 Idah S Muringayi H1113515V
 Fungayi Makoni H1110060Y
 Definite Shunje H1110024O
 Simbiso S Chipazi H1112229J
Online application and allocation of residence
system.
 To transform the manual residence
application into a computerized system which
is more user friendly and GUI oriented .
 Functional requirements
System accept and validate user input
Process user information and complete residence
allocation
 Non functional requirements
Better speed in loading pages
Reliability- 24/7
Security - use of passwords, CIA, firewalls, UPS
Hardware ( client computers, network, web servers)
Rapid Application Development
Why RAD?
 faster development cycle and better turnaround time
 enhanced quality due to error reduction due touse of
automation tools
 better maintenance and up gradation of the system
 Better project management(participation of all interested
parties)
RISK MITIGATION
TECHNICAL
Lack of technical expertise
Malicious use of system
 some candidates claiming to have
knowledge in managing the
system’s database when they do not
know much
Training of system users
Use of passwords and firewalls to
control access and flow within the
system
 thorough practical and theoretical
interviewing before induction of new
candidates
OPERATIONAL
power outages
unintentional deletion of data
Use of UPS
implementation of remote backups
HUMAN THREATS
Theft and robbery
Vandalism
Computer crime
use of physical barriers e.g. lock &
key, security guards
implementing policy regarding
vandalism and computer crime
Use of anti-virus and anti-malware
NATURAL THREATS
Due to geographical and
environmental factors( earthquakes,
Use of remote backups
RISKS ANALYSIS AND MITIGATION
TYPE OF TESTING GENERAL SCOPE WHO GENERALLY DOES IT
UNIT small unit of code,
not lager than a class
the developers
INTERGRATION Multiple classes The developers
FUNCTIONAL
/SYSTEM
Whole system Users, administrator. Even
developers
ACCEPTANCE whole system in
users environment
users
TESTING
This is concerned with the confidentiality, Integrity and availability of
the system
 Confidentiality
Implemented through the use of access controls e.g. passwords
Different privileges are given to different users of the system
 Integrity
 Mainly concerned with the prevention of improper modification of
the overall system and database information.
 Use of Encryption
 Availability
 System availability when needed
 Use of UPS in case of power outages
 The online application and allocation system of
residence was tailor-made only for use at HIT.

Slides

  • 2.
     Idah SMuringayi H1113515V  Fungayi Makoni H1110060Y  Definite Shunje H1110024O  Simbiso S Chipazi H1112229J Online application and allocation of residence system.
  • 3.
     To transformthe manual residence application into a computerized system which is more user friendly and GUI oriented .
  • 4.
     Functional requirements Systemaccept and validate user input Process user information and complete residence allocation  Non functional requirements Better speed in loading pages Reliability- 24/7 Security - use of passwords, CIA, firewalls, UPS Hardware ( client computers, network, web servers)
  • 5.
    Rapid Application Development WhyRAD?  faster development cycle and better turnaround time  enhanced quality due to error reduction due touse of automation tools  better maintenance and up gradation of the system  Better project management(participation of all interested parties)
  • 6.
    RISK MITIGATION TECHNICAL Lack oftechnical expertise Malicious use of system  some candidates claiming to have knowledge in managing the system’s database when they do not know much Training of system users Use of passwords and firewalls to control access and flow within the system  thorough practical and theoretical interviewing before induction of new candidates OPERATIONAL power outages unintentional deletion of data Use of UPS implementation of remote backups HUMAN THREATS Theft and robbery Vandalism Computer crime use of physical barriers e.g. lock & key, security guards implementing policy regarding vandalism and computer crime Use of anti-virus and anti-malware NATURAL THREATS Due to geographical and environmental factors( earthquakes, Use of remote backups RISKS ANALYSIS AND MITIGATION
  • 7.
    TYPE OF TESTINGGENERAL SCOPE WHO GENERALLY DOES IT UNIT small unit of code, not lager than a class the developers INTERGRATION Multiple classes The developers FUNCTIONAL /SYSTEM Whole system Users, administrator. Even developers ACCEPTANCE whole system in users environment users TESTING
  • 8.
    This is concernedwith the confidentiality, Integrity and availability of the system  Confidentiality Implemented through the use of access controls e.g. passwords Different privileges are given to different users of the system  Integrity  Mainly concerned with the prevention of improper modification of the overall system and database information.  Use of Encryption  Availability  System availability when needed  Use of UPS in case of power outages
  • 9.
     The onlineapplication and allocation system of residence was tailor-made only for use at HIT.