SlideShare a Scribd company logo
1 of 37
Running Head: PROJECT CHARTS
1
PROJECT CHARTS
2
Project Charts
Name
Institution
Project Charts
Project Activities Plan
Gantt Chart Showing the Schedule of the Project Activities
Applications Implementation Re-engineering process
Customization Project Interface Project Architecture
Project Conersion Project Testing Employees Training
Project End 43586 43593 43600 43607
43607 43610 43616 43635 43639
Duration Applications Implementation Re-engineering
process Customization Project Interface Project
Architecture Project Conersion Project Testing Employees
Training Project End 28 14 14 7 14 6 5 4
3
Start Week
Week
0123456789
MayMayMayMayMayJunJunJunJunJul
1815222951219263
Phase
Applications Implementation
One
Re-engineering
Customization
Phase
Project Interfaces
Two
Project Architecture
Project Conversion
Project Testing
Final Project Specification
Phase Review and Approval
Phase
Three
Employees Training
Project End
Milestone: additional funds
May 1, 2019
Starting
Access Control, Authentication, and Public Key Infrastructure
Chapter 3
Business Drivers for Access Controls
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
1
Data or Information Assets
An intangible asset with no form or substance:
Paper records
Electronic media
Intellectual property stored in people's heads
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
2
Importance of Policy and Senior Management Role
Organizations value intellectual property
Must control access to information to ensure survival
Protecting confidential information involves:
Technical controls
Clear policies and sound business processes that implement
those policies
Access control policies are effective only with support of senior
executives
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
3
Classification Schemes
Classification scheme is a method of organizing sensitive
information into access levels
Only a person with the approved level of access is allowed to
view information
This access is called clearance
Every organization has its own method of determining clearance
levels
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
4
National Security Classification
Unclassified
Confidential
Secret
Top Secret
Corporations
Public
Internal
Sensitive
Highly sensitive
Classification Schemes (Cont.)
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
5
In a hospital, for example, a data classification scheme would
identify the sensitivity of every piece of data in the hospital,
from the cafeteria menu to patient medical records.
Classified as Public
For use by defined category within job role
Sensitivity-Based Data Classification
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
6
Need to know
Requester should not receive access just because of his or her
clearance, position, or rank
Requester must establish a valid need to see information
Access should be granted only if information is vital for
requester’s official duties
Least privilege
A computer user or program should have only the access needed
to carry out its job
Need to Know and Least Privilege
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
7
Declassification
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
8
Automatic
Systematic
Mandatory declassification review
Freedom of Information Act request
Business Drivers for Access Control
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
9
Cost-benefit analysis
Risk assessment
Business facilitation
Cost containment
Operational efficiency
IT risk management
Electronic Records
United Nations Electronic Data Classification
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
10
The Life Cycle of an Order
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
09/23/10
(c) ITT Educational Services, Inc.
11
Defense:
Risk: Insecure Direct Object Reference
Use an automated tool for real-time attack.
Monitor parameter manipulation–hidden/static.
Establish baseline configuration.
Risk: Cross-Site Request Forgery
Use an automated tool for real-time attack.
Alert/respond to parameter manipulation.
Use known attack signatures.
Establish baseline/monitor resource changes.
Risk: Security Misconfiguration
Use an automated tool for real-time attack.
Inspect outbound responses.
Investigate application failures.
09/23/10
(c) ITT Educational Services, Inc.
11
Controlling Access and Protecting Value
Importance of internal access controls
Importance of external access controls
Implementation of access controls with respect to contractors,
vendors, and third parties
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
12
Refers to security of records and information not in electronic
systems and applications
Access is regularly linked to functional responsibilities and not
to position or grade
Security or background investigation required
Physical Security of Sensitive Information
Can/Should this information be shared?
Secure storage and limited access
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
13
Data Destruction
Use appropriate secure destruction method for the media and
format.
Do not put in trash bins.
Data awaiting destruction should be placed in lockable
containers.
Strictly confidential and confidential data is destroyed in
accordance with specific guidelines.
.
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Data destroyed in accordance with administrative or operations
retention schedule
14
Data Destruction (Continued)
.
Shredder/Degausser
Light office shredder/disintegrator
Electronic media
Portable devices
Portable devices
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Data destroyed in accordance with administrative or operations
retention schedule
15
Manage the Identity and Access Provisioning Life Cycle
16
Module Topic
Access Control and Identity Management Life Cycle
‹#›
17
Access Control and Identity Management Life Cycle
‹#›
18
Provisioning
Review
Revocation
Provisioning
‹#›
19
Provisioning entails determining the organizational
requirements for access to information, and applies the
appropriate access rights
Review
‹#›
20
Access rights and usage must be monitored on a basis
commensurate with risk
Reviewing access can take the form of automated checks,
manual audits, and several other methods
Revocation
‹#›
21
Through access review, revocation typically is invoked when a
user has aggregated unnecessary access, or access is not
commensurate with the role of the user
Business Requirements
Reference number:
Document Control
Change Record
Date
Author
Version
Change Reference
Reviewers
Name
Position
Table of Contents
2Document Control
1
Business Requirements
4
1.1
Project Overview
4
1.2
Background including current process
4
1.3
Scope
4
1.3.1
Scope of Project
4
1.3.2
Constraints and Assumptions
5
1.3.3
Risks
5
1.3.4
Scope Control
5
1.3.5
Relationship to Other Systems/Projects
5
1.3.6
Definition of Terms (if applicable)
5
1 Business Requirements
1.1 Project Overview
Provide a short, yet complete, overview of the project.
1.2 Background including current process
Describe the background to the project, (same section may be
reused in the Quality Plan) include:
This project is
The project goal is to
The IT role for this project is
1.3 Scope
1.3.1 Scope of Project
The scope of this project includes a number of areas. For each
area, there should be a corresponding strategy for incorporating
these areas into the overall project.
Applications
In order to meet the target production date, only these
applications will be implemented:
Sites
These sites are considered part of the implementation:
Process Re-engineering
Re-engineering will
Customization
Customizations will be limited to
Interfaces
the interfaces included are:
Architecture
Application and Technical Architecture will
Conversion
Only the following data and volume will be considered for
conversion:
Testing
Testing will include only
Funding
Project funding is limited to
Training
Training will be
Education
Education will include
1.3.2 Constraints and Assumptions
The following constraints have been identified:
The following assumptions have been made in defining the
scope, objectives and approach:
1.3.3 Risks
The following risks have been identified as possibly affecting
the project during its progression:
1.3.4 Scope Control
The control of changes to the scope identified in this document
will be managed through the Change Control, with business
owner representative approval for any changes that affect cost
or timeline for the project.
1.3.5 Relationship to Other Systems/Projects
It is the responsibility of the business unit to inform IT of other
business initiatives that may impact the project. The following
are known business initiatives:
1.3.6 Definition of Terms (if applicable)
List any definitions that will be used throughout the duration of
the project.
5
Running Head: BUSINESS REQUIREMENT
DOCUMENTATION 1
BUSINESS REQUIREMENT DOCUMENTATION 2
Business Requirement Documentation
Student Name
Professor Name
Course Title
Date
Business Requirement Documentation
Scope of the Project
Company and Project Objectives
The company aims to use the project to cater to the increasing
company needs and offer qualities services to expanding the
number of customers. The goal of the company is to increase the
speed use of the system to customer with a more reliable system
by providing an open and flexible system base of future
speculation of technology change. It will ensure a high level of
customer’s data security and remove repetition of business
transactions in the organization. It will be enhanced by
electrical capture of stakeholder’s data from the sources. The
project aims to increase information sharing form the company
and stakeholders as well as boasts the ability and effectiveness
of employee to perform their job. The overall objective is to
provide a more efficient and effective way to serve increasing
customer and safekeeping of stakeholder data.
The project ensures the end user that is customer and
organization have the best experience input into the design
process. It ensures there is a reduction in time taken to make a
transaction online and the delivery time is reduced. It also gives
update of time-to-time on the delivery process (Hsu & Wang,
2017). The project aims to achieve all the organization's goal
and objective within the stipulated time and budget. It will also
try to minimize the disruption of business operation during this
tie on the affected units. It will also come into favorable terms
of agreement with the vendors and another department.
Application
To cater to the increasing number and period given, the project
will first implement the installation of the servers. It also
includes updating the database, starting with the internal
environment of the business that is the update of staff data,
management, and shareholders information (Lind & Culler,
2015). It will be followed by updating the customer's profile to
capture the necessary data, ensure the safety of data received,
and increase the speed of the access to the profiles. The system
will then concentrate on the security features of the database.
The analysis of the system will be conducted to ensure effective
use of the application.
The project will update the central hub with the update servers
to access the new database. This is to boost the network
connectivity between the serves and the computers in the
organization. The operating system will be configured again to
gain access to the new database and with the networking
system. Due to the time parameter, the project will not be
updating the hardware system with the new application. They
include action such printer and scanners replacement, upgrade
of computer desktop hardware, an increase of internet cables,
and routers.
Sites
Management is required to interpret different data from the
system without physically involved in the daily activities of the
business. To achieve the project will install software that will
analyze the daily transaction of the business and send
interpreted data to the management (T. Hans, 2014). The data
may involve a sale report, invoices analysis, and output data of
the product. It will easily decision making on the management.
The system will contain part of the vendors of the company as
part of the implementation of the project. It will be in the aim to
reconcile all the company data and transaction to an online
platform. It is to ensure the proper record keeping of all
incoming and outgoing transaction with the vendors. To
effectively implement the project, the website design will have
to change to accommodate the new data. It will include more
feature at the end, such as delivery track option, promotion
options, and more to compare competing brand in the website.
Re-engineering Process
Re-engineering will restructure the business processes involved
during the transaction between the customer and the company.
To improve on quality and speed between the transactions taken
between the customers purchasing the product and the company
staff authenticating the process some of the step involved will
be redesigned (Lind & Culler, 2015). There will be a few steps
involves, and the website will be automatically caring for the
whole process of buying. To authenticate the process employee
will take a few seconds to update the customers on the delivery
start.
Another process that will be redesign is the analysis of the data.
The system will be able to improve in term of speed to analyze
customer data, thus offer better quality. Management will be
able to pull the reports required as a concise moment to enable
make the right decision. The re-engineering of the various
process such the customer website, staff users, vendor process,
and management will affect the company structures. It will
bring in the supervisor of the transaction, the system, and
updating and analysis of the system data.
Customization
Since the project is designed according to company
specification, it will include all the customers’ preferences. One
the customer create a profile and make his first customer the
program will be able to speculate customer’s choice and taste of
products such that the next time customer login in it will be to
advertise the best product (Lind & Culler, 2015). The
customization will be limited to only those who have created an
account on the company’s website. Accessibility of product and
the whole process of buying on the customer's end interface will
only be limited to those who have created an account also.
On the company end, interface vendor will be required to create
an account and keep track of their invoices. They will be alerted
automatically when they supply product each reorders level.
The management will be able to manage the company
inventories from the others, as vendors are limited to access the
movement of product in the company.
The low-level staff will only have access to daily activities
transactions. Their activities involve managing the money
transaction, authenticating product for delivery, and updating
the customers on the delivery process. Top management will be
able to analyze all the data required in the running of the
business. It includes sale report, balance sheet, income
statement, inventory management report, among other reports
necessary for decision-making. The information technology
department will be in control of the system to offer support and
troubleshooting of the system when needed.
Interfaces
The project will implement two information system interface.
The first one includes the external user interface that will
comprise of customer and vendors(Foster &Godbole, 2016).
Customer’s user will consist of features such as the creation of
an account, filling of profile data, comparison of various
product, various payment methods, the making of purchase, and
tracking the delivery of the product. Vendor’s side will
comprise of quotation platform, track of invoices, methods of
payments, quantities delivered an update of reorder level.
The second interface includes that company user. It comprises
features such as the update of the product, price update,
promotion update, viewing of successful completion of the
purchase of product transactions, update on delivery methods,
and time. It will also comprise of customer care services to
ensure customer complaints are handled and are satisfied with
the services offered. It will also be able to produce various
reports needed for decision making in the business.
Architecture
The technical architecture will be involved in planning the
design of the whole project. They show in the diagram, chart the
information flow, and control measure in places at every point
of the system(Xing & Qi, 2015). They include the physical
design of the project and the material required to hold the
hardware part of the system. They form the connection of all the
system involving the hardware and the software to ensure the
system run as required. They recommend the requirement of the
information asset in implementing the project. They will be
involved in using various domains as a business model,
information, services and technical in design the required
business model, capture the relevant data, alignment with
business process, and provide security features.
They will also play the role of management in offering
technological strategies for the company process according to
business vision and goals. They also provide advisory services
to the management team concerning the business solution that
involves the role of information technology. Some application
includes providing information technology long-range plan to
achieve the project objectives.
Conversion
The project will first utilize the parallel conversion method to
make customer familiar with the new system. Within a
stipulated time, the project will use to direct conversion method
where it ultimately uses the new system(T. Hans, 2014). The
customer old profile will be deleted and required to create new
profiles. The previous company data that is stored on electronic
devices will be converted to the new system to ensure full
transit to the new system. The vital information that was left
behind in the old system will be integrated into the new system
to make it full operation. Security measure will be followed to
ensure no critical data is lost during the transit.
Testing
The project will be tested on a fully integrated system to ensure
it complies with the desired result. The project will use
simulated method to test the reliability, compliance, and
performance before being launched. It will be able to
recommend an improvement need.
Funding
The project is expected to receive much support from
shareholder since the main aim is to improve shareholders
wealth; thus, most of the financing will be shareholders
contribution. The company retention profit will be used to fund
the project. The company wills also source from external credit
sources such as a bank.
Training and Education
Training on the uses of the new system will be conducted on all
employee in the company according to their customization use.
Education will include all the stakeholder of the company to
make them familiar with the project (T. Hans, 2014). Customer
will be provided with the written guideline on the website the
moment the access it on how to create both the account and a
profile and how to maximize all the features available.
Project Control
The project will use the documentation and prepared project
plan along with company budgeting plan to monitor the progress
of the system. It wills constraint not all the activities within the
budget line and make sure resources are misused (Keyes, 2017).
It will ensure the project is on track with the stipulate
completion time by following the project plan. It will ensure
there is no or little change occur on the scope of the project
working on the project documentation. The company is required
to employ skilled personnel in the area of project management
to always evaluate and monitor the progress of the project. The
monitoring group is expected to come up with a baseline review
of the project.
The Possible Risk Associated With the Project
The project is related to the risk of uncontrolled strategy
schedule leading to developing a comprehensive timeline. The
number of the developed interface may interfere with the
existing system. The project may include failure due to shallow
knowledge of the user. Vendor may not estimate the product
may be due to insufficient information provided. Unrealistic
budgeting of the project may cause the constraint on the
implementation of the project (Parry & Lind, 2016). Unrealistic
time estimation to complete the project due to enormous
pressure from management. The project may face the risk of
being implement by a team member with little knowledge of the
business operation or information technology. There may be
unmatched functionality with the new packages due to reducing
customization. The procurement may use unclear methods to
provide low qualities raw material or induce unclear quality
management procedure.
Project Assumption
The project assumes the following in developing the plan. All
the stakeholders are willing to shift the business operation to
take advantage of the new system. Top management is in
support of the project and provides all the resources need to
ensure the project is completed. The monitoring group carries
their work precisely without any influences to ensure they
provide recommendation where required. The vendor will
deliver the material in time. The project team member will
adhere to the company guideline and communication plan. Any
delay in supply of material will result to project completion
delays(Hassan, Ahmad, &Zuhaira, 2018). Any new information
provided may lead to a change in the project plan. All the
information about the company and the user is disclosed to the
project. All the users will participate in the timely execution of
the project plan. The technological infrastructures that needed
in the project will be readily available in the market.
Project Constraints
The project may be limited access to the international user to
the nature of law enforcement. Resources available in the
market may limit the project success. Budget constraints due to
limited sources of finance may hinder the successful completion
of the project (Parry & Lind, 2016). An unforeseeable disaster
such as national disaster, for example, war, earthquake may
extend completion time. Completion time of the project may
constrain the proper execution of the plan.
Integration with Other System and Infrastructure
For the project to be completed, all the software system must be
integrated with the hardware system. The computer software
such as enterprise resource planning will be integrated with
computer desktop. The networking such as the internet will be
accessed through the router available and central hub. Servers
will serve as the domain for accesses of internet and storage of
data to ensure reliability and speed of the system. Printer and
scanner will be connected with the computer to produce the
output processed such as invoice and reports. The database will
be upgraded and made available to both the customer user
interface and company user. Security features such as password
and supervision when the long transaction is involved will be
implemented in the system to ensure safe data storage (Norman,
2014). The project will be integrated in all business unit of the
company to ensure uniform flow of the project.
Definition of Terms
Interface refers to a point where two systems interact to make a
complete pattern of design software.
Integration refers to the redesign of different sub-system or
component of a system and brings them together to make one
complete system.
Database refers to the storage of the collection of information
can be easily managed, update, and accessed anytime in need.
Project scope refers to tools that are used to explain the key
objective of the project, the desired milestone, functions,
completion time, and costs.
Project Activities Plan
Gantt Chart Showing the Schedule of the Project Activities
References
Foster, E. C., &Godbole, S. (2016). Database User Interface
Design. Database Systems, 139-153. doi:10.1007/978-1-4842-
1191-5_6
Hassan, I. U., Ahmad, N., &Zuhaira, B. (2018). Calculating
completeness of software project scope definition. Information
and Software Technology, 94, 208-233.
doi:10.1016/j.infsof.2017.10.010
Hsu, H., & Wang, S. (2017). Integrating Technology: Using
Google Forms to Collect and Analyze Data. Science
Scope, 040(08). doi:10.2505/4/ss17_040_08_64
Keyes, J. (2017). Information Technology Project Tracking and
Control. The CIO’s Guide to Risk, 105-
122.doi:10.1201/9781315108674-7
Lind, M. R., & Culler, E. (2015).Information Technology
Project Performance. Perspectives and Techniques for
Improving Information Technology Project Management, 39-50.
doi:10.4018/978-1-4666-2800-7.ch004
Norman, T. (2014).Information Technology Systems
Infrastructure. Integrated Security Systems Design, 203-249.
doi:10.1016/b978-0-12-800022-9.00011-5
Parry, V. K., & Lind, M. L. (2016). Alignment of Business
Strategy and Information Technology Considering Information
Technology Governance, Project Portfolio Control, and Risk
Management. International Journal of Information Technology
Project Management, 7(4), 21-37.
doi:10.4018/ijitpm.2016100102
T. Hans, R. (2014). Software Project Scope Verification
Through Deliverable-Oriented Work Breakdown
Structure. Computer Science & Information Technology ( CS&
IT ). doi:10.5121/csit.2013.3646
Xing, F., & Qi, H. (2015).Montage's Application and
Exploration in the Architecture Project Art. 2015 International
Conference on Industrial Informatics - Computing Technology,
Intelligent Technology, Industrial Information Integration.
doi:10.1109/iciicii.2015.130
Applications Implementation Re-engineering process
Customization Project Interface Project Architecture
Project Conersion Project Testing Employees Training
Project End 43586 43593 43600 43607
43607 43610 43616 43635 43639
Duration Applications Implementation Re-engineering
process Customization Project Interface Project
Architecture Project Conersion Project Testing Employees
Training Project End 28 14 14 7 14 6 5 4
3
Start Week
Week
0123456789
MayMayMayMayMayJunJunJunJunJul
1815222951219263
Phase
Applications Implementation
One
Re-engineering
Customization
Phase
Project Interfaces
Two
Project Architecture
Project Conversion
Project Testing
Final Project Specification
Phase Review and Approval
Phase
Three
Employees Training
Project End
Milestone: additional funds
May 1, 2019
Starting
1
Project Plan Inception
Muhammad Jawad
Dr. Dave Verret
CIS 498
April 15, 2019
Project Introduction
Background Information
Mino is an innovative e-commerce company that is located in
Beijing, China. The company has been in existence for the last
five years. The company has employed ten workers, and it
raises revenue of $5 million per year. With the increase in
demand for company products, the company is expanding at a
very rapid rate. It is even estimated that in the next two years
the company will be able to employ about 30 employees and the
revenue generated is also expected to increase from $ 5 million
to $ 30 million. To effectively perform their tasks the company
relies on information technology because most of the
transactions are done online. The company has invested strongly
in information technology. The company has does most of its
transactions online, and it is recording an increase in the
number of users who are seeking to have access to their goods
and services. Therefore, there is a need to expand the business
so that it can meet the needs of the rising number of customers
who have access to the company.
The business of the Company
The company is an e-commerce oriented meaning that most of
their transactions are done over the internet. Users have to have
access to the website of the company from where they can place
their orders. Then the transactions are done online, and the
products are delivered to the customer. The company deals
mostly with electronics such as phones, tablets, televisions,
computers, and laptops. The goods are ordered and are delivered
within China in a week, but overseas delivery may take months.
Most of the transactions that the company does are based in
China, but there are a few exceptions whereby it may sell their
products overseas.
Information Systems
The organization does most of its transactions online; therefore
it should have a well-established information system. The
company uses a MySQL database because it bests serves the
needs of the organization. The MySQL database allows for the
frequent databases to be performed by the company. The
database also can handle the multiple documents, and because
the company will require many users to create their profiles,
then MySQL database will be the best. The information
systems have very many components; therefore, the system
requires regular system analysis that helps solve the problems
of the system. During system analysis, the system is split into
parts to determine how they are working to achieve the needs of
the organization. During splitting they can identify any problem
to the system and try to solve the problems ("Networking
systems,").
The computers in the organization are connected independently
to the central hub which connects them to the external network
via the router. The company has ten computers and printers that
are all connected through the central hub. The computer also
has a variety of computer resources that help in the network
connectivity processes. Apart from the computers, it has a
central hub, router, printers, scanners, internet cables that allow
for easier operating of the tasks in the organization.
Furthermore, the company uses a network operating software
called Microsoft NT that allows for the connection to the
internet
The human-computer interface that the organization is has on
two parts. First, the client end allows for the client to view the
product, create an account and buy products. While on the
company end it allows them to post their products over the
internet and view who have bought products. The website
design that is used by the company is the responsive design. It
allows individuals to view the best quality of images and also it
allows for transactions to be performed by the website
("Different types of website design,").
References
Different types of website design. (n.d.). Retrieved from
https://expert.services/blog/managing-your-website/custom-
website-trends/responsive-design
Networking systems. (n.d.). Retrieved from
https://www.purplezeus.com/networking-systems.html
· Week 6 Project Deliverable 3 Submission
Click the link above to submit your assignment.
Students, please view the "Submit a Clickable Rubric
Assignment" in the Student Center.
Instructors, training on how to grade is within the Instructor
Center.
Project Deliverable 3: Database and Programming Design
Due Week 6 and worth 150 points
This assignment consists of two (2) sections: a design document
and a revised Gantt chart or project plan. You must submit both
sections as separate files for the completion of this
assignment. Label each file name according to the section of the
assignment for which it is written. Additionally, you may create
and / or assume all necessary assumptions needed for the
completion of this assignment.
One (1) of the main functions of any business is to transform
data into information. The use of relational databases has
gained recognition as a standard for organizations and business
transactions. A quality database design makes the flow of data
seamless. The database schema is the foundation of the
relational database. The schema defines the tables, fields,
relationships, views, indexes, and other elements. The schema
should be created by envisioning the business, processes, and
workflow of the company.
Section 1: Design Document
1. Write a five to ten (5-10) page design document in which
you:
a. Create a database schema that supports the company’s
business and processes.
b. Explain and support the database schema with relevant
arguments that support the rationale for the structure. Note: The
minimum requirement for the schema should entail the tables,
fields, relationships, views, and indexes.
c. Create database tables with appropriate field-naming
conventions. Then, identify primary keys and foreign keys, and
explain how referential integrity will be achieved.
d. Normalize the database tables to third normal form (3NF).
e. Create an Entity-Relationship (E-R) Diagram through the use
of graphical tools in Microsoft Visio or an open source
alternative such as Dia. Note: The graphically depicted solution
is not included in the required page length but must be included
in the design document appendix.
f. Explain your rationale behind the design of your E-R
Diagram.
g. Create a Data Flow Diagram (DFD) through the use of
graphical tools in Microsoft Visio or an open source alternative
such as Dia. Note: The graphically depicted solution is not
included in the required page length but must be included in the
design document appendix.
h. Explain your rationale behind the design of your DFD.
i. Create at least two (2) sample queries that will support the
organizational reporting needs.
j. Create at least two (2) screen layouts that illustrate the
interface that organizational users will utilize.
Your assignment must follow these formatting requirements:
· This course requires use of Strayer Writing Standards (SWS).
The format is different than other Strayer University courses.
Please take a moment to review the SWS documentation for
details.
· Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the
date. The cover page and the reference page are not included in
the required assignment page length.
· Include charts or diagrams created in MS Visio or Dia as an
appendix of the design document. All references to these
diagrams must be included in the body of the design document.
Section 2: Revised Gantt Chart / Project Plan
Use Microsoft Project or an open source alternative, such as
Open Project, to:
2. Update the Gantt chart or project plan (summary and detail)
template, from Project Deliverable 2: Business Requirements,
with all the project tasks.
The specific course learning outcomes associated with this
assignment are:
· Describe the various integrative functions and processes
within the information systems area, including databases,
systems analysis, security, networking, computer infrastructure,
human computer interaction, and Web design.
· Demonstrate the ability to evaluate organizational issues with
integrative technological solutions.
· Apply integrative information technology solutions with
project management tools to solve business problems.
· Use technology and information resources to research issues in
information technology.
· Write clearly and concisely about strategic issues and
practices in the information technology domain using proper
writing mechanics and technical style conventions.
Grading for this assignment will be based on answer quality,
logic/organization of the paper, and language and writing skills,
using the following rubric found here.

More Related Content

Similar to Running Head PROJECT CHARTS1PROJECT CHARTS2.docx

Nabi Hussain_IT_Resume
Nabi Hussain_IT_ResumeNabi Hussain_IT_Resume
Nabi Hussain_IT_Resume
Nabi hussain
 
4 Security Guidelines for SharePoint Governance
4 Security Guidelines for SharePoint Governance4 Security Guidelines for SharePoint Governance
4 Security Guidelines for SharePoint Governance
Imperva
 
CV_Sunil Arya_Updated
CV_Sunil Arya_UpdatedCV_Sunil Arya_Updated
CV_Sunil Arya_Updated
Sunil Arya
 
Abul_Resume_QE&A
Abul_Resume_QE&AAbul_Resume_QE&A
Abul_Resume_QE&A
Abul Azad
 
Resume_Monica
Resume_MonicaResume_Monica
Resume_Monica
Monica R
 

Similar to Running Head PROJECT CHARTS1PROJECT CHARTS2.docx (20)

Paramjeet s resume
Paramjeet s resumeParamjeet s resume
Paramjeet s resume
 
Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824
 
ByteCode pentest report example
ByteCode pentest report exampleByteCode pentest report example
ByteCode pentest report example
 
Alex syvorotka - QA: Customer Oriented Testing Approaches in theory and practice
Alex syvorotka - QA: Customer Oriented Testing Approaches in theory and practiceAlex syvorotka - QA: Customer Oriented Testing Approaches in theory and practice
Alex syvorotka - QA: Customer Oriented Testing Approaches in theory and practice
 
Vinod_Resume
Vinod_ResumeVinod_Resume
Vinod_Resume
 
QA Prayag
QA PrayagQA Prayag
QA Prayag
 
Nabi Hussain_IT_Resume
Nabi Hussain_IT_ResumeNabi Hussain_IT_Resume
Nabi Hussain_IT_Resume
 
Sample Risk Assessment Report- QuantumBanking.pdf
Sample Risk Assessment Report- QuantumBanking.pdfSample Risk Assessment Report- QuantumBanking.pdf
Sample Risk Assessment Report- QuantumBanking.pdf
 
4 Security Guidelines for SharePoint Governance
4 Security Guidelines for SharePoint Governance4 Security Guidelines for SharePoint Governance
4 Security Guidelines for SharePoint Governance
 
Jagan_Resume
Jagan_ResumeJagan_Resume
Jagan_Resume
 
Swetha Nelluru
Swetha NelluruSwetha Nelluru
Swetha Nelluru
 
CV_Sunil Arya_Updated
CV_Sunil Arya_UpdatedCV_Sunil Arya_Updated
CV_Sunil Arya_Updated
 
Abul_Resume_QE&A
Abul_Resume_QE&AAbul_Resume_QE&A
Abul_Resume_QE&A
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit Club
 
The Complete Web Application Security Testing Checklist
The Complete Web Application Security Testing ChecklistThe Complete Web Application Security Testing Checklist
The Complete Web Application Security Testing Checklist
 
NavinB
NavinBNavinB
NavinB
 
Practical IT auditing
Practical IT auditingPractical IT auditing
Practical IT auditing
 
Resume_Monica
Resume_MonicaResume_Monica
Resume_Monica
 
Improving our Approach Towards Capturing Value in Requirements
Improving our Approach Towards Capturing Value in RequirementsImproving our Approach Towards Capturing Value in Requirements
Improving our Approach Towards Capturing Value in Requirements
 
Thick Client Penetration Testing Modern Approaches and Techniques.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdfThick Client Penetration Testing Modern Approaches and Techniques.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdf
 

More from todd581

Running head PHD IT 1PHD IT 5Written Interview Qu.docx
Running head PHD IT 1PHD IT 5Written Interview Qu.docxRunning head PHD IT 1PHD IT 5Written Interview Qu.docx
Running head PHD IT 1PHD IT 5Written Interview Qu.docx
todd581
 
Running head PERSONALITY INVENTORIES1PERSONALITY INVENTORIE.docx
Running head PERSONALITY INVENTORIES1PERSONALITY INVENTORIE.docxRunning head PERSONALITY INVENTORIES1PERSONALITY INVENTORIE.docx
Running head PERSONALITY INVENTORIES1PERSONALITY INVENTORIE.docx
todd581
 
Running head PHASE 2 1PH.docx
Running head PHASE 2                                       1PH.docxRunning head PHASE 2                                       1PH.docx
Running head PHASE 2 1PH.docx
todd581
 
Running head PERSONAL MISSION STATEMENT1PERSONAL MISSION ST.docx
Running head PERSONAL MISSION STATEMENT1PERSONAL MISSION ST.docxRunning head PERSONAL MISSION STATEMENT1PERSONAL MISSION ST.docx
Running head PERSONAL MISSION STATEMENT1PERSONAL MISSION ST.docx
todd581
 
Running head PERSONALITY DEVELOPMENTPERSONALITY DEVELOPMENT.docx
Running head PERSONALITY DEVELOPMENTPERSONALITY DEVELOPMENT.docxRunning head PERSONALITY DEVELOPMENTPERSONALITY DEVELOPMENT.docx
Running head PERSONALITY DEVELOPMENTPERSONALITY DEVELOPMENT.docx
todd581
 
Running Head PERSONAL NURSING PHILOSOPHY 1PERSONAL NURSING P.docx
Running Head PERSONAL NURSING PHILOSOPHY 1PERSONAL NURSING P.docxRunning Head PERSONAL NURSING PHILOSOPHY 1PERSONAL NURSING P.docx
Running Head PERSONAL NURSING PHILOSOPHY 1PERSONAL NURSING P.docx
todd581
 
Running Head PHILOSOPHICAL WORLDVIEW1PHILOSOPHICAL WORLDVIEW.docx
Running Head PHILOSOPHICAL WORLDVIEW1PHILOSOPHICAL WORLDVIEW.docxRunning Head PHILOSOPHICAL WORLDVIEW1PHILOSOPHICAL WORLDVIEW.docx
Running Head PHILOSOPHICAL WORLDVIEW1PHILOSOPHICAL WORLDVIEW.docx
todd581
 
Running Head PHIL WORKSHOP1PHIL WORKSHOP 2.docx
Running Head PHIL WORKSHOP1PHIL WORKSHOP 2.docxRunning Head PHIL WORKSHOP1PHIL WORKSHOP 2.docx
Running Head PHIL WORKSHOP1PHIL WORKSHOP 2.docx
todd581
 
RUNNING HEAD PERSONAL BRANDING ACTION PLANPERSONAL BRANDING ACT.docx
RUNNING HEAD PERSONAL BRANDING ACTION PLANPERSONAL BRANDING ACT.docxRUNNING HEAD PERSONAL BRANDING ACTION PLANPERSONAL BRANDING ACT.docx
RUNNING HEAD PERSONAL BRANDING ACTION PLANPERSONAL BRANDING ACT.docx
todd581
 
Running head PERFORMANCE1PERFORMANCE2Case Scena.docx
Running head PERFORMANCE1PERFORMANCE2Case Scena.docxRunning head PERFORMANCE1PERFORMANCE2Case Scena.docx
Running head PERFORMANCE1PERFORMANCE2Case Scena.docx
todd581
 
Running Head PERTINENT HEALTHCARE ISSUE1PERTINENT HEALTHCAR.docx
Running Head PERTINENT HEALTHCARE ISSUE1PERTINENT HEALTHCAR.docxRunning Head PERTINENT HEALTHCARE ISSUE1PERTINENT HEALTHCAR.docx
Running Head PERTINENT HEALTHCARE ISSUE1PERTINENT HEALTHCAR.docx
todd581
 
Running head Patient Safety and Risk Management in Dental Pra.docx
Running head Patient Safety and Risk Management in Dental Pra.docxRunning head Patient Safety and Risk Management in Dental Pra.docx
Running head Patient Safety and Risk Management in Dental Pra.docx
todd581
 
Running head PayneABUS738001PayneABUS738001.docx
Running head PayneABUS738001PayneABUS738001.docxRunning head PayneABUS738001PayneABUS738001.docx
Running head PayneABUS738001PayneABUS738001.docx
todd581
 
Running head NURSING RESEARCH 1NURSING RESEARCH 7.docx
Running head NURSING RESEARCH 1NURSING RESEARCH 7.docxRunning head NURSING RESEARCH 1NURSING RESEARCH 7.docx
Running head NURSING RESEARCH 1NURSING RESEARCH 7.docx
todd581
 
Running head Personal Mastery1Personal Mastery4LDRS 310.docx
Running head Personal Mastery1Personal Mastery4LDRS 310.docxRunning head Personal Mastery1Personal Mastery4LDRS 310.docx
Running head Personal Mastery1Personal Mastery4LDRS 310.docx
todd581
 
Running head PERCEIVED BENEFITS AND BARRIES ON MMR VACCINE 1 .docx
Running head PERCEIVED BENEFITS AND BARRIES ON MMR VACCINE 1 .docxRunning head PERCEIVED BENEFITS AND BARRIES ON MMR VACCINE 1 .docx
Running head PERCEIVED BENEFITS AND BARRIES ON MMR VACCINE 1 .docx
todd581
 
Running Head PATHOPHYSIOLOGY 1PATHOPHYSIOLOGY5.docx
Running Head PATHOPHYSIOLOGY 1PATHOPHYSIOLOGY5.docxRunning Head PATHOPHYSIOLOGY 1PATHOPHYSIOLOGY5.docx
Running Head PATHOPHYSIOLOGY 1PATHOPHYSIOLOGY5.docx
todd581
 
Running head PASTORAL COUNSELLING ON MENTAL HEALTH1PASTORAL .docx
Running head PASTORAL COUNSELLING ON MENTAL HEALTH1PASTORAL .docxRunning head PASTORAL COUNSELLING ON MENTAL HEALTH1PASTORAL .docx
Running head PASTORAL COUNSELLING ON MENTAL HEALTH1PASTORAL .docx
todd581
 
Running head Personal Mastery1Personal Mastery2LDRS 310.docx
Running head Personal Mastery1Personal Mastery2LDRS 310.docxRunning head Personal Mastery1Personal Mastery2LDRS 310.docx
Running head Personal Mastery1Personal Mastery2LDRS 310.docx
todd581
 

More from todd581 (20)

Running head PHD IT 1PHD IT 5Written Interview Qu.docx
Running head PHD IT 1PHD IT 5Written Interview Qu.docxRunning head PHD IT 1PHD IT 5Written Interview Qu.docx
Running head PHD IT 1PHD IT 5Written Interview Qu.docx
 
Running head PERSONALITY INVENTORIES1PERSONALITY INVENTORIE.docx
Running head PERSONALITY INVENTORIES1PERSONALITY INVENTORIE.docxRunning head PERSONALITY INVENTORIES1PERSONALITY INVENTORIE.docx
Running head PERSONALITY INVENTORIES1PERSONALITY INVENTORIE.docx
 
Running head PHASE 2 1PH.docx
Running head PHASE 2                                       1PH.docxRunning head PHASE 2                                       1PH.docx
Running head PHASE 2 1PH.docx
 
Running head PERSONAL MISSION STATEMENT1PERSONAL MISSION ST.docx
Running head PERSONAL MISSION STATEMENT1PERSONAL MISSION ST.docxRunning head PERSONAL MISSION STATEMENT1PERSONAL MISSION ST.docx
Running head PERSONAL MISSION STATEMENT1PERSONAL MISSION ST.docx
 
Running head PERSONALITY DEVELOPMENTPERSONALITY DEVELOPMENT.docx
Running head PERSONALITY DEVELOPMENTPERSONALITY DEVELOPMENT.docxRunning head PERSONALITY DEVELOPMENTPERSONALITY DEVELOPMENT.docx
Running head PERSONALITY DEVELOPMENTPERSONALITY DEVELOPMENT.docx
 
Running Head PERSONAL NURSING PHILOSOPHY 1PERSONAL NURSING P.docx
Running Head PERSONAL NURSING PHILOSOPHY 1PERSONAL NURSING P.docxRunning Head PERSONAL NURSING PHILOSOPHY 1PERSONAL NURSING P.docx
Running Head PERSONAL NURSING PHILOSOPHY 1PERSONAL NURSING P.docx
 
Running Head PHILOSOPHICAL WORLDVIEW1PHILOSOPHICAL WORLDVIEW.docx
Running Head PHILOSOPHICAL WORLDVIEW1PHILOSOPHICAL WORLDVIEW.docxRunning Head PHILOSOPHICAL WORLDVIEW1PHILOSOPHICAL WORLDVIEW.docx
Running Head PHILOSOPHICAL WORLDVIEW1PHILOSOPHICAL WORLDVIEW.docx
 
Running Head PHIL WORKSHOP1PHIL WORKSHOP 2.docx
Running Head PHIL WORKSHOP1PHIL WORKSHOP 2.docxRunning Head PHIL WORKSHOP1PHIL WORKSHOP 2.docx
Running Head PHIL WORKSHOP1PHIL WORKSHOP 2.docx
 
Running head PHILOSOPHY OF RELIGION-EXISTENCE OF GOD .docx
Running head PHILOSOPHY OF RELIGION-EXISTENCE OF GOD           .docxRunning head PHILOSOPHY OF RELIGION-EXISTENCE OF GOD           .docx
Running head PHILOSOPHY OF RELIGION-EXISTENCE OF GOD .docx
 
RUNNING HEAD PERSONAL BRANDING ACTION PLANPERSONAL BRANDING ACT.docx
RUNNING HEAD PERSONAL BRANDING ACTION PLANPERSONAL BRANDING ACT.docxRUNNING HEAD PERSONAL BRANDING ACTION PLANPERSONAL BRANDING ACT.docx
RUNNING HEAD PERSONAL BRANDING ACTION PLANPERSONAL BRANDING ACT.docx
 
Running head PERFORMANCE1PERFORMANCE2Case Scena.docx
Running head PERFORMANCE1PERFORMANCE2Case Scena.docxRunning head PERFORMANCE1PERFORMANCE2Case Scena.docx
Running head PERFORMANCE1PERFORMANCE2Case Scena.docx
 
Running Head PERTINENT HEALTHCARE ISSUE1PERTINENT HEALTHCAR.docx
Running Head PERTINENT HEALTHCARE ISSUE1PERTINENT HEALTHCAR.docxRunning Head PERTINENT HEALTHCARE ISSUE1PERTINENT HEALTHCAR.docx
Running Head PERTINENT HEALTHCARE ISSUE1PERTINENT HEALTHCAR.docx
 
Running head Patient Safety and Risk Management in Dental Pra.docx
Running head Patient Safety and Risk Management in Dental Pra.docxRunning head Patient Safety and Risk Management in Dental Pra.docx
Running head Patient Safety and Risk Management in Dental Pra.docx
 
Running head PayneABUS738001PayneABUS738001.docx
Running head PayneABUS738001PayneABUS738001.docxRunning head PayneABUS738001PayneABUS738001.docx
Running head PayneABUS738001PayneABUS738001.docx
 
Running head NURSING RESEARCH 1NURSING RESEARCH 7.docx
Running head NURSING RESEARCH 1NURSING RESEARCH 7.docxRunning head NURSING RESEARCH 1NURSING RESEARCH 7.docx
Running head NURSING RESEARCH 1NURSING RESEARCH 7.docx
 
Running head Personal Mastery1Personal Mastery4LDRS 310.docx
Running head Personal Mastery1Personal Mastery4LDRS 310.docxRunning head Personal Mastery1Personal Mastery4LDRS 310.docx
Running head Personal Mastery1Personal Mastery4LDRS 310.docx
 
Running head PERCEIVED BENEFITS AND BARRIES ON MMR VACCINE 1 .docx
Running head PERCEIVED BENEFITS AND BARRIES ON MMR VACCINE 1 .docxRunning head PERCEIVED BENEFITS AND BARRIES ON MMR VACCINE 1 .docx
Running head PERCEIVED BENEFITS AND BARRIES ON MMR VACCINE 1 .docx
 
Running Head PATHOPHYSIOLOGY 1PATHOPHYSIOLOGY5.docx
Running Head PATHOPHYSIOLOGY 1PATHOPHYSIOLOGY5.docxRunning Head PATHOPHYSIOLOGY 1PATHOPHYSIOLOGY5.docx
Running Head PATHOPHYSIOLOGY 1PATHOPHYSIOLOGY5.docx
 
Running head PASTORAL COUNSELLING ON MENTAL HEALTH1PASTORAL .docx
Running head PASTORAL COUNSELLING ON MENTAL HEALTH1PASTORAL .docxRunning head PASTORAL COUNSELLING ON MENTAL HEALTH1PASTORAL .docx
Running head PASTORAL COUNSELLING ON MENTAL HEALTH1PASTORAL .docx
 
Running head Personal Mastery1Personal Mastery2LDRS 310.docx
Running head Personal Mastery1Personal Mastery2LDRS 310.docxRunning head Personal Mastery1Personal Mastery2LDRS 310.docx
Running head Personal Mastery1Personal Mastery2LDRS 310.docx
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Recently uploaded (20)

Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 

Running Head PROJECT CHARTS1PROJECT CHARTS2.docx

  • 1. Running Head: PROJECT CHARTS 1 PROJECT CHARTS 2 Project Charts Name Institution Project Charts Project Activities Plan Gantt Chart Showing the Schedule of the Project Activities Applications Implementation Re-engineering process Customization Project Interface Project Architecture Project Conersion Project Testing Employees Training Project End 43586 43593 43600 43607 43607 43610 43616 43635 43639 Duration Applications Implementation Re-engineering process Customization Project Interface Project Architecture Project Conersion Project Testing Employees Training Project End 28 14 14 7 14 6 5 4 3 Start Week Week 0123456789
  • 2. MayMayMayMayMayJunJunJunJunJul 1815222951219263 Phase Applications Implementation One Re-engineering Customization Phase Project Interfaces Two Project Architecture Project Conversion Project Testing Final Project Specification Phase Review and Approval Phase Three Employees Training Project End Milestone: additional funds May 1, 2019 Starting Access Control, Authentication, and Public Key Infrastructure Chapter 3 Business Drivers for Access Controls © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page ‹#› Access Control, Authentication, and PKI © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
  • 3. Company www.jblearning.com All rights reserved. 1 Data or Information Assets An intangible asset with no form or substance: Paper records Electronic media Intellectual property stored in people's heads Page ‹#› Access Control, Authentication, and PKI © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 2 Importance of Policy and Senior Management Role Organizations value intellectual property Must control access to information to ensure survival Protecting confidential information involves: Technical controls Clear policies and sound business processes that implement those policies Access control policies are effective only with support of senior executives
  • 4. Page ‹#› Access Control, Authentication, and PKI © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 3 Classification Schemes Classification scheme is a method of organizing sensitive information into access levels Only a person with the approved level of access is allowed to view information This access is called clearance Every organization has its own method of determining clearance levels Page ‹#› Access Control, Authentication, and PKI © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 4 National Security Classification Unclassified Confidential Secret Top Secret Corporations
  • 5. Public Internal Sensitive Highly sensitive Classification Schemes (Cont.) Page ‹#› Access Control, Authentication, and PKI © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 5 In a hospital, for example, a data classification scheme would identify the sensitivity of every piece of data in the hospital, from the cafeteria menu to patient medical records. Classified as Public For use by defined category within job role Sensitivity-Based Data Classification Page ‹#› Access Control, Authentication, and PKI © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved.
  • 6. 6 Need to know Requester should not receive access just because of his or her clearance, position, or rank Requester must establish a valid need to see information Access should be granted only if information is vital for requester’s official duties Least privilege A computer user or program should have only the access needed to carry out its job Need to Know and Least Privilege Page ‹#› Access Control, Authentication, and PKI © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 7 Declassification Page ‹#› Access Control, Authentication, and PKI
  • 7. © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 8 Automatic Systematic Mandatory declassification review Freedom of Information Act request Business Drivers for Access Control Page ‹#›
  • 8. Access Control, Authentication, and PKI © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 9 Cost-benefit analysis Risk assessment Business facilitation Cost containment Operational efficiency IT risk management
  • 9. Electronic Records United Nations Electronic Data Classification Page ‹#› Access Control, Authentication, and PKI © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 10 The Life Cycle of an Order Page ‹#› Access Control, Authentication, and PKI © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 09/23/10 (c) ITT Educational Services, Inc. 11 Defense: Risk: Insecure Direct Object Reference Use an automated tool for real-time attack. Monitor parameter manipulation–hidden/static.
  • 10. Establish baseline configuration. Risk: Cross-Site Request Forgery Use an automated tool for real-time attack. Alert/respond to parameter manipulation. Use known attack signatures. Establish baseline/monitor resource changes. Risk: Security Misconfiguration Use an automated tool for real-time attack. Inspect outbound responses. Investigate application failures. 09/23/10 (c) ITT Educational Services, Inc. 11 Controlling Access and Protecting Value Importance of internal access controls Importance of external access controls Implementation of access controls with respect to contractors, vendors, and third parties Page ‹#› Access Control, Authentication, and PKI © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 12 Refers to security of records and information not in electronic systems and applications Access is regularly linked to functional responsibilities and not
  • 11. to position or grade Security or background investigation required Physical Security of Sensitive Information Can/Should this information be shared? Secure storage and limited access Page ‹#› Access Control, Authentication, and PKI © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved.
  • 12. 13 Data Destruction Use appropriate secure destruction method for the media and format. Do not put in trash bins. Data awaiting destruction should be placed in lockable containers. Strictly confidential and confidential data is destroyed in accordance with specific guidelines. . Page ‹#› Access Control, Authentication, and PKI © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Data destroyed in accordance with administrative or operations retention schedule 14 Data Destruction (Continued)
  • 13. . Shredder/Degausser Light office shredder/disintegrator Electronic media Portable devices Portable devices Page ‹#› Access Control, Authentication, and PKI © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Data destroyed in accordance with administrative or operations retention schedule 15 Manage the Identity and Access Provisioning Life Cycle 16 Module Topic Access Control and Identity Management Life Cycle ‹#›
  • 14. 17 Access Control and Identity Management Life Cycle ‹#› 18 Provisioning Review Revocation Provisioning ‹#› 19 Provisioning entails determining the organizational requirements for access to information, and applies the appropriate access rights
  • 15. Review ‹#› 20 Access rights and usage must be monitored on a basis commensurate with risk Reviewing access can take the form of automated checks, manual audits, and several other methods Revocation ‹#› 21 Through access review, revocation typically is invoked when a user has aggregated unnecessary access, or access is not commensurate with the role of the user
  • 16. Business Requirements Reference number: Document Control Change Record Date Author Version Change Reference
  • 17. Reviewers Name Position Table of Contents 2Document Control 1 Business Requirements 4 1.1 Project Overview 4 1.2 Background including current process 4 1.3 Scope 4 1.3.1 Scope of Project 4 1.3.2 Constraints and Assumptions 5 1.3.3 Risks
  • 18. 5 1.3.4 Scope Control 5 1.3.5 Relationship to Other Systems/Projects 5 1.3.6 Definition of Terms (if applicable) 5 1 Business Requirements 1.1 Project Overview Provide a short, yet complete, overview of the project. 1.2 Background including current process Describe the background to the project, (same section may be reused in the Quality Plan) include: This project is The project goal is to The IT role for this project is 1.3 Scope 1.3.1 Scope of Project The scope of this project includes a number of areas. For each area, there should be a corresponding strategy for incorporating these areas into the overall project. Applications In order to meet the target production date, only these applications will be implemented:
  • 19. Sites These sites are considered part of the implementation: Process Re-engineering Re-engineering will Customization Customizations will be limited to Interfaces the interfaces included are: Architecture Application and Technical Architecture will Conversion Only the following data and volume will be considered for conversion: Testing Testing will include only Funding Project funding is limited to Training Training will be Education Education will include 1.3.2 Constraints and Assumptions The following constraints have been identified: The following assumptions have been made in defining the
  • 20. scope, objectives and approach: 1.3.3 Risks The following risks have been identified as possibly affecting the project during its progression: 1.3.4 Scope Control The control of changes to the scope identified in this document will be managed through the Change Control, with business owner representative approval for any changes that affect cost or timeline for the project. 1.3.5 Relationship to Other Systems/Projects It is the responsibility of the business unit to inform IT of other business initiatives that may impact the project. The following are known business initiatives: 1.3.6 Definition of Terms (if applicable) List any definitions that will be used throughout the duration of the project. 5 Running Head: BUSINESS REQUIREMENT DOCUMENTATION 1 BUSINESS REQUIREMENT DOCUMENTATION 2
  • 21. Business Requirement Documentation Student Name Professor Name Course Title Date Business Requirement Documentation Scope of the Project Company and Project Objectives The company aims to use the project to cater to the increasing company needs and offer qualities services to expanding the number of customers. The goal of the company is to increase the speed use of the system to customer with a more reliable system by providing an open and flexible system base of future speculation of technology change. It will ensure a high level of customer’s data security and remove repetition of business transactions in the organization. It will be enhanced by electrical capture of stakeholder’s data from the sources. The project aims to increase information sharing form the company and stakeholders as well as boasts the ability and effectiveness of employee to perform their job. The overall objective is to provide a more efficient and effective way to serve increasing
  • 22. customer and safekeeping of stakeholder data. The project ensures the end user that is customer and organization have the best experience input into the design process. It ensures there is a reduction in time taken to make a transaction online and the delivery time is reduced. It also gives update of time-to-time on the delivery process (Hsu & Wang, 2017). The project aims to achieve all the organization's goal and objective within the stipulated time and budget. It will also try to minimize the disruption of business operation during this tie on the affected units. It will also come into favorable terms of agreement with the vendors and another department. Application To cater to the increasing number and period given, the project will first implement the installation of the servers. It also includes updating the database, starting with the internal environment of the business that is the update of staff data, management, and shareholders information (Lind & Culler, 2015). It will be followed by updating the customer's profile to capture the necessary data, ensure the safety of data received, and increase the speed of the access to the profiles. The system will then concentrate on the security features of the database. The analysis of the system will be conducted to ensure effective use of the application. The project will update the central hub with the update servers to access the new database. This is to boost the network connectivity between the serves and the computers in the organization. The operating system will be configured again to gain access to the new database and with the networking system. Due to the time parameter, the project will not be updating the hardware system with the new application. They include action such printer and scanners replacement, upgrade of computer desktop hardware, an increase of internet cables, and routers. Sites Management is required to interpret different data from the system without physically involved in the daily activities of the
  • 23. business. To achieve the project will install software that will analyze the daily transaction of the business and send interpreted data to the management (T. Hans, 2014). The data may involve a sale report, invoices analysis, and output data of the product. It will easily decision making on the management. The system will contain part of the vendors of the company as part of the implementation of the project. It will be in the aim to reconcile all the company data and transaction to an online platform. It is to ensure the proper record keeping of all incoming and outgoing transaction with the vendors. To effectively implement the project, the website design will have to change to accommodate the new data. It will include more feature at the end, such as delivery track option, promotion options, and more to compare competing brand in the website. Re-engineering Process Re-engineering will restructure the business processes involved during the transaction between the customer and the company. To improve on quality and speed between the transactions taken between the customers purchasing the product and the company staff authenticating the process some of the step involved will be redesigned (Lind & Culler, 2015). There will be a few steps involves, and the website will be automatically caring for the whole process of buying. To authenticate the process employee will take a few seconds to update the customers on the delivery start. Another process that will be redesign is the analysis of the data. The system will be able to improve in term of speed to analyze customer data, thus offer better quality. Management will be able to pull the reports required as a concise moment to enable make the right decision. The re-engineering of the various process such the customer website, staff users, vendor process, and management will affect the company structures. It will bring in the supervisor of the transaction, the system, and updating and analysis of the system data. Customization Since the project is designed according to company
  • 24. specification, it will include all the customers’ preferences. One the customer create a profile and make his first customer the program will be able to speculate customer’s choice and taste of products such that the next time customer login in it will be to advertise the best product (Lind & Culler, 2015). The customization will be limited to only those who have created an account on the company’s website. Accessibility of product and the whole process of buying on the customer's end interface will only be limited to those who have created an account also. On the company end, interface vendor will be required to create an account and keep track of their invoices. They will be alerted automatically when they supply product each reorders level. The management will be able to manage the company inventories from the others, as vendors are limited to access the movement of product in the company. The low-level staff will only have access to daily activities transactions. Their activities involve managing the money transaction, authenticating product for delivery, and updating the customers on the delivery process. Top management will be able to analyze all the data required in the running of the business. It includes sale report, balance sheet, income statement, inventory management report, among other reports necessary for decision-making. The information technology department will be in control of the system to offer support and troubleshooting of the system when needed. Interfaces The project will implement two information system interface. The first one includes the external user interface that will comprise of customer and vendors(Foster &Godbole, 2016). Customer’s user will consist of features such as the creation of an account, filling of profile data, comparison of various product, various payment methods, the making of purchase, and tracking the delivery of the product. Vendor’s side will comprise of quotation platform, track of invoices, methods of payments, quantities delivered an update of reorder level. The second interface includes that company user. It comprises
  • 25. features such as the update of the product, price update, promotion update, viewing of successful completion of the purchase of product transactions, update on delivery methods, and time. It will also comprise of customer care services to ensure customer complaints are handled and are satisfied with the services offered. It will also be able to produce various reports needed for decision making in the business. Architecture The technical architecture will be involved in planning the design of the whole project. They show in the diagram, chart the information flow, and control measure in places at every point of the system(Xing & Qi, 2015). They include the physical design of the project and the material required to hold the hardware part of the system. They form the connection of all the system involving the hardware and the software to ensure the system run as required. They recommend the requirement of the information asset in implementing the project. They will be involved in using various domains as a business model, information, services and technical in design the required business model, capture the relevant data, alignment with business process, and provide security features. They will also play the role of management in offering technological strategies for the company process according to business vision and goals. They also provide advisory services to the management team concerning the business solution that involves the role of information technology. Some application includes providing information technology long-range plan to achieve the project objectives. Conversion The project will first utilize the parallel conversion method to make customer familiar with the new system. Within a stipulated time, the project will use to direct conversion method where it ultimately uses the new system(T. Hans, 2014). The customer old profile will be deleted and required to create new profiles. The previous company data that is stored on electronic devices will be converted to the new system to ensure full
  • 26. transit to the new system. The vital information that was left behind in the old system will be integrated into the new system to make it full operation. Security measure will be followed to ensure no critical data is lost during the transit. Testing The project will be tested on a fully integrated system to ensure it complies with the desired result. The project will use simulated method to test the reliability, compliance, and performance before being launched. It will be able to recommend an improvement need. Funding The project is expected to receive much support from shareholder since the main aim is to improve shareholders wealth; thus, most of the financing will be shareholders contribution. The company retention profit will be used to fund the project. The company wills also source from external credit sources such as a bank. Training and Education Training on the uses of the new system will be conducted on all employee in the company according to their customization use. Education will include all the stakeholder of the company to make them familiar with the project (T. Hans, 2014). Customer will be provided with the written guideline on the website the moment the access it on how to create both the account and a profile and how to maximize all the features available. Project Control The project will use the documentation and prepared project plan along with company budgeting plan to monitor the progress of the system. It wills constraint not all the activities within the budget line and make sure resources are misused (Keyes, 2017). It will ensure the project is on track with the stipulate completion time by following the project plan. It will ensure there is no or little change occur on the scope of the project working on the project documentation. The company is required to employ skilled personnel in the area of project management to always evaluate and monitor the progress of the project. The
  • 27. monitoring group is expected to come up with a baseline review of the project. The Possible Risk Associated With the Project The project is related to the risk of uncontrolled strategy schedule leading to developing a comprehensive timeline. The number of the developed interface may interfere with the existing system. The project may include failure due to shallow knowledge of the user. Vendor may not estimate the product may be due to insufficient information provided. Unrealistic budgeting of the project may cause the constraint on the implementation of the project (Parry & Lind, 2016). Unrealistic time estimation to complete the project due to enormous pressure from management. The project may face the risk of being implement by a team member with little knowledge of the business operation or information technology. There may be unmatched functionality with the new packages due to reducing customization. The procurement may use unclear methods to provide low qualities raw material or induce unclear quality management procedure. Project Assumption The project assumes the following in developing the plan. All the stakeholders are willing to shift the business operation to take advantage of the new system. Top management is in support of the project and provides all the resources need to ensure the project is completed. The monitoring group carries their work precisely without any influences to ensure they provide recommendation where required. The vendor will deliver the material in time. The project team member will adhere to the company guideline and communication plan. Any delay in supply of material will result to project completion delays(Hassan, Ahmad, &Zuhaira, 2018). Any new information provided may lead to a change in the project plan. All the information about the company and the user is disclosed to the project. All the users will participate in the timely execution of the project plan. The technological infrastructures that needed in the project will be readily available in the market.
  • 28. Project Constraints The project may be limited access to the international user to the nature of law enforcement. Resources available in the market may limit the project success. Budget constraints due to limited sources of finance may hinder the successful completion of the project (Parry & Lind, 2016). An unforeseeable disaster such as national disaster, for example, war, earthquake may extend completion time. Completion time of the project may constrain the proper execution of the plan. Integration with Other System and Infrastructure For the project to be completed, all the software system must be integrated with the hardware system. The computer software such as enterprise resource planning will be integrated with computer desktop. The networking such as the internet will be accessed through the router available and central hub. Servers will serve as the domain for accesses of internet and storage of data to ensure reliability and speed of the system. Printer and scanner will be connected with the computer to produce the output processed such as invoice and reports. The database will be upgraded and made available to both the customer user interface and company user. Security features such as password and supervision when the long transaction is involved will be implemented in the system to ensure safe data storage (Norman, 2014). The project will be integrated in all business unit of the company to ensure uniform flow of the project. Definition of Terms Interface refers to a point where two systems interact to make a complete pattern of design software. Integration refers to the redesign of different sub-system or component of a system and brings them together to make one complete system. Database refers to the storage of the collection of information can be easily managed, update, and accessed anytime in need. Project scope refers to tools that are used to explain the key objective of the project, the desired milestone, functions, completion time, and costs.
  • 29. Project Activities Plan Gantt Chart Showing the Schedule of the Project Activities References Foster, E. C., &Godbole, S. (2016). Database User Interface Design. Database Systems, 139-153. doi:10.1007/978-1-4842- 1191-5_6 Hassan, I. U., Ahmad, N., &Zuhaira, B. (2018). Calculating completeness of software project scope definition. Information and Software Technology, 94, 208-233.
  • 30. doi:10.1016/j.infsof.2017.10.010 Hsu, H., & Wang, S. (2017). Integrating Technology: Using Google Forms to Collect and Analyze Data. Science Scope, 040(08). doi:10.2505/4/ss17_040_08_64 Keyes, J. (2017). Information Technology Project Tracking and Control. The CIO’s Guide to Risk, 105- 122.doi:10.1201/9781315108674-7 Lind, M. R., & Culler, E. (2015).Information Technology Project Performance. Perspectives and Techniques for Improving Information Technology Project Management, 39-50. doi:10.4018/978-1-4666-2800-7.ch004 Norman, T. (2014).Information Technology Systems Infrastructure. Integrated Security Systems Design, 203-249. doi:10.1016/b978-0-12-800022-9.00011-5 Parry, V. K., & Lind, M. L. (2016). Alignment of Business Strategy and Information Technology Considering Information Technology Governance, Project Portfolio Control, and Risk Management. International Journal of Information Technology Project Management, 7(4), 21-37. doi:10.4018/ijitpm.2016100102 T. Hans, R. (2014). Software Project Scope Verification Through Deliverable-Oriented Work Breakdown Structure. Computer Science & Information Technology ( CS& IT ). doi:10.5121/csit.2013.3646 Xing, F., & Qi, H. (2015).Montage's Application and Exploration in the Architecture Project Art. 2015 International Conference on Industrial Informatics - Computing Technology, Intelligent Technology, Industrial Information Integration. doi:10.1109/iciicii.2015.130 Applications Implementation Re-engineering process Customization Project Interface Project Architecture Project Conersion Project Testing Employees Training Project End 43586 43593 43600 43607 43607 43610 43616 43635 43639 Duration Applications Implementation Re-engineering
  • 31. process Customization Project Interface Project Architecture Project Conersion Project Testing Employees Training Project End 28 14 14 7 14 6 5 4 3 Start Week Week 0123456789 MayMayMayMayMayJunJunJunJunJul 1815222951219263 Phase Applications Implementation One Re-engineering Customization Phase Project Interfaces Two Project Architecture Project Conversion Project Testing Final Project Specification Phase Review and Approval Phase Three Employees Training Project End Milestone: additional funds May 1, 2019 Starting 1
  • 32. Project Plan Inception Muhammad Jawad Dr. Dave Verret CIS 498 April 15, 2019 Project Introduction Background Information Mino is an innovative e-commerce company that is located in Beijing, China. The company has been in existence for the last five years. The company has employed ten workers, and it raises revenue of $5 million per year. With the increase in demand for company products, the company is expanding at a very rapid rate. It is even estimated that in the next two years the company will be able to employ about 30 employees and the revenue generated is also expected to increase from $ 5 million to $ 30 million. To effectively perform their tasks the company relies on information technology because most of the transactions are done online. The company has invested strongly in information technology. The company has does most of its transactions online, and it is recording an increase in the number of users who are seeking to have access to their goods
  • 33. and services. Therefore, there is a need to expand the business so that it can meet the needs of the rising number of customers who have access to the company. The business of the Company The company is an e-commerce oriented meaning that most of their transactions are done over the internet. Users have to have access to the website of the company from where they can place their orders. Then the transactions are done online, and the products are delivered to the customer. The company deals mostly with electronics such as phones, tablets, televisions, computers, and laptops. The goods are ordered and are delivered within China in a week, but overseas delivery may take months. Most of the transactions that the company does are based in China, but there are a few exceptions whereby it may sell their products overseas. Information Systems The organization does most of its transactions online; therefore it should have a well-established information system. The company uses a MySQL database because it bests serves the needs of the organization. The MySQL database allows for the frequent databases to be performed by the company. The database also can handle the multiple documents, and because the company will require many users to create their profiles, then MySQL database will be the best. The information systems have very many components; therefore, the system requires regular system analysis that helps solve the problems of the system. During system analysis, the system is split into parts to determine how they are working to achieve the needs of the organization. During splitting they can identify any problem to the system and try to solve the problems ("Networking systems,"). The computers in the organization are connected independently to the central hub which connects them to the external network
  • 34. via the router. The company has ten computers and printers that are all connected through the central hub. The computer also has a variety of computer resources that help in the network connectivity processes. Apart from the computers, it has a central hub, router, printers, scanners, internet cables that allow for easier operating of the tasks in the organization. Furthermore, the company uses a network operating software called Microsoft NT that allows for the connection to the internet The human-computer interface that the organization is has on two parts. First, the client end allows for the client to view the product, create an account and buy products. While on the company end it allows them to post their products over the internet and view who have bought products. The website design that is used by the company is the responsive design. It allows individuals to view the best quality of images and also it allows for transactions to be performed by the website ("Different types of website design,"). References Different types of website design. (n.d.). Retrieved from https://expert.services/blog/managing-your-website/custom- website-trends/responsive-design Networking systems. (n.d.). Retrieved from https://www.purplezeus.com/networking-systems.html · Week 6 Project Deliverable 3 Submission Click the link above to submit your assignment. Students, please view the "Submit a Clickable Rubric Assignment" in the Student Center. Instructors, training on how to grade is within the Instructor Center.
  • 35. Project Deliverable 3: Database and Programming Design Due Week 6 and worth 150 points This assignment consists of two (2) sections: a design document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment for which it is written. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment. One (1) of the main functions of any business is to transform data into information. The use of relational databases has gained recognition as a standard for organizations and business transactions. A quality database design makes the flow of data seamless. The database schema is the foundation of the relational database. The schema defines the tables, fields, relationships, views, indexes, and other elements. The schema should be created by envisioning the business, processes, and workflow of the company. Section 1: Design Document 1. Write a five to ten (5-10) page design document in which you: a. Create a database schema that supports the company’s business and processes. b. Explain and support the database schema with relevant arguments that support the rationale for the structure. Note: The minimum requirement for the schema should entail the tables, fields, relationships, views, and indexes. c. Create database tables with appropriate field-naming conventions. Then, identify primary keys and foreign keys, and explain how referential integrity will be achieved. d. Normalize the database tables to third normal form (3NF). e. Create an Entity-Relationship (E-R) Diagram through the use of graphical tools in Microsoft Visio or an open source alternative such as Dia. Note: The graphically depicted solution
  • 36. is not included in the required page length but must be included in the design document appendix. f. Explain your rationale behind the design of your E-R Diagram. g. Create a Data Flow Diagram (DFD) through the use of graphical tools in Microsoft Visio or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length but must be included in the design document appendix. h. Explain your rationale behind the design of your DFD. i. Create at least two (2) sample queries that will support the organizational reporting needs. j. Create at least two (2) screen layouts that illustrate the interface that organizational users will utilize. Your assignment must follow these formatting requirements: · This course requires use of Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details. · Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. · Include charts or diagrams created in MS Visio or Dia as an appendix of the design document. All references to these diagrams must be included in the body of the design document. Section 2: Revised Gantt Chart / Project Plan Use Microsoft Project or an open source alternative, such as Open Project, to: 2. Update the Gantt chart or project plan (summary and detail) template, from Project Deliverable 2: Business Requirements, with all the project tasks. The specific course learning outcomes associated with this
  • 37. assignment are: · Describe the various integrative functions and processes within the information systems area, including databases, systems analysis, security, networking, computer infrastructure, human computer interaction, and Web design. · Demonstrate the ability to evaluate organizational issues with integrative technological solutions. · Apply integrative information technology solutions with project management tools to solve business problems. · Use technology and information resources to research issues in information technology. · Write clearly and concisely about strategic issues and practices in the information technology domain using proper writing mechanics and technical style conventions. Grading for this assignment will be based on answer quality, logic/organization of the paper, and language and writing skills, using the following rubric found here.