Scenario You are provided with the text sheet entitled Integrated Distributors I
ID: 3757313 • Letter: S
Question
Scenario
You are provided with the text sheet entitled Integrated Distributors Incorporated (access_project_ts_integrateddistributors.docx) to complete this project. You play the dual role of an IT architect and IT security specialist working for Integrated Distributors Incorporated (IDI), a multi-national organization with offices in several countries. Your instructor for this course plays the role of the chief information officer (CIO). Your peers play the role of selected technology staff. Each of the organization’s locations is operating with different information technologies and infrastructure—IT systems, applications, and databases. Various levels of IT security and access management have been implemented and embedded within their respective locations.
Tasks
Your goals as the IT architect and IT security specialist are to:
Develop solutions to the issues that the specified location of IDI is facing.
Develop plans to implement corporate-wide information access methods to ensure confidentiality, integrity, and availability.
Assess risks and vulnerabilities with operating IT facilities in the disparate locations where IDI now functions and develop mitigation plans and implementation methods.
Analyze the strengths and weaknesses in the current systems of IDI.
Address remote user and Web site user’s secure access requirements.
Develop a proposed budget for the project—consider hardware, software, upgrades/replacements, and consulting services.
Prepare detailed network and configuration diagrams outlining the proposed change to be able to present it to the management.
Develop and submit a comprehensive report addressing the learning objectives and your solutions to the issues within the scenario.
Prepare a 10- to 15-slide PowerPoint presentation that addresses important access control, infrastructure, and management aspects from each location.
Explanation / Answer
The question addresses a detailed answer which can be found by studying Ian Sommerville book "Software Engineering" or by studying "Software Testing & Methodologies".
There are various number of models present to compute risk analysis and to reduce it as well such as:
a.) Spiral Model : In spiral model, the development team initializes all the required steps iteratively to find any defects or issues regarding the project in spirals. Due to this approach risk is analysed and reduced. The cost of spiral model as compared to other models is comprehensively larger.
Phases of Spiral Model --
i.) Feasibility Study with Requirements analysis and Risk Analysis : This is the first phase of Spiral model for the development of project in which all the requirements are gathered using Quesstionnaires and surveys which can be automated or manually on papers. The main purpose of developing the project is described in this phase and all the requirements are documented in SRS which is an acronym for Software Requirements Specification.
ii.) Designing and Risk Analysis : When the requirements are gathered and properly documented in SRS and risk and cost is analysed then the phase two comes in which the Architectural design and Detailled design is made. Architectural design consists some level of Abstraction in which the data flowing between entities and thier attributes is not shown. Then Detailed design is made in which abstraction level is 0 and entities and attributes are shown and data flow diagrams, Use case diagrams are made as well.
iii.) Implementation and Risk Analysis: When the first two critical and essential phases of spiral model is accomplished then implementation part comes in which the development team plays the role. In your case is Technological staff which will address this phase.
iv.) Deployement and Maintenance with Risk Analysis: When the technological staff work is done then the Testing is performed in which also goes into several steps such as following:
a.Unit Testing : In which work is divided into few or more units known as modules and tested accordingly.
b.Integration Testing: In which all the units or modules are integrated and tested as whole.
c.System Testing: In which User acceptance is performed such as following:
Alpha Testing: Performed by Users
Beta Testing: Performed by testers at client site.
There more models which can also help in mitigating issues in an organization that helps IT architect and IT analyst. In general terms Models are performed by end-users such as CEO,CIO or Managers such as Prototype Model, Waterfall Model, Iterative Model, Evolutionary Model and Rapid Application Development etc.
I hope I gave you an idea to design a report based on above mentioned steps. KIndly go through each point because the topic is very lengthy and I will prefer to read some books on it to completely understand the process that takes place in an organization.
Thank you and Please do not forget to Thumbs up.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.