Chat with us, powered by LiveChat Project Charter - EssayAbode

Project Charter

Assume that you have submitted a proposal and that your company (an outside vendor) has won the bid and will do the work. You have been awarded a time and materials contract. For the RFP you select you will estimate one-time and reoccurring costs.
Your next task will be to develop a project charter using the information from the Desktop Lab Project. Over the course of the next several weeks, you will use this as a basis for developing other project management deliverables.
The project charter must contain the following:
  • Project title
  • Purpose
  • Description
  • Scope statement
  • Objectives
  • Success criteria or expected benefits
  • Major deliverables
  • Acceptance criteria
  • Milestone schedule
  • Key assumptions
  • Constraints
  • Major risks


Desktop Lab Project:
Your company will be responsible for retrofitting three 20 seat rooms of PCs for students at a university’s new computer lab. In addition to the PCs, each lab will also need to have three smart TVs to aid in collaboration and to enhance the learning environment. Security of the lab assets is essential. Since you are planning this, you have the latitude to the scope and plan the project. However, there are some priority must-have requirements to balance the usability and potential cyber-risks of this learning environment:
All computers connected to the network must have an authentication mechanism that adheres to the University Account and Password Guidelines and uniquely identifies the user of the computer for each session. Before using the lab computer, each user will be required to authenticate via the campus Active Directory domain structure with a unique user ID and password credentials which comply with the campus standard. In addition, some method of session time out must be enabled for the user accounts, and a method of logging must be implemented. In order to prevent the installation of malicious applications or key-logging software, you must implement steps to prevent malicious code and key-loggers from being installed and executed on the computers and ensure security updates are continually installed and all connected devices in the computer labs are monitored for security threats. All computer lab devices should be physically secured, or access to the lab should be secured through whatever means are fiscally available make at least two recommendations for the physical security aspects of the computer labs.

Related Tags

Academic APA Assignment Business Capstone College Conclusion Course Day Discussion Double Spaced Essay English Finance General Graduate History Information Justify Literature Management Market Masters Math Minimum MLA Nursing Organizational Outline Pages Paper Presentation Questions Questionnaire Reference Response Response School Subject Slides Sources Student Support Times New Roman Title Topics Word Write Writing