Reference no: EM131140505
Please read carefully the attached assignment and answers all questions.
Assignment Overview
For this assignment you are to research and then create a work breakdown structure (WBS) with associated project management plan and GANTT chart that would be delivered as part of a project. You do not need any special IT skills to do so. Please create yours using Excel and upload the Excel file when you are done.
Background Information
Your organization has just undergone a data breach along with an attempt at social engineering. This has alarmed upper management, and they would like you to plan a half-day seminar (4 hours) at which four key individuals will speak to the 200 individuals in your organization:
1. Your CIO will describe the data breach and follow-up actions, covering current laws as well as how employees can handle customer questions.
2. An outside consultant from Hoffmeister Securities will explain social engineering and how to avoid getting 'caught'.
3. An overview of network as well as physical security best practices will be presented by your CSO.
4. An outside consultant will provide a futuristic session on the Internet of Things, to inform you of the types of security challenges coming in years ahead.
Assignment Deliverables:
Add all the tasks you will need to plan this event. You will use your lists of tasks from above. Be as thorough as possible so that you will could actually work through the tasks. Make sure that if tasks must be done consecutively that you identify that on the chart (again, refer to the videos I provided).
Where do you begin? You might, for example, begin with a kickoff meeting (yes, you allow time on the WBS for meetings). So you need to account for that time.
When you have decided how much time you need for that meeting, you will create a task in Excel for "Kickoff Meeting," and use "filler" to shade the Excel cells to indicate how many days or hours it might take to complete the analysis.
Depending on how many people are at the meeting, you may have several lines (one per resource) and they may (must!) run concurrently (right? If you're all at the same meeting?)
Attachment:- Assignment.rar
Find the probability of the customer selecting both items
: Purchasing a Pizza The probability that a customer selects a pizza with mushrooms or pepperoni is 0.43, and the probability that the customer selects only mushrooms is 0.32. If the probability that he or she selects only pepperoni is 0.17, find th..
|
Match the statement with the term most directly associated
: 1. _______ Rights, privileges, and competitive advantages that result from the ownership of long-lived assets that do not possess physical substance.
|
What are affirmative action policies or programs
: What are affirmative action policies or programs, and why are they controversial? Supporters of affirmative action argue that it is intended to level an uneven playing field in which discrimination still exists. What do you think
|
Find firm degree of financial leverage at a base ebit level
: A firm has EBIT of $375,000, interest expense of $75,000, preferred dividends of $6,000 and a tax rate of 40%. The firm's degree of financial leverage at a base EBIT level of $375,000 is:
|
Complete the given assignment
: For this assignment you are to research and then create a work breakdown structure (WBS) with associated project management plan and GANTT chart that would be delivered as part of a project.
|
Analyze the medias effect on terrorism
: Analyze the media's effect on terrorism. Speculate on the end result that each side (the media and the terrorist group) hopes to gain from the other.
|
Nature of politics in the united states federal government
: How does American "Public Opinion" and the "Media" influence American Policy decisions? How do interest groups and lobbyists influence the nature of politics in the United States Federal Government
|
What rate of return did mike earn over the year
: The stock is currently selling for $60 per share. What rate of return did Mike earn over the year
|
Describe four different force multipliers that terrorist use
: Describe at least four different force multipliers that terrorists use. Evaluate the effectiveness of each of these force multipliers in contributing to the success of a terrorist attack. Justify your response.
|