Task 1 - ICTPMG505_CapoquianCarl
docx
keyboard_arrow_up
School
Royal Melbourne Institute of Technology *
*We aren’t endorsed by this school
Course
ICT50115
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
13
Uploaded by JudgeFog12446
ICTPMG505
Manage ICT Projects
ID No. DAN6138
Name: Carl Lesther Capoquian Date: 20 November, 2023
1.
Define the project
a.
Appendix A – Project Scope Plan
Project Name:
IT Cybersecurity Plan
Project No:
1
Project Manager:
Carl Lesther
Capoquian
Start date:
23/02/2015
Background data:
Problem/Opportunity
The Port of Tacoma aims to improve its cybersecurity in response to federal initiatives for port facility security.
Organisation and Project Objective
Enhance the cybersecurity of the Port's technology infrastructure.
Comply with federal cybersecurity regulations.
Identify vulnerabilities and develop a prioritized set of actions to lessen risks.
Project deliverables
Detailed assessment report.
Recommendations to improve security.
Prioritized plan for future cybersecurity enhancements.
In Scope
Cybersecurity Vulnerability Assessment.
Review of current security measures.
Assessment of network vulnerabilities.
Out of scope
Implementing cybersecurity solutions.
Ongoing monitoring post-assessment
Project constraints
Budget is limited to $100,000.00.
Project duration until August 31, 2016.
Assumptions
Selected vendor will sign required agreements.
Proposed timeline and budget are feasible.
Proposed high-level project timeline
Phase
Dates
Notes
Initiation
1
st
week
Team introduction
Planning
2-3
rd
week
Detailed planning, resource allocation
Executing
4-5
th
week
Cybersecurity assessment activities
Monitoring
6-7
th
week
Weekly reports, weekly communications
Closure
8-9
th
week
Reporting, project closure, final assessment
Proposed high-level budget (cost and human resources)
1.
Initiation Phase:
Cost: $5,000
Resources: Project Manager, IT Security Consultant
2.
Planning Phase:
Cost: $15,000
Resources: Project Manager, IT Security Consultant, Support Staff
3.
Execution Phase:
Cost: $60,000
Resources: Project Manager, IT Security Consultant
Team
4.
Monitoring Phase:
Cost: $10,000
Resources: Project Manager, IT Security Consultant
5.
Closure Phase:
Cost: $10,000
Resources: Project Manager, IT Security Consultant
Contract Statement
Authorized individuals for contract initiation, signing, and completion acceptances include Michael Keim, the Senior Contract Administrator and Carl Capoquian, the designated Project Manager. Any changes to the contract or project scope will require mutual agreement between the Port of Tacoma and the project maanger. Both parties will follow the contract terms, including penalties for variations, ensuring fairness and compliance.
Stakeholders and title
Port of Tacoma - Client
Michael Keim, CPPB - Senior Contract Administrator
Carl Capoquian - Project Manager
IT Security Consultant Team
IT Department Staff
Prepared by:
Carl Capoquian
Date:
23/02/2015
Approved by:
Date:
23/02/2015
b.
Questions to help clarify the project parameters
What is the defined scope of the cybersecurity assessment project?
What is the projected timeline for completing the assessment, and are there any critical deadlines?
What is the estimated budget allocated for this cybersecurity project, and are there any cost constraints to consider?
What quality standards or benchmarks are expected to be met for the assessment's success?
What resources (human, technological) are available or needed for the project,
and are there any potential risks or obstacles identified in the process?
c.
Organisation/Project chart
Port of Tacoma, Client
Carl Capoquian, Project Manager
IT Securiy Consultant
IT Department Staf
Michael Keim, CPPB
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
2.
Establish the project (Project Charter)
a.
Project Background
- This project aims to fortify cybersecurity at the Port of Tacoma, aligning with federal initiatives for critical infrastructure security.
b.
Project purpose and justification
- To conduct a thorough cybersecurity assessment, comply with federal regulations, and enhance the Port's cybersecurity posture.
c.
High Level Project scope Statement
Project Objectives and Success Criteria
Objectives
:
Conduct Thorough Assessment: Identify IT vulnerabilities within the Port's infrastructure and policies.
Create Mitigation Plan: Prioritize and address identified vulnerabilities to enhance
cybersecurity.
SMART
Success Criteria:
Specific
: Identify 80% of critical IT vulnerabilities.
Measurable
: Reduce risks by 30% within six months through mitigation actions.
Achievable
: Implement industry best practices to fortify cybersecurity.
Relevant
: Ensure compliance with federal cybersecurity regulations.
Time-bound
: Complete assessment and mitigation plan by August 31, 2016.
This project supports broader organizational goals by improving critical infrastructure
cybersecurity, ensuring compliance, and fortifying the Port's cybersecurity defenses.
High Level Project Scope and Requirements
In scope
Cybersecurity Vulnerability Assessment.
Review of current security measures.
Assessment of network vulnerabilities.
Out of scope
Implementing cybersecurity solutions.
Ongoing monitoring post-assessment.
Assumptions
The main assumptions are:
Selected vendor will sign required agreements.
Proposed timeline and budget are feasible.
Constraints
The main constraints are:
Budget is limited to $100,000.00.
Project duration until August 31, 2016.
d.
Project Methodology and Approach
- The project will follow the NIST Cybersecurity Framework and the OpSec Five Step Process. The Phases include Initiation
, Planning
, Execution
, Monitoring
, and Closure
, each with specific deliverables aligned with the assessment and plan. Here is the description for each:
Initiation
-Define project objectives and stakeholders' roles.
Planning
-Create a detailed project plan and resource allocation.
Execution
-Conduct cybersecurity assessment and policy review.
Monitoring
-Monitor progress and manage risks.
Closure
-Finalize assessment reports and ensure project closure.
e.
Project Structure
f.
Project Stakeholders and Authority
Name
Title
Authority
Michael Keim
Senior Contract Administrator
Overall oversight of contractual aspects and project governance.
Carl Capoquian
Project Manager
Responsible for project management, decision-
making, and coordination among stakeholders.
Kristel Angela
IT Security Consultant
Technical expertise in conducting cybersecurity assessments and providing recommendations.
Melvin Cyrus
Justin Ralph
Kiara Margareth
IT Department Staff
Collaboration and support roles, providing necessary resources and cooperation as per project requirements.
g.
Project high level risks
Port of Tacoma, Client
Carl Capoquian, Project Manager
IT Securiy Consultant
IT Department Staf
Michael Keim, CPPB
Risk no.
Category
Risk Description
Likelihood
Impact
1
Financial
Budget constraints due to unforeseen additional assessment requirements
Medium (3)
High (4)
2
Marketing and Sales
Negative public perception following cybersecurity assessment disclosure
Low (2)
Medium (3)
3
Resourcing
Insufficient internal IT staff cooperation for assessment access
High (4)
High (4)
4
Technical
Inadequate IT infrastructure documentation leading to assessment delays
Medium (3)
High (4)
5
Legal
Non-compliance with sensitive security information (SSI) regulations
Medium (3)
Medium (3)
h.
Summary Schedule
Phase or Milestone
Preferred
completion date
Dependencies
Initiation
1
st
week
Team introduction
Planning
2-3
rd
week
Detailed planning, resource allocation
Executing
4-5
th
week
Cybersecurity assessment activities
Monitoring
6-7
th
week
Weekly reports, weekly communications
Closure
8-9
th
week
Reporting, project closure, final assessment
i.
Summary Budget
Category of Cost
Best Estimate
Worst Estimate
Most Likely
Initiation Phase
$5,000
$4,500
$5,200
Planning Phase
$15,000
$14,000
$15,500
Execution Phase
$60,000
$58,000
$62,000
Monitoring Phase
$10,000
$9,000
$10,500
Closure Phase
$10,000
$9,500
$10,200
j.
Document Quality Control
Version Control
Version
Date
Author
Comments
1
17/10/23
Michael
N/A
Approvers
Name
Title
Signature
Angelina
17/10/23
Angel
Reviewers
Name
Title
Signature
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Carl
17/10/23
Carl
Definitions
Term/Abbreviation
Full name
Description
3.
Develop a Project Plan
a.
Scope Changes: Engage Project Manager, IT Security Consultants, and Stakeholders when altering project scope for comprehensive assessment.
Risk Management: Consult Project Manager, IT Security Consultants to identify and address project risks.
Resource Allocation: Project Manager, Support Staff to manage resources and workload effectively.
Quality Review: Project Manager, IT Security Consultants to ensure deliverables meet quality standards.
b.
National Institute of Standards and Technology (NIST) Framework
- Offers guidelines and standards for improving critical infrastructure cybersecurity. It provides a framework that aligns with best practices for cybersecurity assessments.
Federal Information Security Modernization Act (FISMA):
- Directs federal agencies in securing their data, information systems, and infrastructure. It is relevant for assessing and enhancing cybersecurity measures within federal entities or projects involving federal grants.
c.
Task
no
Phases/Tasks/Milestones
Duration
Start Date (based on elapsed)
Finish Date (based on
elapsed)
Sequence/predecessors
Resources
1
Initiation Phase: Define project objectives and stakeholders' roles
7 days
23/02/201
5
2/3/2015
-
Project Manager, IT Security
Consultant
2
Planning Phase: Create a detailed project plan and resource allocation
14 days
2/3/2015
16/3/201
5
1
Project Manager, IT Security
Consultant
, Support Staff(IT Staff)
3
Execution Phase: Conduct cybersecurity assessment and policy review
14 days
16/3/2015
30/3/201
5
2
Project Manager, IT Security
Consultant
4
Monitoring Phase: Monitor progress and manage risks
14 days
30/3/2015
13/4/201
5
3
Project Manager, IT Security
Consultant
5
Closure Phase: Finalize assessment reports and ensure project closure
14 days
13/4/2015
27/4/201
5
4
Project Manager, IT Security
Consultant
Risk no.
Risk Description
Risk Priority
Risk Mitigation Strategy
1
Insufficient cooperation from internal IT staff
Probability: Medium
Impact: High
Overall: Critical
Mitigation: Encourage open communication, provide incentives, and offer training to engage IT staff effectively.
2
Inadequate documentation
of IT infrastructure
Probability: Medium Impact: High
Overall: Critical
Mitigation: Implement a structured documentation
process, conduct regular audits, and involve external experts if necessary.
3
Non-compliance with Sensitive Security Information (SSI) regulations
Probability: Medium Impact: Low
Overall: Medium
Mitigation: Regular training sessions on SSI guidelines, continuous monitoring, and compliance checks.
4
Technical difficulties in assessing wireless network vulnerabilities
Probability: Low
Impact: High
Overall: High
Mitigation: Engage specialized consultants, conduct thorough testing,
and implement additional
security measures.
Categor
y
Item
Quantity/Ho
urs
Cost per
Item/Hour
Total
Cost
Labour
Project Manager
-
$50/hour
$15,000
Labour
IT Security Consultant
-
$80/hour
$24,000
Labour
IT Department Staf
-
$40/hour
$6,000
Materials
Software Licenses
3 licenses
$1,000/license
$3,000
Materials
Documentation Supplies
-
$500
$500
Equipme
nt
IT Testing Equipment
-
$5,000
$5,000
Travel
Project-related travel
-
$2,000
$2,000
Others
Contingency
-
$10,000
$10,000
Total
-
-
-
$65,500
i.
Work Breakdown Structure (WBS) and WBS dictionary
Work Breakdown Structure (WBS)
1.
Initiation Phase
1.1 Define Project Objectives
1.2 Identify Stakeholders
1.3 Develop Project Charter
2.
Planning Phase
2.1 Create Project Plan
2.2 Resource Allocation
2.3 Risk Assessment
3.
Execution Phase
3.1 Conduct Cybersecurity Assessment
3.2 Policy Review
3.3 Vulnerability Testing
4.
Monitoring Phase
4.1 Progress Tracking
4.2 Risk Management
4.3 Quality Assurance
5.
Closure Phase
5.1 Finalize Assessment Reports
5.2 Project Review
5.3 Project Closure Activities
WBS Dictionary
1.1 Define Project Objectives
Description: Establish specific, measurable, achievable, relevant, and time-bound
project objectives.
Responsible: Project Manager
Duration: 3 days
Dependencies: None
2.2 Resource Allocation
Description: Allocate human resources and required tools for project execution.
Responsible: Project Manager
Duration: 5 days
Dependencies: Completion of Project Plan
3.3 Vulnerability Testing
Description: Conduct detailed testing for cybersecurity vulnerabilities.
Responsible: IT Security Consultant Team
Duration: 10 days
Dependencies: Cybersecurity Assessment Completion
4.2 Risk Management
Description: Identify and manage project risks.
Responsible: Project Manager, Risk Management Team
Duration: Ongoing
Dependencies: Identified Risks from Risk Assessment
ii.
Gantt Chart
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
iii.
Roles and Responsibilities of the Project Team
1.
CPPB (Senior Contract Administrator):
Facilitates procurement and contractual aspects.
Liaises between the organization and external parties.
Ensures compliance with procurement guidelines and regulations.
2.
Project Manager:
Oversees the entire project lifecycle and its successful delivery.
Develops project plans, schedules, and resource allocation.
Manages communication among stakeholders, ensuring project objectives are met.
3.
IT Security Consultant:
Conducts comprehensive cybersecurity assessments.
Identifies vulnerabilities and recommends risk mitigation strategies.
Assists in developing cybersecurity plans aligned with industry standards.
4.
IT Department Staff:
Provides technical support and expertise in the organization's IT infrastructure.
Collaborates with the IT Security Consultant for assessment and policy implementation.
Assists in implementing recommended cybersecurity measures and ensuring system compliance.
d.
1.
Prepare a Clear Proposal
:
Outline project goals, scope, resources needed, and expected outcomes
2.
Discuss with Team:
Share the proposal with the project team.
Address questions or concerns.
3.
Seek Team Approval:
Request formal approval from each team member.
Document their consent.
4.
Senior Approval:
If needed, seek approval from senior management or stakeholders.
5.
Finalize and Implement:
Incorporate feedback into the proposal.
Start the project according to the approved plan.
4.
Administering and Monitoring the Project
a.
To ensure stakeholders know their responsibilities and tasks:
Document Roles: Create a clear document outlining each stakeholder's role, tasks, and deadlines.
Meetings or Emails: Hold brief meetings or send emails to explain individual responsibilities and tasks.
Regular Updates: Provide periodic updates to reinforce roles and clarify any changes or
concerns.
Open Communication: Establish accessible channels for stakeholders to ask questions or seek clarification.
Confirm Understanding: Request stakeholders to acknowledge their understanding of their assigned tasks and responsibilities.
b.
Scheduling Concern: Ensuring adequate time allocation for cybersecurity assessment without impacting ongoing IT operations.
Quality Concern: Verifying the accuracy and completeness of vulnerability assessments
to meet industry standards and ensure strong cybersecurity measures.
i.
Scheduling Concern
: Evaluate the project team's workload and redistribute tasks if necessary to accommodate the cybersecurity assessment, Also implement a flexible schedule, allowing for adjustments without disrupting critical IT operations.
Quality Concern
: Conduct regular internal reviews and audits to ensure thoroughness and adherence to industry best practices.
c.
Risk Control
i.
Scope
: Regularly review and update project scope documents. Have clear change management procedures to handle scope alterations.
ii.
Time
: Use schedules and deadlines, track progress, and address delays promptly.
iii.
Finances
: Maintain accurate financial records, conduct regular budget reviews, and
seek authorization for any budget modifications.
iv.
Resources
: Monitor available resources, adjust as needed, and ensure the right people are allocated to tasks.
v.
Quality
: Set quality benchmarks, conduct regular quality checks, and employ continuous monitoring to maintain set standards.
vi.
Risks
: Continuously identify and assess risks, implement strategies to mitigate them, and regularly review risk plans for updates.
d.
Appendix C
Project deliverable
Standards or Requirements
Quality Assurance
Quality Control
Cybersecurity Vulnerability Assessment Report
Department of Homeland Security guidelines, National
Institute of Standards and Technology (NIST) Cybersecurity Framework, Port of Tacoma IT Security Policies
Ongoing review of assessment methodologies against DHS and NIST frameworks, continuous internal audits to ensure compliance, regular stakeholder consultations for alignment with Port's policies.
Final review by an external cybersecurity audit firm, validation against agreed-upon Port of Tacoma security benchmarks, formal approval from Port's
IT Security team before submission.
Vulnerability Mitigation Plan
Alignment with NIST Cybersecurity
Framework, DHS guidelines, and Port of Tacoma IT Security Policies
Rigorous assessment of proposed mitigation strategies against NIST and DHS guidelines, peer reviews by cybersecurity experts, regular updates based on emerging threats.
Independent validation of proposed actions, comprehensive review by the Port's IT security team, validation of the roadmap's effectiveness against
agreed benchmarks.
IT Policies and Procedure Recommendations Conformity with NIST Cybersecurity
Framework, Port of In-depth analysis to ensure alignment with NIST Independent assessment of proposed policies
Report
Tacoma's IT governance policies,
and federal security regulations.
standards, cross-
verification with Port of Tacoma IT governance policies,
expert reviews for policy completeness
and clarity.
and procedures, review by Port of Tacoma's IT governance committee, final validation against industry standards and federal regulations.
Status Report Template
Project Title
: IT Cybersecurity Plan
Date and reporting period
: 16/03/2015 reporting for week 3 of March
Author
: Carl Capoquian
Traffic light
: Green
Accomplishments since the last report:
Date Due
Date Completed
Deliverable, milestones, decision or issue
2/3/2015
27/02/2015
Gave roles and their tasks. Define Project objectives
16/3/2015
10/3/2015
Create a detailed project plan and resource allocation
Upcoming activities
Date Due
Tasks
30/03/2015
Conduct cybersecurity assessment and policy review
13/4/2015
Monitor progress and manage risks
27/4/2015
Finalize assessment reports and ensure project closure
Costs
Budgeted to date
Actuals to date
Comments
$100,000
$35,000
N/A
Summary of issues and variations
Issue/Chang
e no:
Description
N/A
N/A
Other comments:
The project is currently on track, and the team has successfully met most of the outlined deliverables.
5.
Finalising the Project
a.
Answer the following questions:
i.
Invoices, receipts, expense reports, and financial reports detailing budget allocations and expenditures.
ii.
Final budget reports, invoices, expense reports, and any financial reconciliations related to the project.
b.
Human resources will be redeployed based on their skills and availability for upcoming projects within the organization. The process involves conducting exit interviews, evaluating individual performances, and collaborating with department heads to allocate resources efficiently.
c.
The project's completion will be confirmed through a formal acceptance meeting or presentation where the deliverables, outcomes, and client/stakeholder expectations are reviewed and approved against the project's initial objectives.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
d.
Here is the project Checklist:
Review cybersecurity assessment report against initially defined vulnerabilities.
Validate mitigation plan completeness and alignment with identified risks.
Ensure IT policies and procedure recommendations adhere to agreed-upon standards.
And yes, the project would be considered successful if it met the objectives outlined in the plan, effectively identifying vulnerabilities and providing actionable strategies.
e.
i.
The Project Manager, IT Security Consultant, IT Department Staff would be involved.
ii.
Insights on the effectiveness of methodologies used, challenges faced during implementation, and suggestions for improvements.
iii.
Conducting team meetings or surveys to gather feedback, organizing review sessions to discuss experiences and suggestions for enhancing future project outcomes.
f.
Identify four key lessons and suggest how you would change your approach to your next
project.
Date
Description
Recommended action
Raised by
Communication gaps occurred
between the IT department and
consultants,
affecting
the
assessment progress
Implement regular
cross-functional
meetings to enhance
communication and
collaboration.
Project Manager
Underestimated
resource
requirements during the execution
phase, leading to delays.
Conduct a thorough
resource assessment
and
maintain
flexibility in resource
allocation.
IT Security Consultant
Insufficient contingency planning
for
unexpected
technical
complexities.
Develop
a
comprehensive risk
mitigation strategy
with specific focus
on
technical
uncertainties.
IT Department Staff
Inadequate
stakeholder
engagement during the planning
phase affected alignment with
organizational objectives.
Prioritize stakeholder
involvement at each
project stage to
ensure
alignment
with organizational
goals.
Project Manager