Monday, August 17, 2020

Project Feasibility Study Example

Project Feasibility Study Example Project Feasibility Study â€" Assignment Example > 7.0 References ……………………………………………………………………………………13Executive Summary 1.0 IntroductionThe main purpose of this document is to provide a feasibility study for the University security systems that are going to be implemented in a new building. The document will also address some of the controls that need to be considered for the project to turn out as a success. This particular security systems feasibility plan will also delineate on responsibilities and expected behaviors for the individuals who will be using the security systems in all sorts of ways. Therefore this security systems feasibility plan should be viewed as a documentation of the structured process that will be used to plan for adequate, cost effective security protection for human and tangible assets that will be found within the vicinity of the university building (CPI, 2008,p. 2). Each security plan is developed in accordance to the guidelines set forth by the university guide for establishing such security plans together with the applicable risk mitigation strategies. 2.0 Project Initiation 2.1 ObjectiveThe objectives of this particular brief are to outline the University security systems plan. Security systems here refer to the technological products that are used to safeguard unauthorized access and intrusion of the university buildings, or other tangible and non-tangible assets like information (Security Bureau, 2000, p. 3). This plan will mainly dwell on the security systems that are required within the university building. Our plan is going to be consistent with the entire campus wide plan pertaining to security system and security in general whereby this particular security systems plan has also been established in consultation with the campus chief information security officer (Fennelly, 2003, p. 106). In order for success to be achieved, this particular plan will be geared towards identifying potential security threats and d evising mitigation mechanisms before security breaches happen. This is so because proper security mechanism should safeguard personnel, prevent unauthorized access to equipments, facility, information, sabotage and damage by devising various active and passive measures (Roper, 1996, p. 1). 2.2 ScopeThe scope of this particular plan will focus on the below areas: College assets within the university building Safeguarding students and workers within the new building from crime and any other violent activity Student’s assets such as laptops and mobile phonesUniversity specific information such as student’s academic employment information Teaching and non-teaching staff information Technological infrastructure that support the computing needs of the new building 2.3 Approach The university is going to implement the following approach to ensure that there is compliance with security systems requirements. Identifying and tracking the security hazards. Identifying system security in stallation procedures and design criteria that are in line with the security philosophy established by the university to counter threats and vulnerabilities to the university. Interacting with design engineers throughout the entire design stage of any new facility being established in order to ensure that sound security concepts are involved. Elaborate plan of specific tasks which will encourage receiving of feedback in the best manner possible so that they may be included into designing and manufacturing at the early stages in order to avoid delaying the plan and incurring additional costs. Interacting with Project managers during the project phases in order to ensure that the unit designs integrate properly with the overall system security requirements. Acquiring products that are certified with relevant bodiesGoing for products that are energy efficient so that we may have a “green campus” Testing the main system together with its modules including all the security aspects D ocumenting the project phasesMonitoring the security systems program (Smith, 2008, p. 5).

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.