Discuss about the Research Analysis Report for Analysis of Cyber Security.
The project of Research Analysis of Cyber Security on Land Transport is based for analysing the various issues and problems related to the internet based electronic devices and GPS system had been facing (Choo et al., 2017). The analysis would be based on the analysis of the effective utilization of the literatures and articles for forming the final analysis of the project plan development. The completion of the project would help in forming a distinct analysis of the activities of the cyber technology implementation for land transportation and the impact of the cyber security issues. The following assignment would involve the analysis of the project fundamentals for the mentioned topic as it would form an analysis of the project requirements, stakeholder analysis, project procurement, and types of contracts that can be implied in the project. The completion of the project has been helpful for forming the initial information transfer for the project operations.
The project of Research Analysis of Cyber Security on Land Transport is developed for forming an analysis of the possible cyber security threats for land transportation system. The project would involve the use of various articles and literatures for forming the analysis of the final deliverable for the project. The implication of the effective development of the operations would also be helpful for aligning the implication of the final reports development. The implication of the technology had made it evitable for the development of the improved operations in all fields. The study would involve the analysis of the various risks and threats for the implication of the cyber technologies for the land transportation. The use of effective reporting guidelines would be helpful for the implication of the activities favouring the future study and analysis. The project would also include the prioritization of the factors of risk after the analysis of the final project development.
The study of the cyber security issues of the land transportation would allow the users for the development of the risk and threats list. The ranking of the risk factors would allow the use of the risk mitigation planning method for the development of the secured land transportation system. The use of study would help in forming some methods for the risk identified in the study. The risk mitigation would help in forming the security of the land transportation in the project. The deployment of the operations would also be helpful for the implementation of the effective implication of the operations. The development of the activities would allow the prioritizing the risk for forming the analysis of the cyber security threats and forming the mitigation of the land transportation. The security of the passenger’s information would be implied for the development of the effective risk mitigation operations. The continuation of the risk operations had been successful for forming the utilization of the existing literatures and articles supporting the implication of the risk mitigation for aviation industry. The aviation security is experienced in forming the correct standards and sets for the implementation of the security implementation. The use of the same literatures on the implication of the cyber security for the aviation industry would allow the implication of the same strategies for the cyber security implementation of the land transportation.
The project stakeholder is defined as an individual, organization, and group involved in the project that can form an effect on the project or may be affected by the outcomes of the project. The project team members, sponsors, and organization members are the key project stakeholders of the project (Wells et al., 2014). The end users and customers of the project can also be considered as the stakeholders. The primary stakeholders of the project are project sponsor, project manager, client, and project team members. The secondary stakeholders of the project are end user, supplier, and government.
Project Sponsor: The project sponsor for the study of the cyber security issues of the land transportation is the one who would invest in the completion of the project study. The sponsor would be responsible for the accumulation of the resources in the project.
Project Manager: The project manager is responsible for the completion of the project activities of study of the cyber security issues of the land transportation and it would also be helpful for forming the alignment of the activities so that the project can be completed while maintaining the quality and operations.
Client: The client is the one for whom the study is being done for the project of study of the cyber security issues of the land transportation. The client gets the benefit of the completion of the project.
Project Team Members: The project team members are the list of members that would be responsible for the execution of the project. The study and research, risk prioritization, and mitigation plan development for the study of the cyber security issues of the land transportation project are the responsibilities of the project team members.
End User: The end user is the person or group that would get the benefit of the project of study of the cyber security issues of the land transportation. The passengers travelling by using land transportation, the companies providing land transportation, and the state government are end users that would get the benefit of the study.
Supplier: The various resources and articles required for the analysis of the cyber security of aviation industry. The required resources for implying the mitigation strategies for the project of study of the cyber security issues of the land transportation would be supplied by an external individual or element (Internet Sources).
Government: The state government would be responsible for the alignment of the activities favouring the utilization of work approval. The study of the cyber security issues of the land transportation would also help the government for identifying the various cyber security issues in the land transportation.
Stakeholder |
Power |
Interest |
Role |
Government |
High |
Low |
The state government would be responsible for the alignment of the activities favouring the utilization of work approval. |
Supplier |
Low |
Low |
The supplier would provide the required resources for implying the mitigation strategies |
End User |
High |
The end user is the person or group that would get the benefit from the completion of the project |
|
Project Team Members |
Low |
The project team members are the list of members that would be responsible for the execution of the project. |
|
Project Manager |
Low |
High |
The project manager is responsible for the completion of the project activities |
Client |
High |
High |
The client gets the benefit of the completion of the project. |
Project Sponsors |
High |
High |
The sponsor would be responsible for the accumulation of the resources in the project. |
The project procurement method comprises of 5 major steps required for the development of the final project of study of the cyber security issues of the land transportation. The 5 steps for effective procurement method for the project are,
According to Saini et al. (2018), the types of contract that could be implied for the project of Research Analysis of Cyber Security on Land Transport are fixed price (lump sum) contracts, quantities or rates based contracts, cost reimbursable contracts, and guarantee maximum price contracts. However, the cost reimbursable contract would be most appropriate for the development of the project. The analysis of the cost reimbursable contract has been made in the following section,
Cost Reimbursable Contracts: The cost reimbursable contract has involved the payments of the actual costs along with an additional seller profit fee to the seller (O’Connell, 2012). This type of contract also includes the incentive clause that is being given to the seller for exceeding the expected performance in selling the product (or meeting the project objective selected as main). The incentive is also termed as a bonus for the seller in exchange of the performance. It is of three types namely Cost-Plus-Fee (CPF) or Cost-Plus-Percentage of Cost (CPPC), Cost-Plus-Fixed-Fee (CPFF), and Cost-Plus-Incentive-Fee (CPIF). The implication of the cost reimbursable contracts would be helpful for the alignment of the activities favouring the incentive scheme development. The Cost-Plus-Fee (CPF) or Cost-Plus-Percentage of Cost (CPPC) pay works as no incentive scheme and it is based on the cost of the contractor. The Cost-Plus-Fixed-Fee (CPFF) is a contract pay that includes the pre-determined fee agreed by the two parties signing the contract. The Cost-Plus-Incentive-Fee (CPIF) has a larger fee award scheme and it is based on the alignment of the fee awards for meeting and exceeding the performance targets.
Conclusion
The project of Research Analysis of Cyber Security on Land Transport was developed for forming an analysis of the possible cyber security threats for land transportation system. The study had involved the analysis of the various risks and threats for the implication of the cyber technologies for the land transportation. The use of effective reporting guidelines had been helpful for the implication of the activities favouring the future study and analysis. The project had included the prioritization of the factors of risk after the analysis of the final project development.
Chertoff, M., & Simon, T. (2015). The impact of the dark web on internet governance and cyber security.
Choo, K. K. R., Kermani, M. M., Azarderakhsh, R., & Govindarasu, M. (2017). Emerging embedded and cyber physical system security challenges and innovations. IEEE Transactions on Dependable and Secure Computing, 14(3), 235-236.
Dua, S., & Du, X. (2016). Data mining and machine learning in cybersecurity. CRC press.
Dumitras, T., & Neamtiu, I. (2011). Experimental Challenges in Cyber Security: A Story of Provenance and Lineage for Malware. CSET, 11, 2011-9.
Fowler, S., Sweetman, C., Ravindran, S., Joiner, K. F., & Sitnikova, E. (2017). Developing cyber-security policies that penetrate Australian defence acquisitions. Australian Defence Force Journal, (202), 17.
Fowler, S., Sweetman, C., Ravindran, S., Joiner, K. F., & Sitnikova, E. (2017). Developing cyber-security policies that penetrate Australian defence acquisitions. Australian Defence Force Journal, (202), 17.
Friis, K., & Ringsmose, J. (Eds.). (2016). Conflict in Cyber Space: Theoretical, Strategic and Legal Pespectives. Routledge.
Liu, J., Xiao, Y., Li, S., Liang, W., & Chen, C. P. (2012). Cyber security and privacy issues in smart grids. IEEE Communications Surveys & Tutorials, 14(4), 981-997.
Liu, J., Xiao, Y., Li, S., Liang, W., & Chen, C. P. (2012). Cyber security and privacy issues in smart grids. IEEE Communications Surveys & Tutorials, 14(4), 981-99
Lubell, J., & Zimmerman, T. (2017, March). CHALLENGES TO AUTOMATING SECURITY CONFIGURATION CHECKLISTS IN MANUFACTURING ENVIRONMENTS. In International Conference on Critical Infrastructure Protection (pp. 225-241). Springer, Cham.
Lynn, W. J. (2010). Defending a new domain: the Pentagon’s cyberstrategy. Foreign Affairs, 89(5), 97-108.
O’Connell, M. E. (2012). Cyber security without cyber war. Journal of Conflict and Security Law, 17(2), 187-209.
Saini, S., Beniwal, R. K., Kumar, R., Paul, R., & Saini, S. (2018). Modelling for improved cyber security in Smart distribution system. International Journal on Future Revolution in Computer Science & Communication Engineering, Accepted.
Wells, L. J., Camelio, J. A., Williams, C. B., & White, J. (2014). Cyber-physical security challenges in manufacturing systems. Manufacturing Letters, 2(2), 74-77.
Yan, Y., Qian, Y., Sharif, H., & Tipper, D. (2012). A survey on cyber security for smart grid communications. IEEE Communications Surveys and tutorials, 14(4), 998-1010.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download