Week 2 Short Paper - System/Software Development Life Cycle (SDLC) model and methodology

User Generated

Wntnaxhzne

Writing

SEC 8100

Wilmington University

Description

Select a System/Software Development Life Cycle (SDLC) model and methodology then apply this model and methodology to a project using the Information Technology (IT) specialization you wrote about in your Week 1 paper. Be sure to define the SDLC model and methodology and identify which SDLC step is associated with each project component.

The paper must following the formatting guidelines in The Publication Manual of the American Psychological Association (2010), (6th ed., 7th printing), and contain a title page, four references, three to five pages of content, and a reference page. In addition, the paper will be submitted through the SafeAssign originality-checking tool. More APA assistance can be found at the Purdue University Online Writing Lab.

The rubric for this assignment can be viewed when clicking on the above assignment link, which you will use to submit your assignment.

Unformatted Attachment Preview

Running head: WEEK 1 SHORT PAPER - CONCEPTS OF INFORMATION ASSURANCE 1 Week 1 Short Paper - Concepts of Information Assurance Santhosh Jagan Kumar Sadasivuni Wilmington University SEC 8100 Information Assurance Integration Professor Harold Lowe Nov 4, 2018 WEEK 1 SHORT PAPER - CONCEPTS OF INFORMATION ASSURANCE 2 Introduction Complex organizations require complex systems to manage their data and to make things easier and more organized. Knowledge of the use and management of information systems is essential for every organization. Information systems provide computer-based methods of storing, organizing and evaluating information or data (Robson, 2015). The process of managing information systems has its benefits and challenges for the organizations depending on which information systems they use. to increase efficiency, organizations should have basic knowledge of fundamental concepts in managing information systems. Different departments in an organization require different systems, for example, management information systems, risk management information systems and so on. There are fundamental principles that govern the use of information systems which give the user a guide on what to expect from information systems. The Concept of Risk in Information Systems Information systems are human made which means they are exposed to many risks. One of the dangers which is very common is hazard risks. They are risks associated with the environment in which the systems are used for example, equipment breakdown, and theft and so on. Financial risks are also a reality in information systems; every year the cost of maintaining high-quality technology or infrastructure rises which makes purchase and maintenance challenging for users. When using information systems, it is common to experience operational risks which interfere with the performance of the system, for example, service interruptions or security breaches. They are also prone to natural risks which can result in the loss of vital information and destruction of the system, for example, fires, floods et cetera. Concerning risk, there are information systems that help users to predict the levels of risk when making certain WEEK 1 SHORT PAPER - CONCEPTS OF INFORMATION ASSURANCE 3 decisions; they are called Risk Management Information Systems (RMIS). These systems assist organizations to put in place risk protection measures and exercise risk management which cushions them when risks occur or eliminate the occurrence of the risk. Use of Information Systems For organizations to realize their primary goal of profitability, they must improve the efficiency of their operations. They, therefore, need information systems unique to every department for the organization. Information systems transform raw data into valuable information which is used to inform the decision-making process. The data they use is from both internal and external sources which make them especially useful when making informed choices. Their use is widespread over a range of different industries because they support specific tasks in an organization. For example, there are those systems used for management, others for risk, human resource management and so forth. Their specificity enables organizations to undertake a particular analysis of the different issue. They give organizations an advantage in a competitive industry as they greatly influence the activities of the organization. They provide useful information in a format that is most suitable to the user; they are flexible in their use and meet the user’s specific needs. Processing in Information Systems The processing of information involves the manipulation of digitized raw data to produce meaningful data. It also consists of making the data usable and understandable to the user. The raw data received by the system is not readable to the user however after processing; he or she can access the readable information viable for decision making. Information processing generally involves four primary sites; the first is the input. Data is fed into the system from a variety of internal and external sources. Next is the processing stage where the information is transformed WEEK 1 SHORT PAPER - CONCEPTS OF INFORMATION ASSURANCE 4 so that it is usable by the users and easily understood. The other step is storing the data so that it is available anytime it is needed. The final step is output, where the information is availed to the user at his or her request. Information processing validates raw data and presents information helpful to organizations. Storage in Information Systems Information systems can store data which may be used to validate claims or for future reference. Data storage on hardware devices is possible by transferring information to any hardware that is within or outside the computer, server or any other computing device. Depending on the need and urgency of the data, users may store information temporarily or permanently. in the use of software devices, data is stored in non-tangible spaces for example, cloud spaces. Information systems assist in gathering and prioritizing stored information. Data warehouses are created to save large amounts of data for organizations. The data can go back years since it storage date and is free from tampering. To increase the efficiency of storage systems, backup appliances are sued which contain the most crucial information for the organization. In case of loss or damage, the backed up data is used. When information is not needed for significant periods, it is archived. Archived information is essential to the organization even though it not frequently used. Transmission of Data in Information Systems The transfer of data from one source to another is known as transmission. Transmission of data can take place in the physical and digitally. Physically, data is moved from one device to another or is retrieved from one system and fed into another (Hashem et al, 2015). However, there is a current trend in data transmission which demands digitized transmissions over physical or analog transfers. Digital transmissions improve signal processing and are faster and more WEEK 1 SHORT PAPER - CONCEPTS OF INFORMATION ASSURANCE 5 reliable than physical transfers. Digital transmissions and digital communications go hand in hand as they both involve the transfer of data from one source to another. Core Principles in Information Assurance There are three fundamental principles used in ensuring the security of data. The first and the most important according to me is confidentiality. It involves safeguarding information from unauthorized uses. Privacy provides that only the people who should view the data are the ones doing so. It is possible by the use of cryptography and encryption. Encryption makes the data unreadable to users by providing characters that are not understandable; the authorized person may enter the security code and decode the information. The second principle is integrity; it involves the storage of the data in a way that deters theft, alteration of the data, witness tampering and so in. The third is availability. It involves the connection between the computer and other information systems which enable users to view information on the computer device used. The three principles work hand in hand to ensure the security of data and consequently, its reliability. Conclusion Information systems provide useful information to organizations which is essential for decision making. There are various Information systems unique to each department of an organization. When used successfully, they can help organizations to beat their competition and improve their productivity and performance. There are numerous risks such as hazard risks, natural risks and so forth, which are associated with using information systems, most of which can be avoided or controlled (Laudon & Laudon, 2015). Numerous organizations use information systems which allow the storage and transmission of information. During storage organizations should develop backup devices for use in case of the occurrence of a risk. New WEEK 1 SHORT PAPER - CONCEPTS OF INFORMATION ASSURANCE 6 trends in the market show an inclination in digital transmission over physical transfers. The vital principles essential in information security involve, confidentiality integrity and availability. Without these three, information is not secure for use by individuals or organizations. WEEK 1 SHORT PAPER - CONCEPTS OF INFORMATION ASSURANCE 7 References Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The rise of “big data” on cloud computing: Review and open research issues. Information systems, 47, 98-115. Laudon, K. C., & Laudon, J. P. (2015). Management information systems (Vol. 8). Prentice Hall. Pearlson, K. E., Saunders, C. S., & Galletta, D. F. (2016). Managing and Using Information Systems, Binder Ready Version: A Strategic Approach. John Wiley & Sons. Robson, W. (2015). Strategic management and information systems. Pearson Higher Ed.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: SYSTEM SOFTWARE DEVELOPMENT LIFE CYCLE

System Software Development Life Cycle
Institution Affiliation
Date.

1

SYSTEM SOFTWARE DEVELOPMENT LIFE CYCLE

2

Introduction
Agile is a software development life cycle which attempts to link the project managers
with team members in a bid to synchronize their efforts while incorporating the customers as
well. All software development life cycles do that; only that agile offers a somewhat different
approach. With Agile comes methodology based on the international best practices. Such a
methodology can then be applied to requirements, planning, analyzing and designing the
software. Agile is, therefore, a series of management best practices in the field of software
development. Agile is premised on the fact that to cope; organizations must embrace agility.
The development cycle of agile is comprised of six phases; delimiting the requirements,
planning stage, designing stage, building and developing stage, testing stage and finally
releasing stage. In this paper, I seek to show how agile can be employed in the development of
an identity verification software. (Denning, 2016).
Agile & ID Verification
Security assurance is very vital in our contemporary world. This is because it is
important to keep fraudsters and other nefarious actors at bay. To put the importance of
identification and verification into perspective, it is important to note that in 2004, the White
House wanted to establish a uniform threshold for allocating state identities. The White House
came up with a standard that set out the requirements and structure for identification of Us
government officials. The standard came up with a PIV Proposed Personal Identity S...


Anonymous
Excellent! Definitely coming back for more study materials.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags