Analyze the itil service management guidelines and principle

Assignment Help Computer Network Security
Reference no: EM13969507

Question:

Assignment: Software Engineering, CMMI, and ITIL

Realizing that an organization's CMMI level impacts an organization's success on requests for proposals (RFPs), your CIO wants to get the software development processes to CMMI level 3. Your organization has started developing software applications and database systems for their customers. The CIO wants to ensure that the software development and database development processes are being properly managed and audited, and he wants to ensure that the organization begins taking the necessary steps to progress to CMMI level 3. In preparation for your response, review the CMMI information available at the Carnegie Mellon Website, located at https://www.sei.cmu.edu/cmmi/.

IT managers will commonly manage software development and systems integration activities. Write a three to five (3-5) page paper in which you:

Describe the software engineering process, the challenges in managing software development activities, and the potential interface issues from the software development perspective.

Analyze the CMMI levels and define a roadmap that the organization will need to follow in order to get their software development processes to CMMI level 3. Note: This is important because the CMMI level that an organization achieves impacts their software development reputation.

Explain the auditing tasks that must be performed in order to achieve level 3.

Determine the continuous assurance auditing activities that the organization will need to implement to help achieve CMMI level 3.

Analyze the ITIL service management guidelines and principles.

Examine how ITIL service management practices relate to CMMI levels and continuous service auditing.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Describe the process of performing effective information technology audits and general controls.

Describe information technology general controls based on the Information Technology Infrastructure Library (ITIL) best practices.

Describe the various general controls and audit approaches for software and architecture to include operating systems, telecommunication networks, cloud computing, service-oriented architecture and virtualization.

Use technology and information resources to research issues in information technology audit and control.

Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Verified Expert

The assignment summaries the requirement and impacts of CMMI level 3 framework for the software development process in an organization. It also describes how auditing and ITIL process can help in implementing the CMMI guidelines and principles.

Reference no: EM13969507

Questions Cloud

Distinguish between administrator and liquidator : In relation to corporate insolvency distinguish between an administrator and a liquidator.
Examine the impact of the media on gender socialization : Examine the impact of the media on gender socialization and stereotypes. In this discussion forum, students are required to provide a reaction or brief summary and analysis of a selected supplementary material (e.g. professional web-site, journal ..
What is the profit that studio expects to make : How many CDs should Top Gun expect to sell at a discount? What is the profit that studio expects to make?
Problem regarding the issue of debentures : As Secretary of Ouse Ltd write a memorandum for the Board explaining the differences between raising finance: (a) by an issue of shares;
Analyze the itil service management guidelines and principle : Describe the software engineering process, the challenges in managing software development activities, and the potential interface issues from the software development perspective.
Create an xy plot of ecg vs. time : Create an XY plot of ECG vs. time, and place the plot on the Plots worksheet. Give the plot an appropriate title and labels for axes, and adjust various parameters of the plot to make it look pleasing and professional. Resize it to approximately..
How many books does borders expect to sell at a discount : The marginal production cost for the publisher is $1 per book. How much profit does the publisher make given Borders actions?
Explain to jane what action she should take : Jane, who is a minority shareholder not on the board, gets no dividends and wishes to do something about this state of affairs. Explain to Jane what action she should take.
What are the central beliefs of islam : What are the central beliefs of Islam, and how are they reflected in the Five Pillars? What is the origin and importance of the Qur'an? What are the Islamic understandings of the Judaic and Christian traditions

Reviews

Write a Review

Computer Network Security Questions & Answers

  Discuss the security of the network

Discuss the security of the network and suggested best practices for securing the business network.

  Describe and discuss the potential impact

Develop and ratify borderless cybersecurity policies that can be enforced through international litigation and accepted international sanctions via the United Nations.

  Define encryption

In a given encryption system where the messages are expressed only as numbers and "e" is an integer.

  Compare and contrast the difference between legislation and

cyber security power point presentation using the information you learned from modules 1 and 2 create a powerpoint

  How to manage the file system encryption keys

Setup a 64MB encrypted file system in a file on a Flash drive so that it can be used with the cryptmount command.

  Explain the major steps needed to preserve the integrity

Analyze the overall procedures for First Responder and Incident Handling, and ascertain the fundamental way in which such procedures relate to the scenario in this specific case.

  Why is the authentication header mode ipsec incompatible

Design and explain any issues or problems - Why is the authentication header (AH) mode of IPSec incompatible with network address translation schemes

  Identify an assessment of risks associated with collection

Identify and provide an assessment of the risks associated with collection, processing, and storage of confidential client information.

  There is a common misconception that analog technology is

there is a common misconception that analog technology is no longer used in the transmission of digital data. however

  What levels of security appropriate to secure information

Determine what levels of security are appropriate to secure the information system while allowing a maximum amount of uninterrupted work flow.

  Privacy and security of information

Privacy and security of information- Pat, a billing associate at a local hospital, was issued a laptop for work purposes. Her friend, however, has asked to borrow it for school to complete an online assignment

  Piece of code that allows a buffer

Give an example of piece of code that allows a buffer over run to occur. Assuming a program contains absolutely no buffer over runs. What other control flow-related problems may it have.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd