Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / CEIS390: Week 2 Project Charter Project Name Project Number Project Team # and Name Owner(s) Prioritization Start Date Scheduled Completion Date NOTE: Remove this note and all instructions in the template for a business professional document

CEIS390: Week 2 Project Charter Project Name Project Number Project Team # and Name Owner(s) Prioritization Start Date Scheduled Completion Date NOTE: Remove this note and all instructions in the template for a business professional document

Business

CEIS390: Week 2 Project Charter Project Name Project Number Project Team # and Name Owner(s) Prioritization Start Date Scheduled Completion Date NOTE: Remove this note and all instructions in the template for a business professional document. Mission/ Purpose Project Description and Project Product Objectives Business Need What is your project going to accomplish? How does this project relate to overall strategic goals and objectives of the company? Is it part of a program or larger project? What will this project create? What are the outcome products being created with this project? At a high level, how do you plan on completing the work required for this project? List at least five high-level deliverables (outputs) that will be generated from the execution of this project. This section will help to prepare for your project scope and WBS later in the course. What objective is this project designed to meet? List a high-level objective statement for the overall project and at least 3–5 goals required to meet this objective. These must be measurable. For example, if an objective of the project is the cut cost, then by how much will costs be cut? Why should we do this project? What will be gained, changed, or modified? Is there a financial or business reason to do this project? Explain, in detail, how this project will be beneficial to the project owner. 1 CEIS390: Week 2 Project Charter Milestones What are the key milestone dates associated with the project? Milestones may show the completion of a set of major deliverables or phases. List at least 10 milestones and provide estimated end dates for each. Milestones must have associated dates. Make sure the project start and end dates are consistent with the milestone start and end dates. Budget What is the estimated budget for this project? Do not research your project cost; this is an estimate. This does not need to be close to your project’s actual costs when your project planning is complete in Week 6. This is an order of magnitude estimate. Generic Software Development Budget Example Development costs Development labor Software licenses Server software X servers @ ???? Printer Other equipment Testing Training Supplies Total development costs Operational costs Hardware Software Operational labor Total operational costs Total Estimated Costs User Acceptance Criteria High-Level Project Assumptions (Modify as needed based on the scope and requirements of your technology project.) 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 What are the minimum success criteria as defined by the key stakeholders? How will you monitor and measure the project quality? How will the project owners determine if the project is a success or not? These must be detailed and measureable. What are the assumptions on which the project is based? What 7–10 statements do you believe to be true or will become true about the project during project execution but cannot be sure about at this time? 2 CEIS390: Week 2 Project Charter High-Level Project Constraints Exclusions and Boundaries Major Risks What are the major limiting factors that affect the project? What 8 –10 rules, regulations, requirements, laws, processes, or procedures are you bound by on this project? What are the boundaries of the project? To ensure that your project scope is properly constrained, identify 8–10 things that will be excluded from the project plans. What items will be not be included in the project? What are the major risks affecting the project? List a minimum of 7–10 risks. These risks must occur during the project, not after the project finishes or before the project starts. The risks defined should be directly associated with the project implementation. KEY STAKEHOLDERS Project Manager Authority Level Project Core Team Subject Matter Experts (SMEs) (What resources will you need with special expertise?) APPROVALS Type Name Project Manager Approval Signature Customer/Sponsor Approval 3 Date Running Head: INFORMATION SECURITY INFORMATION SECURITY INFORMATION SECURITY 2 Summary The world of technology has been developing at a very high rate which means that organizations and individual computer systems users have benefited a lot from the developing technology. At the same time, the hackers have also been developing their skills on how to access the information from the companies for their own benefit. Cloud computing is one of the current strategies that companies are using to store information and other vital blueprints about their companies. (Pahnila, et al., 2018). An example is a case of a healthcare organization which holds various patients’ personal data. The hackers might target to access such information so that to use it to target the patient. Some of the causes of insecurity within the organizations does not necessarily involve outside attackers as they might arise from within the institution. At example is a case where due to increased use of smartphones and other devices that can be connected into the main computer system that runs the organization, hackers can get a chance to access the system through them. They act as weak points since users might forget to update their systems. Information insecurity can also occur due to mistakes that can occur in the institution. An example is a situation where a hacker sends a virus through the email and once the email has been opened, the virus is installed into the system hence giving the hacker a chance to control the information systems for their own benefit. This project looks into ways that such companies can keep their information protected from such hackers hence maintaining their customers’ trust. The stakeholders also depend on a secure company hence this report shall target on ways through which organizations can handle the information received and the company’s blueprints safe from attacks. Reference: INFORMATION SECURITY Moody, G. D., Siponen, M., & Pahnila, S. (2018). Toward a unified model of information security policy compliance. MIS quarterly, 42(1). 3

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE