Project Management in Reserve Bank of Australia
VerifiedAdded on 2022/09/18
|15
|1257
|25
Presentation
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
PROJECT
MANAGEMENT
IN
RESERVE BANK
OF
AUSTRALIA
MANAGEMENT
IN
RESERVE BANK
OF
AUSTRALIA
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Project Management
■ A project is the accomplishment of a goal
with a desired outcome.
■ Project Management is the set of
activities that is carried out accurately in
order to accomplish the project
successfully.
■ Project Management activities are not
routine operations, but a combination of
specific tasks relevant to the project
(Kerzner, 2017).
■ Efficient management of a project is done
by a competent project manager to make
it successful.
■ A project is the accomplishment of a goal
with a desired outcome.
■ Project Management is the set of
activities that is carried out accurately in
order to accomplish the project
successfully.
■ Project Management activities are not
routine operations, but a combination of
specific tasks relevant to the project
(Kerzner, 2017).
■ Efficient management of a project is done
by a competent project manager to make
it successful.
Reserve Bank of Australia
■ It is the central bank of Australia, since 14th
January, 1960 (Rees, Smith & Hall, 2016)
■ The bank has its headquarters at Sydney of
New South Wales in Australia.
■ Philip Lowe is the current governor of the
bank.
■ Have the authority to issue notes of the
nation.
■ Provides employment to the responsible
citizens of Australia.
■ Maintains the economic growth and
prosperity of the country.
■ It is the central bank of Australia, since 14th
January, 1960 (Rees, Smith & Hall, 2016)
■ The bank has its headquarters at Sydney of
New South Wales in Australia.
■ Philip Lowe is the current governor of the
bank.
■ Have the authority to issue notes of the
nation.
■ Provides employment to the responsible
citizens of Australia.
■ Maintains the economic growth and
prosperity of the country.
Cyber Security at RBA
■ Gain an insight about the network
traffic of the bank and implement data
security technologies.
■ Extension in layers of Security by multi-
factor authentication.
■ Optimum protection of data by
encrypting devices.
■ Incorporate Advanced Threat Protection
(ATP) to combat hacking of data.
■ Train employees at RBA after
completion of the cyber security
project.
■ Gain an insight about the network
traffic of the bank and implement data
security technologies.
■ Extension in layers of Security by multi-
factor authentication.
■ Optimum protection of data by
encrypting devices.
■ Incorporate Advanced Threat Protection
(ATP) to combat hacking of data.
■ Train employees at RBA after
completion of the cyber security
project.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Project Management Processes
■ Initiation- Determine the requirements of cyber
security in bank and conduct a feasibility study.
■ Planning- Determine the steps of implementing
firewalls and encryption algorithms.
■ Execution- Implement strong encryption on
devices and networks, apply firewalls in
different layers of network, enhance security
(Lientz & Rea, 2016).
■ Validation- Test the systems after the
implementation of cyber security measure and
detect authentication.
■ Closure- If everything works well, close project
and deploy for commercial use.
■ Initiation- Determine the requirements of cyber
security in bank and conduct a feasibility study.
■ Planning- Determine the steps of implementing
firewalls and encryption algorithms.
■ Execution- Implement strong encryption on
devices and networks, apply firewalls in
different layers of network, enhance security
(Lientz & Rea, 2016).
■ Validation- Test the systems after the
implementation of cyber security measure and
detect authentication.
■ Closure- If everything works well, close project
and deploy for commercial use.
PMBOK Project Management
MethodologyPMBOK methodology of project management
is used to implement cyber security
protection in the Reserve Bank of Australia.
The PMBOK guide provides for a standard set
of “Comprehensive Security Policy” that will
help the engineers and the technical experts
to provide optimum quality of work with
regard to privacy of data, integrity in
systems, developing architectures and many
other aspects (Chavez, 2018).
Following the PMBOK methods, the cyber
security project in RBA will help to instill
confidence amongst the stakeholders that
quality is maintained at every firewall
implementation and network security.
MethodologyPMBOK methodology of project management
is used to implement cyber security
protection in the Reserve Bank of Australia.
The PMBOK guide provides for a standard set
of “Comprehensive Security Policy” that will
help the engineers and the technical experts
to provide optimum quality of work with
regard to privacy of data, integrity in
systems, developing architectures and many
other aspects (Chavez, 2018).
Following the PMBOK methods, the cyber
security project in RBA will help to instill
confidence amongst the stakeholders that
quality is maintained at every firewall
implementation and network security.
Importance of PMBOK
■ Strategic alignment is obtained in the
implementation of cyber security.
■ Ensures security goals of the work
processes in the money transaction
departments of RBA.
■ Accounts for a good technical expert
personnel to guide in the processes of
security implementation.
■ Ensures security standards in online
transactions and effective utilization of
resources.
■ Reduces costs and controls quality in
the system development process.
■ Strategic alignment is obtained in the
implementation of cyber security.
■ Ensures security goals of the work
processes in the money transaction
departments of RBA.
■ Accounts for a good technical expert
personnel to guide in the processes of
security implementation.
■ Ensures security standards in online
transactions and effective utilization of
resources.
■ Reduces costs and controls quality in
the system development process.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Project Management Selection
Methods■ Benefit Measurement Methods- Cost benefits are
majorly calculated by determining the cash
inflow and outflow(Fakrulla & Mouli, 2019).
■ The techniques are:
1. Economic Model Value
2. Payback Period
3. Discounted Cash Flow
4. Opportunity Cost
5. Cost Ratio
6. Scoring Model
7. Net Present Value
8. Internal Rate of Return
Methods■ Benefit Measurement Methods- Cost benefits are
majorly calculated by determining the cash
inflow and outflow(Fakrulla & Mouli, 2019).
■ The techniques are:
1. Economic Model Value
2. Payback Period
3. Discounted Cash Flow
4. Opportunity Cost
5. Cost Ratio
6. Scoring Model
7. Net Present Value
8. Internal Rate of Return
Project Management Knowledge
Areas■ Integration Management- develop project charter to integrate all modules in
the PMBOK processes.
■ Scope Management- determine scope of implementing cyber security at RBA.
■ Schedule Management- estimate the time required to align cyber security
measures.
■ Cost Management- calculate the overall cost to conduct the stages of security
implementation
■ Quality Management- determine standards at each stage of security
implementation.
■ Communication Management- enhance interaction amongst the leads,
stakeholders and the technical engineers
■ Resource Management- optimum utilization of resources such as cloud
storages, digital interfaces, security firewalls and so on.
■ Risk Management- assess risks such as data breaching and hacking of
networks.
■ Procurement Management- gather affordable resources from the best cloud
solution providers with strengthened security.
■ Stakeholder Management- update information to stakeholders about the
success of each stage in security implementation.
Areas■ Integration Management- develop project charter to integrate all modules in
the PMBOK processes.
■ Scope Management- determine scope of implementing cyber security at RBA.
■ Schedule Management- estimate the time required to align cyber security
measures.
■ Cost Management- calculate the overall cost to conduct the stages of security
implementation
■ Quality Management- determine standards at each stage of security
implementation.
■ Communication Management- enhance interaction amongst the leads,
stakeholders and the technical engineers
■ Resource Management- optimum utilization of resources such as cloud
storages, digital interfaces, security firewalls and so on.
■ Risk Management- assess risks such as data breaching and hacking of
networks.
■ Procurement Management- gather affordable resources from the best cloud
solution providers with strengthened security.
■ Stakeholder Management- update information to stakeholders about the
success of each stage in security implementation.
Role of a Project Manager
■ Conduct requirement gathering and analysis for
the cyber security implementation at RBA
■ Plan the schedule, cost, stages and technical
expertise.
■ Execute the operations for implementing
security in all devices of the bank step wise.
■ Determine risks of data hacking and mitigation
measures of security algorithms.
■ Determine quality control in firewalls, password
authentication and other encryption algorithms.
■ Enhance communication amongst technical
engineers and non-technical experts.
■ Involve stakeholders of the bank and the
government sponsors at every stage.
■ Conduct requirement gathering and analysis for
the cyber security implementation at RBA
■ Plan the schedule, cost, stages and technical
expertise.
■ Execute the operations for implementing
security in all devices of the bank step wise.
■ Determine risks of data hacking and mitigation
measures of security algorithms.
■ Determine quality control in firewalls, password
authentication and other encryption algorithms.
■ Enhance communication amongst technical
engineers and non-technical experts.
■ Involve stakeholders of the bank and the
government sponsors at every stage.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Project Success Factors
■ Involvement of technical engineers who will have
sound knowledge on cyber security.
■ Comprehensive and detailed planning of
requirements, budget and schedule (Rogers, 2019).
■ Leadership of a good and experienced project
leader and co-operation of the bank members.
■ Flexible communication amongst the project
members and stakeholders such as RBA executive
personnel and cloud service providers.
■ Immediate resolve of issues in the ongoing
activities of security implantation.
■ Assessment of risks such as hacking or malicious
activities in advance.
■ Incorporating strong closure of project by live
functioning of the bank operations aligned with
security measures.
■ Involvement of technical engineers who will have
sound knowledge on cyber security.
■ Comprehensive and detailed planning of
requirements, budget and schedule (Rogers, 2019).
■ Leadership of a good and experienced project
leader and co-operation of the bank members.
■ Flexible communication amongst the project
members and stakeholders such as RBA executive
personnel and cloud service providers.
■ Immediate resolve of issues in the ongoing
activities of security implantation.
■ Assessment of risks such as hacking or malicious
activities in advance.
■ Incorporating strong closure of project by live
functioning of the bank operations aligned with
security measures.
Project Failure Factors
■ The project would have failed if the
reserve bank would not have cooperated
with the project manager in
implementing cyber security measures
for their online transactions.
■ The failure by the technical engineers to
implement the firewall security in the
networks would have degraded the
quality and the mission of security
implantation at RBA.
■ Failure would have happened if RBA
expected unrealistic demands from the
project manager as well as other
stakeholders such as cloud service
providers about implementing security
software in their devices and ATM
machines.
■ The project would have failed if the
reserve bank would not have cooperated
with the project manager in
implementing cyber security measures
for their online transactions.
■ The failure by the technical engineers to
implement the firewall security in the
networks would have degraded the
quality and the mission of security
implantation at RBA.
■ Failure would have happened if RBA
expected unrealistic demands from the
project manager as well as other
stakeholders such as cloud service
providers about implementing security
software in their devices and ATM
machines.
Consequences of Project Failures
If the project would have been a failure, the following
would have been the consequences:
■ Loss of materials and resources used in the cyber
security execution and failure of operations at the
bank.
■ Negative impact on the reputation and goodwill of the
Reserve Bank of Australia.
■ Loss of motivation amongst the members in the bank
to work effectively during this crisis.
■ Loss of clients who had faith in the security system of
the bank.
■ Emergence of a period of financial crisis of the bank
and thereby an desirable impression on the economy
of Australia .
■ Loss of trusted stakeholders of the bank who invested
in the cyber security project of RBA.
If the project would have been a failure, the following
would have been the consequences:
■ Loss of materials and resources used in the cyber
security execution and failure of operations at the
bank.
■ Negative impact on the reputation and goodwill of the
Reserve Bank of Australia.
■ Loss of motivation amongst the members in the bank
to work effectively during this crisis.
■ Loss of clients who had faith in the security system of
the bank.
■ Emergence of a period of financial crisis of the bank
and thereby an desirable impression on the economy
of Australia .
■ Loss of trusted stakeholders of the bank who invested
in the cyber security project of RBA.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
References
Chavez, R. (2018, June). Implementing Project Management Methodologies in Social
Entrepreneurship Initiatives in Developing Nations: Methodology for Training SE
Project Managers and Two Case Studies. In Global Conference on Business and
Economics (GLOBE 2018) (Vol. 6).
Fakrulla, K. K. M., & Mouli, C. (2019). Comparative Study of Different Contractor Selection
Methods.
Kerzner, H. (2017). Project management: a systems approach to planning, scheduling,
and controlling. John Wiley & Sons.
Lientz, B., & Rea, K. (2016). Breakthrough technology project management. Routledge.
Rees, D. M., Smith, P., & Hall, J. (2016). A Multi‐sector Model of the Australian
Economy. Economic Record, 92(298), 374-408.
Rogers, T. M. (2019). PROJECT SUCCESS AND PROJECT TEAM INDIVIDUALS.
Chavez, R. (2018, June). Implementing Project Management Methodologies in Social
Entrepreneurship Initiatives in Developing Nations: Methodology for Training SE
Project Managers and Two Case Studies. In Global Conference on Business and
Economics (GLOBE 2018) (Vol. 6).
Fakrulla, K. K. M., & Mouli, C. (2019). Comparative Study of Different Contractor Selection
Methods.
Kerzner, H. (2017). Project management: a systems approach to planning, scheduling,
and controlling. John Wiley & Sons.
Lientz, B., & Rea, K. (2016). Breakthrough technology project management. Routledge.
Rees, D. M., Smith, P., & Hall, J. (2016). A Multi‐sector Model of the Australian
Economy. Economic Record, 92(298), 374-408.
Rogers, T. M. (2019). PROJECT SUCCESS AND PROJECT TEAM INDIVIDUALS.
1 out of 15
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.