Research Analysis Of Cyber Security On Land Transport: Project Fundamentals And Stakeholder Analysis

Project Fundamentals

Discuss about the Research Analysis Report for Analysis of Cyber Security.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

The project of Research Analysis of Cyber Security on Land Transport is based for analysing the various issues and problems related to the internet based electronic devices and GPS system had been facing (Choo et al., 2017). The analysis would be based on the analysis of the effective utilization of the literatures and articles for forming the final analysis of the project plan development. The completion of the project would help in forming a distinct analysis of the activities of the cyber technology implementation for land transportation and the impact of the cyber security issues. The following assignment would involve the analysis of the project fundamentals for the mentioned topic as it would form an analysis of the project requirements, stakeholder analysis, project procurement, and types of contracts that can be implied in the project. The completion of the project has been helpful for forming the initial information transfer for the project operations.

The project of Research Analysis of Cyber Security on Land Transport is developed for forming an analysis of the possible cyber security threats for land transportation system. The project would involve the use of various articles and literatures for forming the analysis of the final deliverable for the project. The implication of the effective development of the operations would also be helpful for aligning the implication of the final reports development. The implication of the technology had made it evitable for the development of the improved operations in all fields. The study would involve the analysis of the various risks and threats for the implication of the cyber technologies for the land transportation. The use of effective reporting guidelines would be helpful for the implication of the activities favouring the future study and analysis. The project would also include the prioritization of the factors of risk after the analysis of the final project development.

The study of the cyber security issues of the land transportation would allow the users for the development of the risk and threats list. The ranking of the risk factors would allow the use of the risk mitigation planning method for the development of the secured land transportation system. The use of study would help in forming some methods for the risk identified in the study. The risk mitigation would help in forming the security of the land transportation in the project. The deployment of the operations would also be helpful for the implementation of the effective implication of the operations. The development of the activities would allow the prioritizing the risk for forming the analysis of the cyber security threats and forming the mitigation of the land transportation. The security of the passenger’s information would be implied for the development of the effective risk mitigation operations. The continuation of the risk operations had been successful for forming the utilization of the existing literatures and articles supporting the implication of the risk mitigation for aviation industry. The aviation security is experienced in forming the correct standards and sets for the implementation of the security implementation. The use of the same literatures on the implication of the cyber security for the aviation industry would allow the implication of the same strategies for the cyber security implementation of the land transportation.

Stakeholder Analysis

The project stakeholder is defined as an individual, organization, and group involved in the project that can form an effect on the project or may be affected by the outcomes of the project. The project team members, sponsors, and organization members are the key project stakeholders of the project (Wells et al., 2014). The end users and customers of the project can also be considered as the stakeholders. The primary stakeholders of the project are project sponsor, project manager, client, and project team members. The secondary stakeholders of the project are end user, supplier, and government.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Project Sponsor: The project sponsor for the study of the cyber security issues of the land transportation is the one who would invest in the completion of the project study. The sponsor would be responsible for the accumulation of the resources in the project.

Project Manager: The project manager is responsible for the completion of the project activities of study of the cyber security issues of the land transportation and it would also be helpful for forming the alignment of the activities so that the project can be completed while maintaining the quality and operations.

Client: The client is the one for whom the study is being done for the project of study of the cyber security issues of the land transportation. The client gets the benefit of the completion of the project.

Project Team Members: The project team members are the list of members that would be responsible for the execution of the project. The study and research, risk prioritization, and mitigation plan development for the study of the cyber security issues of the land transportation project are the responsibilities of the project team members.

End User: The end user is the person or group that would get the benefit of the project of study of the cyber security issues of the land transportation. The passengers travelling by using land transportation, the companies providing land transportation, and the state government are end users that would get the benefit of the study.

Supplier: The various resources and articles required for the analysis of the cyber security of aviation industry. The required resources for implying the mitigation strategies for the project of study of the cyber security issues of the land transportation would be supplied by an external individual or element (Internet Sources).

Government: The state government would be responsible for the alignment of the activities favouring the utilization of work approval. The study of the cyber security issues of the land transportation would also help the government for identifying the various cyber security issues in the land transportation.

Stakeholder

Power

Interest

Role

Government

High

Low

The state government would be responsible for the alignment of the activities favouring the utilization of work approval.

Supplier

Low

Low

The supplier would provide the required resources for implying the mitigation strategies

End User

High

The end user is the person or group that would get the benefit from the completion of the project

Project Team Members

Low

The project team members are the list of members that would be responsible for the execution of the project.

Project Manager

Low

High

The project manager is responsible for the completion of the project activities

Client

High

High

The client gets the benefit of the completion of the project.

Project Sponsors

High

High

The sponsor would be responsible for the accumulation of the resources in the project.

Project Procurement

The project procurement method comprises of 5 major steps required for the development of the final project of study of the cyber security issues of the land transportation. The 5 steps for effective procurement method for the project are, 

  1. Specification: The specification is the step that involves the listing of the procurement items for approval to the external vendor. The specification of the procurement item would be helpful for the development of the final list for the procurement of the effective activity development in projects.
  2. Selection: The potential suppliers that can provide the procurement items identified in the list phase is sorted and an analysis is being done based on selection criteria. The selection of the suppliers would be based for the implication of the effective operation development for the project procurement.
  3. Contract Development: The contract developed must comprise of all the conditions by both of the parties forming the contract. The development of the contract would also be helpful for the formation of the negotiation among the two parties on behalf of the exchange of services.
  4. Control: The control of the processes of payment and delivery is a major factor that must be done in the procurement process. The control of the processes would allow the implication of the effective operation development for the users.
  5. Measurement: The use of key system indicators and performance measurement tools for assessing the success and effectiveness of the entire process. The measurement of the activities would also be helpful for the development of the final contract procurement.

According to Saini et al. (2018), the types of contract that could be implied for the project of Research Analysis of Cyber Security on Land Transport are fixed price (lump sum) contracts, quantities or rates based contracts, cost reimbursable contracts, and guarantee maximum price contracts. However, the cost reimbursable contract would be most appropriate for the development of the project. The analysis of the cost reimbursable contract has been made in the following section,

Cost Reimbursable Contracts: The cost reimbursable contract has involved the payments of the actual costs along with an additional seller profit fee to the seller (O’Connell, 2012). This type of contract also includes the incentive clause that is being given to the seller for exceeding the expected performance in selling the product (or meeting the project objective selected as main). The incentive is also termed as a bonus for the seller in exchange of the performance. It is of three types namely Cost-Plus-Fee (CPF) or Cost-Plus-Percentage of Cost (CPPC), Cost-Plus-Fixed-Fee (CPFF), and Cost-Plus-Incentive-Fee (CPIF). The implication of the cost reimbursable contracts would be helpful for the alignment of the activities favouring the incentive scheme development. The Cost-Plus-Fee (CPF) or Cost-Plus-Percentage of Cost (CPPC) pay works as no incentive scheme and it is based on the cost of the contractor. The Cost-Plus-Fixed-Fee (CPFF) is a contract pay that includes the pre-determined fee agreed by the two parties signing the contract. The Cost-Plus-Incentive-Fee (CPIF) has a larger fee award scheme and it is based on the alignment of the fee awards for meeting and exceeding the performance targets.

Conclusion

The project of Research Analysis of Cyber Security on Land Transport was developed for forming an analysis of the possible cyber security threats for land transportation system. The study had involved the analysis of the various risks and threats for the implication of the cyber technologies for the land transportation. The use of effective reporting guidelines had been helpful for the implication of the activities favouring the future study and analysis. The project had included the prioritization of the factors of risk after the analysis of the final project development.

Chertoff, M., & Simon, T. (2015). The impact of the dark web on internet governance and cyber security.

Choo, K. K. R., Kermani, M. M., Azarderakhsh, R., & Govindarasu, M. (2017). Emerging embedded and cyber physical system security challenges and innovations. IEEE Transactions on Dependable and Secure Computing, 14(3), 235-236.

Dua, S., & Du, X. (2016). Data mining and machine learning in cybersecurity. CRC press.

Dumitras, T., & Neamtiu, I. (2011). Experimental Challenges in Cyber Security: A Story of Provenance and Lineage for Malware. CSET, 11, 2011-9.

Fowler, S., Sweetman, C., Ravindran, S., Joiner, K. F., & Sitnikova, E. (2017). Developing cyber-security policies that penetrate Australian defence acquisitions. Australian Defence Force Journal, (202), 17.

Fowler, S., Sweetman, C., Ravindran, S., Joiner, K. F., & Sitnikova, E. (2017). Developing cyber-security policies that penetrate Australian defence acquisitions. Australian Defence Force Journal, (202), 17.

Friis, K., & Ringsmose, J. (Eds.). (2016). Conflict in Cyber Space: Theoretical, Strategic and Legal Pespectives. Routledge.

Liu, J., Xiao, Y., Li, S., Liang, W., & Chen, C. P. (2012). Cyber security and privacy issues in smart grids. IEEE Communications Surveys & Tutorials, 14(4), 981-997.

Liu, J., Xiao, Y., Li, S., Liang, W., & Chen, C. P. (2012). Cyber security and privacy issues in smart grids. IEEE Communications Surveys & Tutorials, 14(4), 981-99

Lubell, J., & Zimmerman, T. (2017, March). CHALLENGES TO AUTOMATING SECURITY CONFIGURATION CHECKLISTS IN MANUFACTURING ENVIRONMENTS. In International Conference on Critical Infrastructure Protection (pp. 225-241). Springer, Cham.

Lynn, W. J. (2010). Defending a new domain: the Pentagon’s cyberstrategy. Foreign Affairs, 89(5), 97-108.

O’Connell, M. E. (2012). Cyber security without cyber war. Journal of Conflict and Security Law, 17(2), 187-209.

Saini, S., Beniwal, R. K., Kumar, R., Paul, R., & Saini, S. (2018). Modelling for improved cyber security in Smart distribution system. International Journal on Future Revolution in Computer Science & Communication Engineering, Accepted.

Wells, L. J., Camelio, J. A., Williams, C. B., & White, J. (2014). Cyber-physical security challenges in manufacturing systems. Manufacturing Letters, 2(2), 74-77.

Yan, Y., Qian, Y., Sharif, H., & Tipper, D. (2012). A survey on cyber security for smart grid communications. IEEE Communications Surveys and tutorials, 14(4), 998-1010.