Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

two Vulnerability Analysis tools used in research and/or commercially available

ID: 3552337 • Letter: T

Question

two Vulnerability Analysis tools used in research and/or commercially available and describe their main features and functionality. Compare and contrast their relative strengths and weaknesses when used in the three (3) scenarios described below:

a.    The system to be developed is intended to be operational in a large enterprise environment and the system itself when fully developed will be of a size typically found in large enterprise deployments such as DOD, large banks or similar sized operations where integration and deployment includes use in a networked environment.

b.    The system to be developed is intended to be operational in a midmarket sized firm which has branches located countrywide. Familiar examples might include a fast food chain of outlets such as Burger King, a nationwide clothing store or similar set of replicated stores where integration and deployment includes use in a networked environment.

c.     The system to be developed is intended to be operational in a small market firm or small business firm or even in home usage. Familiar examples might include an income tax preparation package by a small tax consulting firm.

Explanation / Answer

When we talk about some large organization, which are working globally and havedistributed system network, it becomes very difficult to select methodology which will work for them perfectly. But as the technology is rapidly gaining the pace, new models are introduced intothe market which helps in developing the system with such a methodology where complexsystem taken care with such a techniques that it failure changes will be lesser.

For this scenario, I best prefer agile methodology which has several benefits and its high level picture work as follows:1.

Iteration -1: In this phase the requirement is collected and then the system or project isselected as per the requirement.2.

Iteration 0: In this phase the requirement is processed and the initiation of project isstarted.3.

Multiple Iterations (Construction Iterations) : In this phase the ever changingrequirements are taken from the client on daily basis and implemented accordingly if thescope of any requirement is changed then the iteration is followed once again.4.

Release: After the Construction phase, the product is released for the end user use andhere users will be able to perform any type of interaction with the system as required.5.

Production: System is successfully launched for end user and they are able to perform nnumber of transactions using this system.