MGMT 404 Project
Campus Bookstore self-checking Register
December 12, 2011
Professor Chuang
Table of Contents
Scope statement…………………………………………………………………………………3-4
Work breakdown structure………………………………………………………………………..5
Network diagram………………………………………………………………………………....6
Risk management plan…………………………………………………………………………7-8
Resource management plan………………………………………………………………………8
Communication management plan……………………………………………………………9-10
Scope Statement
Project Overview Statement Executive Summary
________________________________________
Project Name: Self-checking registers
Department: Bookstore
Last Updated: November 11, 2011
Project Manager(s): Carol Johnson, Nancy Drew, David Winner
Project Department Owner:
…show more content…
cess | 4.3.2 Inform the staff/security about their roles and responsibilities | 4.3.3 Request Staff/Security to verify their access cards | Implement the Process | 5.1 Develop a common message about the date of launch | 5.2 Encourage participation and adherence from the stakeholders |
Network Diagram
Risk Management Plan Risk Event | Response | Contingency Plan | Trigger | Person Responsible | Completion before new semester | Accept | Work around | Time frame off | Carol | Material out of spec | Mitigate | Contact Manufactory | Programming not working | IT department & Nancy | Employee training | Share | Work around | Management advisory | Management & Carol | IT programing equipment (barcodes) | Share | Work around | Not resolved in 24 hours | IT department & Nancy | Equipment interface | Mitigate | Work around | Not resolved in 36 hours | IT department & Nancy | Wrong equipment | Mitigate | Order new equipment | Not fitting in define space | IT department & Nancy | Available space in bookstore | Transfer | Re-arrange bookstore | Contractor information | Store management & Carol | Hardware malfunction | Mitigate | Order | Equipment falls | IT department & Nancy | Contractor schedule conflicts | Transfer | Work around | Late showing up | David | Available work hours (school closing) | Transfer | Work around | Bad weather/holidays | David | Risk Management Analysis |
Providing a self-check-out machine to save the customer’s time. Also, these machines will reduce the expenses that will be paid for the labours.
Personnel- All security surveys will require interaction with personnel working at the store. I may
As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door.
In the next few weeks we will be integrating a scanning system that will allow for less need of filing. Our registrar and director agree this would be more efficient instead of all the paper work that piles up. A new goal will be set within the project, which will be getting them introduced to more to scanning and less with filing. Still with the same objective, we will need to have it finished within an appropriate amount of
Responsible for releasing “approved” credentials that clear specific control points or ”gates” on way to being printed
This business case aims to provide a security plan for the network that will be supporting the ACA Technology™ Inventory & Control (ACAIC) system. This is a client/server system that is based at the office located in Melbourne. Throughout this project, you will be able to find answers for reviewing organizational security policies and procedures, developing security plan as well as designing controls to be incorporated in system.
This Printer Policy outlines the procedure for the Department of the Behavioral Health & Intellectual Disabilities, CBH, and PMHCC users. It is an important tool that will be used by this organization in providing support to achieve departmental goals. Printers represent a significant way to minimize risks to information security when the appropriate security applications and procedures are applied. When security procedures are not applied, for instance, by leaving printed documentation in output tray, that documentation becomes a conduit for unauthorized access to the organization's data and IT infrastructure both on and off-site, which subsequently leads to data leakage.
The business problem to be solved is how to improve operational efficiency, reduce customer wait time, and minimize the risk of losing or misplacing a customer’s items, which will preserve profit by reducing preventable losses. The current system and process is outdated and flawed, which is causing customer dissatisfaction and loss of profit.
As a colleague of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door. DELIVERABLES
Each store had a single-user Point-of-Sale (POS) system that was used to record sales. Each store received deliveries once a month. The sales and profit at each store was manually printed out from the POS software once a month by the supervisor. He/She held the physical copy of the report in the store for several days until the regional manager came to pick it up. After picking up all the physical reports from stores in his/her region,, the regional manager then travelled to the head office to enter all the sales data in a single user sales management system. The store supervisor also sent physical copies of the inventory counts to the senior managers of the warehouse and the senior manager of the accounting department. Each of these senior managers had access to single-user inventory management software and accounting software respectively. Sarah, a Regional VP for mall operations, is aware of some of the problems of the operations:
II. Organizational Security Plan and Policya. Security Risks:1. Flood – Burlington, Iowa is located off of the Mississippi River and has flooded in the past. Preventative measures for flooding will include stored sandbags to be placed around the perimeter of the main office and keeping up with weather mandates for the Burlington area. 2. Power Outages – Regardless of the cause, power outages can occur at random times. A UPS device will be placed within the main office to prevent loss of power, during which an automated backup will be enabled.3. Intellectual Theft with Removable Storage - InavaSight holds the intellectual property rights of all information and data developed, viewed, obtained, performed, sent or received for and within the
For my capstone project, I creating a Microsoft Access database for Eastern Aquatics. Craig, the business owner, runs the operation out of the garage of his home. He has been operating this business for approximately twenty years and is looking for ways to be more efficient and improve his record keeping processes. Craig had worked at That Fish Place many years ago and saw some of the issues they were having with one of the products they sold – live blackworms. He told the owners of That Fish Place that he could provide better worms for less cost and then started his own business.
This test will consist of one hundred deliveries and will be completed by the database administrator (DBA). When this test is completed with no errors in the delivery route reports, the next portion of the system can be tested. The test for the accounting system will use the same mock delivery schedule to ensure that all mileage amounts are correctly calculated. The DBA will also send data through the network to ensure that the mileage calculations are formatted properly to work with the accounting system. After the webpage has been created by the IT generalist and the DBA, several employees will be selected at random to test the security of the system. The intended results will be that no other employee's information can be accessed without the proper password, the information retrieved is correct, only pre-defined fields are available for editing, and edited fields are properly updated in the database. The next test will be a system test linking all parts of the data flow process from customer requests all the way through to uploading paychecks to the bank. This test plan will be used to define an installation plan.
registration (confirmation of the identity through the presentation of a valid document and logging of the data by the security staff)
analysing the risks to determine the level of risk, which is defined as the