This document outlines the requirements for developing a mobile app project. It discusses functional requirements like unique user identification and cross-platform compatibility. It also discusses non-functional requirements like ease of use, reliability, portability, security, and size. It provides a budget and human resource plan, including tasks for programmers and a database developer. It also discusses work breakdown structures and compares Gantt charts and PERT charts. Finally, it analyzes various risks associated with the mobile app like activity monitoring, unauthorized connectivity, and data leakage.
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
Mbl App 1 Prjct Sumry
1. Mobile App Part 1. 15
Project summary
Project requirements
This project will have several requirements for its development.
Functional requirements
A user should be able to use the mobile application to be
developed.
Each user using the mobile application should be uniquely
identified using the registration details.
The system should have a wide scope across several mobile
operating system platforms.
Non-functional requirements
i. Ease of use
The mobile application should be easy to use by all users
ii. Reliability
The mobile application should have minimum rate of failure
iii. Portability
The mobile application should operate in various and be
integrated in various platforms.
iv. Security
Any user data sent, should be encrypted
v. Size.
The mobile application should occupy less server and mobile
space.Budget
Desktop
$250
Smartphone
$400
Transport
$60
Flash Drive 2GB
$20
2. Printer
$80
Internet subscription
$50
SMS gateway subscription
$60
Miscellaneous
$80
Total
$1000
Human resources
Three programmers
One database developer
Workload
Person
Task
All programmers
Analysis, design
Two programmers
coding
One programmer
Testing and debugging
Database developer
Design and develop database
Work breakdown structure is a hierarchical and an incremental
decomposition of a given project into deliverables, phases and
work packages. It is a tree structure, which shows a subdivision
of effort required to achieve an objective.
The methodology behind the construction of WBS is the system
analysis, system design, and system development. The WBS
helps in analyzing the system and the project.
3. References
Haugan, G. T. (2002). Effective work breakdown structures.
Vienna, Va: Management Concepts.
Harris, P. E. (2007). Planning and control using Microsoft
Project and PMBOK® guide: Updated for Microsoft Office
Project 2007. Victoria, Australia: Eastwood Harris Pty. Ltd.
Harris, P. E. (1999). Planning and control using Microsoft®
Project 2010 and PMBOK guide® fourth edition. Victoria,
Australia: Eastwood Harris.
Norman, E. S., Brotherton, S. A., & Fried, R. T. (2008). Work
breakdown structures: The foundation for project management
excellence. Hoboken, N.J: John Wiley & Sons.
Comparison between the Gantt chart and PERT
PERT (program evaluation and review technique) is one of the
statistical tool that is used in project management to analyze
4. and represent the tasks involved in the completion of a given
project while a Gantt chart is a horizontal tabular bar chart
which shows the project schedule that is it shows the start and
finish dates of the terminal elements of the project and summary
elements of a project.
The Gantt chart may be used in status reporting to show and
present how much of the plan has been completed by displaying
and showing the progress of an activity.
The information received from a Gantt chart is more helpful
because, the information in a Gantt chart is graphical hence
easily understood than in the PERT which just shows arrows
and nodes.
It is easier to draw and present the information in a Gantt chart
and be used in the analysis of the project because it shows both
the estimated and actual time the project takes compared to the
PERT which only shows the earliest start time and Latest end
time of an activity.
Gantt charts are simple and easy to read while PERT may not be
easily understood.
The PERT provides useful information since it can show the
critical path and the critical activities hence helpful in planning
the resources of the project compared to the Gantt chart which
only shows the activity duration and the predecessors.
When using the PERT, it shows the information on the activities
and shows the slack activities and when to start and end in case
of a dummy activity.
Application of Gantt charts and PERTS
Gantt charts are used when planning for small projects while
PERT can be used when planning for large projects. This is
because many interlinking activities are difficult to represent in
the Gantt chart and also the duration may be large to be
represented.
Importance of Critical path
5. i. It will display all the activities of the project and it will help
to plan on how to do the activities such that the slack activities
can be started either earlier or late.
ii. It can help to reschedule the resources of noncritical
activities to the critical activities hence accelerating the project
activities.
iii. The critical path can be used to calculate the standard
deviation of the project and the covariance to know how
correlated the activities in the project are.
iv. The critical path is what determines the duration of the
project since it shows the activities that shows takes the longest
duration between the start and the end of the project.
Gantt chart
References:
Barkley, B. (2008). Project management in new product
development. New York: McGraw-Hill.
Shelly, G. B., & Rosenblatt, H. J. (2012). Systems analysis and
design. Boston: Course Technology Cengage Learning.
Gantt and Pert charts is the main core mobile app essential
components very crucial when handling the project, it enhances
effective analysis, communication and visualization of a carried
out project. Risk is the main core limitation of this mobile app
as it can be very vulnerable to high levels of misuse.
6. Functionality and vulnerabilities are type mainly evident core
scope of risk according to this context.
1. Activity monitoring
2. Unauthorized dialing
3. Unauthorized network connectivity
4. UI impersonation
5. System modification
6. Logic
7. Data leakage
8. Unsafe data storage
9. Unsafe data transmission
10. Hardcoded password
Inherent schedule flaws and requirement inflations are the top
most risk each projects is ultimately exposed and subjected to.
Sending of messages, microphone recording and data storage
are the main ultimate likelihood assessment aspects of risk
ascertained under the activity monitoring risk. Technical risk is
the most appropriate impact based on the approach as
continuous changing requirement affects the timeline of the
projects accomplishment. Customers and suppliers are the main
ideal owners of the risk for need trackers. Project initiation and
project planning is the main proper methodology to control the
monitoring activity risk (Gunasekera, 2012).
Mobile payment and SMS spread rate is the main assessed
authorized dialing risk encountered under this approach. Change
in premiums and payment rates impacts on the nature of parties’
terms and conditions prompting toll fraud crime. The company
and consumers are the main appropriate owners of authorized
dialing and payment risk. Project monitoring and control is the
main ultimate strategic approach through which performances
and changes can be managed ultimately (Brown et-al, 2013).
Spyware is one of the main fundamental likelihood to
unauthorized network connectivity risk. Attacker’s benefits
through this approach send data; it is very cognizant for the
organization and customers who are the main ultimate owners to
initiate the implementation security measures strategies (Brown
7. et-al, 2013).
Malicious app and phishing attacks are the main UI
impersonation risk assessed. UI legitimacy is the main core
scope through which victims should be very clear and concise
over authenticity of the information and end issues with the
attackers. Proxy and bank app are the main ultimate owners,
initiation plan project strategy is the most viable approach
through which this menaces can be managed (Gunasekera,
2012).
Malicious application and configuration changes are the main
likelihood of system modification risk. Configuration changes
enhance the possibilities of attack and thus rootkit and APN
proxy are the main core owners. Planning, execution and
monitoring and control project are the main appropriate
strategic mechanism through which configuration changes and
malicious attacks can be handled significantly (Bergman et-al,
2013).
Malicious activity is one of is the ultimate assessed logic risk.
Classic technique can influences occurrences of suspicious and
malicious activity which compromise the confidentiality of the
message or data. Project monitoring and control are the
appropriate strategic mechanism through which risk mitigation
based on this level can be ascertained.
Inadvertent and legitimate apps can definitely enhances
sensitive data leakage risk. Confidential information can leak to
third party causing harmful effect to the victim as the attackers
can definitely expose. Phones and customers are the main
ultimate viable owners. Implementation of security tracking
measures is the main project execution strategic approach
through which this vice can be controlled (Hartley & Wong,
2015).
Mobile apps should definitely store data in an encrypted form;
failure to conceptualization of the viable aspect enhances unsafe
sensitive data storage risk. Pin numbers and passwords are the
main ultimate mechanism through sensitive data can be secured
from attackers. Banks and online users are the main owners and
8. therefore the main strategic approach to ascertain this issue is
through project monitoring and control.
Wireless communication is commonly known for higher
insecurity to data transmission risk. Mobile devices are the
main owners and thus it is very significant to that sensitive data
is perfectly encrypted in order to safeguard the data. Invalid
certificates should be ascertained appropriately in order to
fundamentally control and manage the issue (Hartley & Wong,
2015).
Additionally, password ineffective is the main likelihood assess
to hardcoded password risk. MasterCard is the main owner and
thus it is very crucial and necessary beware of reverse
engineering which can absolutely compromise the security and
authenticity of the information and data. Project monitoring and
control is the top most strategic approach through which issue
can ascertained extensively (Gonzalez, 2015).
References
Bergman, N., Stanfield, M., Rouse, J., & Scambray, J. (2013).
Hacking exposed: Mobile security secrets & solutions.
Brown, P., Roth, M. S., & Practising Law Institute,. (2013).
Information technology law institute, 2013: Privacy and
cybersecurity, mobile advertising, digital distribution, social
media and the third industrial revolution.
Gonzalez, D. (2015). Managing online risk: Apps, mobile, and
social media security.
Gunasekera, S. (2012). Android Apps Security. Dordrecht:
Springer.
Hartley, C. P., & Wong, P. (2015). The caregiver's toolbox:
Checklists, forms, resources, mobile apps, and straight talk to
help you provide compassionate care.