Project Scope: The keystone Bank has a hole in its security systems when it comes to cyber-crime. Biometric technology will lead to greater protection from cybercrimes attacks.
Scope of the ProjectThe keystone bank is dedicating a networking event to facilitate the launching of the new Biometrics technology to its operations. It will also show how the technology will automate financial services and create awareness of the new product in the market. The event will be also be used to showcase the new products and services as well, as raise $2 million for charity.
Our main speaker is the Chief Executive Officer of the biometric projects, Martin Bruce; other speakers will be participants from Continental, Motorola, Suntory, AAM, and the management team in the Keystone bank. The purpose of the project it to create good networking, provide a platform for shareholders to engage with the presenters and the good presentation. We invite all the stakeholders to attend the event and join Mr. Bruce as he shares a bout the new technology of automatically shifting the bank systems to the modern technology of Biometrics technology.
Objectives
The main objective of the bank is to develop a technological design that will reduce cyber-crimes as well as delivering memorable high end products and services. The team of management will hear feedbacks from shareholders in the time dedicated to the event. The systems will transform the banking experience in the Keystone bank to very safe and secure.
The event will be held on 26th Friday, 2018 between 8am to 10pm. The whole project will cost PS10k but this may rise on the day of event. The Registration fee is PS 20, this amount of cash will cover the cost of lunch and breakfast. However, the knowledge to be gained is priceless.
Deployment PlanThe project involves launching of the biometric systems to the Keystone bank and ban partners. The systems are efficient and effective especially in the modern technological era. This is because the increased cyber-crime attacks against banks have become a great threat to safety and convenience of security system of banks.
Change Control Management. The development of the systems for the project is going to be administered by MayTech Inc. that is responsible for installing systems upgrades. The biometric systems changes will need to be made to deal with the potential threats and impacts . Below is Keystone Bank Work breakdown structures for the biometric technology event that will help the bank enhance its systems security features and ensure that no un-authorized access to the organization critical infrastructure. The WBS shows how the events will proceeds including the actual dates and the activities that fall within the critical path
Bank Networking Event Biometric Technology event Duration start Finish
1.1.<Planning the Event> 30
1.2. Printing initiation cards and distributing them 5 4-May-18 9-May-18
1.3. organizing and preparing the event venue 2 19-May-18 21-May-18
1.4. Prefeasibility visit to the event venue 10 9-May-18 31-May-18
1.5. Coordinating with members and keeping them posted 3 7-Jun-18 10-Jun-18
2.1.<Launching the event> 29
2.2.Players and entertainment session 1 11-Jun-18 11-Jun-18
2.3.Braistormoming and analyzing the biotech solution 3 12-Jun-18 15-Jun-18
2.4.Getting approvals and support from the stakeholders 14 16-Jun-18 30-Jun-18
2.5.Obtaining the validations and licensing 11 1-Jul-18 11-Jul-18
3.1.<Designing the program> 30
3.2.System elopement 5 12-Jul-18 17-Jul-18
3.3.Cordinating with the IT team and set the requirements 6 18-Jul-18 24-Jul-18
3.4.Internal analysis of Keystone bank hardware and software requirements 7 24-Jul-18 31-Jul-18
3.5.Actual design of the Biometric technology 10 1-Aug-18 10-Aug-18
3.6.Boosting and installation of the recommended features 1 11-Aug-18 12-Aug-18
3.7.System pre-testing 1 13-Aug-18 13-Aug-18
4.1. <Installation of the Biometric technology system at Keystone Bank> 24
4.0.Updated the systems and hardware's 10 14-Aug-18 24-Aug-18
4.2. integrating keystone bank current security system with new biometric 6 25-Aug-18 31-Aug-18
4.3. Post-testing of functionality 1 1-Sep-18 2-Sep-18
4.4. Training of the staffs 5 7-Sep-18 12-Sep-18
4.5. Testing their understanding to use the system 2 13/8/2018 15/8/2019
5.0.<Project Closure> 10
5.1. Final preliminaries 4 16/8/2020 20/8/2021
5.2. validation of the biometric systems 5 14/8/2021 19/8/2022
5.3.final project installation 1 20/8/2022 21/8/2023
5.4. Closure Schedule/Time Management
The project manager will establish a baseline within three weeks on the beginning of project to monitor the progress against the six months baseline on a monthly basis. The assistant project manager is in charge of ensuring the schedule of the project is updated with latest information. The updated information should never be more than four business days out of date. To monitor variance in the project which is more than 11% of the executive milestones the CPIC is the specified method to be used in the schedule.
Project schedule with a Gantt chart and milestones
The chart below describes the period of the events and the time it will take to complete various tasks that will be happening during the networking event. The diagram below indicates a Gantt chart and milestones for Keystone bank events that will helps to ensure that security systems are enhanced when identify the customers. This will help to minimize the high rate of fraud that has been taking place as some persons have been having access to customers' accounts without being authorized. All activities within the critical path have been highlighted using the red colour as shown in Gantt chart below. Activities within the critical path must be undertaken together with other activities because they cannot allow one to complete the prior activities because they will be late for execution and hence it will make the project to be behind the scheduled time.
Project stakeholder assessment
Stakeholder Stakes in Project Impact Purpose of the shareholder to the project Risks/ Attitudes Management strategies
Chief Executive Officer High Commitment in implementing the change Lack of Clarity in the preferred approaches Regular meetings with the project manager as well as involvement in the project developments board
Biometric Department Head Manage the people who will operate the biometric systems Medium Commitment to implement the change Low interest in the project Involve the manager in
Brief meetings
Administration Staff The will operate the biometric systems Low Contribute to system testing and designing. Concerns about increase in workload Involvement in user groups
The primary stakeholders are; the Chief Executive Officer, the Biometric Department Director. The CEO has the highest impact on the project implementation process thereby meetings between the projects managers are held weekly. The final decision of whether to implement the Biometric technology will be finalised by the CEO therefore 50% of whether to implement the project
Risk management - threats and opportunities assessment
Threats
The biometric technology is based on three things; something person has, something the person is or does and something the person knows. Unlike other protection systems the biometric system is user recognition system therefore can be accessed without user knowledge or cooperation. The biometric data will be more difficult to remediate than the loss of passwords and tokens. Also, the systems can be probabilistic as they are vulnerable to deliberate attempts of undermining reliability in their confidence.
Opportunities
The old systems of security authentication were mainly focused on passwords and token, these were secured by cooperatives. As a result they could be demonstrated or produced information of what they knew about any individual. The biometric technology protects passwords and tokens from being shared or transferred.
Simple Attack on a Biometric System
Category Description
Phase 1 Critical loss of property, Information disruption
Phase 2 Loss of proprietary information, major system failure
Phase 3 Minor system failure, Minor information proprietary
Phase 4 Less than minor system failure
Phase 1 category is very serious as it may result to Critical loss of property and Information disruption. Therefore, the risk should receive a lot of attention for prevention unless it is unlikely to occur though it should be addressed. Phase 2 consequence may result to Loss of proprietary information and major system failure. This is not a harsh consequence as compared to category 1 but prevention should be given a high priority as it may damage the operation and morale of the shareholders. Phase 3 categories may result to Minor system failure and Minor information proprietary; it is not terribly damaging to the organization and shareholder but should be prevented. Category phase 4 is determined by the likehood of occurrence and is the least severe because it results to less than minor system failure
Reference list
Ashtiani, B.N., Jiang, Q., Tayah, M., Welcker, B.L., Patton, T.G., Panvalkar, S.S. and Chan, W.K.T., Microsoft Technology Licensing LLC, 2017. Controlling resource allocation with automated consumption against a work breakdown structure. U.S. Patent 9,720,737.
Fleming, Q.W. and Koppelman, J.M., 1997. Earned value project management. Cost Engineering, 39(2), p.13.
Heldman, K., 2018. PMP: project management professional exam study guide. John Wiley & Sons.
Jia, H.Z., Fuh, J.Y., Nee, A.Y. and Zhang, Y.F., 2007. Integration of genetic algorithm and Gantt chart for job shop scheduling in distributed manufacturing systems. Computers & Industrial Engineering, 53(2), pp.313-320.
Kerzner, H. and Kerzner, H.R., 2017. Project management: a systems approach to planning, scheduling, and controlling. John Wiley & Sons.
Kerzner, H. and Kerzner, H.R., 2017. Project management: a systems approach to planning, scheduling, and controlling. John Wiley & Sons.
Kerzner, H., 2017. Project management metrics, KPIs, and dashboards: a guide to measuring and monitoring project performance. John Wiley & Sons.
Maylor, H., 2001. Beyond the Gantt chart:: Project management moving on. European Management Journal, 19(1), pp.92-100.
Meyringer, M., SAP SE, 2006. Interactive and web-based Gantt Chart. U.S. Patent 7,050,056.
Webb, A., 2017. Project management for successful product innovation. Routledge.
Wilson, J.M., 2003. Gantt charts: A centenary appreciation. European Journal of Operational Research, 149(2), pp.430-437.
Zavacki, J.F., 1997. Earned Value Project Management. Quality Progress, 30(8), p.174.
Cite this page
Project Title: Organizing a Networking Biometric Technology Event. (2022, May 17). Retrieved from https://proessays.net/essays/project-title-organizing-a-networking-event-biometric-technology-event
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- Essay Sample on Cultural Relativism
- Paper Example on Nuclear Fusion Life Cycle Model and the Acceptance Process for the Technology
- The Potential Support That the Client Needs in Family Breakdown
- Essay Example on the Humanities: My Online Museum Visit
- Essay Example on Crude Oil: Powering the World & OPEC's Role
- Literary Analysis Essay on The Indian Country
- Essay Example on Navajo Diabetes: Assessing Health Needs in Remote Areas