Assume that you have submitted a proposal and that your company (an outside vendor) has won the bid and will do the work. You have been awarded a time and materials contract. For the RFP you select you will estimate one-time and reoccurring costs.
Your next task will be to develop a project charter using the information from the Desktop Lab Project. Over the course of the next several weeks, you will use this as a basis for developing other project management deliverables.
The project charter must contain the following:
- Project title
- Purpose
- Description
- Scope statement
- Objectives
- Success criteria or expected benefits
- Major deliverables
- Acceptance criteria
- Milestone schedule
- Key assumptions
- Constraints
- Major risks
Desktop Lab Project:
Your company will be responsible for retrofitting three 20 seat rooms of PCs for students at a university’s new computer lab. In addition to the PCs, each lab will also need to have three smart TVs to aid in collaboration and to enhance the learning environment. Security of the lab assets is essential. Since you are planning this, you have the latitude to the scope and plan the project. However, there are some priority must-have requirements to balance the usability and potential cyber-risks of this learning environment:
All computers connected to the network must have an authentication mechanism that adheres to the University Account and Password Guidelines and uniquely identifies the user of the computer for each session. Before using the lab computer, each user will be required to authenticate via the campus Active Directory domain structure with a unique user ID and password credentials which comply with the campus standard. In addition, some method of session time out must be enabled for the user accounts, and a method of logging must be implemented. In order to prevent the installation of malicious applications or key-logging software, you must implement steps to prevent malicious code and key-loggers from being installed and executed on the computers and ensure security updates are continually installed and all connected devices in the computer labs are monitored for security threats. All computer lab devices should be physically secured, or access to the lab should be secured through whatever means are fiscally available make at least two recommendations for the physical security aspects of the computer labs.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
