Systems development life cycle security-information security, Computer Network Security

Assignment Help:

The Role of the Investigation

The first phase, investigation is the most significant. What problem is the system being developed to solve? During investigation phase, objectives, constraints and scope of project are specified and preliminary cost benefit analysis is developed to evaluate perceived benefits and the suitable levels of cost for those benefits. At the end, feasibility analysis is done to assess technical, and behavioral feasibilities of process.

The steps involved in this analysis.

1.  Define the problem.
2.  Data collection - On organization, employees, work, and work environment.

Begin with the existing information company library, systems documentation.
Tips for Interviews
•    be prepared, write the objectives, make appointments, and be punctual.
•    avoid interruptions, be a good listener, and understand what is said.
•    be non committal, take brief notes

Advantages

•    Face-to-face, adaptive, flexible, informative.

Disadvantages

•    time consuming.

Questionnaires

•    Different types of questionnaires are such as fill in blanks, and multiple choices.

Advantages

•    It is economical

Disadvantages

•    Difficult to prepare, everyone does not respond, results may or may not be reliable and valid.

Observation.

•    Study the flow of work through office. Experience is required to know when and what to look for, and to organize data flow diagrams.

Advantages

•    it is highly valid, first hand information.

Disadvantages

•    Inconvenient tasks.

Prepare report comprising of: Statement of scope and objectives, data flow diagrams, identification of system inputs and outputs.

 Analysis

The analysis phase starts with the information gained during investigation phase. This phase consists of assessments of organization, current systems status, and capability to support proposed systems. Analysts determine that which new system is expected to do and how it will interact with the existing systems. This phase terminates with the documentation of findings and update of feasibility analysis. That is given as follows,

1. Technical Feasibility?

Can it be done with the existing technology?

2. Economic Feasibility?

Will the cost be offset by benefits?

3. Operational Feasibility?

Will it work in organization?

Generally the roles of the systems analyst are:

•    To analyze business systems having problems and to design new or modify systems to solve problems.
•    To develop systems to meet new requirements.
•    To prepare and maintain the manuals to communicate company policies and procedures.
•    To design business forms for distributing and collecting information.
•    To perform records management (Distribution and use of reports.)
•    To participate in selection of information processing which is equipment and to establish standards for the equipment selection.
•    To organize and maintain business organization charts.

 Logical Design

In the logical design phase, all functional features of chosen system in analysis are described independently of any computer platform. The information gained from analysis phase is used to start creating a system solution for the business problem.

Logical Design Tasks

•Design how system appear to users, input & outputs
•Design how users interact with system (user interfaces and dialogues)
•Use prototyping approach

 Physical Design

During physical design phase, specific technologies are selected to support alternatives identified and evaluated in logical design. The selected components are evaluated on make or buy decision. The other feasibility analysis should perform for whole solution presented to end user representatives for the approval of organization.\


Implementation

In implementation phase, any required software created. The components are ordered, received, assembled, and tested. After wards users are trained and documentation created. Again a feasibility analysis prepared for the users presented with system for the performance review and acceptance test.

Maintenance and Change

This phase consists of tasks essential to support and modify system for remainder of its useful life. Even though formal development can conclude during this phase, life cycle continues until the process starts again from investigation phase. When current system cannot support any more the organization’s mission, a new project has to be implemented.


Related Discussions:- Systems development life cycle security-information security

Explain symmetric and asymmetric encryption system, Question 1: (a) Dif...

Question 1: (a) Differentiate between symmetric and asymmetric encryption system. (b) Describe how a digital signature is created. (c) Explain briefly what SSL (secure so

What is an autonomous system, QUESTION 1: a) Differentiate between a r...

QUESTION 1: a) Differentiate between a routing protocol and a routed protocol. b) Describe any three design goals of Routing protocols. c) Lists some of the features shared

Attackers motives behind the cyber attack, Attacker's Motives behind the Cy...

Attacker's Motives behind the Cyber Attack Before adapting the necessary measures to deal with the problem, understanding and evaluating the blogger's psyche and his motivation

Describe how the encapsulated security header protocol, Question: (a) ...

Question: (a) Give 2 benefits of using IPsec. (b) IPSec uses two protocol for security: Authentication Header protocol (AH) and the Encapsulated Security Header Protocol (

Describe types of communication impairments, Question : (a) "Pulse Code...

Question : (a) "Pulse Code Modulation (PCM), as used in telephony, samples a signal at 8 kHz using 256 quantization levels". Outline how this scheme works with the help of ske

Risk control strategies-, Risk Control Strategies Once the ranked vulner...

Risk Control Strategies Once the ranked vulnerability risk worksheet has created, they should choose one of following 4 strategies to control each risk: •Apply safeguards which

Explain how the key exchange algorithm works, Question: (a) Explain how...

Question: (a) Explain how the Diffie-Hellman key establishment protocol works. (b) Prove that the Diffie-Hellman key establishment protocol is vulnerable to a `man in the mi

#title.TIPS., 1. For this project, assume that an organization has five ser...

1. For this project, assume that an organization has five servers. Server 1 has a TCO of $25,000, Servers 2 and 3 have a TCO of $37,000 each, and the remaining two servers— Servers

Why use an ids, WHY USE AN IDS? IDS prevent from problem behaviors by in...

WHY USE AN IDS? IDS prevent from problem behaviors by increasing the perceived risk of discovery and punishment. Detect the attacks and other security violations. Detect and at

Cyber security, How to pretect my computer from attacking

How to pretect my computer from attacking

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd