Developing A Cyber Security Plan For Credit Union Bank

Scope definition phase

This is a hypothetical case, therefore your team must decide what type of enterprise you will develop a Security preparedness plan for. Your team will review the five key topic areas presented in class and in the PowerPoints and research each of the key guidelines on these topics and guidelines to prepare and an organization for cyber security best practices including policies and procedure development, incidents response readiness, Disaster recovery and Contingency plan preparedness, corporate policy and governance. Remember the organization has hired your team to prepare them for these areas and be compliant with best practices and standards. Their current status is poor and they are in need organizing and incorporating a security infrastructure.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

1.  Your team should meet regularly to discuss and prepare scope for this project plan.

a.  Scope definition phase will occur where the team will decide the scope of this plan.

b.  A written executive scope statement should be prepared.

2.  Remember the key phases from your project Management class.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

a.  Human resource management to define the roles and responsibilities of the project team. (remember assume you will have a large team of professional that will perform activities in the work breakdown structure)

i.  List the key skills required, their minimum training and education requirements

ii.  Will they be Hourly or salary

b.  Develop a Work Breakdown Structure and determine the work periods (days) for each activity.

i.  Your team will need to develop a phase plane for the activities in your WBS

ii.  Remember the strong dependencies or weak dependencies of activities to take place.

iii.  Remember to set a start date

3.  Prepare a cost baseline for the activities in your plan

a.  What resources will be applied to all the activities (human and materials) and at what rate

b.  This will determine the budget for this project plan.

According to Lundkvist, Meiling and Sandberg, cyber security is one of the type of security that is applied to various computing devices like smart phones, computers etc. as well as various computer networks. It is a process in doing the application of various security measures in order to ensure integrity, confidentiality as well as availability of data.

In this particular assignment, the enterprise from business sector is selected named Credit Union Bank. It also discusses about the development of security preparedness plan that includes development of policies and procedures, disaster recovery and the preparedness of the contingency plan.

Written executive scope statement

Lundkvist, Meiling and Sandberg argued that cyber security is one of the potential method of information technology security that allows in protecting the networks, computer, programs that running. Apart from that, implementation of cyber security will also allow to protect from unauthorized access and destruction that unintended. Therefore, implementation of Cyber Security in the banking system of Credit Union Bank will be very much effective to protect their information such as transactions, file sharing over networks, etc. As days passed, technology changes rapidly and the threats in internet become higher and higher throughout the world. Cyber crime is one of the potential threats for the bankers as well as for the other users. In terms of protecting the cyber threats as well as increased criminal activities, implementation of Cyber Security system will be effective (Torres et al.). Therefore, the scope of this project is to lead the attention in sharing business information from one to other in banking sector especially for the Credit Union Bank. Moreover, Cyber Security System is also known as the safeguard national security that mostly developed by the nations in terms of protecting the digital spying and attacks. Therefore, implementation of Cyber Crime Security has huge scope in protecting data for the Credit Union Bank. On the contrary, Alberts, cited that the business interests and national security of any country in the world depends on the cyber security in these modern days (Throndson et al.). Development or implementation of cyber security professionals in the business system of Credit Union Bank will be better to correlate the organizational daily security operations and broad security guidelines. Se iof security topologies will be effective and efficient in improving security system if Credit Union Bank. It not only helps in preventing the cyber breach of the organization but also helps in protecting the information from cyber threats or attackers. Through the use of data loss prevention tools, Credit Union Bank will be able to protect their business information. This project will bring broad scope for Credit Union Bank because majority of organization especially the organization in banking sector faces challenges in protecting their information from the attackers (Eskerod and Jepsen). According to the 2008 market review, it has been analysed that in the banking sector of United State, organizations were face loss of more than $8.10 billion in a year. It highlighted the importance of Cyber Security System in the banking sector. Therefore, the undertaken project of Cyber Security System implementation for their online transferring system and data protection will be the best methodology.

Human resource management

Credit Union Bank started their journey at 22nd March 2012 with a small number of accounts holder in California. Through providing better service, satisfying the customers, the company is increasing the customer base, and developing a brand name within the banking sector in United States. Credit Union Bank provides the variety of banking services such as personal banking, corporate banking, agricultural finance, financial trade, international banking, industrial finance, etc (Lock). The key stakeholders of the Credit Union Bank in United Sates are the small sized organization as well as industrial units.

Moreover, the selected organization also has the customers of non-residential of California, multinational companies as well as exporters. After starting the business in financial banking sector, Credit Union Bank humbly started their business and has grown in their structure. The organization generates 3% revenue of overall financial activities within California. Apart from that, customers are also happy with the service that provided by the organization. The mission of the company is to generate more revenue and retain the customers through providing higher service.

According to the management of the organization, Credit Union Bank firmly focuses on establishing their business successfully and becoming the leading banker in the banking sector of California. The vision of the company is to expand the market international and achieve higher revenue in the international banking sector. In order to provide better and efficient service to the customers, Credit Union Bank keeps their tune and changes their technologies more efficiently. It allows them in providing speedy service. For example, the company provided internet banking, mobile banking for quick fund transfer.

Figure 1: Organizational Chart of Credit Union Bank

(Created By author)

Moreover, messaging facility for both credit and debit of the customer’s account allows in maintaining security for every transaction (Torres et al.). For the net banking purpose, Credit Union Bank uses latest technology such as One Time Password Methodology. The manager of the Credit Union Bank said that the company has taken major initiative in computerization in their overall process. Credit union Bank has more than 12 branches in all part of the California. Entire branches of the organization have been computerized (Throndson et al.). Credit union Bank provides all time banking with a impressive tagline Any Time, Any Where Banking to their customers.

Through the implementation of centralized banking solution, Credit Union Bank introduced the latest technology and quick fund transfer for their customers. The organization generates large amount of customer related report and documents. Credit Union Bank introduced the FineDoc system for their Document Management System that assists them in creating a detail information database for the new customers (Yang). This electronics document form stored entire information of the new customers to provide the effective customer service and also avoiding the legal disputes.

Key skills required

The main problems that faced by the Credit Union over the year is cyber crime. The company faced $75.3 million in the year of 2014 via cyber crime. As the entire system of Credit Union Bank is computerized, it was unable to manage the entire security system by the IT staffs. Moreover, the company also faced challenges in file sharing and documents sharing over their branches (Rose).

Therefore, this project plan is developing for the implementation or integration of Cyber Security System including RSS algorithm over their computerized banking system. RSS algorithm will allow the selected organization in transmitting information with each branch in a safe way. The string encryption methodology of RSS algorithm will be effective for Credit Union Bank and maintain the security system.

Employee Name

Job Description

M/F

Years of

Experience

Daily Cost

£

Work Quality*

Team Worker*

Comms

Skills*

Work

Behaviour

Jenny Preece

Programmer

F

3 years

125

7

8

8

8

Ben Shneiderman

Business Analyst

M

6 years

190

8

6

6

7

Alan Dix

IT Specialist

M

14 years

210

5

4

5

7

Jakob Nielsen

Test Engineer

M

1 year

100

7

8

7

7

Steve Krug

Network Specialist

M

5 years

155

6

8

6

8

Paul Dourish

Programmer

M

7 years

205

9

3

4

8

Xristine Faulkner

Developer

F

6 years

145

7

7

9

7

Donald Norman

Programmer

M

5 years

130

7

7

6

8

Bruno Latour

Developer

M

11 years

195

8

7

5

7

Manuel De Landa

IT Specialist

M

3 years

150

6

4

4

6

Nicolas Negroponte

Senior Programmer

M

8 years

250

9

8

7

7

Brenda Laurel

Developer

F

9 years

120

5

9

8

8

Martin Heidegger‎

Business Analyst

M

1 year

80

8

5

8

7

Tim Breners-Lee

Operations Expert

M

2 years

180

8

6

7

8

Steve Wozniak

Senior Analyst

M

7 years

160

7

6

8

7

Michel Foucault‎

Senior Developer

M

7 years

185

9

9

9

6

Gilles Deleuze‎

Test Engineer

M

1 year

100

7

8

6

7

Bill Gates

Business Analyst

M

5 years

100

4

6

8

8

John Dewey

Network Specialist

M

4 years

155

8

5

8

7

Jimi Hendrix

IT Specialist

M

12 years

150

6

4

5

6

Walter White 

Network Analyst

M

5 year

100

9

5

5

6

Bootsy Collins

Programmer

M

13 years

210

8

9

7

7

In terms of completing this project, project managers will follow the five phases of project management such as project initiation, project planning, project execution, project control and project finished.

Project Initiation: In this particular phase, project manager examined the entire operation process of Credit Union Bank and their current security system. According to the current operation method, project manager will determine the benefits of the project for selected organization. During this particular phase, the decision making team will be develop for identifying the realistically of the project completion. The planning phase can be considered as a milestone task.

Project Planning: In terms of developing this project, project manager will create a project charter and maintain the activity. Moreover, project manager will also design the scope for this particular project through writing the outline of the project work that to be performed. In terms of designing the scope of the project, one team including the senior analyst will be design that should be prioritizing. During this phase, project manager also calculate the initial project budget and prepare the gantt chart using MS Project including the determination of resources.

Project Execution: During this phase, project manager will provide the roles and responsibilities to the team members I terms of successful implementation of cyber security system at Credit Union Bank. Moreover, the project related information will be defines and checking by the project manager, It will be effective approach of deliver the project just in time. Moreover, Torres et al. opined that during that project execution phase generation of important project information such as effective cyber security system, algorithm that will be appropriate, implementation of hardware as well as related software for cyber security system, etc. This phase can also be considered as a milestone phase.

Training and education requirements

Project Control: During this particular phase, project manager will check the project progress report daily and will monitor the employee based on 360 degree performance monitoring strategy. It will be effective approach of controlling the entire project. Moreover, project manager of this project has to compare the current project progress report with the actual plan. It might be helpful in enhancing the work performance. It will also be helpful for adjusting project schedule according to necessity of the project. In case of control of projects, human resource interfaces and employee self-service are the milestone tasks of the given project.

Project Close: In this phase, project manager will check the completion of all tasks that need to be finished. Moreover, project manager will also give preference the approval of the outcome of the project. Moreover, after completing the entire activities or tasks in this project, project manager will conduct a evaluation phase that requires for successful project management. There are several situations in several project processes. Therefore, project manager for this project will execute the performance and motivate them to give their best effort. It will help in designing the appropriate project plan as well as finish the project on time. In major cases it has been identified that project manager unable to execute the project according to given schedule and also the budget is increase. Therefore, proper management and appropriate scheduling of the project plan and performance measurement through 360 degree performance management approach will be effective way of project submission on time.  The final testing of the project can be considered as the milestone task of the project. The main purpose of this milestone is to evaluate an appropriate critical path of the project.

Task Name

Duration

Start

Finish

Predecessors

Resource Name

Cost1

Project Management Plan for Cyber Security System Integration

56 days

Fri 6/26/15

Fri 9/11/15

 

Alan Dix

$630.00

   Risk assessment plan

5 days

Sun 7/26/15

Thu 7/30/15

 

Ben Shneiderman

$1,140.00

   Threats and vulnerabilities

5 days

Mon 7/27/15

Fri 7/31/15

 

Bill Gates

$500.00

   Implementation

41 days

Fri 6/26/15

Fri 8/21/15

 

Bootsy Collin

$660.00

       HR Operations

5 days

Fri 6/26/15

Thu 7/2/15

 

Brenda Laurel

$630.00

       Pay Roll

4 days

Fri 7/3/15

Wed 7/8/15

5

Bruno Latour

$1,170.00

       Employee Self Service

3 days

Thu 7/9/15

Mon 7/13/15

6

Gilles Deleuze

$500.00

      Training and awareness activities

10 days

Mon 8/10/15

Fri 8/21/15

 

Jakob Nielson

$600.00

   Interfaces

9 days

Tue 7/14/15

Fri 7/24/15

 

Jenny Preece

$480.00

       Pay Roll

6 days

Tue 7/14/15

Tue 7/21/15

7

Jimi Hendrix

$370.00

       HR

2 days

Wed 7/22/15

Thu 7/23/15

10

John Dewey

$465.00

      Conversion

1 day

Fri 7/24/15

Fri 7/24/15

11

Manuel De Landa

$900.00

   Reporting

19 days

Mon 7/27/15

Thu 8/20/15

 

Martin Heidegger

$480.00

       Pay Roll

8 days

Mon 7/27/15

Wed 8/5/15

12

       Benefits Administration

6 days

Thu 8/6/15

Thu 8/13/15

14

       HR

4 days

Fri 8/14/15

Wed 8/19/15

15

Steve Wozniak

$960.00

      Development of policies

5 days

Fri 7/24/15

Thu 7/30/15

11

   Testing

19 days

Fri 8/14/15

Wed 9/9/15

 

Paul Dourish

$1,025.00

       User Acceptance Test

4 days

Thu 8/20/15

Tue 8/25/15

16

       System Test

11 days

Wed 8/26/15

Wed 9/9/15

19

      Disaster and information procurement

10 days

Fri 8/14/15

Thu 8/27/15

15

   Launch

1 day

Wed 9/9/15

Thu 9/10/15

 

Steve Krug

$620.00

       End of the Project

1 day

Wed 9/9/15

Thu 9/10/15

20

Conclusion

This particular project outlined the project planning activities of implementation of Cyber Security System in the banking process of Credit Union Bank. The analyst calculates project scheduling and budgeting during initiation phase. This study also demonstrated the organizational overview including the team members with job titles and roles. The selected organization for this project was the Credit Union Bank that operates in the banking sector at California. The company has several customers and revenue generation is also effective. The entire system of the organization is computerized. Therefore, the company faced enough loss via cyber crime. They also lost customer information from their server. Therefore, this project planning for implementation of cyber security system will be effective and efficient for the Credit union Bank in terms of maintaining their security in each operation of banking sector.

Reference List

Alberts, Mariëtta. ‘The Importance Of A Business Plan When Planning A Lexicographical Project’.Lexikos 9.1 (2012): n. pag. Web.

Eskerod, Pernille, and Anna Lund Jepsen. Project Stakeholder Management. Farnham, Surrey, England: Gower, 2013. Print.

Lock, Dennis. Naked Project Management. Farnham: Ashgate Publishing Ltd, 2013. Print.

Lock, Dennis. Project Management. Burlington, VT: Gower, 2013. Print.

Lundkvist, Robert, John Henrik Meiling, and Marcus Sandberg. ‘A Proactive Plan-Do-Check-Act Approach To Defect Management Based On A Swedish Construction Project’. Construction Management and Economics 32.11 (2014): 1051-1065. Web.

Morales, Peter J, and Dennis Anderson. Process Simulation And Parametric Modeling For Strategic Project Management. New York, NY: Springer, 2013. Print.

Rose, Kenneth H. ‘Refining The Knowledge Production Plan: Knowledge Representations In Innovation Projects’. Project Management Journal 43.6 (2012): 114-114. Web.

Throndson, K. et al. ‘N022 The 2C ECG Project: Identifying Factors That Influence Nurses Confidence And Competence With ECG Monitoring’. Canadian Journal of Cardiology 28.5 (2012): S427. Web.

Torres, J.L. et al. ‘Energy Management Strategy For Plug-In Hybrid Electric Vehicles. A Comparative Study’. Applied Energy 113 (2014): 816-824. Web.

Yang, Tian Xiong. ‘The Facilities Plan And Project Management Based On The Optimize Correlation Of Logistics And Production Construction’. AMR 542-543 (2012): 339-343. Web.

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

image

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

image

Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE
image

Services offered

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.

image

Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

Categories
All samples
Essay (any type)
Essay (any type)
The Value of a Nursing Degree
Undergrad. (yrs 3-4)
Nursing
2
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

0+

Happy Clients

0+

Words Written This Week

0+

Ongoing Orders

0%

Customer Satisfaction Rate
image

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success

image

We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.
image
image

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now
image

Order your essay today and save 30% with the discount code ESSAYHELP