Use the following case description to answer questions below. \"The School of Bu
ID: 3602276 • Letter: U
Question
Use the following case description to answer questions below. "The School of Business operates international business programs in 10 locations throughout Europe. The school had its first of 3,000 graduates in 2000. The school keeps track of each graduate's student number, name, country of address, and the name of each major the student completed. In order to maintain strong ties to its alumni, the school holds various event around the world. Events have a title, date, location, and type (e.g., reception, dinner, or seminar). The school needs to keep track of which graduates have attended what events. When a graduate attends an event, a comment is recorded about the information school officials learned from that graduate at that event. The school also keeps in contact with graduate by mail, email and phone interactions. As with events, the school records information learned from the graduate from each of these contacts. When a school official knows that he or she will be meeting or talking to a graduate, a report is produced showing the latest information about the graduate and the information learned during the past two years from that graduate from all contacts and events the graduate attended. “ The university thinks the business school model is a good one, and would like to set up an information system that can automate the process for all graduates. The proposal is to attach this system to the existing university registration system so it would cost nothing to maintain. The plan is to hire graduate assistants to evaluate and design the system in the summer months, and the ITS department can implement the system without extra cost. ITS department has contracts with external consultants to modify the registration system, so adding a couple of modules can be part of the routine Now, you are the graduate assistant to evaluate and analyze such system for the university 1) List 3 key steps you would take to determine the system requirements. These are not tequirementsa instead they are steps to determine or to refine requirements. Briefly explain what each step is and why it should be included. 2) Provide a brief risk analysis of the project so you can make some efforts to avoid them 2) Develop a baseline project plan that you can follow to develop the required components. You should include at least 3 of the 5 system development life cycles, SDLC, depending on the specific approach you take. You don't need to use PM software You only need to describe the baseline tasks in each development life cycle. Notice the short time frame in selecting the proper SDLC.Explanation / Answer
System Requirements:
Linux is one of the most used OS when it comes down to the servers. It is true that vulnerability in Linux are arising as the time passes. Hence, many big organizations are running down the Bounty programs to get them on the safer side and even a big leap in getting security for themselves. This technique has decreased the hacking scenarios and has increased the awareness towards cybersecurity.Today, we are going to talk about the recent vulnerability that was been disclosed in the Linux systems. Below is the description.
Network Monitoring Using Security:
The Traffic monitoring is also an important concept as it can be used to increase the chances of being vulnerable as much time it takes to get less traffic. As, chances of being exploited with attacks such as DoS & DDoS attacks. The networking of the whole system is being done mostly on Linux so understanding Linux to attend the traffic in the system with full proof of vulnerability.
Linux Vulnerability:
Hence, this is how the linux security is exploited and with the help of the possible exploits and pitfalls in the system there are many hacks happening in the systems with Linux.
Exploiting The Vulnerabilities:
In Linux, there are penetration tester softwares that test the vulnerabilities and make the world aware of the security issues that are contained in the systems. The system will then get to know about the cyber security and getting into the facts of the applications is also very important.
The vulnerabilities that are pretty much available in the Internet and are exploited are as follows:
Hence, these are the vulnerabilities that are being indentified on the bigger scale in the market and are being exploited by many security professionals and hackers.
Methodologies:
The impact of the vulnerabilities on the organization may be very intense if not focused on. To keep the network running and fine we need to overcome these vulnerabilities and create patches for these vulnerabilities otherwise the impact of these vulnerabilities will be very immense.
Hence, these are the impacts of the vulnerabilities and how must one deal with these vulnerabilities.
Technology and Methodologies to build the Project:
Technologies to be used:
The technologies can be used by any personal interest in the technology. But there are options to the technology that can help in making the development process simple. Below are some of the technologies that will help in getting the development phase easy and fast.They are as follows:
Hence, keeping in mind that you need a lots of logic in the program you must use Python as it is having many simplified functions that makes the development process simple and pretty easy to use.
Development Methodologies:
The development methodology that one can use to build such an system are as follows:
Hence, these are the technologies and the methodology that will be used to build and implement the solution.
Rate an upvote.....Thankyou
Hope this helps....
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.