Reference no: EM133682410
In this assessment, you will develop a solid plan to execute your selected project. The technical report will show your team's feasibility and capability in completing the project at the end of the term. An updated version of this report will be part of your final report at the end of the semester. You must invest significant time to ensure the report provides clear guidelines for the entire project team. The report must include the following sections at a minimum, but you are welcome to have additional sections as you see fit for the project.
Detailed description of the project, which shows an in-depth business problem analysis.
The project has provided a brief overview of the description and problem. In this sub-section, we expect you to elaborate on the provided content based on your in-depth understanding, research, investigation, and critical analysis. A discussion with your mentor and supervisor can be beneficial in this regard.
In-depth technical requirements analysis to report milestones/deliverables of the project. As different groups are undertaking different projects, you should discuss the expected deliverables for your project with your project mentor (tutor).
Each project comes with three milestones. In this sub-section of the report, you need to expand on each milestone based on your understanding, research, and investigation. A discussion with your mentor and supervisor must be done to understand the needs and requirements for each milestone.
Comparative review of existing/competing products, solutions, and literature relevant to the project milestone.
In this section, you must provide a comparative study based on a market study, industry, and academic literature review to find existing products or solutions that cannot address the problem's milestones. If you find a solution that directly addresses the problem and all milestones, describe it and explain a possible alternative from a feasibility or cost point of view.
Formulate requirements, such as functional, usability, reliability, performance, and security, based on critical reflection from comparative review.
In this section, you need to define the requirements (For example, functional | usability | reliability, | performance, | and security) of a possible solution to address project milestones to address the business problem. It is essential to understand this requirement when designing a system.
Identify, select, and justify appropriate network and security technologies to solve the problem.
Identify technologies that may address the requirements identified and details in earlier sub-points.
Design a system model for the project to address the problem. This will be the design of your proposed solution to address the business problem. For example, the design description may detail network/security architectures, logical and/or physical network designs, required protocols, or algorithms involved in the design solution.
In this part, you need to present a pictorial illustration of the system model of your solution. The solution must be detailed, including network/security architectures, logical and/or physical network designs, required protocols, or algorithms, with appropriate explanation and description.
Determine each team member's role and responsibilities to complete the project. Include capabilities to support these roles and responsibilities. Your role must match the available job responsibilities in the seek.com.au web portal.
In this section, you must identify roles and responsibilities to complete the project. The roles and responsibilities may include e-portfolio design and project management, along with all technical and reporting requirements of the unit and the project. Make sure your role matches the existing job role at Seek.com.au. Also, you will be marked individually in this section.
A cost-effective budget in a table to show itemised costs and where the fund is coming from.
A clear budget to match your system design/model and requirement technologies to achieve the project's milestones. Keep in mind that the school may provide support to cover some costs.
Risk assessment and a plan to address those risks. The risk assessment must consider ethical and professional issues relevant to the project.
Identify risks that may hinder your objectives in achieving the outcome/milestones. Each risk must be matched with a plan to address the risk. A risk assessment plan for cybersecurity risk may be helpful in this section.
List the technical hardware and software components you need to use to implement the proposed solution.
Other than previously mentioned technologies. Do you need any other hardware and/or software to finish this project prototype design successfully?
Managing project progress and delegating tasks as required.
Leading project planning meetings.
Taking responsibility for project milestone delivery.
Signing off on contracts.
Supervising project documentation.
Coordinating Stakeholders
Documenting, managing and reporting risks.
Preparing and delivering reports.
Optimising processes and team productivity.
Researching new security technology to decide what will most effectively protect the organisation.
Design security or disaster recovery systems.
Monitoring an organisation's networks for security breaches and investigating violations.
Installing software, such as firewalls and data encryption programs, to protect sensitive information.
Researching the latest information technology (IT) security trends.
Recommending security enhancements.
Helping computer users when they need to install or learn about new security products and procedures.
Tasks and duties
Identifying and understanding the different parts within engineered systems such as software and hardware.
Install, configure, test and maintain new networks and related applications, servers and workstations Troubleshoot network problems.
Ensure network firewalls and security are up to date.
Prepare and maintain procedures and documentation related to computer networks.
Writing requirements for how a system is supposed to perform.
Developing prototypes.
Designing tests to verify whether a system is achieving a desired function.
Communicating with other resources throughout research and development.
Managing projects which can include budgeting, scheduling and risk assessments