Detailed Project Management Plan for Successful Computing Projects
VerifiedAdded on  2024/07/01
|25
|4597
|380
Report
AI Summary
This report presents a comprehensive project management plan for a computing project, focusing on vulnerability assessment within BT Group, a telecommunications organization. The plan outlines project aims and objectives related to data security, availability, and confidentiality. It covers essential aspects such as cost, scope, time, quality, communication, risk, and resources. The report includes a work breakdown structure and a Gantt chart to provide a clear timeline and stages for completion. It also incorporates small-scale qualitative and quantitative research methods to analyze data and provide recommendations. The accuracy and authenticity of the data are emphasized, along with a reflection on the learning and performance during the project management process, offering recommendations for future improvements. Desklib provides access to this and other solved assignments to aid students in their studies.

Managing successful computing
project
project
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

TABLE OF CONTENTS
Introduction..................................................................................................................................................1
Task 1...........................................................................................................................................................2
P1 Devise project aims and objectives for a chosen scenario..................................................................2
P2 Produce a project management plan that covers aspects of cost, scope, time, quality,
communication, risk and resources..........................................................................................................3
P3 Produce a work breakdown structure and a Gantt chart to provide timeframes and stages for
completion............................................................................................................................................... 4
M1 Produce a comprehensive project management plan, milestone schedule and project schedule for
monitoring and completing the aims and objectives of the project.........................................................7
Task 2.........................................................................................................................................................10
P4 Carry out small-scale research by applying qualitative and quantitative research methods
appropriate for meeting project aims and objectives............................................................................. 10
M2 Evaluate the accuracy and reliability of different research methods applied..................................11
Task 3.........................................................................................................................................................13
P5 Analyse research and data using appropriate tools and techniques..................................................13
P6 Communicate appropriate recommendations as a result of research and data analysis to draw valid
and meaningful conclusions.................................................................................................................. 15
M3 Evaluate the selection of appropriate tools and techniques for accuracy and authenticity to support
and justify recommendations................................................................................................................. 16
Task 4.........................................................................................................................................................17
P7 Reflect on the value of undertaking the research to meet stated objectives and own learning and
performance........................................................................................................................................... 17
M4 Evaluate the value of the project management process and use of quality research to meet stated
objectives and support own learning and performance.........................................................................17
Conclusion................................................................................................................................................. 19
Introduction..................................................................................................................................................1
Task 1...........................................................................................................................................................2
P1 Devise project aims and objectives for a chosen scenario..................................................................2
P2 Produce a project management plan that covers aspects of cost, scope, time, quality,
communication, risk and resources..........................................................................................................3
P3 Produce a work breakdown structure and a Gantt chart to provide timeframes and stages for
completion............................................................................................................................................... 4
M1 Produce a comprehensive project management plan, milestone schedule and project schedule for
monitoring and completing the aims and objectives of the project.........................................................7
Task 2.........................................................................................................................................................10
P4 Carry out small-scale research by applying qualitative and quantitative research methods
appropriate for meeting project aims and objectives............................................................................. 10
M2 Evaluate the accuracy and reliability of different research methods applied..................................11
Task 3.........................................................................................................................................................13
P5 Analyse research and data using appropriate tools and techniques..................................................13
P6 Communicate appropriate recommendations as a result of research and data analysis to draw valid
and meaningful conclusions.................................................................................................................. 15
M3 Evaluate the selection of appropriate tools and techniques for accuracy and authenticity to support
and justify recommendations................................................................................................................. 16
Task 4.........................................................................................................................................................17
P7 Reflect on the value of undertaking the research to meet stated objectives and own learning and
performance........................................................................................................................................... 17
M4 Evaluate the value of the project management process and use of quality research to meet stated
objectives and support own learning and performance.........................................................................17
Conclusion................................................................................................................................................. 19

References..................................................................................................................................................20
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

LIST OF FIGURES
Figure 1: Work breakdown structure for the project...................................................................................5
Figure 1: Work breakdown structure for the project...................................................................................5
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

LIST OF TABLES
Table 1: Gantt chart.....................................................................................................................................5
Table 2: Milestone....................................................................................................................................... 7
Table 3: Schedule for project.......................................................................................................................8
Table 1: Gantt chart.....................................................................................................................................5
Table 2: Milestone....................................................................................................................................... 7
Table 3: Schedule for project.......................................................................................................................8

Introduction
Computer systems are used to store, manage and process the data whereas the data also can be
communicated to the other users to support the fast execution of the operations in the business
environment. However, the system and the technology being used in the business might be impacted
with the vulnerabilities those are reduce the performance, compromise the data and damage the
resources. BT Group is a telecommunication organization has to store and manage the user, employees
and business data. The report will discuss the project goals and objectives of the organization regarding
vulnerability handling. Also, it will discuss the project planning factors including cost, time and scope.
Work breakdown and Gantt chart technology will be used to support the project planning. With a small
research and data analysis, the report will generate the decision making data. The accuracy and
authenticity of the data will be managed and analyzed. The report will also focus on the learning and
performance during the project management with recommendations for the further improvements in the
business context.
1
Computer systems are used to store, manage and process the data whereas the data also can be
communicated to the other users to support the fast execution of the operations in the business
environment. However, the system and the technology being used in the business might be impacted
with the vulnerabilities those are reduce the performance, compromise the data and damage the
resources. BT Group is a telecommunication organization has to store and manage the user, employees
and business data. The report will discuss the project goals and objectives of the organization regarding
vulnerability handling. Also, it will discuss the project planning factors including cost, time and scope.
Work breakdown and Gantt chart technology will be used to support the project planning. With a small
research and data analysis, the report will generate the decision making data. The accuracy and
authenticity of the data will be managed and analyzed. The report will also focus on the learning and
performance during the project management with recommendations for the further improvements in the
business context.
1
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Task 1
P1 Devise project aims and objectives for a chosen scenario
About the organization
BT Group is the leading British Multinational organization having services in 180 countries. The
organization is also largest service provider in mobile, fixed lines and broadband services in United
Kingdom. The expansion of the business is in the subscription based television and information
technology services. BT Group has to store and manage the customer details, their subscriptions and the
network information. The organization has to manage the security, reliability and confidentiality so that
customers’ trust and data availability can be achieved.
Project description
The project has major focus on the vulnerability assessment in the organization which can impact the
data security, accuracy and reliability along with confidentiality and availability. Computing resources
in the organization may be vulnerable to the attacks, unauthenticated access and damage. The
organization has to determine the vulnerabilities so that potential changes can be made to achieve high
data security (Marchewka, 2014).
Aims
The goal of the project is to determine the vulnerabilities on the computing resources to improving the
data security, availability and confidentiality. The project also has goal to improve the security with the
consideration of the business capabilities and scopes.
Objectives
The project has following objectives to improve the telecommunication services through the data
accuracy and reliability:
ï‚· To understand the values of the confidentiality, availability and integrity in the context of BT
Group.
2
P1 Devise project aims and objectives for a chosen scenario
About the organization
BT Group is the leading British Multinational organization having services in 180 countries. The
organization is also largest service provider in mobile, fixed lines and broadband services in United
Kingdom. The expansion of the business is in the subscription based television and information
technology services. BT Group has to store and manage the customer details, their subscriptions and the
network information. The organization has to manage the security, reliability and confidentiality so that
customers’ trust and data availability can be achieved.
Project description
The project has major focus on the vulnerability assessment in the organization which can impact the
data security, accuracy and reliability along with confidentiality and availability. Computing resources
in the organization may be vulnerable to the attacks, unauthenticated access and damage. The
organization has to determine the vulnerabilities so that potential changes can be made to achieve high
data security (Marchewka, 2014).
Aims
The goal of the project is to determine the vulnerabilities on the computing resources to improving the
data security, availability and confidentiality. The project also has goal to improve the security with the
consideration of the business capabilities and scopes.
Objectives
The project has following objectives to improve the telecommunication services through the data
accuracy and reliability:
ï‚· To understand the values of the confidentiality, availability and integrity in the context of BT
Group.
2
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

ï‚· To identify the potential vulnerabilities and their sources those can impact the data management
and security.
ï‚· To justify the context and implement the recommendations to overcome the vulnerabilities and
their impacts.
P2 Produce a project management plan that covers aspects of cost, scope, time, quality, communication,
risk and resources
BT Group can achieve the desired security through the planning. The project planning is the process to
initialize the concept, plan the resources, design the framework and implement the approaches. It also
focuses on the monitoring and quality management. The organization can consider the following
planning aspects in project:
Cost: Without financial capabilities, it is difficult to complete the project. The organization has need of
$20,000 to complete the project. The major areas consuming the cost are resources, technical hardware
and software, security framework designing and quality assurance through multiple attempts and
approaches. The organization is planned to reserve additional $2,000 for the risk management.
Scope: The project has scope to manage the information in the accurate and reliable manner. The project
can achieve security and confidentiality on the data which can improve the decision making and
operation excellence (Larson et al, 2014). Also, the business has scope to provide the trustworthy
services to the customers.
Time: There is time of 2 months to initiate and complete the project. The organization also has used last
two weeks to manage the delays and availability of the resources to complete the project. The time
management is constraint through the policies and role management in the business operations.
Quality: With the help of the total quality management with the consideration of the cost, time and
efforts, the organization has to ensure that the outcomes are effective to prevent the vulnerable activities.
The business can measure and monitor the quality to achieve the baselines of the project as expected.
Communication: Mails and personal interactions are major channels for the communication. The
organization can use the mail services for the routine reporting and instructions whereas personal
interaction can help to resolve the issues and monitor the progress according to the defined quality
standards (Fleming and Koppelman, 2016).
3
and security.
ï‚· To justify the context and implement the recommendations to overcome the vulnerabilities and
their impacts.
P2 Produce a project management plan that covers aspects of cost, scope, time, quality, communication,
risk and resources
BT Group can achieve the desired security through the planning. The project planning is the process to
initialize the concept, plan the resources, design the framework and implement the approaches. It also
focuses on the monitoring and quality management. The organization can consider the following
planning aspects in project:
Cost: Without financial capabilities, it is difficult to complete the project. The organization has need of
$20,000 to complete the project. The major areas consuming the cost are resources, technical hardware
and software, security framework designing and quality assurance through multiple attempts and
approaches. The organization is planned to reserve additional $2,000 for the risk management.
Scope: The project has scope to manage the information in the accurate and reliable manner. The project
can achieve security and confidentiality on the data which can improve the decision making and
operation excellence (Larson et al, 2014). Also, the business has scope to provide the trustworthy
services to the customers.
Time: There is time of 2 months to initiate and complete the project. The organization also has used last
two weeks to manage the delays and availability of the resources to complete the project. The time
management is constraint through the policies and role management in the business operations.
Quality: With the help of the total quality management with the consideration of the cost, time and
efforts, the organization has to ensure that the outcomes are effective to prevent the vulnerable activities.
The business can measure and monitor the quality to achieve the baselines of the project as expected.
Communication: Mails and personal interactions are major channels for the communication. The
organization can use the mail services for the routine reporting and instructions whereas personal
interaction can help to resolve the issues and monitor the progress according to the defined quality
standards (Fleming and Koppelman, 2016).
3

Risk: Major risk in the project is to complete the activities within the time and cost. The delays and
unavailability of the resources at work are risk to achieve the quality outcomes. To secure the data, risk
of resource unavailability and cost exceed should be managed.
Resources: BT Group has technical department which can audit the systems and manage the security.
Also, there is need of the resources in the planning and quality assurance. The organization has to
prepare the team of 5 employees with proper work distribution to achieve the goals effectively.
P3 Produce a work breakdown structure and a Gantt chart to provide timeframes and stages for
completion
BT Group has need of the work breakdown structure to define the roles and responsibilities of the
employees in the project. Work break down is also required to create the manageable modules of the
project goals so that they can be communicated to the target employees, completed with desired quality
and executed with high performance (Harrison and Lock, 2017). For example, implementation team can
configure the security of specific applications when design team is preparing the framework for other
security concerns.
4
unavailability of the resources at work are risk to achieve the quality outcomes. To secure the data, risk
of resource unavailability and cost exceed should be managed.
Resources: BT Group has technical department which can audit the systems and manage the security.
Also, there is need of the resources in the planning and quality assurance. The organization has to
prepare the team of 5 employees with proper work distribution to achieve the goals effectively.
P3 Produce a work breakdown structure and a Gantt chart to provide timeframes and stages for
completion
BT Group has need of the work breakdown structure to define the roles and responsibilities of the
employees in the project. Work break down is also required to create the manageable modules of the
project goals so that they can be communicated to the target employees, completed with desired quality
and executed with high performance (Harrison and Lock, 2017). For example, implementation team can
configure the security of specific applications when design team is preparing the framework for other
security concerns.
4
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Figure 1: Work breakdown structure for the project
Gantt chart is the set of the activities and their potential time. It is significant to measure the project
progress with the defined time. It enforces the employees to complete the activities within time slot to
ensure smooth execution of the project (Lock, 2017). It helps to avoid the potential delays and reduce
the complexities in management.
Table 1: Gantt chart
Activity Time
Planning
Understanding CIA features
Current security parameters
Week-1
1 day
1 day
5
Computing project
Planning
Hand on
machines
User and
system
analysis
Document
the strategy
Identify
skills
Requirement
specification
Meetings
Focus on
issues
Ouline
solutions
Risk
identificati
on
Pre-design
Communicatio
n for project
requirement
Finalization
of solutions
Contract
and
agreement
Revise cost
and time
Designing
Logical
design
Physical
resources
Protyping and
risk
managment
Implementa
tion
Configuration
of device and
software
additional
installation
Documen
tation
Testing
Configurati
on testing
Physical
installation
Quality
analysis
Post-
implementatio
n
Maintena
nce guide
Recomm
endations
Training and
development
Resource
handover
Project
closure
Gantt chart is the set of the activities and their potential time. It is significant to measure the project
progress with the defined time. It enforces the employees to complete the activities within time slot to
ensure smooth execution of the project (Lock, 2017). It helps to avoid the potential delays and reduce
the complexities in management.
Table 1: Gantt chart
Activity Time
Planning
Understanding CIA features
Current security parameters
Week-1
1 day
1 day
5
Computing project
Planning
Hand on
machines
User and
system
analysis
Document
the strategy
Identify
skills
Requirement
specification
Meetings
Focus on
issues
Ouline
solutions
Risk
identificati
on
Pre-design
Communicatio
n for project
requirement
Finalization
of solutions
Contract
and
agreement
Revise cost
and time
Designing
Logical
design
Physical
resources
Protyping and
risk
managment
Implementa
tion
Configuration
of device and
software
additional
installation
Documen
tation
Testing
Configurati
on testing
Physical
installation
Quality
analysis
Post-
implementatio
n
Maintena
nce guide
Recomm
endations
Training and
development
Resource
handover
Project
closure
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Project concept creation
Resource planning
3 days
2 days
Requirement specification
Vulnerabilities analysis
Impact analysis
Internal communication
Week-2
1 days
2 days
2 days
Pre-design
Solution forming
Contracting
Resource management
Week-3
1 day
1.5 days
2.5 days
Designing
Prototyping the design
Requirement verification
Finalizing solution for design
Forth week
3 days
1 day
1 day
Implementation
Hardware and software installation
Configuration
Upgrading existing components
Fifth week
3 days
2 days
1 day
Testing
Module based testing
Functional testing
Sixth week
1 day
2 days
6
Resource planning
3 days
2 days
Requirement specification
Vulnerabilities analysis
Impact analysis
Internal communication
Week-2
1 days
2 days
2 days
Pre-design
Solution forming
Contracting
Resource management
Week-3
1 day
1.5 days
2.5 days
Designing
Prototyping the design
Requirement verification
Finalizing solution for design
Forth week
3 days
1 day
1 day
Implementation
Hardware and software installation
Configuration
Upgrading existing components
Fifth week
3 days
2 days
1 day
Testing
Module based testing
Functional testing
Sixth week
1 day
2 days
6

Integrated testing 2 days
Post-implementation
Documenting input, process and output
Training and development
Closing project constract
Seventh week
1 day
3 days
1 day
M1 Produce a comprehensive project management plan, milestone schedule and project schedule for
monitoring and completing the aims and objectives of the project
The project management plan has outlined the major considerations those can be used to achieve the
desired outcomes. The organization has planned how to manage the resources, budget, activities and
constraints along with the opportunities to the business. The vulnerability assessment can be completed
with time and cost effective execution of the project plan.
Milestone Schedule
Table 2: Milestone
Activity Completed within Status
Planning 5 days Completed
Designing 12 days Completed
Implementation 6 days Partial completed
Testing 4 days Due
Post-implementation 6 days Initiated but incomplete
7
Post-implementation
Documenting input, process and output
Training and development
Closing project constract
Seventh week
1 day
3 days
1 day
M1 Produce a comprehensive project management plan, milestone schedule and project schedule for
monitoring and completing the aims and objectives of the project
The project management plan has outlined the major considerations those can be used to achieve the
desired outcomes. The organization has planned how to manage the resources, budget, activities and
constraints along with the opportunities to the business. The vulnerability assessment can be completed
with time and cost effective execution of the project plan.
Milestone Schedule
Table 2: Milestone
Activity Completed within Status
Planning 5 days Completed
Designing 12 days Completed
Implementation 6 days Partial completed
Testing 4 days Due
Post-implementation 6 days Initiated but incomplete
7
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 25
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.