I also downloaded the project I am doing my assignment on
Scenario: You are researching a business development idea for your company. You have been preparing components of the project plan throughout this course. You will now pull together the four components completed in the previous weeks into a final project plan for presentation to the board of directors of your organization. The business development idea will be focused on an IT project that will improve or change your current business model to create more value for your company and its customers
Individual Assignment
1. What should be submitted
Two documents:
a) A Word document with the name of BIS320.W5.??? containing the IT Strategic
Project Plan.
b) A powerpoint with the name of BIS320.W5.??? containing the presentation.
Remember to replace ??? with initials of your First, Middle, Last Names. For
example, BIS320.W5.SSS.
Do NOT submit any other files except for the 2 listed above. Other documents will not be
graded.
2. Objective
To review and understand IT Strategic Project Plan.
3. Assignment Requirement
Scenario: You are researching a business development idea for your company. You have
been preparing components of the project plan throughout this course. You will now pull
together the four components completed in the previous weeks into a final project plan for
presentation to the board of directors of your organization. The business development idea
will be focused on an IT project that will improve or change your current business model
to create more value for your company and its customers.
Synthesize the individual assignment deliverables from Weeks 1 through 4, including
instructor corrections and recommendations.
Create an Information Technology (IT) project plan in Microsoft® Word in a minimum of
2,100 words, including an introduction and conclusion, and include the following:
• The project proposal summary that you created in Week 1, updated with
recommendations and corrections from your instructor
• Your data communications plan and project budget from Week 2
• Your collaboration and eCommerce recommendations from Week 3
• Your project security plan from Week 4
• A GANTT-type chart in your paper to illustrate the project schedule
Create a Microsoft® PowerPoint® presentation of 6 to 10 slides to accompany the
strategic plan. Please include the following in your presentation:
• Overview of your project (cover the points listed in the project proposal summary, 2 to 3
slides)
Week 5 Assignment Requirement and Tips
Page 1 of 4
• A summary of your data communications plan (1 slide)
• Your collaboration and eCommerce recommendations (1 to 2 slides)
• Your project security plan (1 slide)
• A Gantt-type chart illustrating project schedule (1 slide)
• A call to action slide to your audience (1 slide)
Organization / Development
Include introduction and conclusion. There is no need to include an abstract for short
papers.
Ensure the paper, excluding cover page, reference page and the appendix is within 1800
and 2200 words.
•
•
•
•
Direct quotes will be excluded during grading of contents. Ensure the content in
direct quote is not the primary fact.
Direct quotes must be less than 10% of your paper. Assignments containing more
than 10% direct quotes will not be graded and assigned 0 point.
Address the required components of the assignment in the order outlined in the
grading rubric. Otherwise, I might miss them while grading.
Each paragraph should consist of three or more sentences.
Mechanics
•
Format your paper consistent with APA guidelines.
o Please review “APA Guidelines” provided in Instructor Announcements
section.
• Use effective headings to explicitly identify the major components as outlined in
the grading rubric.
• Use third person pronouns. If you are not sure what this means, research it. Hint !
No I, we and you.
• References: You should have at least two references.
• Citation: There should be at least two citations due to the fact that you have two
references!
PowerPoint 6×6 Rules/Guidelines.
Remember the audience will not have access to your PowerPoint presentation. They
can only see your slides and not the ‘speakers note” while you are presenting. Will
your slides have enough information to convince the audience without listening to
your presentation?
How would 1 or 2 words bullet points convey your message?
4. Grading Rubric
Week 5 Assignment Requirement and Tips
Page 2 of 4
The following is point allocation breakdown for the major components of the paper.
Please follow the exact order outlined here.
Content
Points
The project proposal summary
2
Your data communications plan and project budget
2
Your collaboration and eCommerce recommendations
2
Your project security plan
2
A GANTT-type chart in your paper to illustrate the project schedule
2
The following deductions are applicable
Organization / Development
Paper is strictly 1800-2200 words (excluding Title and Reference
pages)
1
The introduction provides sufficient background on the topic and
previews major points.
Paragraphs/content follow the provided order. Each paragraph is
focused, coherent, and relevant and has at least 3 sentences.
The conclusion is logical, flows from the body of the paper, and
reviews the major points.
Mechanics
The paper follows APA guidelines for format.
1
At least two references provided. APA guidelines followed.
Citations follow APA guidelines. References cited.
The paper is laid out with effective use of headings, font styles, and
white space.
Rules of grammar, usage, and punctuation are followed.
Sentences are complete, clear, concise, and varied.
Spelling is correct.
Presentation
Content
Points
Overview of your project
1
Week 5 Assignment Requirement and Tips
Page 3 of 4
A summary of your data communications plan
1
Your collaboration and eCommerce recommendations
1
Your project security plan
1
A Gantt-type chart illustrating project schedule
0.5
A call to action slide to your audience
0.5
5. Recommendations/Tips
Refer to recommendations and tips in the previous assignments.
Week 5 Assignment Requirement and Tips
Page 4 of 4
Running head: PROJECT DATA SECURITY PLAN
Project Data Security Plan
Snooky Calambro
BIS/320
Sundar Sinnapan
08/07/2017
1
PROJECT DATA SECURITY PLAN
2
Collaboration Technology
Introduction
Information technology is the newest entrant in the global information sharing industry
that is based on full utilization of computer technology alongside its related components. As a
means of sharing information, concern has shifted to the ability to secure the information in
motion and circuit from access by the wrong hands or unauthorized individuals. The danger of
such information sharing being compromised is due to the nature of interconnectivity and
networking of computers worldwide.
Collaboration technology refers to a group of software-enabled processes applied in a
company system to help people with similar goals to achieve them. However, the functioning of
these technical aspects is highly dependent on the communication process responsible for giving
instructions and carrying out or executing the instructions received. In most cases, interference
whether deliberately or unintentional could result in significant repercussions for the company
hence the inevitable need for utmost tenacity in a prevention of any such occurrences.
The project is about fire outbreak management in enterprises by the application of
technological means in prevention and fighting actual fires. Detection of gas leaks due to wear
and tear of pipes could be automated. In addition to that smoke detection systems and software to
detect uncomfortable amounts of heat are functionalized. Ideal fire control system due to gas
leakages is based on the detection of the presence of mercaptan. A remote-controlled device
could be inserted into the gas chambers and laced with a chemical that reacts with mercaptan.
The device could be set to trigger alarms distributed all over the place when a reaction occurs.
PROJECT DATA SECURITY PLAN
3
Threats against collaboration technology
Due to the enhanced roles of a collaborated system, vulnerabilities could be observed anywhere
within the complex structure of the system or even in part of the component. The interference in
the system can be due to forces that are either internal or external depending on the function
targeted.
Internal threats
Actions that compromise the security of a system may be caused by the acts of
individuals within the company. The attacks orchestrated or aided by efforts of the members of a
group are referred to as internal threats. Some examples of internal threats to the security are
instances of blatant employee maliciousness such as information leakage and engagement in
illegal activities. Other cases may find root in subordinate in competencies or just simple laziness
like downloading malicious content, employee cyber -attacks or the anatomy of software due to
its engineering (Sawik, 2013)
Sometimes, the social nature of human beings proves to be the undoing of a computer
security system. For instance, a casual mention by a ‘friend’ of a ‘friend ‘who incidentally works
at the company the password of the scheme could lead to the system being compromised.
Malicious content too that is sent on the internet in communication forms such as email could be
mistakenly downloaded hence executed by an employee.
External threats
The threats that originate from sources that don’t work or frequent a firm are the external
threats. In other words, the deliberate intentioned individuals who want to disrupt the system but
PROJECT DATA SECURITY PLAN
4
lack the access use this means. Examples of external threats are viruses in the form of worms and
Trojan horses, hacks or the unauthorized access, phishing and even blended attacks (Sandberg, et
al, 2015)
Preventing security threats
The threats to an information system are numerous and dangerous and thus have to be
addressed. The threats may be classified into three categories; hardware and software. The
protection of both parts of the system must be guaranteed for the system to work. The threat of
temperance with hardware of the scheme which is composed of the detector must be avoided.
The device could falter, be stolen or damaged rendering the whole system useless. To safeguard
the gadget from malicious theft or damage physical forms of security such as guards should be
implemented (Boyle & Panco, 2014)
For software threats, they are many and diverse hence creativity must be applied in their
solutions. An example is the attacks from viruses that could be solved by installation of preemptive antivirus programs. In a case of employees compromising security passwords, tighter
regulations that could include bi-hourly password changes with a rotation program for holders be
implemented.
Conclusion
In the field of information technology, investments have to be made to guarantee the
safety of information which is very powerful. Information flow is the basis for instructions for
the operation of the system thus the focus on the security of those instructions is almost all that
matters
PROJECT DATA SECURITY PLAN
5
References
Boyle, R. J., & Panko, R. R. (2014). Corporate computer security. Prentice Hall Press.
Sandberg, H., Amin, S., & Johansson, K. H. (2015). Cyberphysical security in networked control
systems: An introduction to the issue. IEEE Control Systems, 35(1), 20-23.
Sawik, T. (2013). Selection of optimal countermeasure portfolio in IT security
planning. Decision Support Systems, 55(1), 156-164.
Running head: PROJECT DATA SECURITY PLAN
Project Data Security Plan
08/07/2017
1
PROJECT DATA SECURITY PLAN
2
Collaboration Technology
Introduction
Information technology is the newest entrant in the global information sharing industry
that is based on full utilization of computer technology alongside its related components. As a
means of sharing information, concern has shifted to the ability to secure the information in
motion and circuit from access by the wrong hands or unauthorized individuals. The danger of
such information sharing being compromised is due to the nature of interconnectivity and
networking of computers worldwide.
Collaboration technology refers to a group of software-enabled processes applied in a
company system to help people with similar goals to achieve them. However, the functioning of
these technical aspects is highly dependent on the communication process responsible for giving
instructions and carrying out or executing the instructions received. In most cases, interference
whether deliberately or unintentional could result in significant repercussions for the company
hence the inevitable need for utmost tenacity in a prevention of any such occurrences.
The project is about fire outbreak management in enterprises by the application of
technological means in prevention and fighting actual fires. Detection of gas leaks due to wear
and tear of pipes could be automated. In addition to that smoke detection systems and software to
detect uncomfortable amounts of heat are functionalized. Ideal fire control system due to gas
leakages is based on the detection of the presence of mercaptan. A remote-controlled device
could be inserted into the gas chambers and laced with a chemical that reacts with mercaptan.
The device could be set to trigger alarms distributed all over the place when a reaction occurs.
PROJECT DATA SECURITY PLAN
3
Threats against collaboration technology
Due to the enhanced roles of a collaborated system, vulnerabilities could be observed anywhere
within the complex structure of the system or even in part of the component. The interference in
the system can be due to forces that are either internal or external depending on the function
targeted.
Internal threats
Actions that compromise the security of a system may be caused by the acts of
individuals within the company. The attacks orchestrated or aided by efforts of the members of a
group are referred to as internal threats. Some examples of internal threats to the security are
instances of blatant employee maliciousness such as information leakage and engagement in
illegal activities. Other cases may find root in subordinate in competencies or just simple laziness
like downloading malicious content, employee cyber -attacks or the anatomy of software due to
its engineering (Sawik, 2013)
Sometimes, the social nature of human beings proves to be the undoing of a computer
security system. For instance, a casual mention by a ‘friend’ of a ‘friend ‘who incidentally works
at the company the password of the scheme could lead to the system being compromised.
Malicious content too that is sent on the internet in communication forms such as email could be
mistakenly downloaded hence executed by an employee.
External threats
The threats that originate from sources that don’t work or frequent a firm are the external
threats. In other words, the deliberate intentioned individuals who want to disrupt the system but
PROJECT DATA SECURITY PLAN
4
lack the access use this means. Examples of external threats are viruses in the form of worms and
Trojan horses, hacks or the unauthorized access, phishing and even blended attacks (Sandberg, et
al, 2015)
Preventing security threats
The threats to an information system are numerous and dangerous and thus have to be
addressed. The threats may be classified into three categories; hardware and software. The
protection of both parts of the system must be guaranteed for the system to work. The threat of
temperance with hardware of the scheme which is composed of the detector must be avoided.
The device could falter, be stolen or damaged rendering the whole system useless. To safeguard
the gadget from malicious theft or damage physical forms of security such as guards should be
implemented (Boyle & Panco, 2014)
For software threats, they are many and diverse hence creativity must be applied in their
solutions. An example is the attacks from viruses that could be solved by installation of preemptive antivirus programs. In a case of employees compromising security passwords, tighter
regulations that could include bi-hourly password changes with a rotation program for holders be
implemented.
Conclusion
In the field of information technology, investments have to be made to guarantee the
safety of information which is very powerful. Information flow is the basis for instructions for
the operation of the system thus the focus on the security of those instructions is almost all that
matters
PROJECT DATA SECURITY PLAN
5
References
Boyle, R. J., & Panko, R. R. (2014). Corporate computer security. Prentice Hall Press.
Sandberg, H., Amin, S., & Johansson, K. H. (2015). Cyberphysical security in networked control
systems: An introduction to the issue. IEEE Control Systems, 35(1), 20-23.
Sawik, T. (2013). Selection of optimal countermeasure portfolio in IT security
planning. Decision Support Systems, 55(1), 156-164.
Running head: PROJECT PROPOSAL SUMMARY
Project Proposal Summary
07/17/2017
1
PROJECT PROPOSAL SUMMARY
2
Project proposal summary
Description of the proposed project
House fires due to gas leaks are some of the challenges that confront many families today. In
most cases, the gas leaks occur when the users forget to close them tightly and as a result letting
some gases out. As a result, this proposed technology intends to come up with a technology that
will sense even the smallest amount of gas leaks in the houses and allow the authorities to take
the most relevant course of action in response to these problems. The main aim is to provide an
opportunity to find ways of detecting gas leaks before disasters occur.
The business reason for the project
Organizations, companies, families, and government institutions have been victims of infernos
that result from gas leaks. In most cases, these fires have been so devastating that they have
caused massive destruction of property and human lives. In the process, business organizations,
governments, and families have lost valuable items that could have been salvaged if these leaks
were detected in time. The main aim of this idea is to make it possible to detect the leaking
within a particular radius so that efforts are made to stop fire outbreak or mitigate the effects
should such fires start.
The manner in which executing this project would make the company better
While other institutions have tried to come up with this kind of technology, they have not been in
a position to provide one which is as powerful as the one being proposed. The sensors to be used
in this product are so powerful that they will detect even the slightest leaks from the tanks. One
of the reasons that have made the war against gas-related fires to be complicated is the fact that
PROJECT PROPOSAL SUMMARY
3
some of the gadgets that are currently in the market are not as very efficient in detecting minimal
leaks. The introduction of this technology would make it possible for the authorities and house
property managers to have the capacity to detect the gases in time and decide on the most
appropriate course of action.
How market competition is trying to identify and solve the problem
A lot of efforts have been put in place to make sure that gas leaks are easily detected. One
classical method of detecting gas leaks is the addition of a compound called Ethyl Mercaptan so
as to add some smell to the gas. In that regard, if a person enters a house where there is a gas
leak, the smell would be sufficient to provide a warning to the individual. However, if there is
nobody around, it would be difficult to detect the gas. In the recent times, researchers and
scientists have made efforts to come up with technological devices to detect these gases.
However, these instruments have not been useful in detecting little leaks.
The consequences if the project is not implemented
There are far-reaching effects of failure to implement this project. One of the issues that would
arise from the inability to implement the project is that the organization would continue suffering
from frequent fires that most institutions face. If the company does not implement this project, it
stands out to lose from the massive demand for these instruments as has been witnessed in the
recent times. If the company is in a position to do something that would change the nature of
these disasters, it is inconceivable that it should fail to come up with the technology.
PROJECT PROPOSAL SUMMARY
4
Budget for the project and the return on investment
The figures are in billion dollars
YEAR/PROJECTED
2018
2019
2020
2021
2022
2023
2024
1.1
1.3
1.2
1.4
1.7
1.8
2.1
Other cash incomes
0.2
0.3
0.2
0.3
0.2
0.1
0.2
Cash Outflow (expenses)
0.5
0.8
0.8
0.9
1.1
1.3
1.5
2018
2019
2020
2021
2022
2023
2024
1.1
1.3
1.2
1.4
1.7
1.8
2.1
Other cash incomes
0.2
0.3
0.2
0.3
0.2
0.1
0.2
Cash Outflow (expenses)
(0.5)
(0.8)
(0.8)
(0.9)
(1.1)
(1.3)
(1.5)
INCOME
Annual Sales ( figures in
billions)
Return on investment
YEAR/PROJECTED
INCOME
Annual Sales ( figures in
billions)
PROJECT PROPOSAL SUMMARY
Return on investment
0.8
5
0.8
0.6
0.8
0.7
0.6
0.8
The risks involved
There are some risks that might come which may, in the long run, derail the process of the
implantation of the program. One of the risks involved is that the planners may fail to raise the
resources that they may need to implement the process successfully. Since a lot of money is
required for the execution of the project, the failure to get the funds may significantly hinder a
successful implementation of the project. Additionally, it is also possible that better technology
may come up in the market which may make the one the company is introducing to be obsolete.