Research Assignment – Develop a Project Charter -Information Technology project managment

REQUIRED ACTIONS:
Research the internet and select a Request for Proposal (RFP) related to your area of information technology expertise. Areas of expertise include Cybersecurity, IT Security, IT Project Management, Information Security, Management, Business Analytics, Business Administration, Software Development, Database. Many federal, state, city and counties have current RFP’s. RFP’s are used by entities to request proposals for work that will be done inhouse by an outside vendor or company.
Assume that you have submitted a proposal and that your company (an outside vendor) has won the bid and will do the work. You have been awarded a time and materials contract. For the RFP you select – you will estimate one time and reoccurring costs.
Your next task will be to develop a project charter using the information from your selected RFP. Over the course of the next several weeks, you will use this as a basis for developing other project management deliverables.
The project charter must contain the following:
  • Project title
  • Purpose
  • Description
  • Scope statement
  • Objectives
  • Success criteria or expected benefits
  • Major deliverables
  • Acceptance criteria
  • Milestone schedule
  • Key assumptions
  • Constraints
  • Major risks
Desktop Lab Project: (Click here to explore)

Desktop Lab Project:
Your company will be responsible for retrofitting three 20 seat rooms of PCs for students at a university new computer lab. In addition to the PCs, each lab will also need to have three ‘smart TVs’ to aid in collaboration and to enhance the learning environment. Security of the lab assets is essential. Since you are planning this, you have the latitude to the scope and plan the project. However, there are some priority must-have requirements to balance the usability and potential cyber-risks of this learning environment:
All computers connected to the network must have an authentication mechanism that adheres to the University Account and Password Guidelines and uniquely identifies the user of the computer for each session. Before using the lab computer, each user will be required to authenticate via the campus Active Directory domain structure with a unique user ID and password credentials which comply with the campus standard. In addition, some method of session time out must be enabled for the user accounts, and a method of logging must be implemented. In order to prevent the installation of malicious applications or key-logging software, you must implement steps to prevent malicious code and key-loggers from being installed and executed on the computers and ensure security updates are continually installed and all connected devices in the computer labs are monitored for security threats. All computer lab devices should be physically secured, or access to the lab should be secured through whatever means are fiscally available – make at least two recommendations for the physical security aspects of the computer labs.

Are you struggling with your paper? Let us handle it - WE ARE EXPERTS!

Whatever paper you need - we will help you write it

Get started

Starts at $9 /page

How our paper writing service works

It's very simple!

  • Fill out the order form

    Complete the order form by providing as much information as possible, and then click the submit button.

  • Choose writer

    Select your preferred writer for the project, or let us assign the best writer for you.

  • Add funds

    Allocate funds to your wallet. You can release these funds to the writer incrementally, after each section is completed and meets your expected quality.

  • Ready

    Download the finished work. Review the paper and request free edits if needed. Optionally, rate the writer and leave a review.