SlideShare a Scribd company logo
1 of 37
75629 Topic: prevention measures for vulneranbilities
Number of Pages: 2 (Double Spaced)
Number of sources: 1
Writing Style: APA
Type of document: Editing
Academic Level:Undergraduate
Category: Computer Science
Language Style: English (U.S.)
Order Instructions: Attached
After identifying your organizations' vulnerabilities through
previous weekly assignments, you now need to develop security
measures to protect those vulnerabilities.
Create a spreadsheet of vulnerabilities and prevention measures
for your organization.
Categorize by people, process, or technology.
Provide 350- to 700-word paper onnext steps for each
prevention measure based on the vulnerability, potential
incident, environmental and security controls in SDLC.
Submit your spreadsheet and paper using the Assignment Files
tab.
Data Flow Diagram (DFD) Tips
Processes: Verbs
Dataflows: Nouns
Data Stores: Nouns
External Entities: Nouns
1) Process’s input & output are different
2) Each data store should have at least
one data flow in and one data flow out
3) Each process should have at least one
data flow in and one data flow out
4) All inputs and outputs should be
labeled
5) Processes should have an identifier
(Ex., 1.0, 2.0, etc.)
Process Process
Process-to-Process
Process Process
Process-to-Process
Process-to-External Entity
Process
External
Entity
Process-to-External Entity
Process
External
Entity
Data S tore
Process-to-Data Store
Process Data S tore
Process-to-Data Store
Process
External Entity-to-External Entity
External
Entity
External
Entity
External Entity-to-External Entity
External
Entity
External
Entity
Data S tore
Data Store-to-Data Store
Data S toreData S tore
Data Store-to-Data Store
Data S tore
External Entity-to-Data StoreExternal Entity-to-Data Store
External
Entity
Data S tore
External
Entity
Data S tore
External
Entity
Data S tore
External Entity-to-Data Store
External
Entity
Data S toreProcess Process
Process-to-Process
Process-to-External Entity
Process
External
Entity
Data S tore
Process-to-Data Store
Process
External Entity-to-External Entity
External
Entity
External
Entity
Data S tore
Data Store-to-Data Store
Data S tore
External Entity-to-Data Store
External
Entity
Data S tore
DFD_Rules.vsdxTop Process
Stage 2: Requirements Specification
Before you begin this assignment, be sure you have read the
Case Study and all assignments for this class, especially Stage
4: Final System Report. The feedback you received on your
Stage 1 assignment should be reviewed and used as you proceed
with Stage 2.
Purpose of this Assignment
This assignment gives you the opportunity to specify clear and
concise requirements, including the use of data and process
models, for a system that enables a productive change in a way
the business is conducted. This assignment specifically
addresses the following course outcomes to enable you to:
· apply a systematic approach to translate requirements into an
executable systems design
· effectively communicate with stakeholders to determine,
manage, and document business requirements throughout the
SDLC
· perform modeling to assist with analysis and decision making
Assignment
The results of your systems analysis and design work in this
class will be documented in a Final System Report. The
purpose of the Report is to inform management of your system
proposal and gain approval to proceed with the project. The
Report will be developed and submitted in stages, which will be
compiled at the end of class into the Final System Report.
Review the outline of the Final System Report in the Stage 4
Assignment description. Note that it contains the analysis of
the problem(s) and requirements, and proposes what kind of a
system solution is needed. It does not propose a specific
solution, but it does recommend why and how the organization
should acquire the solution.
Following the Preliminary Investigation Report (Stage 1
assignment), the next step is to identify the requirements for a
system, documenting them in the Requirements Specification
document. The purpose of the Requirements Specification is to
clearly define what the proposed system will do in non-
technical user-oriented language. It should identify what data is
entered into the system, what output is required, what processes
the system should perform, what protections and controls are
needed, what performance is expected, and what the business
continuity needs are. In order to clearly express the
requirements, data and process models are used to communicate
how the system should work.
All of the information you need to complete the projects in this
class is not provided in the case study. In the discussion area of
the classroom, there is a discussion titled "Case Study Interview
Questions" where you can pose questions about the case study,
as if you were interviewing the people in the case study
organization. Any information that you need that is not
included in the case study should be asked about in this
discussion. Responses from the faculty member on behalf of
the case study organization will be available for everyone in the
class.
Use the information provided in the case study and the Case
Study Interview Questions discussion to create a checklist of
functional and technical requirements and the data and process
models listed below. Using the format and resources below, list
three requirements for each of the areas shown in I and II.
Then, create two diagrams to illustrate the scope of the system:
the context diagram and the use case diagram. Then, create the
data flow diagram to illustrate the flow of the inputs and
outputs listed as functional requirements in section I. You
should then select a process or process step (from those listed in
section I.b – processing requirements) that has some decision
associated with it to create the three process models listed
below. The same process/process step will be used for all three
of the process models; they are just different ways to represent
the process and the decision involved. Approximate lengths for
each section are provided as a guideline; be sure to provide all
pertinent information. References in brackets are to the two e-
textbooks (by authors Jawahar and Conger) used in this class
and the page on which the explanatory information begins. Use
the examples listed in the brackets to develop your diagrams.
[Note: Every diagram/model needs to be customized for the
course scenario. Simply copying the example diagram(s) with
little or no customization will result in a zero for that diagram.]
There are several different methodologies using different
symbols, but your diagrams will be graded for compliance with
the examples listed. You are required to use the symbols and
diagramming methods illustrated in the examples, and follow
any rules for the diagram in the sources listed with each
diagram.
Requirements Specification
Background: First, provide a brief description of your proposed
system to establish the context for the Requirements
Specification.
I.Functional Requirements. The input-processing-output
requirements must relate to each other. Start with three outputs
you expect from the system, then determine what inputs are
needed to create each of those outputs, and finally specify what
processing needs to occur for each input to create the output.
At least one of your processing requirements must have a
decision associated with it so it can be used for the Process
Models below. You should have a complete statement for each
requirement, and each requirement should be numbered within
the category. (introductory paragraph and list of 9 inter-related
requirement statements) [Jawahar, p. 95 and the Week 3
Content, including reading on IEEE Software Requirements
Specifications] [another source of ideas and concepts
is:http://www.slideshare.net/ALATechSource/sample-project-
requirements-document-library-blog]
a.Output requirements. List three different reports, results of a
calculation, or other outputs.
i. Output #1
ii. Output #2
iii. Output #3
b. Input requirements.
i. List the main data elements required to create output #1
ii. List the main data elements required to create output #2
iii. List the main data elements required to create output #3
c.Processing requirements (at least one must have a decision
associated with it)
i. Processing required to create Output #1
ii. Processing required to create Output #2
iii. Processing required to create Output #3
II.Technical Requirements (introductory paragraph and 3
requirement statements listed for each area below) [Jawahar, p.
95]
a. Security requirements
b. System control requirements
c. Performance requirements
d. Business continuity requirements (backup, restart, recovery)
III.System Scope Diagrams (introductory/explanatory paragraph
and 2 diagrams) [a good explanation and example is at
http://www.jamasoftware.com/blog/defining-project-scope-
context-use-case-diagrams/]
a. Context Diagram [explanation in Conger, p.228; use example
in Conger, p.229. Figure 7.2]
b. Use Case Diagram [use example in weblink above]
IV.Data Flow Diagram (introductory/explanatory paragraph and
diagram) [Week 4 Content module and weblinks]
a. Data Flow Diagram [explanation in Conger, p.228; use
example in Conger, p.230, Figure 7.3; use the tips located in the
assignment folder (DFD_Tips.pdf)]
V. Process Models (introductory/explanatory paragraph and 3
items below) [Week 4 Systems Analysis Course Module]
a. Structured English [use example in Systems Analysis
Course Module, Process Description Tools]
b. Decision Table [use example in Systems Analysis Course
Module, Process Description Tools]
c. Decision Tree [use example in Systems Analysis Course
Module, Process Description Tools]
Submitting Your Assignment
Submit your document via your Assignment Folder as Microsoft
Word document, or a document that can be ready using MS
Word, with your last name included in the filename. Use the
Grading Rubric below to be sure you have covered all aspects of
the assignment.
GRADING RUBRIC:
Criteria
90-100%
Far Above Standards
80-89%
Above Standards
70-79%
Meets Standards
60-69%
Below Standards
< 60%
Well Below Standards
Possible Points
Functional Requirements
16-18 Points
Three requirements for input, output and processing are clearly
stated and correctly inter-related; are logically derived from the
Case Study, and demonstrate a sophisticated level of writing.
14-15 Points
Three requirements for input, output and processing are clearly
stated and correctly inter-related; are logically derived from the
Case Study, and demonstrate a clear understanding of the course
concepts.
12-13 Points
Three requirements for input, output and processing are stated
and are inter-related; and are derived from the Case Study.
10-11 Points
May present fewer than three requirements for input, output and
processing, or they may not be inter-related; and/or may not be
derived from the Case Study.
0-9 Points
Functional requirements are not included, or demonstrate little
effort.
18
Technical Requirements
11-12 Points
Three requirements each for security, system control,
performance, and business continuity are clearly stated and are
logically derived from the Case Study, and demonstrate a
sophisticated level of writing.
9-10 Points
Three requirements each for security, system control,
performance, and business continuity are clearly stated and are
logically derived from the Case Study, and demonstrate
effective writing.
8 Points
Three requirements each for security, system control,
performance, and business continuity are provided and are
appropriate to the Case Study.
7 Points
Fewer than three requirements each for security, control,
performance and business continuity may be provided, and/or
they may not be appropriate to the Case Study.
0-6 Points
Functional requirements are not provided, or little effort is
demonstrated.
12
System Scope Diagrams
9-10 Points
Context diagram and Use Case diagram are correctly
constructed, logical, appropriate to the Case Study and
demonstrate a sophisticated level of analysis.
8 Points
Context diagram and Use Case diagram are correctly
constructed, logical, appropriate to the Case Study and
demonstrate accurate analysis.
7 Points
Context diagram and Use Case diagram are provided, and are
appropriate to the Case Study.
6 Points
Both Context and Use Case diagrams may not be provided,
and/or may not be appropriate to the Case Study.
0-5 Points
Both Context and Use Case diagrams are not provided, or little
effort is demonstrated.
10
Data Flow Diagram
9-10 Points
Data Flow Diagram is correctly constructed, logical, appropriate
to the Case Study and demonstrate a sophisticated level of
analysis.
8 Points
Data Flow Diagram is correctly constructed, logical, appropriate
to the Case Study and demonstrate accurate analysis.
7 Points
Data Flow Diagram is provided, and are appropriate to the Case
Study.
6 Points
Data Flow Diagram may not be correctly contructed, and/or may
not be appropriate to the Case Study.
0-5 Points
Data Flow Diagram is not provided, or little effort is
demonstrated.
10
Process Models
36-40 Points
All three process models – structured English, decision table,
and decision tree – are correctly constructed, logical,
appropriate to the Case Study and demonstrate a sophisticated
level of analysis. All three models describe the same decision
process.
32-35 Points
All three process models – structured English, decision table,
and decision tree – are correctly constructed, logical,
appropriate to the Case Study and demonstrate accurate
analysis. All three models describe the same decision process.
28-31 Points
All three process models – structured English, decision table,
and decision tree – are provided, and are appropriate to the Case
Study. All three models describe the same decision process.
24-27 Points
All three process models may not be provided, may not describe
the same decision process, and/or may not be appropriate to the
Case Study.
0-23 Points
The three process models are not provided, or little effort is
demonstrated.
40
Format
9-10 Points
Submission reflects effective organization and sophisticated
writing; follows instructions provided; uses correct structure,
grammar, and spelling; presented in a professional format; any
references used are appropriately incorporated and cited using
APA style.
8 Points
Submission reflects effective organization and clear writing;
follows instructions provided; uses correct structure, grammar,
and spelling; presented in a professional format; any references
used are appropriately incorporated and cited using APA style.
7 Points
Submission is adequate, is somewhat organized, follows
instructions provided; contains minimal grammar and/or
spelling errors; and follows APA style for any references and
citations.
6 Points
Submission is not well organized, and/or does not follow
instructions provided; and/or contains grammar and/or spelling
errors; and/or does not follow APA style for any references and
citations. May demonstrate inadequate level of writing.
0-5 Points
Document is extremely poorly written and does not convey the
information.
10
TOTAL Points Possible
100
Stage 2: Requirements Specification 5
IFSM 461: Systems Analysis and Design
Precision Electronic Parts, Inc.
Case Study
Introduction
This case study will be used for a series of staged assignments.
It should be thoroughly read and understood prior to working on
any of the assignments.
Setting
Precision Electronic Parts (PEP), Inc., is a small private
business that has retained you to assist in the development of a
new billing and payment system and associated processes.
Background
PEP is a small, private specialized electronics company in
Kansas. For the past 20 years, it has manufactured a wide range
of precision electronic components and replacement parts for
medical equipment used in hospitals, doctor’s offices, and
pharmacies. Last year, the company began building and
delivering custom low voltage motors that reduced electricity
costs and made older medical equipment more environmentally
friendly. More recently, PEP has added a new line of more
efficient low voltage motors that can be used in precision
equipment outside the healthcare industry.
As a result, PEP is experiencing significant increases in orders
for the motors. The manufacturing facility has been expanded,
and the sales and marketing teams have been enlarged. All of
this is straining the Ordering & Shipping Department and the
Inventory Management Department, which have received no
increase in personnel. They are meeting the challenge, but the
Executive Leadership Team (the CEO, COO, CFO, and CIO)
know that they are only treading water. The Finance
Department, however, is getting further and further behind in
their invoice, billing and payment processes. The Business
Administration Department has stepped up to the task, but is at
the breaking point.
IT Steering Committee
The IT Steering Committee (ITSC) at PEP is comprised of the
Executive Leadership Team, the Senior Vice President and Vice
President.
• Carolyn West is the Chief Executive Officer (CEO). She has
been at the company for 11 years. Carolyn has a background
working for and managing electronics companies. Like most
CEOs, Carolyn is focused on the strategic and long-term
business health of PEP. She chairs the IT Steering Committee.
Carolyn and the committee members jointly make decisions
about IT systems and major organizational business process
changes.
• Tim Uduak, Jr. is the Chief Operating Officer (COO) and the
son of founding partner Tim Uduak, Sr. Tim has been around
the company since its inception in one capacity or another,
except for four years of college and a 3-year break to startup his
own company. When his startup failed, Tim came back to PEP
as the SVP, Engineering & Manufacturing Operations. Last
year, he was promoted to COO. While Tim has a strategic focus
and is not technology averse, he prefers to solve business
challenges with processes rather than information technology.
• Karl Manley is the Chief Financial Officer (CFO). He has
been with the company for 9 years. Karl has a background in
accounting and finance, and is a certified public accountant
(CPA). He tends to focus on the company’s financial health to
the exclusion of all other business concerns. While Karl is
technology fluent, he resists new IT purchases unless there is a
clear and direct connection made between the technology
investment and improving the company’s financial profile. The
Director, Accounts Receivable (Mary Winston) and the
Director, Accounts Payable (Amy Dole) report to the CFO, and
together are responsible for the financial operations of the
business.
• Mark Temple is the Chief Information Officer (CIO) and head
of the IT Department. He provides all IT services to PEP. Prior
to being hired as the CIO, Mark was an IT manager at a large
multi-national corporation responsible for providing IT services
to their offices from the headquarters in Lincoln, Nebraska.
While in that position, Mark participated in very structured IT
processes, and developed an appreciation for working with the
operational and management divisions to ensure success of IT
projects. When he arrived at PEP, he advised the CEO, COO
and CFO that an IT Steering Committee could help ensure they
pursued the most beneficial IT projects. He is your primary
point of contact for dealing with PEP in analyzing their
processes and systems.
• Susan Black is the Senior Vice President (SVP), Engineering
& Manufacturing Operations and is Tim’s replacement. Susan
has worked for the company for 13 years. She started as a
Senior Engineer, and after six years was promoted to Director,
Engineering, where she spearheaded the successful research and
development of the low voltage motors. Susan is a champion of
information technology as long as it is clearly focused on the
core business.
• Jason Udo is the Vice President (VP), Business
Administration. He oversees all departments, except
Engineering & Manufacturing, Finance, and IT. His
responsibilities include key support functions such as Sales,
Marketing, Ordering & Shipping, Inventory, and Human
Resources.
The ITSC has adopted the IT governance processes
recommended by the CIO. They review proposals for IT
investments and determine where to invest their limited funds.
Each of the members has particular areas of interest, but all of
them are focused on reducing the overall cost of running the
business, increasing sales, and managing the cost of IT for the
company. The ITSC has established a series of checkpoints at
which they make go/no-go decisions on IT projects. At these
decision points the following documents are reviewed by the
ITSC:
· Preliminary Investigation Report – describes the
problem/opportunity, identifies benefits of a new system, and
reports on various aspects of feasibility of the proposed project.
· Requirements Specification – documents the requirements to
be fulfilled by the proposed system.
· Systems Design Specification – translates the requirements
into a logical design for the proposed system.
· Final System Report – compiles previous documents and lays
out the way ahead if the project is approved and funded.
As each report is approved, work on the following step begins.
This controls the amount of time and effort put into a request
for a system. For example, if the Preliminary Investigation
Report is not accepted by the ITSC, no further work is
performed on the system proposal.
Your Task
You are an independent Business and IT Systems Analyst,
specializing in developing IT solutions for small business
needs. You have been contracted by the CIO to prepare the
documentation required for the ITSC as they consider replacing
the information systems associated with operations, business
administration, and finance. Due to the backlog in the billing
and payment processes, the ITSC wants to start by replacing the
current customer billing and payment system and processes.
However, the ITSC requires assurance that a new billing and
payment system and processes can be interfaced with other new
IT systems and updated business processes as needed. While
there is currently no money in the budget allocated to replacing
or upgrading these systems, the executives are committed to
moving the company forward and improving PEP’s ability to
manage its growing business efficiently and effectively.
Your Activities
After interviewing each member of the ITSC, you have
collected the following information regarding the invoice,
billing and payment processes and needs:
• Customer billing is handled by the Invoicing Department,
which reports to the VP, Business
Administration.
• Customer payments are handled by the Accounts Receivable
Department, which reports to the
CFO.
• Customer billing and payments are managed and recorded in
an in-house developed Microsoft
Access based solution. The solution was developed by the IT
Department and is housed on a server controlled and managed
by the IT Department. The solution is updated on request from
the Invoicing and Accounts Receivable Departments.
• The Sales Department works with Invoicing to establish new
customer accounts and update and close existing accounts as
needed.
• The Ordering & Shipping Department sends a monthly report
to Invoicing where the products ordered and shipped and their
codes are entered into the invoicing module. Pricing is
computed based on the product codes and quantities entered.
• Invoicing is responsible for adding, updating, and maintaining
the product codes and pricing used by the invoicing database on
the 15th of each calendar month. The monthly report containing
the updates is provided by the Marketing Department.
• Invoicing generates and mails customer bills on the last
business day of each calendar month.
• Customer payments (lump sum) are due by the 10th of each
calendar. Customers send the payments to Accounts Receivable.
Accounts Receivable is responsible for updating customer
account records when the payments are received.
• Invoicing is responsible for identifying accounts that are 30
days, 60 days or more overdue. These reports are sent to
Accounts Receivable and Sales. Accounts Receivable handles
all collections.
• There is a 2% fee added to all invoices that are 30 days or
more overdue.
• Accounts Receivable notifies the Sales Department to assist
with customers who are 60 days or more delinquent. Ordering &
Shipping is also notified so that no further shipments are made
until the outstanding invoice is paid in full. These situations are
rare.
• Installation services are offered as a fixed price fee for small
businesses (doctor’s offices, individually owned pharmacies,
etc.). Larger installations (hospitals, chain pharmacies,
pharmaceutical manufacturers, etc.) are billed on a pre-defined
hourly rate.
• Volume discounts are not currently offered, but Marketing is
planning to offer this discount within the next six (6) months
because the low voltage motors are increasingly being ordered
in quantities of five (5) or more. The following volume
discounts will be offered:
o 5 or more: 2%
o 10 or more: 5%
o 25 or more: 10%
• Electronic invoicing via email is not currently offered, but
Marketing and Invoicing plan to offer this feature within the
next six (6) months.
• Electronic payment to a lockbox account is not currently
offered, but Marketing and Accounts Receiving plan to offer
this feature within the next six (6) months.
• The customer account data elements currently include:
o Customer Organization Name
o Customer Street Address
o Customer City
o Customer State
o Customer Zip Code + 4
o Primary Contact First Name
o Primary Contact Last Name
o Primary Contact Phone Number
o Primary Contact Email Address
o Secondary Contact First Name
o Secondary Contact Last Name
o Secondary Contact Phone Number
o Secondary Contact Email Address
o Products Ordered
o Product Ordered Date
o Products Shipped
o Product Ship Date
o Quantity
o Product Pricing
o Calculated Price (Calculated Field)
o Amount Due (Calculated Field)
o Amount Paid
o Date Paid
o Amount 30 Days Overdue (Calculated Field)
o Amount 60 Days Overdue (Calculated Field)
o Amount Greater Than 60 Days Overdue (Calculated Field)
o 2% Overdue Amount (Calculated Field)
• The customer account data elements required for near-term
plans include:
o Quantity Discount (Calculated Field)
o Electronic Invoicing (Check Box)
o Electronic Payment (Check Box)
• Paper invoices currently contain the following data elements:
o Unique Serialized Invoice Number (System Generated?)
o Customer Organization Name
o Customer Street Address
o Customer City
o Customer State
o Customer Zip Code + 4
o Products Ordered
o Product Ordered Date
o Products Shipped
o Product Ship Date
o Quantity
o Product Pricing
o Calculated Price (Calculated Field)
o Amount Due (Calculated Field)
o Amount 30 Days Overdue (Calculated Field)
o Amount 60 Days Overdue (Calculated Field)
o Amount Greater Than 60 Days Overdue (Calculated Field)
o 2% Overdue Amount (Calculated Field)
• Paper invoice data points required for near-term plans include:
o Volume Discount (Calculated Field)
o Electronic Invoicing (Yes or No)
o Electronic Payment (Yes or No)
• When electronic invoices are offered, the same current and
near-term data elements as shown above will be included.
You have also documented the following additional
considerations:
• All customer, invoicing, and payment data must be secured,
but accessible to those departments and personnel who have a
need to know.
• PEP requires the ability to generate a receipt automatically at
the time payments are recorded. The receipt will be sent
electronically to the organization’s primary contact email
address. The receipt must contain:
o Unique Serialized Invoice Number
o Customer Organization Name
o Customer Street Address
o Customer City
o Customer State
o Customer Zip Code + 4
o Amount Paid
o Date Paid
o Amount Outstanding
• The following company entities need to be able to generate
their own reports as needed:
o COO
o CFO
o Director, Accounts Receivable
o Accounts Receivable Managers & Staff
o Director, Accounts Payable
o SVP, Engineering & Manufacturing Operations
o VP, Business Administration
o Invoicing Managers & Staff
o Sales Managers & Staff
o Marketing Managers & Staff
o Ordering & Shipping Managers & Staff
Your Deliverables
Your first task is to develop the Preliminary Investigation
Report (PIR), which will examine the problems/opportunities,
identify benefits of a new system, and report on various aspects
of feasibility of such a project. You will draw upon the
background and other information provided above to develop
the PIR. If that Report is accepted by the ITSC, you will
analyze and organize the requirements you have collected into a
Requirements Specification. After receiving approval of the
Requirements Specification, you will develop the Systems
Design Specification, which will translate the requirements into
a logical design of the proposed system. With a further
decision to proceed, you will then develop the Final System
Report, which will combine your previously developed
documents and lay out the way ahead if the project is approved
and funded.
PEP Case Study2
PEP CASE STUDY
1
PEP CASE STUDY
7
PEP Case Study
PEP Case Study
Introduction
Management of an organization requires consideration of
several factors to emerge successfully, especially for the case of
an organization that requires coordination of several
departments. All the departments must be considered in the
coordination process in order to ensure that there is easy and
effective flow within and outside the premises. However, in this
case, the main factor of consideration is information
technology. There is a tremendous development in this section
that it requires the stakeholders of the company to ensure that
the most appropriate system is installed to ensure that it meets
its objectives on a timely basis.
Solution
to PEP Case
PEP is at a point where the management must accept that
change is inevitable. The advancement in the production and
increase in demand is just an indicator that the initial systems
and process of billing and accounting must be readjusted to
meet the demands in the market without much strain on both
human and IT resources. There is an immediate change that is
required in the ordering and billing department as it’s for the
case of the inventory department. The change must be made
before the situation becomes too much for the company (Laudon
& Traver, 2016).
Regarding the departments, they must initiate changes because
these are some of the key departments within the organization
that should have been considered for renovation upon
introduction of new products and increase in demand. With an
increase in the demand, purchases and billing is automatic that
the company was likely to face issues with finance department
as there was an increase in the workload in terms of processing
bills, invoices and the salaries of increased personnel in the
company.
However, the solution for the underlying problems at the PEP
company is within the company itself. There is a need for minor
changes within the departments affected and the creation of a
well coordinating plan. The plan has to be such that there is an
efficient and effective flow of the main activities of the
company without causing much strain to the company`s
resources (Laudon & Traver, 2016). Therefore, under the
guidance of Chief Information Officer, Mr. Mark Temple and
the steering committee should be able to come in agreement
with some of the proposals that will ensure these problems are
solved amicably.
One of the most critical factors that must be considered is in the
form of technology. The world is evolving into a technological
hub that everything is being automated to be more effective in
meeting organization objectives. As such, Mr. Temple must be
willing to accept the fact that it’s better that they install a good
technology system that will coordinate all the departments
efficiently for a longer duration of service delivery. The other
option is to install a system that shall be outdated soon, and the
same problems are likely to arise.
The department of finance is one of the most affected
department because of the changes that were initiated in the
company. Therefore, to make things better, there needs to be a
modern technology system that coordinates the billing,
invoicing and processing of payments on a timely basis (Wang,
Chen & Benitez, 2015). The system must be such that it's
automatically connected with the ordering and shipping
department. This will ensure that any order made must be
through online basis and get directly recorded into the system.
This will reduce the workload between the two departments. In
event of shipment and sale of the motors, the recording system
automatically does its role and the work becomes easier and
efficient within the system.
However, due to the urgency of the issue and the need to install
a system that can easily interphase with other departments
without wasting more resources in terms of finance and time,
this requires that the company installs a system that has already
been tested and proven to be functional before. As a result, the
company is most likely to get a system that can efficiently do
the process of billing, invoicing and processing of payment on a
timely basis at a pocket-friendly cost. This is the aspect that the
system is not likely to be the most updated one, but still very
useful in this case.
The change initiated in this department falls in the sector of
information and technology. It’s a common knowledge that not
all individuals are for the changes that come with the initiation
of the use of information technology system in service delivery.
For this to be effective, there is a need to ensure that the
steering committee are on the same page so that they can
implement it fully throughout the departments of the
organization. This will ensure that the company improves on its
service delivery and there is a likelihood of higher production.
There is also a need to train the employees on the use of the
new system so as to ensure that there is coordination of the
system and personnel within the company. For instance, the
discounts made, and the fee added on the overdue payments can
only be done by the employees who understand how the system
can be operated. This is a similar case for the services that are
not currently being done by the system such as invoicing via
email and electronic payments that intend to be initiated within
the next months. These are crucial process if the company
intends to ensure that there is no overload at the departments
offering these services. Therefore, offering training to the
employees in these departments will improve service delivery.
Additionally, there is a need for outsourcing or employing new
personnel in the affected departments. This is due to the
company experiencing an industrial growth in which the demand
for its product has increased and the production has
skyrocketed. Therefore, to ensure that there is less strain on
certain departments, there is a need to employ more staff.
The hiring of more staffs in this department will result in the
administration concentrating strictly on its duties. This was a
problem that should be avoided at all cost for a company that
seeks to develop and increase its market base (Rosemann & vom
Brocke, 2015). It’s through specialization of labor and division
of labor that the company has been able to attain the heights
that it has reached. To continue performing at the top, it should
improve on these defaults and the company is likely to have
more production and better service delivery that will ensure
success flows within the company.
In summary, the success of the company depends on the ability
of the management team to keep in touch with the required
changes within the facility. This is especially important if there
is an expansion in the company.
References
Laudon, K. C., & Traver, C. G. (2016). E-commerce: business,
technology, society.
Rosemann, M., & vom Brocke, J. (2015). The six core elements
of business process management. In Handbook on business
process management 1 (pp. 105-122). Springer, Berlin,
Heidelberg.
Wang, Y., Chen, Y., & Benitez-Amado, J. (2015). How
information technology influences environmental performance:
Empirical evidence from China. International Journal of
Information Management, 35(2), 160-170.
Sheet1Database Security VulnerabilitiesPrevention, Detection,
and Response Techniques for Yahoo.comPotential SQL
Injection Vulnerability for SQL Database Database Backend and
Front End Content Managent(Yahoo records) Public Users
Threat Vector: Attacker crafts an SQL statement to retrieve
records from Yahoo database example: SELECT * FROM Users
WHERE UserId = 105 OR 1=1;Content Management Engine
Mitigation Procedure: Parameterized Querys and Sanitization,
Whitelist Input ValidationCloud Data Spoofing Cloud DMZ and
ISP Network ConfigurationsNetwork Traffic Redirect of
valuable cloud information Threat Vector: Cloud Storage For
user Access may be spoofed by an attacker and this may lead to
data being written to the attacker's target instead of Cloud
Storage For user Access ISP and DMZ Routers are
misconfigured Mitigation Procedure: Standard authentication
mechanism to identify the destination data store. Black list of
BOGON IP's with IPS logging and session sniping Denial Of
ServiceBandwidth Constraints and Traffic Redirection
Excessive Resource Consumption for Yahoo Inc
WebserverThreat Vector: External user(s) accessing Yahoo
servers may consuming CPU resources and Bandwidth, the
Hardware and software resources are insufficient or
misconfiguredMitigation Procedure: Load Balancing and testing
load capacity i.e. concurrent connections consuming normal
resources. Upgrade Hardware and use different paths of last
resort for external users to retrieve resources when resources
become scarcePrivilege EscalationAuthenication Systems,
Methods, and Security Control typesElevation of
PrivilegeThreat Vector: Yahoo Inc Webserver External Users
may be able to impersonate the context of Authentication
Mechinism Provider External Users in order to gain additional
privilegeEntire Network InfrastructureMitigation Procedure:
Upgrade and or Harden existing authentication mechnisms to
include two factor authentication and stronger passwords.
Enforce least privilege and log/alert Administrative account
access
Prevention Measures for Vulnerabilities
XX
CMGT/431
XX
XX
1
2
Prevention Measures for Vulnerabilities
The identification of potential security vulnerabilities in Yahoo
Inc will undergo System Development Lifecycle Practices to
ensure the underlying systems are assuredly protected by
modern security practices and controls. In each of the phases of
SDLC, the security mechanisms are explicitly tailored to the
system requiring the control (McCown, 2002). The purpose of
this study is to review the applicable Security Controls to the
vulnerabilities as mentioned earlier in the attached spreadsheet.
Thus, providing prevention, detection, and response
mechanisms within each of the SDLC phases.
The first phase of the SDLC is Initiation, as such this consists
of weighing the potential gains and losses if specific controls
are implemented. Scope creep is a primary concern in this phase
of SDLC as budgets become an issue when requiring specific
controls to be redesigned. The formal risk assessment process is
a requirement in the initiation phase as there are likely to be
threats that target the CIA triad of the system design. The
impact of the threat to the CIA triad as it applies to the risk
assessment results in security controls derived explicitly for
that Information System.
In a noniterative approach Acquisition and Development of the
security hardware and or software will build upon the initiation
phase of SLDC (Haridas, 2007). In the initial risk assessment in
the initiation phase, the resulting security controls are defined
as the acquired assets in SDLC. Before the Development portion
of this phase can begin, the risk assessment should call out all
the applicable vulnerabilities and the level of threat to all the
underlying assets. The reciprocity of internal systems and their
interoperable security controls are detailed explicitly in this
phase as they apply to the underlying development of the system
in development.
In the third phase of SDLC, Implementation requires that the
system undergoes testing of the implemented security controls
to assure that a viable authority to operate Security Package is
approved for the system. The stakeholders and all vested
personnel in this phase are apprised of any due outs required for
the system. Another chance to test the security controls and the
viable efficiency of the system is executed in this phase as well.
The fourth phase of the SDLC is the Operate and Maintain and
requires close monitoring of the system to ensure that the
controls and system are operating within the scope of what they
are intended to do (Bird, 2017). Changes to the system at this
time should, of course, be documented and carefully reviewed
for accuracy and meet expectation. In this phase, continuous
monitoring and modification of security controls will ensure
that the authority to operate on the network security package is
relevant to the timeframe in which it will be submitted. In the
fifth phase of the SDLC, we will focus on ending the lifecycle
of the system with security methods commensurate with the
impact on any controls impacting the retiring system. Disposal
of any valuable information using destruction methods approved
by the organization's policy is carried out as a final step in the
final phase of SDLC.
References
Haridas, N. (2007, April). Software Engineering – Security as a
Process in the SDLC. SANS Institute InfoSec Reading Room, (),
. Retrieved from https://www.sans.org/reading-
room/whitepapers/securecode/software-engineering-security-
process-sdlc-1846
Bird, J. (2017, October). 2017 State of Application Security:
Balancing Speed and Risk. SANS Institute InfoSec Reading
Room, (), . Retrieved from https://www.sans.org/reading-
room/whitepapers/analyst/2017-state-application-security-
balancing-speed-risk-38100
McCown, C. (2002, November). Framework for Secure
Application Design and Development. SANS Institute InfoSec
Reading Room, (), .
Retrieved from https://www.sans.org/reading-
room/whitepapers/application/framework-secure-application-
design-development-842
Categories
Vulnerabilities
Potential Incident
Controls
People
Social Engineering
Breach of data/Personal Identifiable Information
Proper training, policies, and access control permissions
Process
Technology
75629 Topic prevention measures for vulneranbilitiesNumber of.docx

More Related Content

Similar to 75629 Topic prevention measures for vulneranbilitiesNumber of.docx

IFSM 461 EXceptional Education/snaptutorial.COM
IFSM 461 EXceptional Education/snaptutorial.COMIFSM 461 EXceptional Education/snaptutorial.COM
IFSM 461 EXceptional Education/snaptutorial.COMMcdonaldRyan17
 
IT 510 Final Project Guidelines and Rubric Overview .docx
IT 510 Final Project Guidelines and Rubric  Overview .docxIT 510 Final Project Guidelines and Rubric  Overview .docx
IT 510 Final Project Guidelines and Rubric Overview .docxpriestmanmable
 
GG Freightways (GGFRT) IT Decision Paper AssignmentBefore you be.docx
GG Freightways (GGFRT) IT Decision Paper AssignmentBefore you be.docxGG Freightways (GGFRT) IT Decision Paper AssignmentBefore you be.docx
GG Freightways (GGFRT) IT Decision Paper AssignmentBefore you be.docxshericehewat
 
IT 600 Final Project Milestone Two Template Analytical Organi.docx
IT 600 Final Project Milestone Two Template Analytical Organi.docxIT 600 Final Project Milestone Two Template Analytical Organi.docx
IT 600 Final Project Milestone Two Template Analytical Organi.docxpriestmanmable
 
IT 510 Final Project Guidelines and Rubric Overview The final projec.docx
IT 510 Final Project Guidelines and Rubric Overview The final projec.docxIT 510 Final Project Guidelines and Rubric Overview The final projec.docx
IT 510 Final Project Guidelines and Rubric Overview The final projec.docxcareyshaunda
 
IT 510 Final Project Guidelines and Rubric Overview .docx
IT 510 Final Project Guidelines and Rubric  Overview .docxIT 510 Final Project Guidelines and Rubric  Overview .docx
IT 510 Final Project Guidelines and Rubric Overview .docxvrickens
 
Insert Your Name and ClassIT Online Training Application D.docx
Insert Your Name and ClassIT Online Training Application D.docxInsert Your Name and ClassIT Online Training Application D.docx
Insert Your Name and ClassIT Online Training Application D.docxcarliotwaycave
 
CIS 321 Case Study ‘Equipment Check-Out System’MILESTONE 3 – PRO.docx
CIS 321 Case Study ‘Equipment Check-Out System’MILESTONE 3 – PRO.docxCIS 321 Case Study ‘Equipment Check-Out System’MILESTONE 3 – PRO.docx
CIS 321 Case Study ‘Equipment Check-Out System’MILESTONE 3 – PRO.docxclarebernice
 
PURPOSE of the project is Williams Specialty Company (WSC) reque.docx
PURPOSE of the project is Williams Specialty Company (WSC) reque.docxPURPOSE of the project is Williams Specialty Company (WSC) reque.docx
PURPOSE of the project is Williams Specialty Company (WSC) reque.docxamrit47
 
As Applied ICT term 3 Ex 10
As Applied ICT term 3 Ex 10As Applied ICT term 3 Ex 10
As Applied ICT term 3 Ex 10Jordan_0009
 
Project Guidelines.pdf
Project Guidelines.pdfProject Guidelines.pdf
Project Guidelines.pdfTendaiZulu
 
System analysis and design
System analysis and designSystem analysis and design
System analysis and designRobinsonObura
 
Online eaxmination
Online eaxminationOnline eaxmination
Online eaxminationAditi_17
 
Structure system analysis and design method -SSADM
Structure system analysis and design method -SSADMStructure system analysis and design method -SSADM
Structure system analysis and design method -SSADMFLYMAN TECHNOLOGY LIMITED
 
IT 510 Milestone Four Guidelines and Rubric You will su
IT 510 Milestone Four Guidelines and Rubric  You will suIT 510 Milestone Four Guidelines and Rubric  You will su
IT 510 Milestone Four Guidelines and Rubric You will suTatianaMajor22
 
Final exam 2011 spring
Final exam 2011 springFinal exam 2011 spring
Final exam 2011 springSou Tibon
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsMuhammadTalha436
 

Similar to 75629 Topic prevention measures for vulneranbilitiesNumber of.docx (20)

IFSM 461 EXceptional Education/snaptutorial.COM
IFSM 461 EXceptional Education/snaptutorial.COMIFSM 461 EXceptional Education/snaptutorial.COM
IFSM 461 EXceptional Education/snaptutorial.COM
 
IT 510 Final Project Guidelines and Rubric Overview .docx
IT 510 Final Project Guidelines and Rubric  Overview .docxIT 510 Final Project Guidelines and Rubric  Overview .docx
IT 510 Final Project Guidelines and Rubric Overview .docx
 
SE chapters 6-7
SE chapters 6-7SE chapters 6-7
SE chapters 6-7
 
Slides chapters 6-7
Slides chapters 6-7Slides chapters 6-7
Slides chapters 6-7
 
GG Freightways (GGFRT) IT Decision Paper AssignmentBefore you be.docx
GG Freightways (GGFRT) IT Decision Paper AssignmentBefore you be.docxGG Freightways (GGFRT) IT Decision Paper AssignmentBefore you be.docx
GG Freightways (GGFRT) IT Decision Paper AssignmentBefore you be.docx
 
IT 600 Final Project Milestone Two Template Analytical Organi.docx
IT 600 Final Project Milestone Two Template Analytical Organi.docxIT 600 Final Project Milestone Two Template Analytical Organi.docx
IT 600 Final Project Milestone Two Template Analytical Organi.docx
 
IT 510 Final Project Guidelines and Rubric Overview The final projec.docx
IT 510 Final Project Guidelines and Rubric Overview The final projec.docxIT 510 Final Project Guidelines and Rubric Overview The final projec.docx
IT 510 Final Project Guidelines and Rubric Overview The final projec.docx
 
IT 510 Final Project Guidelines and Rubric Overview .docx
IT 510 Final Project Guidelines and Rubric  Overview .docxIT 510 Final Project Guidelines and Rubric  Overview .docx
IT 510 Final Project Guidelines and Rubric Overview .docx
 
Insert Your Name and ClassIT Online Training Application D.docx
Insert Your Name and ClassIT Online Training Application D.docxInsert Your Name and ClassIT Online Training Application D.docx
Insert Your Name and ClassIT Online Training Application D.docx
 
CIS 321 Case Study ‘Equipment Check-Out System’MILESTONE 3 – PRO.docx
CIS 321 Case Study ‘Equipment Check-Out System’MILESTONE 3 – PRO.docxCIS 321 Case Study ‘Equipment Check-Out System’MILESTONE 3 – PRO.docx
CIS 321 Case Study ‘Equipment Check-Out System’MILESTONE 3 – PRO.docx
 
PURPOSE of the project is Williams Specialty Company (WSC) reque.docx
PURPOSE of the project is Williams Specialty Company (WSC) reque.docxPURPOSE of the project is Williams Specialty Company (WSC) reque.docx
PURPOSE of the project is Williams Specialty Company (WSC) reque.docx
 
Is 4 th
Is 4 thIs 4 th
Is 4 th
 
As Applied ICT term 3 Ex 10
As Applied ICT term 3 Ex 10As Applied ICT term 3 Ex 10
As Applied ICT term 3 Ex 10
 
Project Guidelines.pdf
Project Guidelines.pdfProject Guidelines.pdf
Project Guidelines.pdf
 
System analysis and design
System analysis and designSystem analysis and design
System analysis and design
 
Online eaxmination
Online eaxminationOnline eaxmination
Online eaxmination
 
Structure system analysis and design method -SSADM
Structure system analysis and design method -SSADMStructure system analysis and design method -SSADM
Structure system analysis and design method -SSADM
 
IT 510 Milestone Four Guidelines and Rubric You will su
IT 510 Milestone Four Guidelines and Rubric  You will suIT 510 Milestone Four Guidelines and Rubric  You will su
IT 510 Milestone Four Guidelines and Rubric You will su
 
Final exam 2011 spring
Final exam 2011 springFinal exam 2011 spring
Final exam 2011 spring
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for Exams
 

More from sleeperharwell

For this assignment, review the articleAbomhara, M., & Koie.docx
For this assignment, review the articleAbomhara, M., & Koie.docxFor this assignment, review the articleAbomhara, M., & Koie.docx
For this assignment, review the articleAbomhara, M., & Koie.docxsleeperharwell
 
For this assignment, provide your perspective about Privacy versus N.docx
For this assignment, provide your perspective about Privacy versus N.docxFor this assignment, provide your perspective about Privacy versus N.docx
For this assignment, provide your perspective about Privacy versus N.docxsleeperharwell
 
For this assignment, provide your perspective about Privacy vers.docx
For this assignment, provide your perspective about Privacy vers.docxFor this assignment, provide your perspective about Privacy vers.docx
For this assignment, provide your perspective about Privacy vers.docxsleeperharwell
 
For this Assignment, read the case study for Claudia and find two to.docx
For this Assignment, read the case study for Claudia and find two to.docxFor this Assignment, read the case study for Claudia and find two to.docx
For this Assignment, read the case study for Claudia and find two to.docxsleeperharwell
 
For this assignment, please start by doing research regarding the se.docx
For this assignment, please start by doing research regarding the se.docxFor this assignment, please start by doing research regarding the se.docx
For this assignment, please start by doing research regarding the se.docxsleeperharwell
 
For this assignment, please discuss the following questionsWh.docx
For this assignment, please discuss the following questionsWh.docxFor this assignment, please discuss the following questionsWh.docx
For this assignment, please discuss the following questionsWh.docxsleeperharwell
 
For this assignment, locate a news article about an organization.docx
For this assignment, locate a news article about an organization.docxFor this assignment, locate a news article about an organization.docx
For this assignment, locate a news article about an organization.docxsleeperharwell
 
For this assignment, it requires you Identifies the historic conte.docx
For this assignment, it requires you Identifies the historic conte.docxFor this assignment, it requires you Identifies the historic conte.docx
For this assignment, it requires you Identifies the historic conte.docxsleeperharwell
 
For this assignment, create a framework from which an international .docx
For this assignment, create a framework from which an international .docxFor this assignment, create a framework from which an international .docx
For this assignment, create a framework from which an international .docxsleeperharwell
 
For this assignment, create a 15-20 slide digital presentation in tw.docx
For this assignment, create a 15-20 slide digital presentation in tw.docxFor this assignment, create a 15-20 slide digital presentation in tw.docx
For this assignment, create a 15-20 slide digital presentation in tw.docxsleeperharwell
 
For this assignment, you are to complete aclinical case - narrat.docx
For this assignment, you are to complete aclinical case - narrat.docxFor this assignment, you are to complete aclinical case - narrat.docx
For this assignment, you are to complete aclinical case - narrat.docxsleeperharwell
 
For this assignment, you are to complete aclinical case - narr.docx
For this assignment, you are to complete aclinical case - narr.docxFor this assignment, you are to complete aclinical case - narr.docx
For this assignment, you are to complete aclinical case - narr.docxsleeperharwell
 
For this assignment, you are provided with four video case studies (.docx
For this assignment, you are provided with four video case studies (.docxFor this assignment, you are provided with four video case studies (.docx
For this assignment, you are provided with four video case studies (.docxsleeperharwell
 
For this assignment, you are going to tell a story, but not just.docx
For this assignment, you are going to tell a story, but not just.docxFor this assignment, you are going to tell a story, but not just.docx
For this assignment, you are going to tell a story, but not just.docxsleeperharwell
 
For this assignment, you are asked to prepare a Reflection Paper. Af.docx
For this assignment, you are asked to prepare a Reflection Paper. Af.docxFor this assignment, you are asked to prepare a Reflection Paper. Af.docx
For this assignment, you are asked to prepare a Reflection Paper. Af.docxsleeperharwell
 
For this assignment, you are asked to prepare a Reflection Paper. .docx
For this assignment, you are asked to prepare a Reflection Paper. .docxFor this assignment, you are asked to prepare a Reflection Paper. .docx
For this assignment, you are asked to prepare a Reflection Paper. .docxsleeperharwell
 
For this assignment, you are asked to conduct some Internet research.docx
For this assignment, you are asked to conduct some Internet research.docxFor this assignment, you are asked to conduct some Internet research.docx
For this assignment, you are asked to conduct some Internet research.docxsleeperharwell
 
For this assignment, you are a professor teaching a graduate-level p.docx
For this assignment, you are a professor teaching a graduate-level p.docxFor this assignment, you are a professor teaching a graduate-level p.docx
For this assignment, you are a professor teaching a graduate-level p.docxsleeperharwell
 
For this assignment, we will be visiting the PBS website,Race  .docx
For this assignment, we will be visiting the PBS website,Race  .docxFor this assignment, we will be visiting the PBS website,Race  .docx
For this assignment, we will be visiting the PBS website,Race  .docxsleeperharwell
 
For this assignment, the student starts the project by identifying a.docx
For this assignment, the student starts the project by identifying a.docxFor this assignment, the student starts the project by identifying a.docx
For this assignment, the student starts the project by identifying a.docxsleeperharwell
 

More from sleeperharwell (20)

For this assignment, review the articleAbomhara, M., & Koie.docx
For this assignment, review the articleAbomhara, M., & Koie.docxFor this assignment, review the articleAbomhara, M., & Koie.docx
For this assignment, review the articleAbomhara, M., & Koie.docx
 
For this assignment, provide your perspective about Privacy versus N.docx
For this assignment, provide your perspective about Privacy versus N.docxFor this assignment, provide your perspective about Privacy versus N.docx
For this assignment, provide your perspective about Privacy versus N.docx
 
For this assignment, provide your perspective about Privacy vers.docx
For this assignment, provide your perspective about Privacy vers.docxFor this assignment, provide your perspective about Privacy vers.docx
For this assignment, provide your perspective about Privacy vers.docx
 
For this Assignment, read the case study for Claudia and find two to.docx
For this Assignment, read the case study for Claudia and find two to.docxFor this Assignment, read the case study for Claudia and find two to.docx
For this Assignment, read the case study for Claudia and find two to.docx
 
For this assignment, please start by doing research regarding the se.docx
For this assignment, please start by doing research regarding the se.docxFor this assignment, please start by doing research regarding the se.docx
For this assignment, please start by doing research regarding the se.docx
 
For this assignment, please discuss the following questionsWh.docx
For this assignment, please discuss the following questionsWh.docxFor this assignment, please discuss the following questionsWh.docx
For this assignment, please discuss the following questionsWh.docx
 
For this assignment, locate a news article about an organization.docx
For this assignment, locate a news article about an organization.docxFor this assignment, locate a news article about an organization.docx
For this assignment, locate a news article about an organization.docx
 
For this assignment, it requires you Identifies the historic conte.docx
For this assignment, it requires you Identifies the historic conte.docxFor this assignment, it requires you Identifies the historic conte.docx
For this assignment, it requires you Identifies the historic conte.docx
 
For this assignment, create a framework from which an international .docx
For this assignment, create a framework from which an international .docxFor this assignment, create a framework from which an international .docx
For this assignment, create a framework from which an international .docx
 
For this assignment, create a 15-20 slide digital presentation in tw.docx
For this assignment, create a 15-20 slide digital presentation in tw.docxFor this assignment, create a 15-20 slide digital presentation in tw.docx
For this assignment, create a 15-20 slide digital presentation in tw.docx
 
For this assignment, you are to complete aclinical case - narrat.docx
For this assignment, you are to complete aclinical case - narrat.docxFor this assignment, you are to complete aclinical case - narrat.docx
For this assignment, you are to complete aclinical case - narrat.docx
 
For this assignment, you are to complete aclinical case - narr.docx
For this assignment, you are to complete aclinical case - narr.docxFor this assignment, you are to complete aclinical case - narr.docx
For this assignment, you are to complete aclinical case - narr.docx
 
For this assignment, you are provided with four video case studies (.docx
For this assignment, you are provided with four video case studies (.docxFor this assignment, you are provided with four video case studies (.docx
For this assignment, you are provided with four video case studies (.docx
 
For this assignment, you are going to tell a story, but not just.docx
For this assignment, you are going to tell a story, but not just.docxFor this assignment, you are going to tell a story, but not just.docx
For this assignment, you are going to tell a story, but not just.docx
 
For this assignment, you are asked to prepare a Reflection Paper. Af.docx
For this assignment, you are asked to prepare a Reflection Paper. Af.docxFor this assignment, you are asked to prepare a Reflection Paper. Af.docx
For this assignment, you are asked to prepare a Reflection Paper. Af.docx
 
For this assignment, you are asked to prepare a Reflection Paper. .docx
For this assignment, you are asked to prepare a Reflection Paper. .docxFor this assignment, you are asked to prepare a Reflection Paper. .docx
For this assignment, you are asked to prepare a Reflection Paper. .docx
 
For this assignment, you are asked to conduct some Internet research.docx
For this assignment, you are asked to conduct some Internet research.docxFor this assignment, you are asked to conduct some Internet research.docx
For this assignment, you are asked to conduct some Internet research.docx
 
For this assignment, you are a professor teaching a graduate-level p.docx
For this assignment, you are a professor teaching a graduate-level p.docxFor this assignment, you are a professor teaching a graduate-level p.docx
For this assignment, you are a professor teaching a graduate-level p.docx
 
For this assignment, we will be visiting the PBS website,Race  .docx
For this assignment, we will be visiting the PBS website,Race  .docxFor this assignment, we will be visiting the PBS website,Race  .docx
For this assignment, we will be visiting the PBS website,Race  .docx
 
For this assignment, the student starts the project by identifying a.docx
For this assignment, the student starts the project by identifying a.docxFor this assignment, the student starts the project by identifying a.docx
For this assignment, the student starts the project by identifying a.docx
 

Recently uploaded

Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 

Recently uploaded (20)

Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 

75629 Topic prevention measures for vulneranbilitiesNumber of.docx

  • 1. 75629 Topic: prevention measures for vulneranbilities Number of Pages: 2 (Double Spaced) Number of sources: 1 Writing Style: APA Type of document: Editing Academic Level:Undergraduate Category: Computer Science Language Style: English (U.S.) Order Instructions: Attached After identifying your organizations' vulnerabilities through previous weekly assignments, you now need to develop security measures to protect those vulnerabilities. Create a spreadsheet of vulnerabilities and prevention measures for your organization. Categorize by people, process, or technology. Provide 350- to 700-word paper onnext steps for each
  • 2. prevention measure based on the vulnerability, potential incident, environmental and security controls in SDLC. Submit your spreadsheet and paper using the Assignment Files tab. Data Flow Diagram (DFD) Tips Processes: Verbs Dataflows: Nouns Data Stores: Nouns External Entities: Nouns 1) Process’s input & output are different 2) Each data store should have at least one data flow in and one data flow out 3) Each process should have at least one data flow in and one data flow out 4) All inputs and outputs should be labeled 5) Processes should have an identifier (Ex., 1.0, 2.0, etc.) Process Process Process-to-Process Process Process Process-to-Process Process-to-External Entity Process
  • 3. External Entity Process-to-External Entity Process External Entity Data S tore Process-to-Data Store Process Data S tore Process-to-Data Store Process External Entity-to-External Entity External Entity External Entity External Entity-to-External Entity External Entity External Entity
  • 4. Data S tore Data Store-to-Data Store Data S toreData S tore Data Store-to-Data Store Data S tore External Entity-to-Data StoreExternal Entity-to-Data Store External Entity Data S tore External Entity Data S tore External Entity Data S tore External Entity-to-Data Store External Entity Data S toreProcess Process Process-to-Process
  • 5. Process-to-External Entity Process External Entity Data S tore Process-to-Data Store Process External Entity-to-External Entity External Entity External Entity Data S tore Data Store-to-Data Store Data S tore External Entity-to-Data Store External Entity Data S tore DFD_Rules.vsdxTop Process Stage 2: Requirements Specification
  • 6. Before you begin this assignment, be sure you have read the Case Study and all assignments for this class, especially Stage 4: Final System Report. The feedback you received on your Stage 1 assignment should be reviewed and used as you proceed with Stage 2. Purpose of this Assignment This assignment gives you the opportunity to specify clear and concise requirements, including the use of data and process models, for a system that enables a productive change in a way the business is conducted. This assignment specifically addresses the following course outcomes to enable you to: · apply a systematic approach to translate requirements into an executable systems design · effectively communicate with stakeholders to determine, manage, and document business requirements throughout the SDLC · perform modeling to assist with analysis and decision making Assignment The results of your systems analysis and design work in this class will be documented in a Final System Report. The purpose of the Report is to inform management of your system proposal and gain approval to proceed with the project. The Report will be developed and submitted in stages, which will be compiled at the end of class into the Final System Report. Review the outline of the Final System Report in the Stage 4 Assignment description. Note that it contains the analysis of the problem(s) and requirements, and proposes what kind of a system solution is needed. It does not propose a specific solution, but it does recommend why and how the organization should acquire the solution. Following the Preliminary Investigation Report (Stage 1
  • 7. assignment), the next step is to identify the requirements for a system, documenting them in the Requirements Specification document. The purpose of the Requirements Specification is to clearly define what the proposed system will do in non- technical user-oriented language. It should identify what data is entered into the system, what output is required, what processes the system should perform, what protections and controls are needed, what performance is expected, and what the business continuity needs are. In order to clearly express the requirements, data and process models are used to communicate how the system should work. All of the information you need to complete the projects in this class is not provided in the case study. In the discussion area of the classroom, there is a discussion titled "Case Study Interview Questions" where you can pose questions about the case study, as if you were interviewing the people in the case study organization. Any information that you need that is not included in the case study should be asked about in this discussion. Responses from the faculty member on behalf of the case study organization will be available for everyone in the class. Use the information provided in the case study and the Case Study Interview Questions discussion to create a checklist of functional and technical requirements and the data and process models listed below. Using the format and resources below, list three requirements for each of the areas shown in I and II. Then, create two diagrams to illustrate the scope of the system: the context diagram and the use case diagram. Then, create the data flow diagram to illustrate the flow of the inputs and outputs listed as functional requirements in section I. You should then select a process or process step (from those listed in section I.b – processing requirements) that has some decision associated with it to create the three process models listed below. The same process/process step will be used for all three
  • 8. of the process models; they are just different ways to represent the process and the decision involved. Approximate lengths for each section are provided as a guideline; be sure to provide all pertinent information. References in brackets are to the two e- textbooks (by authors Jawahar and Conger) used in this class and the page on which the explanatory information begins. Use the examples listed in the brackets to develop your diagrams. [Note: Every diagram/model needs to be customized for the course scenario. Simply copying the example diagram(s) with little or no customization will result in a zero for that diagram.] There are several different methodologies using different symbols, but your diagrams will be graded for compliance with the examples listed. You are required to use the symbols and diagramming methods illustrated in the examples, and follow any rules for the diagram in the sources listed with each diagram. Requirements Specification Background: First, provide a brief description of your proposed system to establish the context for the Requirements Specification. I.Functional Requirements. The input-processing-output requirements must relate to each other. Start with three outputs you expect from the system, then determine what inputs are needed to create each of those outputs, and finally specify what processing needs to occur for each input to create the output. At least one of your processing requirements must have a decision associated with it so it can be used for the Process Models below. You should have a complete statement for each requirement, and each requirement should be numbered within the category. (introductory paragraph and list of 9 inter-related requirement statements) [Jawahar, p. 95 and the Week 3 Content, including reading on IEEE Software Requirements Specifications] [another source of ideas and concepts
  • 9. is:http://www.slideshare.net/ALATechSource/sample-project- requirements-document-library-blog] a.Output requirements. List three different reports, results of a calculation, or other outputs. i. Output #1 ii. Output #2 iii. Output #3 b. Input requirements. i. List the main data elements required to create output #1 ii. List the main data elements required to create output #2 iii. List the main data elements required to create output #3 c.Processing requirements (at least one must have a decision associated with it) i. Processing required to create Output #1 ii. Processing required to create Output #2 iii. Processing required to create Output #3 II.Technical Requirements (introductory paragraph and 3 requirement statements listed for each area below) [Jawahar, p. 95] a. Security requirements b. System control requirements c. Performance requirements d. Business continuity requirements (backup, restart, recovery) III.System Scope Diagrams (introductory/explanatory paragraph and 2 diagrams) [a good explanation and example is at http://www.jamasoftware.com/blog/defining-project-scope- context-use-case-diagrams/] a. Context Diagram [explanation in Conger, p.228; use example in Conger, p.229. Figure 7.2] b. Use Case Diagram [use example in weblink above] IV.Data Flow Diagram (introductory/explanatory paragraph and diagram) [Week 4 Content module and weblinks] a. Data Flow Diagram [explanation in Conger, p.228; use example in Conger, p.230, Figure 7.3; use the tips located in the assignment folder (DFD_Tips.pdf)] V. Process Models (introductory/explanatory paragraph and 3
  • 10. items below) [Week 4 Systems Analysis Course Module] a. Structured English [use example in Systems Analysis Course Module, Process Description Tools] b. Decision Table [use example in Systems Analysis Course Module, Process Description Tools] c. Decision Tree [use example in Systems Analysis Course Module, Process Description Tools] Submitting Your Assignment Submit your document via your Assignment Folder as Microsoft Word document, or a document that can be ready using MS Word, with your last name included in the filename. Use the Grading Rubric below to be sure you have covered all aspects of the assignment. GRADING RUBRIC: Criteria 90-100% Far Above Standards 80-89% Above Standards 70-79% Meets Standards 60-69% Below Standards < 60% Well Below Standards Possible Points Functional Requirements
  • 11. 16-18 Points Three requirements for input, output and processing are clearly stated and correctly inter-related; are logically derived from the Case Study, and demonstrate a sophisticated level of writing. 14-15 Points Three requirements for input, output and processing are clearly stated and correctly inter-related; are logically derived from the Case Study, and demonstrate a clear understanding of the course concepts. 12-13 Points Three requirements for input, output and processing are stated and are inter-related; and are derived from the Case Study. 10-11 Points May present fewer than three requirements for input, output and processing, or they may not be inter-related; and/or may not be derived from the Case Study. 0-9 Points Functional requirements are not included, or demonstrate little effort. 18 Technical Requirements 11-12 Points Three requirements each for security, system control, performance, and business continuity are clearly stated and are logically derived from the Case Study, and demonstrate a sophisticated level of writing. 9-10 Points Three requirements each for security, system control, performance, and business continuity are clearly stated and are logically derived from the Case Study, and demonstrate effective writing. 8 Points Three requirements each for security, system control, performance, and business continuity are provided and are appropriate to the Case Study.
  • 12. 7 Points Fewer than three requirements each for security, control, performance and business continuity may be provided, and/or they may not be appropriate to the Case Study. 0-6 Points Functional requirements are not provided, or little effort is demonstrated. 12 System Scope Diagrams 9-10 Points Context diagram and Use Case diagram are correctly constructed, logical, appropriate to the Case Study and demonstrate a sophisticated level of analysis. 8 Points Context diagram and Use Case diagram are correctly constructed, logical, appropriate to the Case Study and demonstrate accurate analysis. 7 Points Context diagram and Use Case diagram are provided, and are appropriate to the Case Study. 6 Points Both Context and Use Case diagrams may not be provided, and/or may not be appropriate to the Case Study. 0-5 Points Both Context and Use Case diagrams are not provided, or little effort is demonstrated. 10 Data Flow Diagram 9-10 Points Data Flow Diagram is correctly constructed, logical, appropriate to the Case Study and demonstrate a sophisticated level of analysis. 8 Points Data Flow Diagram is correctly constructed, logical, appropriate to the Case Study and demonstrate accurate analysis. 7 Points
  • 13. Data Flow Diagram is provided, and are appropriate to the Case Study. 6 Points Data Flow Diagram may not be correctly contructed, and/or may not be appropriate to the Case Study. 0-5 Points Data Flow Diagram is not provided, or little effort is demonstrated. 10 Process Models 36-40 Points All three process models – structured English, decision table, and decision tree – are correctly constructed, logical, appropriate to the Case Study and demonstrate a sophisticated level of analysis. All three models describe the same decision process. 32-35 Points All three process models – structured English, decision table, and decision tree – are correctly constructed, logical, appropriate to the Case Study and demonstrate accurate analysis. All three models describe the same decision process. 28-31 Points All three process models – structured English, decision table, and decision tree – are provided, and are appropriate to the Case Study. All three models describe the same decision process. 24-27 Points All three process models may not be provided, may not describe the same decision process, and/or may not be appropriate to the Case Study. 0-23 Points The three process models are not provided, or little effort is demonstrated. 40 Format 9-10 Points Submission reflects effective organization and sophisticated
  • 14. writing; follows instructions provided; uses correct structure, grammar, and spelling; presented in a professional format; any references used are appropriately incorporated and cited using APA style. 8 Points Submission reflects effective organization and clear writing; follows instructions provided; uses correct structure, grammar, and spelling; presented in a professional format; any references used are appropriately incorporated and cited using APA style. 7 Points Submission is adequate, is somewhat organized, follows instructions provided; contains minimal grammar and/or spelling errors; and follows APA style for any references and citations. 6 Points Submission is not well organized, and/or does not follow instructions provided; and/or contains grammar and/or spelling errors; and/or does not follow APA style for any references and citations. May demonstrate inadequate level of writing. 0-5 Points Document is extremely poorly written and does not convey the information. 10 TOTAL Points Possible 100 Stage 2: Requirements Specification 5
  • 15. IFSM 461: Systems Analysis and Design Precision Electronic Parts, Inc. Case Study Introduction This case study will be used for a series of staged assignments. It should be thoroughly read and understood prior to working on any of the assignments. Setting Precision Electronic Parts (PEP), Inc., is a small private business that has retained you to assist in the development of a new billing and payment system and associated processes. Background PEP is a small, private specialized electronics company in Kansas. For the past 20 years, it has manufactured a wide range of precision electronic components and replacement parts for medical equipment used in hospitals, doctor’s offices, and pharmacies. Last year, the company began building and delivering custom low voltage motors that reduced electricity costs and made older medical equipment more environmentally friendly. More recently, PEP has added a new line of more efficient low voltage motors that can be used in precision equipment outside the healthcare industry. As a result, PEP is experiencing significant increases in orders for the motors. The manufacturing facility has been expanded, and the sales and marketing teams have been enlarged. All of this is straining the Ordering & Shipping Department and the Inventory Management Department, which have received no increase in personnel. They are meeting the challenge, but the Executive Leadership Team (the CEO, COO, CFO, and CIO) know that they are only treading water. The Finance
  • 16. Department, however, is getting further and further behind in their invoice, billing and payment processes. The Business Administration Department has stepped up to the task, but is at the breaking point. IT Steering Committee The IT Steering Committee (ITSC) at PEP is comprised of the Executive Leadership Team, the Senior Vice President and Vice President. • Carolyn West is the Chief Executive Officer (CEO). She has been at the company for 11 years. Carolyn has a background working for and managing electronics companies. Like most CEOs, Carolyn is focused on the strategic and long-term business health of PEP. She chairs the IT Steering Committee. Carolyn and the committee members jointly make decisions about IT systems and major organizational business process changes. • Tim Uduak, Jr. is the Chief Operating Officer (COO) and the son of founding partner Tim Uduak, Sr. Tim has been around the company since its inception in one capacity or another, except for four years of college and a 3-year break to startup his own company. When his startup failed, Tim came back to PEP as the SVP, Engineering & Manufacturing Operations. Last year, he was promoted to COO. While Tim has a strategic focus and is not technology averse, he prefers to solve business challenges with processes rather than information technology. • Karl Manley is the Chief Financial Officer (CFO). He has been with the company for 9 years. Karl has a background in accounting and finance, and is a certified public accountant (CPA). He tends to focus on the company’s financial health to the exclusion of all other business concerns. While Karl is technology fluent, he resists new IT purchases unless there is a clear and direct connection made between the technology
  • 17. investment and improving the company’s financial profile. The Director, Accounts Receivable (Mary Winston) and the Director, Accounts Payable (Amy Dole) report to the CFO, and together are responsible for the financial operations of the business. • Mark Temple is the Chief Information Officer (CIO) and head of the IT Department. He provides all IT services to PEP. Prior to being hired as the CIO, Mark was an IT manager at a large multi-national corporation responsible for providing IT services to their offices from the headquarters in Lincoln, Nebraska. While in that position, Mark participated in very structured IT processes, and developed an appreciation for working with the operational and management divisions to ensure success of IT projects. When he arrived at PEP, he advised the CEO, COO and CFO that an IT Steering Committee could help ensure they pursued the most beneficial IT projects. He is your primary point of contact for dealing with PEP in analyzing their processes and systems. • Susan Black is the Senior Vice President (SVP), Engineering & Manufacturing Operations and is Tim’s replacement. Susan has worked for the company for 13 years. She started as a Senior Engineer, and after six years was promoted to Director, Engineering, where she spearheaded the successful research and development of the low voltage motors. Susan is a champion of information technology as long as it is clearly focused on the core business. • Jason Udo is the Vice President (VP), Business Administration. He oversees all departments, except Engineering & Manufacturing, Finance, and IT. His responsibilities include key support functions such as Sales, Marketing, Ordering & Shipping, Inventory, and Human Resources.
  • 18. The ITSC has adopted the IT governance processes recommended by the CIO. They review proposals for IT investments and determine where to invest their limited funds. Each of the members has particular areas of interest, but all of them are focused on reducing the overall cost of running the business, increasing sales, and managing the cost of IT for the company. The ITSC has established a series of checkpoints at which they make go/no-go decisions on IT projects. At these decision points the following documents are reviewed by the ITSC: · Preliminary Investigation Report – describes the problem/opportunity, identifies benefits of a new system, and reports on various aspects of feasibility of the proposed project. · Requirements Specification – documents the requirements to be fulfilled by the proposed system. · Systems Design Specification – translates the requirements into a logical design for the proposed system. · Final System Report – compiles previous documents and lays out the way ahead if the project is approved and funded. As each report is approved, work on the following step begins. This controls the amount of time and effort put into a request for a system. For example, if the Preliminary Investigation Report is not accepted by the ITSC, no further work is performed on the system proposal. Your Task You are an independent Business and IT Systems Analyst, specializing in developing IT solutions for small business needs. You have been contracted by the CIO to prepare the documentation required for the ITSC as they consider replacing the information systems associated with operations, business administration, and finance. Due to the backlog in the billing and payment processes, the ITSC wants to start by replacing the current customer billing and payment system and processes. However, the ITSC requires assurance that a new billing and payment system and processes can be interfaced with other new
  • 19. IT systems and updated business processes as needed. While there is currently no money in the budget allocated to replacing or upgrading these systems, the executives are committed to moving the company forward and improving PEP’s ability to manage its growing business efficiently and effectively. Your Activities After interviewing each member of the ITSC, you have collected the following information regarding the invoice, billing and payment processes and needs: • Customer billing is handled by the Invoicing Department, which reports to the VP, Business Administration. • Customer payments are handled by the Accounts Receivable Department, which reports to the CFO. • Customer billing and payments are managed and recorded in an in-house developed Microsoft Access based solution. The solution was developed by the IT Department and is housed on a server controlled and managed by the IT Department. The solution is updated on request from the Invoicing and Accounts Receivable Departments. • The Sales Department works with Invoicing to establish new customer accounts and update and close existing accounts as needed. • The Ordering & Shipping Department sends a monthly report to Invoicing where the products ordered and shipped and their codes are entered into the invoicing module. Pricing is computed based on the product codes and quantities entered. • Invoicing is responsible for adding, updating, and maintaining the product codes and pricing used by the invoicing database on the 15th of each calendar month. The monthly report containing the updates is provided by the Marketing Department. • Invoicing generates and mails customer bills on the last business day of each calendar month. • Customer payments (lump sum) are due by the 10th of each
  • 20. calendar. Customers send the payments to Accounts Receivable. Accounts Receivable is responsible for updating customer account records when the payments are received. • Invoicing is responsible for identifying accounts that are 30 days, 60 days or more overdue. These reports are sent to Accounts Receivable and Sales. Accounts Receivable handles all collections. • There is a 2% fee added to all invoices that are 30 days or more overdue. • Accounts Receivable notifies the Sales Department to assist with customers who are 60 days or more delinquent. Ordering & Shipping is also notified so that no further shipments are made until the outstanding invoice is paid in full. These situations are rare. • Installation services are offered as a fixed price fee for small businesses (doctor’s offices, individually owned pharmacies, etc.). Larger installations (hospitals, chain pharmacies, pharmaceutical manufacturers, etc.) are billed on a pre-defined hourly rate. • Volume discounts are not currently offered, but Marketing is planning to offer this discount within the next six (6) months because the low voltage motors are increasingly being ordered in quantities of five (5) or more. The following volume discounts will be offered: o 5 or more: 2% o 10 or more: 5% o 25 or more: 10% • Electronic invoicing via email is not currently offered, but Marketing and Invoicing plan to offer this feature within the next six (6) months. • Electronic payment to a lockbox account is not currently offered, but Marketing and Accounts Receiving plan to offer this feature within the next six (6) months. • The customer account data elements currently include: o Customer Organization Name o Customer Street Address
  • 21. o Customer City o Customer State o Customer Zip Code + 4 o Primary Contact First Name o Primary Contact Last Name o Primary Contact Phone Number o Primary Contact Email Address o Secondary Contact First Name o Secondary Contact Last Name o Secondary Contact Phone Number o Secondary Contact Email Address o Products Ordered o Product Ordered Date o Products Shipped o Product Ship Date o Quantity o Product Pricing o Calculated Price (Calculated Field) o Amount Due (Calculated Field) o Amount Paid o Date Paid o Amount 30 Days Overdue (Calculated Field) o Amount 60 Days Overdue (Calculated Field) o Amount Greater Than 60 Days Overdue (Calculated Field) o 2% Overdue Amount (Calculated Field) • The customer account data elements required for near-term plans include: o Quantity Discount (Calculated Field) o Electronic Invoicing (Check Box) o Electronic Payment (Check Box) • Paper invoices currently contain the following data elements: o Unique Serialized Invoice Number (System Generated?) o Customer Organization Name o Customer Street Address
  • 22. o Customer City o Customer State o Customer Zip Code + 4 o Products Ordered o Product Ordered Date o Products Shipped o Product Ship Date o Quantity o Product Pricing o Calculated Price (Calculated Field) o Amount Due (Calculated Field) o Amount 30 Days Overdue (Calculated Field) o Amount 60 Days Overdue (Calculated Field) o Amount Greater Than 60 Days Overdue (Calculated Field) o 2% Overdue Amount (Calculated Field) • Paper invoice data points required for near-term plans include: o Volume Discount (Calculated Field) o Electronic Invoicing (Yes or No) o Electronic Payment (Yes or No) • When electronic invoices are offered, the same current and near-term data elements as shown above will be included. You have also documented the following additional considerations: • All customer, invoicing, and payment data must be secured, but accessible to those departments and personnel who have a need to know. • PEP requires the ability to generate a receipt automatically at the time payments are recorded. The receipt will be sent electronically to the organization’s primary contact email address. The receipt must contain: o Unique Serialized Invoice Number o Customer Organization Name o Customer Street Address
  • 23. o Customer City o Customer State o Customer Zip Code + 4 o Amount Paid o Date Paid o Amount Outstanding • The following company entities need to be able to generate their own reports as needed: o COO o CFO o Director, Accounts Receivable o Accounts Receivable Managers & Staff o Director, Accounts Payable o SVP, Engineering & Manufacturing Operations o VP, Business Administration o Invoicing Managers & Staff o Sales Managers & Staff o Marketing Managers & Staff o Ordering & Shipping Managers & Staff Your Deliverables Your first task is to develop the Preliminary Investigation Report (PIR), which will examine the problems/opportunities, identify benefits of a new system, and report on various aspects of feasibility of such a project. You will draw upon the background and other information provided above to develop the PIR. If that Report is accepted by the ITSC, you will analyze and organize the requirements you have collected into a Requirements Specification. After receiving approval of the Requirements Specification, you will develop the Systems Design Specification, which will translate the requirements into a logical design of the proposed system. With a further decision to proceed, you will then develop the Final System Report, which will combine your previously developed documents and lay out the way ahead if the project is approved
  • 24. and funded. PEP Case Study2 PEP CASE STUDY 1 PEP CASE STUDY 7 PEP Case Study PEP Case Study Introduction Management of an organization requires consideration of
  • 25. several factors to emerge successfully, especially for the case of an organization that requires coordination of several departments. All the departments must be considered in the coordination process in order to ensure that there is easy and effective flow within and outside the premises. However, in this case, the main factor of consideration is information technology. There is a tremendous development in this section that it requires the stakeholders of the company to ensure that the most appropriate system is installed to ensure that it meets its objectives on a timely basis. Solution to PEP Case PEP is at a point where the management must accept that change is inevitable. The advancement in the production and increase in demand is just an indicator that the initial systems and process of billing and accounting must be readjusted to meet the demands in the market without much strain on both human and IT resources. There is an immediate change that is required in the ordering and billing department as it’s for the case of the inventory department. The change must be made before the situation becomes too much for the company (Laudon & Traver, 2016). Regarding the departments, they must initiate changes because these are some of the key departments within the organization that should have been considered for renovation upon
  • 26. introduction of new products and increase in demand. With an increase in the demand, purchases and billing is automatic that the company was likely to face issues with finance department as there was an increase in the workload in terms of processing bills, invoices and the salaries of increased personnel in the company. However, the solution for the underlying problems at the PEP company is within the company itself. There is a need for minor changes within the departments affected and the creation of a well coordinating plan. The plan has to be such that there is an efficient and effective flow of the main activities of the company without causing much strain to the company`s resources (Laudon & Traver, 2016). Therefore, under the guidance of Chief Information Officer, Mr. Mark Temple and the steering committee should be able to come in agreement with some of the proposals that will ensure these problems are solved amicably. One of the most critical factors that must be considered is in the form of technology. The world is evolving into a technological hub that everything is being automated to be more effective in meeting organization objectives. As such, Mr. Temple must be willing to accept the fact that it’s better that they install a good technology system that will coordinate all the departments efficiently for a longer duration of service delivery. The other option is to install a system that shall be outdated soon, and the
  • 27. same problems are likely to arise. The department of finance is one of the most affected department because of the changes that were initiated in the company. Therefore, to make things better, there needs to be a modern technology system that coordinates the billing, invoicing and processing of payments on a timely basis (Wang, Chen & Benitez, 2015). The system must be such that it's automatically connected with the ordering and shipping department. This will ensure that any order made must be through online basis and get directly recorded into the system. This will reduce the workload between the two departments. In event of shipment and sale of the motors, the recording system automatically does its role and the work becomes easier and efficient within the system. However, due to the urgency of the issue and the need to install a system that can easily interphase with other departments without wasting more resources in terms of finance and time, this requires that the company installs a system that has already been tested and proven to be functional before. As a result, the company is most likely to get a system that can efficiently do the process of billing, invoicing and processing of payment on a timely basis at a pocket-friendly cost. This is the aspect that the system is not likely to be the most updated one, but still very useful in this case. The change initiated in this department falls in the sector of
  • 28. information and technology. It’s a common knowledge that not all individuals are for the changes that come with the initiation of the use of information technology system in service delivery. For this to be effective, there is a need to ensure that the steering committee are on the same page so that they can implement it fully throughout the departments of the organization. This will ensure that the company improves on its service delivery and there is a likelihood of higher production. There is also a need to train the employees on the use of the new system so as to ensure that there is coordination of the system and personnel within the company. For instance, the discounts made, and the fee added on the overdue payments can only be done by the employees who understand how the system can be operated. This is a similar case for the services that are not currently being done by the system such as invoicing via email and electronic payments that intend to be initiated within the next months. These are crucial process if the company intends to ensure that there is no overload at the departments offering these services. Therefore, offering training to the employees in these departments will improve service delivery. Additionally, there is a need for outsourcing or employing new personnel in the affected departments. This is due to the company experiencing an industrial growth in which the demand for its product has increased and the production has skyrocketed. Therefore, to ensure that there is less strain on
  • 29. certain departments, there is a need to employ more staff. The hiring of more staffs in this department will result in the administration concentrating strictly on its duties. This was a problem that should be avoided at all cost for a company that seeks to develop and increase its market base (Rosemann & vom Brocke, 2015). It’s through specialization of labor and division of labor that the company has been able to attain the heights that it has reached. To continue performing at the top, it should improve on these defaults and the company is likely to have more production and better service delivery that will ensure success flows within the company. In summary, the success of the company depends on the ability of the management team to keep in touch with the required changes within the facility. This is especially important if there is an expansion in the company. References Laudon, K. C., & Traver, C. G. (2016). E-commerce: business, technology, society. Rosemann, M., & vom Brocke, J. (2015). The six core elements of business process management. In Handbook on business
  • 30. process management 1 (pp. 105-122). Springer, Berlin, Heidelberg. Wang, Y., Chen, Y., & Benitez-Amado, J. (2015). How information technology influences environmental performance: Empirical evidence from China. International Journal of Information Management, 35(2), 160-170. Sheet1Database Security VulnerabilitiesPrevention, Detection, and Response Techniques for Yahoo.comPotential SQL Injection Vulnerability for SQL Database Database Backend and Front End Content Managent(Yahoo records) Public Users Threat Vector: Attacker crafts an SQL statement to retrieve records from Yahoo database example: SELECT * FROM Users WHERE UserId = 105 OR 1=1;Content Management Engine Mitigation Procedure: Parameterized Querys and Sanitization, Whitelist Input ValidationCloud Data Spoofing Cloud DMZ and ISP Network ConfigurationsNetwork Traffic Redirect of valuable cloud information Threat Vector: Cloud Storage For
  • 31. user Access may be spoofed by an attacker and this may lead to data being written to the attacker's target instead of Cloud Storage For user Access ISP and DMZ Routers are misconfigured Mitigation Procedure: Standard authentication mechanism to identify the destination data store. Black list of BOGON IP's with IPS logging and session sniping Denial Of ServiceBandwidth Constraints and Traffic Redirection Excessive Resource Consumption for Yahoo Inc WebserverThreat Vector: External user(s) accessing Yahoo servers may consuming CPU resources and Bandwidth, the Hardware and software resources are insufficient or misconfiguredMitigation Procedure: Load Balancing and testing load capacity i.e. concurrent connections consuming normal resources. Upgrade Hardware and use different paths of last resort for external users to retrieve resources when resources become scarcePrivilege EscalationAuthenication Systems, Methods, and Security Control typesElevation of PrivilegeThreat Vector: Yahoo Inc Webserver External Users may be able to impersonate the context of Authentication Mechinism Provider External Users in order to gain additional privilegeEntire Network InfrastructureMitigation Procedure: Upgrade and or Harden existing authentication mechnisms to include two factor authentication and stronger passwords. Enforce least privilege and log/alert Administrative account access
  • 32. Prevention Measures for Vulnerabilities XX CMGT/431 XX XX 1 2
  • 33. Prevention Measures for Vulnerabilities The identification of potential security vulnerabilities in Yahoo Inc will undergo System Development Lifecycle Practices to ensure the underlying systems are assuredly protected by modern security practices and controls. In each of the phases of SDLC, the security mechanisms are explicitly tailored to the system requiring the control (McCown, 2002). The purpose of this study is to review the applicable Security Controls to the vulnerabilities as mentioned earlier in the attached spreadsheet. Thus, providing prevention, detection, and response mechanisms within each of the SDLC phases. The first phase of the SDLC is Initiation, as such this consists of weighing the potential gains and losses if specific controls are implemented. Scope creep is a primary concern in this phase of SDLC as budgets become an issue when requiring specific controls to be redesigned. The formal risk assessment process is
  • 34. a requirement in the initiation phase as there are likely to be threats that target the CIA triad of the system design. The impact of the threat to the CIA triad as it applies to the risk assessment results in security controls derived explicitly for that Information System. In a noniterative approach Acquisition and Development of the security hardware and or software will build upon the initiation phase of SLDC (Haridas, 2007). In the initial risk assessment in the initiation phase, the resulting security controls are defined as the acquired assets in SDLC. Before the Development portion of this phase can begin, the risk assessment should call out all the applicable vulnerabilities and the level of threat to all the underlying assets. The reciprocity of internal systems and their interoperable security controls are detailed explicitly in this phase as they apply to the underlying development of the system in development. In the third phase of SDLC, Implementation requires that the system undergoes testing of the implemented security controls to assure that a viable authority to operate Security Package is approved for the system. The stakeholders and all vested personnel in this phase are apprised of any due outs required for the system. Another chance to test the security controls and the viable efficiency of the system is executed in this phase as well. The fourth phase of the SDLC is the Operate and Maintain and requires close monitoring of the system to ensure that the
  • 35. controls and system are operating within the scope of what they are intended to do (Bird, 2017). Changes to the system at this time should, of course, be documented and carefully reviewed for accuracy and meet expectation. In this phase, continuous monitoring and modification of security controls will ensure that the authority to operate on the network security package is relevant to the timeframe in which it will be submitted. In the fifth phase of the SDLC, we will focus on ending the lifecycle of the system with security methods commensurate with the impact on any controls impacting the retiring system. Disposal of any valuable information using destruction methods approved by the organization's policy is carried out as a final step in the final phase of SDLC. References Haridas, N. (2007, April). Software Engineering – Security as a Process in the SDLC. SANS Institute InfoSec Reading Room, (), . Retrieved from https://www.sans.org/reading- room/whitepapers/securecode/software-engineering-security- process-sdlc-1846 Bird, J. (2017, October). 2017 State of Application Security: Balancing Speed and Risk. SANS Institute InfoSec Reading Room, (), . Retrieved from https://www.sans.org/reading- room/whitepapers/analyst/2017-state-application-security- balancing-speed-risk-38100
  • 36. McCown, C. (2002, November). Framework for Secure Application Design and Development. SANS Institute InfoSec Reading Room, (), . Retrieved from https://www.sans.org/reading- room/whitepapers/application/framework-secure-application- design-development-842 Categories Vulnerabilities Potential Incident Controls People Social Engineering Breach of data/Personal Identifiable Information Proper training, policies, and access control permissions Process Technology