Project Management Plan for Enhancing Network Security at Westpac Bank

Verified

Added on  2025/04/30

|12
|1590
|130
AI Summary
Desklib provides past papers and solved assignments for students. This project details a plan to enhance Westpac Bank's network security.
Document Page
Information Systems Project
Management
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Contents
1. Project Title.................................................................................................................................3
2. Project Background:....................................................................................................................3
3. Project Charter.............................................................................................................................3
4. Stakeholder Register....................................................................................................................8
5. Stakeholder Management Strategy..............................................................................................9
References......................................................................................................................................11
Document Page
1. Project Title: To enhance security in Westpac Bank.
2. Project Background:
Westpac bank is a leading Australian Bank which was established in 1982 with more then 40000
employees effectively serving more than 14 million customers. The bank currently has about
1200 branches and 3200 ATMs internationally. The bank is offering various banking services to
its customer for carrying out transactional functions seamlessly. As the organisation is offering
facilities of online banking, currently the bank is facing some issues related to information
security. Thus, Westpac is very concern regarding the data security for maintaining trusts and
loyalty among the customers for attaining business growth and operational excellence. Thus, the
project is selected for enhancing the network and data security by identifying various threats,
risk and network vulnerabilities impacting the organisational network and business processes
with systematic project execution with effective project management using different project
management tool and techniques.
3. Project Charter
The current project support in complementing the overall Corporate Objectives
The project aims in working jointly for understanding group capabilities. By offering
enhanced services to the customers and to contribute towards service conveyance
positively (Kraitsman et al 2016).
Working as a team support in understanding the capabilities of the organisation, and by
increasing the proper management process and resources.
The project is also effective in bolstering the organisational aims and objective such as:
To offered customers with high quality customer service
To create focused workforce
To enhance data security
To list down all skilled and proficient employees in the organisation.
Project Title Security in Westpac bank
Project cost estimation $ 1000000
1
Document Page
Project manager XYX
Objective To understand and enhance the network security of the bank
Baseline development Project baseline is required for any project for meeting
security, integrity, availability and confidentiality of data
and information regarding the network and project. Along
with that the time, quality and cost is defined for aligning
the project along with the activities.
Project Scope To reveal various security threats, and to determine potential
solution for achieve proper security through effective change in
management and resources.
Project meeting The various meeting are held for discussing the project along
with brainstorming about different suggestion and ideas with
different stakeholders associated with the organisation directly
with a motive to increase network security. Thus, the project
manager of the project has decided to organise team meeting
every Monday.
Project risk Some of the risk involved with the current project is resource
limitation, capital management, time management, team interest.
Documentation process In the current project documentation is considered as important
aspect that includes tools, requirements, process and techniques
used for effective project execution and completion. The project
team document every requirement and stage of project
completion for future referral.
Time duration The current project is estimated to get finished in a period of 8
weeks.
Project success criteria To analyze the organizational network and to implement the
recommendations for maintaining high data security
Communication To achieve high network security as project outcome, proper
communication is required to be maintained between the team
members both verbally and formally through meeting, mails, and
telephone to share project goal and objectives.
Resources To attain and execute the project demand skilled and efficient
resources are required. Along with the network expertise, the
2
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
project completion need both software and hardware resources.
For increasing network security, project needs networking
components along with tools for resource monitoring
Quality Project can be effectively completed along with required
quality including quality of device installation, software
updates, modules and Plug-in essential for proper security
configuration. The project quality is effectively measured
in every project stage for ensuring that wastage and
rollback is minimum (Cassidy, 2016). The quality of the
project is measured by no security risk and data theft n the
network maintaining data integrity, confidentiality and
availability.
Project resources The main resource of the project is knowledgeable experts and
employees for effective project execution. Project resources are
required for prototype designing and for determining the clients
requirement by implement various modification in hardware and
software for enhancing security.
Aim: The current project aim in determining various possible vulnerabilities of a online banking
system, so that the organisation can sustainably make changes in the network as well as on
computing resources for enhancing security.
Objectives:
To analyse and understand the security need on information while processing and storage
against several external and internal risk or threats.
To find out various vulnerabilities that can and may occurs during online banking system
of Westpac impacting both organisation and customers.
To verify values of data integrity, availability, and confidentiality for an organization.
To understand various impacts of vulnerabilities upon business operations.
Work breakdown structure:
3
Document Page
The objective of the Project management can be met effectively by creating WBS and
accordingly a Gantt chart mainly by the project manager assigned for the respective project.
With the support of WBS, the activities to be included in the IT security project of WestPac can
be divide among various employees working in the project along with formulation of priority and
time allocation.
Gantt chart:
For effective distribution of the activities of the current project, WBS has been created
successfully. After, developing the WBS, the next step of the project manager is to create the
Gantt chart on the basis of the developed WBS (Orchier et al 2000). For proper distribution of
time and activities of the WBS, Gantt chart plays an important role. And with the support if
Gantt chart many internal conflicts can be minimised with proper time delegation.
Activities/ weeks 1st 2nd 3rd 4th 5th 6th 7th 8th
Planning
4
Document Page
Analysis
Requirements
Project Pre-designing
Designing
Project
Implementation
Testing and reviewing
Post-implementation
5
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4. Stakeholder Register
This is a project management document that is prepared for documenting various details and
information of all the information regarding different stakeholder associated with the project
initialization, execution and completion (Setiawan, 2018).
Name Position /
Role
Department Internal /
external
Contacts Power Supports
/ Neutral
/ Resists
Major
Requirement
Main
Expectati
on
Person 1 Project
manager
IT Internal E-mail:
Phone:893
837388
Address:
High Support Management
tools and
technique for
effective
project
management
through
email and
telephone
High
Network
security
Person 2 Network
analyst
IT Internal E-mail:
Phone:223
456789
Address:
High Support Network
analysis tool
through
email and
telephone
High
security
of the
network
Person 3 Sponsor External E-mail:
Phone:456
789789
Address:
Mediu
m
Resists Information
on project
status
through
email and
telephone
High
Return
6
Document Page
Person 4 Project
coordinat
or
IT and HR Internals E-mail:
Phone:879
964677
Address:
Mediu
m
Support Project
information
along with
aims and
objective s
through
email and
telephone
Effective
project
completi
on
Person 5 Advisor Advisory
committee
external E-mail:
Phone:781
9964677
Address
Mediu
m
Support Current
network
status,
weakly
report
through
email and
telephone
and personal
meeting
High
network
security
with low
threats
Person 5 Customer - External E-mail:
Phone:898
964677
Address
Low Neutral Data and
information
security
Reliable
network
5. Stakeholder Management Strategy
For an organization like Westpac, Stakeholder Management Strategy is an effective process that
can review various procedural changes within the organization and business along with their
potential impact upon the associated stakeholders.
7
Document Page
For an instance example, for the process of decision making regarding implementation of various
tools and technology for enhancing overall data and organizational security, Westpac need
proper stakeholders mapping for identifying the impact of the strategies upon various
stakeholders like customers, advisors, employees, sponsor etc (de Carvalho et al 2015). For
effective mapping of the stakeholder proper objective must be set and planned accordingly for
maintaining high security in the organizational network for protecting data and information of
both organization and customers. Stakeholders of the Westpac are classified as internal and
external on the basis of their interdependency and impacts on the function and decision making.
Stakeholder analysis:
Stakeholder Role When to Why to How to Comments
1st Person Project
manager
During the
project
Communicate
the aims and
objectives to
other
stakeholders.
Meeting, Face
to face
communication,
and through
documentation
Prepares the
outline of the
project for team
for ensuring the
best project and
outcome.
2nd Person Network
analyst
During the
process
Need to
improve the
practices and
process and
network.
Through
documentation
and meetings
Maintains
documentation
for all the flaws
of network for
better
understanding
of data network
breaching.
Person-3 Solution
designer
During the
project
initialization
and designing
Create logical
model for the
network
including
system and of
function
Through
document and
personal
interaction
Selects the most
suitable system
information
collecting to
obtain best
model for
8
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
business
solutions as per
requirement
4th person Project
coordinator
During project
implementation
, designing
To develop
effective
working
systems
considering
the
organizational
requirement
Through direct
communication,
weekly reports,
and meeting.
Prototype ate
transformed
into a working
system.
5th Person Advisor During the
testing and
planning of the
project outcome
To offer best
solution for
the network
solution nd
risks.
Through reports The best
solution is
requiring for
enhancing the
overall security
and
performance.
References
Books and journals
Cassidy, A., 2016. A practical guide to information systems strategic planning. Auerbach
Publications.
de Carvalho, M.M., Patah, L.A. and de Souza Bido, D., 2015. Project management and
its effects on project success: Cross-country and cross-industry
comparisons. International Journal of Project Management, 33(7), pp.1509-1522.
Kraitsman, R., Milstein, A., Raff, A. and Matot, D., SECULERT Ltd, 2016. Network
protection system and method. U.S. Patent 9,270,690.
9
Document Page
Orchier, J., Soriano, R., Salvaterra, L., Ardito, D. and Byreddy, A., Chase Manhattan
Bank, 2000. Computer network security management system. U.S. Patent 6,070,244.
Setiawan, J.E., 2018. Wireless Network Security Information System on Banking
Company with Radius Server Using Authentication, Authorization, Accounting
(AAA). International Journal of Computer Science and Software Engineering, 7(11),
pp.255-259.
10
chevron_up_icon
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]