Detailed Project Management Plan for Successful Computing Projects

Verified

Added on  2024/07/01

|25
|4597
|380
Report
AI Summary
This report presents a comprehensive project management plan for a computing project, focusing on vulnerability assessment within BT Group, a telecommunications organization. The plan outlines project aims and objectives related to data security, availability, and confidentiality. It covers essential aspects such as cost, scope, time, quality, communication, risk, and resources. The report includes a work breakdown structure and a Gantt chart to provide a clear timeline and stages for completion. It also incorporates small-scale qualitative and quantitative research methods to analyze data and provide recommendations. The accuracy and authenticity of the data are emphasized, along with a reflection on the learning and performance during the project management process, offering recommendations for future improvements. Desklib provides access to this and other solved assignments to aid students in their studies.
Document Page
Managing successful computing
project
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
TABLE OF CONTENTS
Introduction
..................................................................................................................................................1
Task 1
...........................................................................................................................................................2
P1 Devise project aims and objectives for a chosen scenario
..................................................................2
P2 Produce a project management plan that covers aspects of cost, scope, time, quality,

communication, risk and resources
..........................................................................................................3
P3 Produce a work breakdown structure and a Gantt chart to provide timeframes and stages for

completion
............................................................................................................................................... 4
M1
Produce a comprehensive project management plan, milestone schedule and project schedule for
monitoring and completing the aims and objectives of the project
.........................................................7
Task 2
.........................................................................................................................................................10
P4
Carry out small-scale research by applying qualitative and quantitative research methods
appropriate for meeting project aims and objectives
............................................................................. 10
M2
Evaluate the accuracy and reliability of different research methods applied..................................11
Task 3
.........................................................................................................................................................13
P5
Analyse research and data using appropriate tools and techniques..................................................13
P6
Communicate appropriate recommendations as a result of research and data analysis to draw valid
and meaningful conclusions
.................................................................................................................. 15
M3
Evaluate the selection of appropriate tools and techniques for accuracy and authenticity to support
and justify recommendations
................................................................................................................. 16
Task 4
.........................................................................................................................................................17
P7
Reflect on the value of undertaking the research to meet stated objectives and own learning and
performance
........................................................................................................................................... 17
M4
Evaluate the value of the project management process and use of quality research to meet stated
objectives and support own learning and performance
.........................................................................17
Conclusion
................................................................................................................................................. 19
Document Page
References..................................................................................................................................................20
Document Page
LIST OF FIGURES
Figure 1: Work breakdown structure for the project
...................................................................................5
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
LIST OF TABLES
Table 1: Gantt chart
.....................................................................................................................................5
Table 2: Milestone
....................................................................................................................................... 7
Table 3: Schedule for project
.......................................................................................................................8
Document Page
Introduction
Computer systems are used to store, manage and process the data whereas the data also can be

communicated to the other users to support the fast execution of the operations in the business

environment. However, the system and the technology being used in the business might be impacted

with the vulnerabilities those are reduce the performance, compromise the data and damage the

resources. BT Group is a telecommunication organization has to store and manage the user, employees

and business data. The report will discuss the project goals and objectives of the organization regarding

vulnerability handling. Also, it will discuss the project planning factors including cost, time and scope.

Work breakdown and Gantt chart technology will be used to support the project planning. With a small

research and data analysis, the report will generate the decision making data. The accuracy and

authenticity of the data will be managed and analyzed. The report will also focus on the learning and

performance during the project management with recommendations for the further improvements in the

business context.

1
Document Page
Task 1
P1 Devise project aims and objectives for a chosen scenario

About the organization

BT Group is the leading British Multinational organization having services in 180 countries. The

organization is also largest service provider in mobile, fixed lines and broadband services in United

Kingdom. The expansion of the business is in the subscription based television and information

technology services. BT Group has to store and manage the customer details, their subscriptions and the

network information. The organization has to manage the security, reliability and confidentiality so that

customers’ trust and data availability can be achieved.

Project description

The project has major focus on the vulnerability assessment in the organization which can impact the

data security, accuracy and reliability along with confidentiality and availability. Computing resources

in the organization may be vulnerable to the attacks, unauthenticated access and damage. The

organization has to determine the vulnerabilities so that potential changes can be made to achieve high

data security (Marchewka, 2014).

Aims

The goal of the project is to determine the vulnerabilities on the computing resources to improving the

data security, availability and confidentiality. The project also has goal to improve the security with the

consideration of the business capabilities and scopes.

Objectives

The project has following objectives to improve the telecommunication services through the data

accuracy and reliability:

ï‚·
To understand the values of the confidentiality, availability and integrity in the context of BT
Group.

2
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
ï‚· To identify the potential vulnerabilities and their sources those can impact the data management
and security.

ï‚·
To justify the context and implement the recommendations to overcome the vulnerabilities and
their impacts.

P2 Produce a project management plan that covers aspects of cost, scope, time, quality, communication,

risk and resources

BT Group can achieve the desired security through the planning. The project planning is the process to

initialize the concept, plan the resources, design the framework and implement the approaches. It also

focuses on the monitoring and quality management. The organization can consider the following

planning aspects in project:

Cost:
Without financial capabilities, it is difficult to complete the project. The organization has need of
$20,000 to complete the project. The major areas consuming the cost are resources, technical hardware

and software, security framework designing and quality assurance through multiple attempts and

approaches. The organization is planned to reserve additional $2,000 for the risk management.

Scope:
The project has scope to manage the information in the accurate and reliable manner. The project
can achieve security and confidentiality on the data which can improve the decision making and

operation excellence (Larson et al, 2014). Also, the business has scope to provide the trustworthy

services to the customers.

Time:
There is time of 2 months to initiate and complete the project. The organization also has used last
two weeks to manage the delays and availability of the resources to complete the project. The time

management is constraint through the policies and role management in the business operations.

Quality
: With the help of the total quality management with the consideration of the cost, time and
efforts, the organization has to ensure that the outcomes are effective to prevent the vulnerable activities.

The business can measure and monitor the quality to achieve the baselines of the project as expected.

Communication:
Mails and personal interactions are major channels for the communication. The
organization can use the mail services for the routine reporting and instructions whereas personal

interaction can help to resolve the issues and monitor the progress according to the defined quality

standards (Fleming and Koppelman, 2016).

3
Document Page
Risk: Major risk in the project is to complete the activities within the time and cost. The delays and
unavailability of the resources at work are risk to achieve the quality outcomes. To secure the data, risk

of resource unavailability and cost exceed should be managed.

Resources:
BT Group has technical department which can audit the systems and manage the security.
Also, there is need of the resources in the planning and quality assurance. The organization has to

prepare the team of 5 employees with proper work distribution to achieve the goals effectively.

P3 Produce a work breakdown structure and a Gantt chart to provide timeframes and stages for

completion

BT Group has need of the work breakdown structure to define the roles and responsibilities of the

employees in the project. Work break down is also required to create the manageable modules of the

project goals so that they can be communicated to the target employees, completed with desired quality

and executed with high performance (Harrison and Lock, 2017). For example, implementation team can

configure the security of specific applications when design team is preparing the framework for other

security concerns.

4
Document Page
Figure 1: Work breakdown structure for the project
Gantt chart is the set of the activities and their potential time. It is significant to measure the project

progress with the defined time. It enforces the employees to complete the activities within time slot to

ensure smooth execution of the project (Lock, 2017). It helps to avoid the potential delays and reduce

the complexities in management.

Table
1: Gantt chart
Activity
Time
Planning

Understanding CIA features

Current security parameters

Week-1

1 day

1 day

5

Computing project
Planning
Hand on
machines
User and
system
analysis
Document
the strategy
Identify
skills
Requirement
specification
Meetings
Focus on
issues
Ouline
solutions
Risk
identificati
on
Pre-design
Communicatio
n for project
requirement
Finalization
of solutions
Contract
and
agreement
Revise cost
and time
Designing
Logical
design
Physical
resources
Protyping and
risk
managment
Implementa
tion
Configuration
of device and
software
additional
installation
Documen
tation
Testing
Configurati
on testing
Physical
installation
Quality
analysis
Post-
implementatio
n
Maintena
nce guide
Recomm
endations
Training and
development
Resource
handover
Project
closure
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Project concept creation
Resource planning

3 days

2 days

Requirement specification

Vulnerabilities analysis

Impact analysis

Internal communication

Week-2

1 days

2 days

2 days

Pre-design

Solution forming

Contracting

Resource management

Week-3

1 day

1.5 days

2.5 days

Designing

Prototyping the design

Requirement verification

Finalizing solution for design

Forth week

3 days

1 day

1 day

Implementation

Hardware and software installation

Configuration

Upgrading existing components

Fifth week

3 days

2 days

1 day

Testing

Module based testing

Functional testing

Sixth week

1 day

2 days

6
Document Page
Integrated testing 2 days
Post-implementation

Documenting input, process and output

Training and development

Closing project constract

Seventh week

1 day

3 days

1 day

M1
Produce a comprehensive project management plan, milestone schedule and project schedule for
monitoring and completing the aims and objectives of the project

The project management plan has outlined the major considerations those can be used to achieve the

desired outcomes. The organization has planned how to manage the resources, budget, activities and

constraints along with the opportunities to the business. The vulnerability assessment can be completed

with time and cost effective execution of the project plan.

Milestone Schedule

Table
2: Milestone
Activity
Completed within Status
Planning
5 days Completed
Designing
12 days Completed
Implementation
6 days Partial completed
Testing
4 days Due
Post-implementation
6 days Initiated but incomplete
7
chevron_up_icon
1 out of 25
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]