracy and reliability along with confidentiality and availability. Computing resources

in the organization may be vulnerable to the attacks, unauthenticated access and damage. The

organization has to determine the vulnerabilities so that potential changes can be made to achieve high

data security (Marchewka, 2014).

Aims

The goal of the project is to determine the vulnerabilities on the computing resources to improving the

data security, availability and confidentiality. The project also has goal to improve the security with the

consideration of the business capabilities and scopes.

Objectives

The project has following objectives to improve the telecommunication services through the data

accuracy and reliability:

ï‚·
To understand the values of the confidentiality, availability and integrity in the context of BT
Group.

2

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
ï‚· To identify the potential vulnerabilities and their sources those can impact the data management
and security.

ï‚·
To justify the context and implement the recommendations to overcome the vulnerabilities and
their impacts.

P2 Produce a project management plan that covers aspects of cost, scope, time, quality, communication,

risk and resources

BT Group can achieve the desired security through the planning. The project planning is the process to

initialize the concept, plan the resources, design the framework and implement the approaches. It also

focuses on the monitoring and quality management. The organization can consider the following

planning aspects in project:

Cost:
Without financial capabilities, it is difficult to complete the project. The organization has need of
$20,000 to complete the project. The major areas consuming the cost are resources, technical hardware

and software, security framework designing and quality assurance through multiple attempts and

approaches. The organization is planned to reserve additional $2,000 for the risk management.

Scope:
The project has scope to manage the information in the accurate and reliable manner. The project
can achieve security and confidentiality on the data which can improve the decision making and

operation excellence (Larson et al, 2014). Also, the business has scope to provide the trustworthy

services to the customers.

Time:
There is time of 2 months to initiate and complete the project. The organization also has used last
two weeks to manage the delays and availability of the resources to complete the project. The time

management is constraint through the policies and role management in the business operations.

Quality
: With the help of the total quality management with the consideration of the cost, time and
efforts, the organization has to ensure that the outcomes are effective to prevent the vulnerable activities.

The business can measure and monitor the quality to achieve the baselines of the project as expected.

Communication:
Mails and personal interactions are major channels for the communication. The
organization can use the mail services for the routine reporting and instructions whereas personal

interaction can help to resolve the issues and monitor the progress according to the defined quality

standards (Fleming and Koppelman, 2016).

3
Document Page
Risk: Major risk in the project is to complete the activities within the time and cost. The delays and
unavailability of the resources at work are risk to achieve the quality outcomes. To secure the data, risk

of resource unavailability and cost exceed should be managed.

Resources:
BT Group has technical department which can audit the systems and manage the security.
Also, there is need of the resources in the planning and quality assurance. The organization has to

prepare the team of 5 employees with proper work distribution to achieve the goals effectively.

P3 Produce a work breakdown structure and a Gantt chart to provide timeframes and stages for

completion

BT Group has need of the work breakdown structure to define the roles and responsibilities of the

employees in the project. Work break down is also required to create the manageable modules of the

project goals so that they can be communicated to the target employees, completed with desired quality

and executed with high performance (Harrison and Lock, 2017). For example, implementation team can

configure the security of specific applications when design team is preparing the framework for other

security concerns.

4
Document Page
Figure 1: Work breakdown structure for the project
Gantt chart is the set of the activities and their potential time. It is significant to measure the project

progress with the defined time. It enforces the employees to complete the activities within time slot to

ensure smooth execution of the project (Lock, 2017). It helps to avoid the potential delays and reduce

the complexities in management.

Table
1: Gantt chart
Activity
Time
Planning

Understanding CIA features

Current security parameters

Week-1

1 day

1 day

5

Computing project
Planning
Hand on
machines
User and
system
analysis
Document
the strategy
Identify
skills
Requirement
specification
Meetings
Focus on
issues
Ouline
solutions
Risk
identificati
on
Pre-design
Communicatio
n for project
requirement
Finalization
of solutions
Contract
and
agreement
Revise cost
and time
Designing
Logical
design
Physical
resources
Protyping and
risk
managment
Implementa
tion
Configuration
of device and
software
additional
installation
Documen
tation
Testing
Configurati
on testing
Physical
installation
Quality
analysis
Post-
implementatio
n
Maintena
nce guide
Recomm
endations
Training and
development
Resource
handover
Project
closure

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Project concept creation
Resource planning

3 days

2 days

Requirement specification

Vulnerabilities analysis

Impact analysis

Internal communication

Week-2

1 days

2 days

2 days

Pre-design

Solution forming

Contracting

Resource management

Week-3

1 day

1.5 days

2.5 days

Designing

Prototyping the design

Requirement verification

Finalizing solution for design

Forth week

3 days

1 day

1 day

Implementation

Hardware and software installation

Configuration

Upgrading existing components

Fifth week

3 days

2 days

1 day

Testing

Module based testing

Functional testing

Sixth week

1 day

2 days

6
Document Page
Integrated testing 2 days
Post-implementation

Documenting input, process and output

Training and development

Closing project constract

Seventh week

1 day

3 days

1 day

M1
Produce a comprehensive project management plan, milestone schedule and project schedule for
monitoring and completing the aims and objectives of the project

The project management plan has outlined the major considerations those can be used to achieve the

desired outcomes. The organization has planned how to manage the resources, budget, activities and

constraints along with the opportunities to the business. The vulnerability assessment can be completed

with time and cost effective execution of the project plan.

Milestone Schedule

Table
2: Milestone
Activity
Completed within Status
Planning
5 days Completed
Designing
12 days Completed
Implementation
6 days Partial completed
Testing
4 days Due
Post-implementation
6 days Initiated but incomplete
7
Document Page
Project schedule
Table
3: Schedule for project
Activities
Timeframe
Planning
30 days
Understanding project need and security standards
15 days
Understanding business scope and capabilities
10 days
Documenting concept for project
3 days
Factor identification for project
2 days
Requirement engineering
30 days
Communication with employees
5 days
Understanding working context and machines
5 days
Determining source of vulnerabilities
10 days
Identifying potential solutions for problems
7 days
Documenting requirements
3 days
Pre-design communication
12 days
Present framework of design to owner
3 days
Determine employee engagement opportunities
2 days
Planning event
3 days
Optimizing constraints as cost and time
2 days
Consider legalization of approach
2 days
Designing
40 days
8

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Define approaches for security implementation 20 days
Document the solutions
7 days
Prototyping to employees if required
13 days
Implementation
10 days
Install devices and software
5 days
Configure the components
2 days
Integrate the security functions
3 days
Testing
20 days
Module testing
5 days
Functional testing
7 days
Quality testing
3 days
Integrated testing of the solution
5 days
Post-implementation
15 days
Recommendations for use and optimization
5 days
Training users
3 days
Handover of resources
3 days
Closing of project
4 days
Sum of working days
157 days
Risk recovery
13 days
Total days in project
170 days
9
Document Page
Task 2
P4
Carry out small-scale research by applying qualitative and quantitative research methods appropriate
for meeting project aims and objectives

Qualitative research

According to Carroll (2014), vulnerabilities are weaknesses in the computer security management those

can exploit the system for the unauthenticated access, resource damage and data modification.

Vulnerabilities can impact the organizations for the data availability so that they might not be able to

access the required data on time when they required. Also, the loss of data security can deliver

inaccurate and inconsistent data. The integrity has main impacts on the decision making and data

processing as it can further lead to incorrect results. According to Hsiao et al (2014), it is essential to

install and configure the computing resources with the standard practices and the rules and constraints

are required to apply on the users for the access to achieve the data security.

Quantitative research

The organization can use the questionnaire to research with the help of employee. Questionnaires are

useful to collect the statistical data from the business, devices and employees to support the decision

making. Following are major questions:

1. Is there encryption on the user directory effective to prevent unauthenticated access?

a) Yes
b) No
2. Have you access to the server and other desired sources as per role and liabilities in the business?

a) Yes
b) No
3. Are there permissions on the data sources unmodified with changes in the system?

a) Yes
b) No
4. Is data sources are available for most of the time to ensure data availability?

a) Yes
b) No
10
Document Page
5. Have you think, data is secure during sharing and processing?
a) Yes
b) No
6. Is devices and data are uncompromised even when you are away from the system?

a) Yes
b) No
7. Is most of time, data accurate as received to other users through communication?

a) Yes
b) No
8. Have you access to the hardware being used for the networking services as out of your role?

a) Yes
b) No
9. How many times, you have submitted or determined the infected file issues in system?

a) 0-25
b) 26-50 c) more than 50 d) Never
10. What is your opinion for the infrastructural security on the computing resources?

a) Poor
b) Average c) Effective d) excellent
M2
Evaluate the accuracy and reliability of different research methods applied
The project has qualitative and quantitative research approaches to understand the vulnerabilities and

their impacts on the business. BT Group is providing services in the telecommunication sector in which

data availability and monitoring is at core focus. The project has used qualitative research with the help

of the articles, books and journals so that the data available to the organization can be processed in the

decision making. Also, the documents and records from the business on the devices and their

performance can be used to meet the requirements (Silverman, 2016). The qualitative research approach

was accurate when the business data is used for the decision making. Also, the analysis and

11

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
consideration of the data on the vulnerabilities through the books and journals has helped to provide the
reliable process for the security.

The project also used quantitative research approaches those are more reliable and accurate due to the

direct interaction or communication with the target audiences. For example, the project has used

questionnaire to collect the data from the employees. The project also can use interview and survey to

collect the required information. The questionnaire has benefits to achieve the accurate data from the

employees on the selected options whereas interview can provide detailed and reliable answers and

opinions on the topic (Brannen, 2017). However, quantitative research methods are time consuming and

have need of the expertise to prepare interview or questionnaire to meet objectives; they are also useful

to gather required data in accurate manner. Also, the statistical data can be generated from the

questionnaire which was complex in the theoretical qualitative research.

12
Document Page
Task 3
P5
Analyse research and data using appropriate tools and techniques.
To analyse the project research data, it is essential to understand the nature of the data. The data

collected from the secondary sources like books and journals can be processed and validated with the

help of the authenticated books. The organization also can be validated the vulnerabilities and their

impacts with the business analysis and activity monitoring (Bryman, 2017). Secondary data is easy to

analyze and utilize in the research but there is need of synthesis process to eliminate the unnecessary

data from the research to improve the project performance and quality.

However, to analyse the data of the questionnaire, the project can make of the data analysis approach.

Suppose, the number of the participants in the questionnaire is 30 and they are different in their roles,

age, department and understanding with the computer systems and information management, then the

organization can generate the sample and map to the all employees. It helps to complete the survey with

limited participants but can scale to all resources for the suitable decision making.

Yes
No
0

5

10

15

20

25

Is there encryption on the user
directory effective to prevent
unauthenticated access?

Yes
No
0

5

10

15

20

25

30

Have you access to the server
and other desired sources as
per role and liabilities in the
business?

13
Document Page
Yes No
0

5

10

15

20

25

Are there permissions on
the data sources unmodified
with changes in the system?

Yes
No
0

5

10

15

20

25

30

Is data sources are available
for most of the time to en-
sure data availability?

Yes
No
0

5

10

15

20

25

30

Have you think, data is secure during
sharing and processing?

Yes
No
0

5

10

15

20

25

Is devices and data are un-
compromised even when you
are away from the system?

14

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Yes No
0

5

10

15

20

25

Is most of time, data ac-
curate as received to other
users through communica-
tion?

Yes
No
0

5

10

15

20

25

30

Have you access to the
hardware being used for the
networking services as out
of your role?

0-25
26-50 more than
50

Never

0

4

8

12

16

How many times, you have
submitted or determined the in-
fected file issues in system?

Poor
Average Effective Excellent
0

2

4

6

8

10

12

14

What is your opinion for the
infrastructural security on the
computing resources?

P6
Communicate appropriate recommendations as a result of research and data analysis to draw valid
and meaningful conclusions

The research has resulted that the organization has effective security on the computing resources and

there is also high availability of the information. However, the research also determined that the

organization has need of the improvements in the identification of the vulnerabilities during the data

sharing and on the systems with the awareness and monitoring (
McCusker and Gunaydin, 2015).
15
Document Page
Therefore, the research has determined that the organization has need of the security implementation in
the organization to ensure higher security and reliability.

From the research, it can be determined that the organization has to prevent the access to the user

directories through the use of the encryption and permission management. Also, there is need to review

the user roles and responsibilities to achieve the desired access on the resources. In this manner, the

organization has high access to the data sources. However, there is need of the centralized access

management system so that user permissions and roles can be managed. The organization is also

recommended to implement the regular data security auditing and monitoring to achieve the desired

goals (Terrell, 2012). Also, the organization can improve the physical security to the system and

network components through the surveillance and access controls. Therefore, the organization has to

focus on the data confidentiality, availability and integrity during the operations, storage and sharing.

M3
Evaluate the selection of appropriate tools and techniques for accuracy and authenticity to support
and justify recommendations

The project has used qualitative and quantitative approaches for the data analysis and on the basis of the

data analysis, decisions are made. It is essential to achieve the accurate and authenticated data. The

project has used secondary research in which the author, article and images are justified with the

authenticated books and journals. It has helped to ensure that the collect data on the vulnerabilities and

their solution is accurate (Burke, 2013). Also, the statistical data is collected from the business

documents and customer experience which is varied with the help of the user role analysis and

availability of the format. The research has ensured that the secondary data is accurate during the

collection, processing and analysis whereas it was collected from the known and reliable sources.

Also, the project has used data sampling to analyse the quantitative data from the research. The

questionnaire has used statistical data sources and trusted employees to feed the accurate and

authenticated data in the questions (Lock, 2017). It has helped to collect and process the required data

within the specific time and simplified the process to make the decisions. Easy to use questionnaire and

data processing are helpful for the project to meet the accuracy and reliability.

16
Document Page
Task 4
P7
Reflect on the value of undertaking the research to meet stated objectives and own learning and
performance

The project has goals and objectives to understand the need of the confidentiality, integrity and

availability of the data in the organization with the analysis of the vulnerabilities and their impacts. The

undertaking of the research has value for me to explore the project management tools and techniques.

The research has helped me to understand the structure and process to prepare the outline for the

effective outcomes. With research, I have applied the required constraints of the cost, time and efforts

for the project completion (Harrison and Lock, 2017). The research undertaking has empowered to use

the project management tools like work breakdown and Gantt chart so that activities can be

accomplished on time. Also, research has understood the accuracy and authenticity of the data sources

being used. The research has value to modularize the goals, understand the requirements and map the

capabilities in the systematic manner to move toward the defined goals.

During the research, I have learned about the need of confidentiality, availability and integrity of the

data in the business. I have learned how BT Group can ensure the data security with the proper

installation and configuration of the devices along with changes in the business practices and approaches

for the data management. The learning is also achieved to understand the project planning and the need

of the audit of the computing resources. The network resources and their computer system are examined

and analyzed for their security threats and potential improvements to reduce the loss. I have learned how

an organization can manage the resources and improve the infrastructural security to meet the business

goals for the data security.

M4
Evaluate the value of the project management process and use of quality research to meet stated
objectives and support own learning and performance

The project management process is applied for the research so that the business goals and objectives can

be achieved. Project management has helped to create the project modules those are later assigned to the

employees to accomplish the activities in the systematic manner. It also has helped to standardize the

process of the data collection and processing in the project. Project management process has helped to

optimize the use of the resources, time and cost so that the project can be accomplished within the

17

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
constraints of the business. Also, project management process has helped me to understand and apply
the techniques and tools those can be used to reduce the time and meet the desired goals and objectives.

During the project management, quality is managed through the monitoring process. The organization

can use the quality measures of the cost and time to meet the values with the activities. It has helped me

to learn how the quality can be managed and improved. Project management also has helped to learn

how to work in a team and how to motivate the resources for the desired outcomes. The project

management has accomplished with the desired quality and overall experience was effective to complete

the research.

I have worked as the project manager and I have accomplished the activities and roles with high

liability. I have prepared plans and manage the outcomes to achieve the security. With the opportunity to

work with the resources and optimize the cost, I have learned how to reduce the complexities and avoid

the risk based failures. I have performed effective in the project management.

18
Document Page
Conclusion
The report has discussed how BT Group can plan, design and implement the project to handle the

vulnerabilities and improve the data security. The report has analyzed that the quantitative data is more

accurate and authenticated but it is time consuming to collect and process. Also, the research has

uncovered that the vulnerabilities can impact the accuracy, confidentiality and availability of the data so

that the organization has to make required changes. It has concluded that project management process is

essential to reduce the cost and time and improve the quality of the outcomes.

19
Document Page
References
Books and Journals

Brannen, J., 2017.
Mixing methods: Qualitative and quantitative research. Routledge.
Bryman, A., 2017. Quantitative and qualitative research: further reflections on their integration.

In
Mixing methods: Qualitative and quantitative research (pp. 57-78). Routledge.
Burke, R., 2013. Project management: planning and control techniques.
New Jersey, USA.
Carroll, J.M., 2014.
Computer security. Butterworth-Heinemann.
Fleming, Q.W. and Koppelman, J.M., 2016, December. Earned value project management. Project

Management Institute.

Harrison, F. and Lock, D., 2017.
Advanced project management: a structured approach. Routledge.
Hsiao, D.K., Kerr, D.S. and Madnick, S.E., 2014.
Computer security. Academic Press.
Larson, E.W., Gray, C.F., Danlin, U., Honig, B. and Bacarini, D., 2014.
Project management: The
managerial process
(Vol. 6). Grandview Heights, OH: McGraw-Hill Education.
Lock, D., 2017.
The essentials of project management. Routledge.
Marchewka, J.T., 2014.
Information technology project management. John Wiley & Sons.
McCusker, K. and Gunaydin, S., 2015. Research using qualitative, quantitative or mixed methods and

choice based on the research.
Perfusion, 30(7), pp.537-542.
Silverman, D. ed., 2016.
Qualitative research. Sage.
Terrell, S.R., 2012. Mixed-methods research methodologies.
The qualitative report, 17(1), pp.254-280.
20
1 out of 25
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]