Managing Successful Computing Project: A Comprehensive Guide
VerifiedAdded on  2024/07/01
|25
|4597
|380
AI Summary
This report delves into the intricacies of managing a successful computing project, focusing on a real-world scenario involving BT Group, a leading telecommunications organization. It outlines the project's aims and objectives, encompassing vulnerability assessment, data security, and business continuity. The report meticulously details a comprehensive project management plan, encompassing cost, scope, time, quality, communication, risk, and resource allocation. It further explores the application of qualitative and quantitative research methods, including questionnaires and data analysis techniques, to identify and address vulnerabilities. The report concludes with a reflection on the value of the research process and its impact on personal learning and performance.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Managing successful computing
project
project
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
TABLE OF CONTENTS
Introduction..................................................................................................................................................1
Task 1...........................................................................................................................................................2
P1 Devise project aims and objectives for a chosen scenario..................................................................2
P2 Produce a project management plan that covers aspects of cost, scope, time, quality,
communication, risk and resources..........................................................................................................3
P3 Produce a work breakdown structure and a Gantt chart to provide timeframes and stages for
completion............................................................................................................................................... 4
M1 Produce a comprehensive project management plan, milestone schedule and project schedule for
monitoring and completing the aims and objectives of the project.........................................................7
Task 2.........................................................................................................................................................10
P4 Carry out small-scale research by applying qualitative and quantitative research methods
appropriate for meeting project aims and objectives............................................................................. 10
M2 Evaluate the accuracy and reliability of different research methods applied..................................11
Task 3.........................................................................................................................................................13
P5 Analyse research and data using appropriate tools and techniques..................................................13
P6 Communicate appropriate recommendations as a result of research and data analysis to draw valid
and meaningful conclusions.................................................................................................................. 15
M3 Evaluate the selection of appropriate tools and techniques for accuracy and authenticity to support
and justify recommendations................................................................................................................. 16
Task 4.........................................................................................................................................................17
P7 Reflect on the value of undertaking the research to meet stated objectives and own learning and
performance........................................................................................................................................... 17
M4 Evaluate the value of the project management process and use of quality research to meet stated
objectives and support own learning and performance.........................................................................17
Conclusion................................................................................................................................................. 19
Introduction..................................................................................................................................................1
Task 1...........................................................................................................................................................2
P1 Devise project aims and objectives for a chosen scenario..................................................................2
P2 Produce a project management plan that covers aspects of cost, scope, time, quality,
communication, risk and resources..........................................................................................................3
P3 Produce a work breakdown structure and a Gantt chart to provide timeframes and stages for
completion............................................................................................................................................... 4
M1 Produce a comprehensive project management plan, milestone schedule and project schedule for
monitoring and completing the aims and objectives of the project.........................................................7
Task 2.........................................................................................................................................................10
P4 Carry out small-scale research by applying qualitative and quantitative research methods
appropriate for meeting project aims and objectives............................................................................. 10
M2 Evaluate the accuracy and reliability of different research methods applied..................................11
Task 3.........................................................................................................................................................13
P5 Analyse research and data using appropriate tools and techniques..................................................13
P6 Communicate appropriate recommendations as a result of research and data analysis to draw valid
and meaningful conclusions.................................................................................................................. 15
M3 Evaluate the selection of appropriate tools and techniques for accuracy and authenticity to support
and justify recommendations................................................................................................................. 16
Task 4.........................................................................................................................................................17
P7 Reflect on the value of undertaking the research to meet stated objectives and own learning and
performance........................................................................................................................................... 17
M4 Evaluate the value of the project management process and use of quality research to meet stated
objectives and support own learning and performance.........................................................................17
Conclusion................................................................................................................................................. 19
References..................................................................................................................................................20
LIST OF FIGURES
Figure 1: Work breakdown structure for the project...................................................................................5
Figure 1: Work breakdown structure for the project...................................................................................5
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
LIST OF TABLES
Table 1: Gantt chart.....................................................................................................................................5
Table 2: Milestone....................................................................................................................................... 7
Table 3: Schedule for project.......................................................................................................................8
Table 1: Gantt chart.....................................................................................................................................5
Table 2: Milestone....................................................................................................................................... 7
Table 3: Schedule for project.......................................................................................................................8
Introduction
Computer systems are used to store, manage and process the data whereas the data also can be
communicated to the other users to support the fast execution of the operations in the business
environment. However, the system and the technology being used in the business might be impacted
with the vulnerabilities those are reduce the performance, compromise the data and damage the
resources. BT Group is a telecommunication organization has to store and manage the user, employees
and business data. The report will discuss the project goals and objectives of the organization regarding
vulnerability handling. Also, it will discuss the project planning factors including cost, time and scope.
Work breakdown and Gantt chart technology will be used to support the project planning. With a small
research and data analysis, the report will generate the decision making data. The accuracy and
authenticity of the data will be managed and analyzed. The report will also focus on the learning and
performance during the project management with recommendations for the further improvements in the
business context.
1
Computer systems are used to store, manage and process the data whereas the data also can be
communicated to the other users to support the fast execution of the operations in the business
environment. However, the system and the technology being used in the business might be impacted
with the vulnerabilities those are reduce the performance, compromise the data and damage the
resources. BT Group is a telecommunication organization has to store and manage the user, employees
and business data. The report will discuss the project goals and objectives of the organization regarding
vulnerability handling. Also, it will discuss the project planning factors including cost, time and scope.
Work breakdown and Gantt chart technology will be used to support the project planning. With a small
research and data analysis, the report will generate the decision making data. The accuracy and
authenticity of the data will be managed and analyzed. The report will also focus on the learning and
performance during the project management with recommendations for the further improvements in the
business context.
1
Task 1
P1 Devise project aims and objectives for a chosen scenario
About the organization
BT Group is the leading British Multinational organization having services in 180 countries. The
organization is also largest service provider in mobile, fixed lines and broadband services in United
Kingdom. The expansion of the business is in the subscription based television and information
technology services. BT Group has to store and manage the customer details, their subscriptions and the
network information. The organization has to manage the security, reliability and confidentiality so that
customers’ trust and data availability can be achieved.
Project description
The project has major focus on the vulnerability assessment in the organization which can impact the
data security, accuracy and reliability along with confidentiality and availability. Computing resources
in the organization may be vulnerable to the attacks, unauthenticated access and damage. The
organization has to determine the vulnerabilities so that potential changes can be made to achieve high
data security (Marchewka, 2014).
Aims
The goal of the project is to determine the vulnerabilities on the computing resources to improving the
data security, availability and confidentiality. The project also has goal to improve the security with the
consideration of the business capabilities and scopes.
Objectives
The project has following objectives to improve the telecommunication services through the data
accuracy and reliability:
ï‚· To understand the values of the confidentiality, availability and integrity in the context of BT
Group.
2
P1 Devise project aims and objectives for a chosen scenario
About the organization
BT Group is the leading British Multinational organization having services in 180 countries. The
organization is also largest service provider in mobile, fixed lines and broadband services in United
Kingdom. The expansion of the business is in the subscription based television and information
technology services. BT Group has to store and manage the customer details, their subscriptions and the
network information. The organization has to manage the security, reliability and confidentiality so that
customers’ trust and data availability can be achieved.
Project description
The project has major focus on the vulnerability assessment in the organization which can impact the
data security, accuracy and reliability along with confidentiality and availability. Computing resources
in the organization may be vulnerable to the attacks, unauthenticated access and damage. The
organization has to determine the vulnerabilities so that potential changes can be made to achieve high
data security (Marchewka, 2014).
Aims
The goal of the project is to determine the vulnerabilities on the computing resources to improving the
data security, availability and confidentiality. The project also has goal to improve the security with the
consideration of the business capabilities and scopes.
Objectives
The project has following objectives to improve the telecommunication services through the data
accuracy and reliability:
ï‚· To understand the values of the confidentiality, availability and integrity in the context of BT
Group.
2
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
ï‚· To identify the potential vulnerabilities and their sources those can impact the data management
and security.
ï‚· To justify the context and implement the recommendations to overcome the vulnerabilities and
their impacts.
P2 Produce a project management plan that covers aspects of cost, scope, time, quality, communication,
risk and resources
BT Group can achieve the desired security through the planning. The project planning is the process to
initialize the concept, plan the resources, design the framework and implement the approaches. It also
focuses on the monitoring and quality management. The organization can consider the following
planning aspects in project:
Cost: Without financial capabilities, it is difficult to complete the project. The organization has need of
$20,000 to complete the project. The major areas consuming the cost are resources, technical hardware
and software, security framework designing and quality assurance through multiple attempts and
approaches. The organization is planned to reserve additional $2,000 for the risk management.
Scope: The project has scope to manage the information in the accurate and reliable manner. The project
can achieve security and confidentiality on the data which can improve the decision making and
operation excellence (Larson et al, 2014). Also, the business has scope to provide the trustworthy
services to the customers.
Time: There is time of 2 months to initiate and complete the project. The organization also has used last
two weeks to manage the delays and availability of the resources to complete the project. The time
management is constraint through the policies and role management in the business operations.
Quality: With the help of the total quality management with the consideration of the cost, time and
efforts, the organization has to ensure that the outcomes are effective to prevent the vulnerable activities.
The business can measure and monitor the quality to achieve the baselines of the project as expected.
Communication: Mails and personal interactions are major channels for the communication. The
organization can use the mail services for the routine reporting and instructions whereas personal
interaction can help to resolve the issues and monitor the progress according to the defined quality
standards (Fleming and Koppelman, 2016).
3
and security.
ï‚· To justify the context and implement the recommendations to overcome the vulnerabilities and
their impacts.
P2 Produce a project management plan that covers aspects of cost, scope, time, quality, communication,
risk and resources
BT Group can achieve the desired security through the planning. The project planning is the process to
initialize the concept, plan the resources, design the framework and implement the approaches. It also
focuses on the monitoring and quality management. The organization can consider the following
planning aspects in project:
Cost: Without financial capabilities, it is difficult to complete the project. The organization has need of
$20,000 to complete the project. The major areas consuming the cost are resources, technical hardware
and software, security framework designing and quality assurance through multiple attempts and
approaches. The organization is planned to reserve additional $2,000 for the risk management.
Scope: The project has scope to manage the information in the accurate and reliable manner. The project
can achieve security and confidentiality on the data which can improve the decision making and
operation excellence (Larson et al, 2014). Also, the business has scope to provide the trustworthy
services to the customers.
Time: There is time of 2 months to initiate and complete the project. The organization also has used last
two weeks to manage the delays and availability of the resources to complete the project. The time
management is constraint through the policies and role management in the business operations.
Quality: With the help of the total quality management with the consideration of the cost, time and
efforts, the organization has to ensure that the outcomes are effective to prevent the vulnerable activities.
The business can measure and monitor the quality to achieve the baselines of the project as expected.
Communication: Mails and personal interactions are major channels for the communication. The
organization can use the mail services for the routine reporting and instructions whereas personal
interaction can help to resolve the issues and monitor the progress according to the defined quality
standards (Fleming and Koppelman, 2016).
3
Risk: Major risk in the project is to complete the activities within the time and cost. The delays and
unavailability of the resources at work are risk to achieve the quality outcomes. To secure the data, risk
of resource unavailability and cost exceed should be managed.
Resources: BT Group has technical department which can audit the systems and manage the security.
Also, there is need of the resources in the planning and quality assurance. The organization has to
prepare the team of 5 employees with proper work distribution to achieve the goals effectively.
P3 Produce a work breakdown structure and a Gantt chart to provide timeframes and stages for
completion
BT Group has need of the work breakdown structure to define the roles and responsibilities of the
employees in the project. Work break down is also required to create the manageable modules of the
project goals so that they can be communicated to the target employees, completed with desired quality
and executed with high performance (Harrison and Lock, 2017). For example, implementation team can
configure the security of specific applications when design team is preparing the framework for other
security concerns.
4
unavailability of the resources at work are risk to achieve the quality outcomes. To secure the data, risk
of resource unavailability and cost exceed should be managed.
Resources: BT Group has technical department which can audit the systems and manage the security.
Also, there is need of the resources in the planning and quality assurance. The organization has to
prepare the team of 5 employees with proper work distribution to achieve the goals effectively.
P3 Produce a work breakdown structure and a Gantt chart to provide timeframes and stages for
completion
BT Group has need of the work breakdown structure to define the roles and responsibilities of the
employees in the project. Work break down is also required to create the manageable modules of the
project goals so that they can be communicated to the target employees, completed with desired quality
and executed with high performance (Harrison and Lock, 2017). For example, implementation team can
configure the security of specific applications when design team is preparing the framework for other
security concerns.
4
Figure 1: Work breakdown structure for the project
Gantt chart is the set of the activities and their potential time. It is significant to measure the project
progress with the defined time. It enforces the employees to complete the activities within time slot to
ensure smooth execution of the project (Lock, 2017). It helps to avoid the potential delays and reduce
the complexities in management.
Table 1: Gantt chart
Activity Time
Planning
Understanding CIA features
Current security parameters
Week-1
1 day
1 day
5
Computing project
Planning
Hand on
machines
User and
system
analysis
Document
the strategy
Identify
skills
Requirement
specification
Meetings
Focus on
issues
Ouline
solutions
Risk
identificati
on
Pre-design
Communicatio
n for project
requirement
Finalization
of solutions
Contract
and
agreement
Revise cost
and time
Designing
Logical
design
Physical
resources
Protyping and
risk
managment
Implementa
tion
Configuration
of device and
software
additional
installation
Documen
tation
Testing
Configurati
on testing
Physical
installation
Quality
analysis
Post-
implementatio
n
Maintena
nce guide
Recomm
endations
Training and
development
Resource
handover
Project
closure
Gantt chart is the set of the activities and their potential time. It is significant to measure the project
progress with the defined time. It enforces the employees to complete the activities within time slot to
ensure smooth execution of the project (Lock, 2017). It helps to avoid the potential delays and reduce
the complexities in management.
Table 1: Gantt chart
Activity Time
Planning
Understanding CIA features
Current security parameters
Week-1
1 day
1 day
5
Computing project
Planning
Hand on
machines
User and
system
analysis
Document
the strategy
Identify
skills
Requirement
specification
Meetings
Focus on
issues
Ouline
solutions
Risk
identificati
on
Pre-design
Communicatio
n for project
requirement
Finalization
of solutions
Contract
and
agreement
Revise cost
and time
Designing
Logical
design
Physical
resources
Protyping and
risk
managment
Implementa
tion
Configuration
of device and
software
additional
installation
Documen
tation
Testing
Configurati
on testing
Physical
installation
Quality
analysis
Post-
implementatio
n
Maintena
nce guide
Recomm
endations
Training and
development
Resource
handover
Project
closure
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Project concept creation
Resource planning
3 days
2 days
Requirement specification
Vulnerabilities analysis
Impact analysis
Internal communication
Week-2
1 days
2 days
2 days
Pre-design
Solution forming
Contracting
Resource management
Week-3
1 day
1.5 days
2.5 days
Designing
Prototyping the design
Requirement verification
Finalizing solution for design
Forth week
3 days
1 day
1 day
Implementation
Hardware and software installation
Configuration
Upgrading existing components
Fifth week
3 days
2 days
1 day
Testing
Module based testing
Functional testing
Sixth week
1 day
2 days
6
Resource planning
3 days
2 days
Requirement specification
Vulnerabilities analysis
Impact analysis
Internal communication
Week-2
1 days
2 days
2 days
Pre-design
Solution forming
Contracting
Resource management
Week-3
1 day
1.5 days
2.5 days
Designing
Prototyping the design
Requirement verification
Finalizing solution for design
Forth week
3 days
1 day
1 day
Implementation
Hardware and software installation
Configuration
Upgrading existing components
Fifth week
3 days
2 days
1 day
Testing
Module based testing
Functional testing
Sixth week
1 day
2 days
6
Integrated testing 2 days
Post-implementation
Documenting input, process and output
Training and development
Closing project constract
Seventh week
1 day
3 days
1 day
M1 Produce a comprehensive project management plan, milestone schedule and project schedule for
monitoring and completing the aims and objectives of the project
The project management plan has outlined the major considerations those can be used to achieve the
desired outcomes. The organization has planned how to manage the resources, budget, activities and
constraints along with the opportunities to the business. The vulnerability assessment can be completed
with time and cost effective execution of the project plan.
Milestone Schedule
Table 2: Milestone
Activity Completed within Status
Planning 5 days Completed
Designing 12 days Completed
Implementation 6 days Partial completed
Testing 4 days Due
Post-implementation 6 days Initiated but incomplete
7
Post-implementation
Documenting input, process and output
Training and development
Closing project constract
Seventh week
1 day
3 days
1 day
M1 Produce a comprehensive project management plan, milestone schedule and project schedule for
monitoring and completing the aims and objectives of the project
The project management plan has outlined the major considerations those can be used to achieve the
desired outcomes. The organization has planned how to manage the resources, budget, activities and
constraints along with the opportunities to the business. The vulnerability assessment can be completed
with time and cost effective execution of the project plan.
Milestone Schedule
Table 2: Milestone
Activity Completed within Status
Planning 5 days Completed
Designing 12 days Completed
Implementation 6 days Partial completed
Testing 4 days Due
Post-implementation 6 days Initiated but incomplete
7
Project schedule
Table 3: Schedule for project
Activities Timeframe
Planning 30 days
Understanding project need and security standards 15 days
Understanding business scope and capabilities 10 days
Documenting concept for project 3 days
Factor identification for project 2 days
Requirement engineering 30 days
Communication with employees 5 days
Understanding working context and machines 5 days
Determining source of vulnerabilities 10 days
Identifying potential solutions for problems 7 days
Documenting requirements 3 days
Pre-design communication 12 days
Present framework of design to owner 3 days
Determine employee engagement opportunities 2 days
Planning event 3 days
Optimizing constraints as cost and time 2 days
Consider legalization of approach 2 days
Designing 40 days
8
Table 3: Schedule for project
Activities Timeframe
Planning 30 days
Understanding project need and security standards 15 days
Understanding business scope and capabilities 10 days
Documenting concept for project 3 days
Factor identification for project 2 days
Requirement engineering 30 days
Communication with employees 5 days
Understanding working context and machines 5 days
Determining source of vulnerabilities 10 days
Identifying potential solutions for problems 7 days
Documenting requirements 3 days
Pre-design communication 12 days
Present framework of design to owner 3 days
Determine employee engagement opportunities 2 days
Planning event 3 days
Optimizing constraints as cost and time 2 days
Consider legalization of approach 2 days
Designing 40 days
8
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Define approaches for security implementation 20 days
Document the solutions 7 days
Prototyping to employees if required 13 days
Implementation 10 days
Install devices and software 5 days
Configure the components 2 days
Integrate the security functions 3 days
Testing 20 days
Module testing 5 days
Functional testing 7 days
Quality testing 3 days
Integrated testing of the solution 5 days
Post-implementation 15 days
Recommendations for use and optimization 5 days
Training users 3 days
Handover of resources 3 days
Closing of project 4 days
Sum of working days 157 days
Risk recovery 13 days
Total days in project 170 days
9
Document the solutions 7 days
Prototyping to employees if required 13 days
Implementation 10 days
Install devices and software 5 days
Configure the components 2 days
Integrate the security functions 3 days
Testing 20 days
Module testing 5 days
Functional testing 7 days
Quality testing 3 days
Integrated testing of the solution 5 days
Post-implementation 15 days
Recommendations for use and optimization 5 days
Training users 3 days
Handover of resources 3 days
Closing of project 4 days
Sum of working days 157 days
Risk recovery 13 days
Total days in project 170 days
9
Task 2
P4 Carry out small-scale research by applying qualitative and quantitative research methods appropriate
for meeting project aims and objectives
Qualitative research
According to Carroll (2014), vulnerabilities are weaknesses in the computer security management those
can exploit the system for the unauthenticated access, resource damage and data modification.
Vulnerabilities can impact the organizations for the data availability so that they might not be able to
access the required data on time when they required. Also, the loss of data security can deliver
inaccurate and inconsistent data. The integrity has main impacts on the decision making and data
processing as it can further lead to incorrect results. According to Hsiao et al (2014), it is essential to
install and configure the computing resources with the standard practices and the rules and constraints
are required to apply on the users for the access to achieve the data security.
Quantitative research
The organization can use the questionnaire to research with the help of employee. Questionnaires are
useful to collect the statistical data from the business, devices and employees to support the decision
making. Following are major questions:
1. Is there encryption on the user directory effective to prevent unauthenticated access?
a) Yes b) No
2. Have you access to the server and other desired sources as per role and liabilities in the business?
a) Yes b) No
3. Are there permissions on the data sources unmodified with changes in the system?
a) Yes b) No
4. Is data sources are available for most of the time to ensure data availability?
a) Yes b) No
10
P4 Carry out small-scale research by applying qualitative and quantitative research methods appropriate
for meeting project aims and objectives
Qualitative research
According to Carroll (2014), vulnerabilities are weaknesses in the computer security management those
can exploit the system for the unauthenticated access, resource damage and data modification.
Vulnerabilities can impact the organizations for the data availability so that they might not be able to
access the required data on time when they required. Also, the loss of data security can deliver
inaccurate and inconsistent data. The integrity has main impacts on the decision making and data
processing as it can further lead to incorrect results. According to Hsiao et al (2014), it is essential to
install and configure the computing resources with the standard practices and the rules and constraints
are required to apply on the users for the access to achieve the data security.
Quantitative research
The organization can use the questionnaire to research with the help of employee. Questionnaires are
useful to collect the statistical data from the business, devices and employees to support the decision
making. Following are major questions:
1. Is there encryption on the user directory effective to prevent unauthenticated access?
a) Yes b) No
2. Have you access to the server and other desired sources as per role and liabilities in the business?
a) Yes b) No
3. Are there permissions on the data sources unmodified with changes in the system?
a) Yes b) No
4. Is data sources are available for most of the time to ensure data availability?
a) Yes b) No
10
5. Have you think, data is secure during sharing and processing?
a) Yes b) No
6. Is devices and data are uncompromised even when you are away from the system?
a) Yes b) No
7. Is most of time, data accurate as received to other users through communication?
a) Yes b) No
8. Have you access to the hardware being used for the networking services as out of your role?
a) Yes b) No
9. How many times, you have submitted or determined the infected file issues in system?
a) 0-25 b) 26-50 c) more than 50 d) Never
10. What is your opinion for the infrastructural security on the computing resources?
a) Poor b) Average c) Effective d) excellent
M2 Evaluate the accuracy and reliability of different research methods applied
The project has qualitative and quantitative research approaches to understand the vulnerabilities and
their impacts on the business. BT Group is providing services in the telecommunication sector in which
data availability and monitoring is at core focus. The project has used qualitative research with the help
of the articles, books and journals so that the data available to the organization can be processed in the
decision making. Also, the documents and records from the business on the devices and their
performance can be used to meet the requirements (Silverman, 2016). The qualitative research approach
was accurate when the business data is used for the decision making. Also, the analysis and
11
a) Yes b) No
6. Is devices and data are uncompromised even when you are away from the system?
a) Yes b) No
7. Is most of time, data accurate as received to other users through communication?
a) Yes b) No
8. Have you access to the hardware being used for the networking services as out of your role?
a) Yes b) No
9. How many times, you have submitted or determined the infected file issues in system?
a) 0-25 b) 26-50 c) more than 50 d) Never
10. What is your opinion for the infrastructural security on the computing resources?
a) Poor b) Average c) Effective d) excellent
M2 Evaluate the accuracy and reliability of different research methods applied
The project has qualitative and quantitative research approaches to understand the vulnerabilities and
their impacts on the business. BT Group is providing services in the telecommunication sector in which
data availability and monitoring is at core focus. The project has used qualitative research with the help
of the articles, books and journals so that the data available to the organization can be processed in the
decision making. Also, the documents and records from the business on the devices and their
performance can be used to meet the requirements (Silverman, 2016). The qualitative research approach
was accurate when the business data is used for the decision making. Also, the analysis and
11
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
consideration of the data on the vulnerabilities through the books and journals has helped to provide the
reliable process for the security.
The project also used quantitative research approaches those are more reliable and accurate due to the
direct interaction or communication with the target audiences. For example, the project has used
questionnaire to collect the data from the employees. The project also can use interview and survey to
collect the required information. The questionnaire has benefits to achieve the accurate data from the
employees on the selected options whereas interview can provide detailed and reliable answers and
opinions on the topic (Brannen, 2017). However, quantitative research methods are time consuming and
have need of the expertise to prepare interview or questionnaire to meet objectives; they are also useful
to gather required data in accurate manner. Also, the statistical data can be generated from the
questionnaire which was complex in the theoretical qualitative research.
12
reliable process for the security.
The project also used quantitative research approaches those are more reliable and accurate due to the
direct interaction or communication with the target audiences. For example, the project has used
questionnaire to collect the data from the employees. The project also can use interview and survey to
collect the required information. The questionnaire has benefits to achieve the accurate data from the
employees on the selected options whereas interview can provide detailed and reliable answers and
opinions on the topic (Brannen, 2017). However, quantitative research methods are time consuming and
have need of the expertise to prepare interview or questionnaire to meet objectives; they are also useful
to gather required data in accurate manner. Also, the statistical data can be generated from the
questionnaire which was complex in the theoretical qualitative research.
12
Task 3
P5 Analyse research and data using appropriate tools and techniques.
To analyse the project research data, it is essential to understand the nature of the data. The data
collected from the secondary sources like books and journals can be processed and validated with the
help of the authenticated books. The organization also can be validated the vulnerabilities and their
impacts with the business analysis and activity monitoring (Bryman, 2017). Secondary data is easy to
analyze and utilize in the research but there is need of synthesis process to eliminate the unnecessary
data from the research to improve the project performance and quality.
However, to analyse the data of the questionnaire, the project can make of the data analysis approach.
Suppose, the number of the participants in the questionnaire is 30 and they are different in their roles,
age, department and understanding with the computer systems and information management, then the
organization can generate the sample and map to the all employees. It helps to complete the survey with
limited participants but can scale to all resources for the suitable decision making.
Yes No
0
5
10
15
20
25
Is there encryption on the user
directory effective to prevent
unauthenticated access?
Yes No
0
5
10
15
20
25
30
Have you access to the server
and other desired sources as
per role and liabilities in the
business?
13
P5 Analyse research and data using appropriate tools and techniques.
To analyse the project research data, it is essential to understand the nature of the data. The data
collected from the secondary sources like books and journals can be processed and validated with the
help of the authenticated books. The organization also can be validated the vulnerabilities and their
impacts with the business analysis and activity monitoring (Bryman, 2017). Secondary data is easy to
analyze and utilize in the research but there is need of synthesis process to eliminate the unnecessary
data from the research to improve the project performance and quality.
However, to analyse the data of the questionnaire, the project can make of the data analysis approach.
Suppose, the number of the participants in the questionnaire is 30 and they are different in their roles,
age, department and understanding with the computer systems and information management, then the
organization can generate the sample and map to the all employees. It helps to complete the survey with
limited participants but can scale to all resources for the suitable decision making.
Yes No
0
5
10
15
20
25
Is there encryption on the user
directory effective to prevent
unauthenticated access?
Yes No
0
5
10
15
20
25
30
Have you access to the server
and other desired sources as
per role and liabilities in the
business?
13
Yes No
0
5
10
15
20
25
Are there permissions on
the data sources unmodified
with changes in the system?
Yes No
0
5
10
15
20
25
30
Is data sources are available
for most of the time to en-
sure data availability?
Yes No
0
5
10
15
20
25
30
Have you think, data is secure during
sharing and processing?
Yes No
0
5
10
15
20
25
Is devices and data are un-
compromised even when you
are away from the system?
14
0
5
10
15
20
25
Are there permissions on
the data sources unmodified
with changes in the system?
Yes No
0
5
10
15
20
25
30
Is data sources are available
for most of the time to en-
sure data availability?
Yes No
0
5
10
15
20
25
30
Have you think, data is secure during
sharing and processing?
Yes No
0
5
10
15
20
25
Is devices and data are un-
compromised even when you
are away from the system?
14
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Yes No
0
5
10
15
20
25
Is most of time, data ac-
curate as received to other
users through communica-
tion?
Yes No
0
5
10
15
20
25
30
Have you access to the
hardware being used for the
networking services as out
of your role?
0-25 26-50 more than
50
Never
0
4
8
12
16
How many times, you have
submitted or determined the in-
fected file issues in system?
Poor Average Effective Excellent
0
2
4
6
8
10
12
14
What is your opinion for the
infrastructural security on the
computing resources?
P6 Communicate appropriate recommendations as a result of research and data analysis to draw valid
and meaningful conclusions
The research has resulted that the organization has effective security on the computing resources and
there is also high availability of the information. However, the research also determined that the
organization has need of the improvements in the identification of the vulnerabilities during the data
sharing and on the systems with the awareness and monitoring (McCusker and Gunaydin, 2015).
15
0
5
10
15
20
25
Is most of time, data ac-
curate as received to other
users through communica-
tion?
Yes No
0
5
10
15
20
25
30
Have you access to the
hardware being used for the
networking services as out
of your role?
0-25 26-50 more than
50
Never
0
4
8
12
16
How many times, you have
submitted or determined the in-
fected file issues in system?
Poor Average Effective Excellent
0
2
4
6
8
10
12
14
What is your opinion for the
infrastructural security on the
computing resources?
P6 Communicate appropriate recommendations as a result of research and data analysis to draw valid
and meaningful conclusions
The research has resulted that the organization has effective security on the computing resources and
there is also high availability of the information. However, the research also determined that the
organization has need of the improvements in the identification of the vulnerabilities during the data
sharing and on the systems with the awareness and monitoring (McCusker and Gunaydin, 2015).
15
Therefore, the research has determined that the organization has need of the security implementation in
the organization to ensure higher security and reliability.
From the research, it can be determined that the organization has to prevent the access to the user
directories through the use of the encryption and permission management. Also, there is need to review
the user roles and responsibilities to achieve the desired access on the resources. In this manner, the
organization has high access to the data sources. However, there is need of the centralized access
management system so that user permissions and roles can be managed. The organization is also
recommended to implement the regular data security auditing and monitoring to achieve the desired
goals (Terrell, 2012). Also, the organization can improve the physical security to the system and
network components through the surveillance and access controls. Therefore, the organization has to
focus on the data confidentiality, availability and integrity during the operations, storage and sharing.
M3 Evaluate the selection of appropriate tools and techniques for accuracy and authenticity to support
and justify recommendations
The project has used qualitative and quantitative approaches for the data analysis and on the basis of the
data analysis, decisions are made. It is essential to achieve the accurate and authenticated data. The
project has used secondary research in which the author, article and images are justified with the
authenticated books and journals. It has helped to ensure that the collect data on the vulnerabilities and
their solution is accurate (Burke, 2013). Also, the statistical data is collected from the business
documents and customer experience which is varied with the help of the user role analysis and
availability of the format. The research has ensured that the secondary data is accurate during the
collection, processing and analysis whereas it was collected from the known and reliable sources.
Also, the project has used data sampling to analyse the quantitative data from the research. The
questionnaire has used statistical data sources and trusted employees to feed the accurate and
authenticated data in the questions (Lock, 2017). It has helped to collect and process the required data
within the specific time and simplified the process to make the decisions. Easy to use questionnaire and
data processing are helpful for the project to meet the accuracy and reliability.
16
the organization to ensure higher security and reliability.
From the research, it can be determined that the organization has to prevent the access to the user
directories through the use of the encryption and permission management. Also, there is need to review
the user roles and responsibilities to achieve the desired access on the resources. In this manner, the
organization has high access to the data sources. However, there is need of the centralized access
management system so that user permissions and roles can be managed. The organization is also
recommended to implement the regular data security auditing and monitoring to achieve the desired
goals (Terrell, 2012). Also, the organization can improve the physical security to the system and
network components through the surveillance and access controls. Therefore, the organization has to
focus on the data confidentiality, availability and integrity during the operations, storage and sharing.
M3 Evaluate the selection of appropriate tools and techniques for accuracy and authenticity to support
and justify recommendations
The project has used qualitative and quantitative approaches for the data analysis and on the basis of the
data analysis, decisions are made. It is essential to achieve the accurate and authenticated data. The
project has used secondary research in which the author, article and images are justified with the
authenticated books and journals. It has helped to ensure that the collect data on the vulnerabilities and
their solution is accurate (Burke, 2013). Also, the statistical data is collected from the business
documents and customer experience which is varied with the help of the user role analysis and
availability of the format. The research has ensured that the secondary data is accurate during the
collection, processing and analysis whereas it was collected from the known and reliable sources.
Also, the project has used data sampling to analyse the quantitative data from the research. The
questionnaire has used statistical data sources and trusted employees to feed the accurate and
authenticated data in the questions (Lock, 2017). It has helped to collect and process the required data
within the specific time and simplified the process to make the decisions. Easy to use questionnaire and
data processing are helpful for the project to meet the accuracy and reliability.
16
Task 4
P7 Reflect on the value of undertaking the research to meet stated objectives and own learning and
performance
The project has goals and objectives to understand the need of the confidentiality, integrity and
availability of the data in the organization with the analysis of the vulnerabilities and their impacts. The
undertaking of the research has value for me to explore the project management tools and techniques.
The research has helped me to understand the structure and process to prepare the outline for the
effective outcomes. With research, I have applied the required constraints of the cost, time and efforts
for the project completion (Harrison and Lock, 2017). The research undertaking has empowered to use
the project management tools like work breakdown and Gantt chart so that activities can be
accomplished on time. Also, research has understood the accuracy and authenticity of the data sources
being used. The research has value to modularize the goals, understand the requirements and map the
capabilities in the systematic manner to move toward the defined goals.
During the research, I have learned about the need of confidentiality, availability and integrity of the
data in the business. I have learned how BT Group can ensure the data security with the proper
installation and configuration of the devices along with changes in the business practices and approaches
for the data management. The learning is also achieved to understand the project planning and the need
of the audit of the computing resources. The network resources and their computer system are examined
and analyzed for their security threats and potential improvements to reduce the loss. I have learned how
an organization can manage the resources and improve the infrastructural security to meet the business
goals for the data security.
M4 Evaluate the value of the project management process and use of quality research to meet stated
objectives and support own learning and performance
The project management process is applied for the research so that the business goals and objectives can
be achieved. Project management has helped to create the project modules those are later assigned to the
employees to accomplish the activities in the systematic manner. It also has helped to standardize the
process of the data collection and processing in the project. Project management process has helped to
optimize the use of the resources, time and cost so that the project can be accomplished within the
17
P7 Reflect on the value of undertaking the research to meet stated objectives and own learning and
performance
The project has goals and objectives to understand the need of the confidentiality, integrity and
availability of the data in the organization with the analysis of the vulnerabilities and their impacts. The
undertaking of the research has value for me to explore the project management tools and techniques.
The research has helped me to understand the structure and process to prepare the outline for the
effective outcomes. With research, I have applied the required constraints of the cost, time and efforts
for the project completion (Harrison and Lock, 2017). The research undertaking has empowered to use
the project management tools like work breakdown and Gantt chart so that activities can be
accomplished on time. Also, research has understood the accuracy and authenticity of the data sources
being used. The research has value to modularize the goals, understand the requirements and map the
capabilities in the systematic manner to move toward the defined goals.
During the research, I have learned about the need of confidentiality, availability and integrity of the
data in the business. I have learned how BT Group can ensure the data security with the proper
installation and configuration of the devices along with changes in the business practices and approaches
for the data management. The learning is also achieved to understand the project planning and the need
of the audit of the computing resources. The network resources and their computer system are examined
and analyzed for their security threats and potential improvements to reduce the loss. I have learned how
an organization can manage the resources and improve the infrastructural security to meet the business
goals for the data security.
M4 Evaluate the value of the project management process and use of quality research to meet stated
objectives and support own learning and performance
The project management process is applied for the research so that the business goals and objectives can
be achieved. Project management has helped to create the project modules those are later assigned to the
employees to accomplish the activities in the systematic manner. It also has helped to standardize the
process of the data collection and processing in the project. Project management process has helped to
optimize the use of the resources, time and cost so that the project can be accomplished within the
17
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
constraints of the business. Also, project management process has helped me to understand and apply
the techniques and tools those can be used to reduce the time and meet the desired goals and objectives.
During the project management, quality is managed through the monitoring process. The organization
can use the quality measures of the cost and time to meet the values with the activities. It has helped me
to learn how the quality can be managed and improved. Project management also has helped to learn
how to work in a team and how to motivate the resources for the desired outcomes. The project
management has accomplished with the desired quality and overall experience was effective to complete
the research.
I have worked as the project manager and I have accomplished the activities and roles with high
liability. I have prepared plans and manage the outcomes to achieve the security. With the opportunity to
work with the resources and optimize the cost, I have learned how to reduce the complexities and avoid
the risk based failures. I have performed effective in the project management.
18
the techniques and tools those can be used to reduce the time and meet the desired goals and objectives.
During the project management, quality is managed through the monitoring process. The organization
can use the quality measures of the cost and time to meet the values with the activities. It has helped me
to learn how the quality can be managed and improved. Project management also has helped to learn
how to work in a team and how to motivate the resources for the desired outcomes. The project
management has accomplished with the desired quality and overall experience was effective to complete
the research.
I have worked as the project manager and I have accomplished the activities and roles with high
liability. I have prepared plans and manage the outcomes to achieve the security. With the opportunity to
work with the resources and optimize the cost, I have learned how to reduce the complexities and avoid
the risk based failures. I have performed effective in the project management.
18
Conclusion
The report has discussed how BT Group can plan, design and implement the project to handle the
vulnerabilities and improve the data security. The report has analyzed that the quantitative data is more
accurate and authenticated but it is time consuming to collect and process. Also, the research has
uncovered that the vulnerabilities can impact the accuracy, confidentiality and availability of the data so
that the organization has to make required changes. It has concluded that project management process is
essential to reduce the cost and time and improve the quality of the outcomes.
19
The report has discussed how BT Group can plan, design and implement the project to handle the
vulnerabilities and improve the data security. The report has analyzed that the quantitative data is more
accurate and authenticated but it is time consuming to collect and process. Also, the research has
uncovered that the vulnerabilities can impact the accuracy, confidentiality and availability of the data so
that the organization has to make required changes. It has concluded that project management process is
essential to reduce the cost and time and improve the quality of the outcomes.
19
References
Books and Journals
Brannen, J., 2017. Mixing methods: Qualitative and quantitative research. Routledge.
Bryman, A., 2017. Quantitative and qualitative research: further reflections on their integration.
In Mixing methods: Qualitative and quantitative research (pp. 57-78). Routledge.
Burke, R., 2013. Project management: planning and control techniques. New Jersey, USA.
Carroll, J.M., 2014. Computer security. Butterworth-Heinemann.
Fleming, Q.W. and Koppelman, J.M., 2016, December. Earned value project management. Project
Management Institute.
Harrison, F. and Lock, D., 2017. Advanced project management: a structured approach. Routledge.
Hsiao, D.K., Kerr, D.S. and Madnick, S.E., 2014. Computer security. Academic Press.
Larson, E.W., Gray, C.F., Danlin, U., Honig, B. and Bacarini, D., 2014. Project management: The
managerial process (Vol. 6). Grandview Heights, OH: McGraw-Hill Education.
Lock, D., 2017. The essentials of project management. Routledge.
Marchewka, J.T., 2014. Information technology project management. John Wiley & Sons.
McCusker, K. and Gunaydin, S., 2015. Research using qualitative, quantitative or mixed methods and
choice based on the research. Perfusion, 30(7), pp.537-542.
Silverman, D. ed., 2016. Qualitative research. Sage.
Terrell, S.R., 2012. Mixed-methods research methodologies. The qualitative report, 17(1), pp.254-280.
20
Books and Journals
Brannen, J., 2017. Mixing methods: Qualitative and quantitative research. Routledge.
Bryman, A., 2017. Quantitative and qualitative research: further reflections on their integration.
In Mixing methods: Qualitative and quantitative research (pp. 57-78). Routledge.
Burke, R., 2013. Project management: planning and control techniques. New Jersey, USA.
Carroll, J.M., 2014. Computer security. Butterworth-Heinemann.
Fleming, Q.W. and Koppelman, J.M., 2016, December. Earned value project management. Project
Management Institute.
Harrison, F. and Lock, D., 2017. Advanced project management: a structured approach. Routledge.
Hsiao, D.K., Kerr, D.S. and Madnick, S.E., 2014. Computer security. Academic Press.
Larson, E.W., Gray, C.F., Danlin, U., Honig, B. and Bacarini, D., 2014. Project management: The
managerial process (Vol. 6). Grandview Heights, OH: McGraw-Hill Education.
Lock, D., 2017. The essentials of project management. Routledge.
Marchewka, J.T., 2014. Information technology project management. John Wiley & Sons.
McCusker, K. and Gunaydin, S., 2015. Research using qualitative, quantitative or mixed methods and
choice based on the research. Perfusion, 30(7), pp.537-542.
Silverman, D. ed., 2016. Qualitative research. Sage.
Terrell, S.R., 2012. Mixed-methods research methodologies. The qualitative report, 17(1), pp.254-280.
20
1 out of 25
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.