Fundamentals of Software Project Management

Q1

A software house has been asked to develop a simple web system based on a three-tier archi tecture (and a client-server architecture) for mobile banking. The system allows bank account holders to:

1. Check the current account balance

2. Show the list of the last five transactions

3. Pay into another bank account up to £500 per day if funds are available

The SW project manager has decided that each of the above requirements would correspond to a specific software component that represents a partition of the three-tier architecture into various modules, each with its own GUI, its own portion of business logic, and its own set of SQL queries to the external bank database. The project manager would like to use an Agile approach and thus needs to estimate the ‘size’ of each such component.

a)Consider the above web-based system specification. Discuss a rough size estimation approach expressed as integer points, assigning to the simplest requirement (and to the corresponding component) a unit point and expressing the other requirements (and components) as integer multiples of the simplest one.

b)Consider the above web-based system specification. Discuss how to schedule devel opment in terms of the envisaged software architectural patterns (i.e., in terms of the development sequence of system layers).

Q2

Consider a computerised burglar alarm equipped with a range of sensors that detect out-of normal environment conditions. For instance, movement detectors are used by this system to check whether an intruder is in a house. Once some suspicious movement is identified, the computer raises an alarm. Discuss the most suitable architectural pattern(s) upon which the design of the above system should be based.

need answer

 Tom, Jan, and Julie are IS majors at Great State University. These students have been assigned to a class project by one of their professors, requiring them to develop a new Web-based system to collect and unique information on the IS program’s alumni. This system will be used by the IS graduates to enter job and address information as they graduate, and then make changes to that information as they change jobs and/or address. Their professor also has a number of queries that she is interested in being able to implement. Based on their preliminary discussions with their professor, the students have developed this list of system elements: Inputs: 1 low complexity, 2 medium complexity, 1 high complexity. Outputs: 4 medium complexity. Queries: 1 low complexity, 4 medium complexity, 2 high complexity. Files: 3 medium complexity. Program interfaces: 2 medium complexity. Assume that an adjusted project complexity factor of 1.2 is appropriate for this project. Calculate the total adjusted function points for this project. 

Awareness

 discusses situational awareness. Much of the security efforts of the past have been centered around prevention and protection. The increasing sophistication of cyber attacks have shown that no controls are 100% effective, and some compromises do occur. There is a rising realization that in addition to considering prevention and protection, controls that address detection and response are necessary to improve security posture. Please describe how situational awareness is a driver for detection and response controls.

 

To complete this assignment, you must do the following:

  As indicated above, describe how situational awareness is a driver for detection and response controls.  

IT204 office 365 Application assignment 2

Note: Unicheck is not used for this assignment since you are re-formatting  instructor supplied text.

Use the text below and format as described. Copy and paste it into your document. The font for the header is Arial Black or another sanserif font. Use Times New Roman for the body. Your press release should fit on one page. You may need to adjust the photo’s size to make this happen. Run spell check to correct misspelled words as there are intentional misspelling and grammar errors in the original.

We will discuss the tools for this assignment in class, you can use online sources as a refresher.

Submit by Sunday 11:59 PM.

Email Richard Lanier with any questions. [email protected]

This is the beginning of the document you will submit.

(1 blank line from the top of the page)

Press Release (Center, 20 point Arial Black font, red color with a light gray fill)

For Immediate Release 1/12/2021 (center, underline, 12 point Arial Black font not bold)

(2 blank lines)

Celebrate the end of Covid! (Times New Roman font, bold 12 point, centered. Indent the following paragraph one tab)

You are invited to atend an a walkathon (Times New Roman font, 12 not bold 1.5 line spacing) to raise money for the capital area food bank. (capitalize and bold and underline the words capital area food bank) All money that is raised will be donated to feed hungry people in the Washington area. Please wear a mask ans social distance.

Date: Saturday, June 19, 2021

Time: 10:00 AM 

Place: The Mall in Washington, D.C. (Use bullets and indent two tabs for the date, time, place)

Contributions accepted. You decide what to give. (Indent two tabs, but no bullet)

Come join the fun! (Bold, 14 point, center, yellow highlight)

(1 blank space.  Make a bullet list for the following. Left align the list, one space, 14 point  not bold)

Exercise while helping people.

Wear comfortable walking shoes.

Free water and snacs will be provided.

Wear a mask and social distance. (add one line)

Insert a photo of someone jogging on the right of the type you just pasted. Rotate the photo and add a picture border.  Add as many lines as needed after the photo to fit the following information. Add a picture watermark titled Press Release.

Sponsored by students of I Global University, Fals Church, va (left align, 12 point type)

For more information, contact

Your name

Your email address

Check the document properties. Who created it? When was it created. Write this at the bottom of the page. Created by ______________ Date _______________.

Add a page border and a watermark. Add a light value background color to the page.

paper

 

You have read about server virtualization and cloud computing in chapter 6 of your textbook. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

 • Describe the organization’s environment, and evaluate its preparedness for virtualization.

• Explain Microsoft (or another product) licensing for virtualized environments.

• Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.

• Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities

Make a recommendation for cloud computer use in the organization, including a justification for your recommendations.

Submit your research paper as a single document. Your paper should meet the following requirements:

• Be approximately 2-4 pages in length, not including the required cover page and reference page.

• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

https://www.tandfonline.com/doi/abs/10.1080/02681102.2017.1335281?journalCode=titd20 

Research Paper

** RESEARCH PAPER** 

please address the following in a properly formatted research paper:

1. Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.

2. Are there other frameworks mentioned has been discussed in the article that might be more effective?

3. Has any other research you uncover suggest there are better frameworks to use for addressing risks?

Your paper should meet the following requirements:

Be approximately five to six pages in length, not including the required cover page and reference page.

Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

**DISCUSSION POST**

From your research, discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?

Present your discussion post as if you were presenting to senior leaders of your company.

System Security Architecture

Briefly respond to all the following questions. Make sure to explain and back up your responses with facts and examples. This assignment should be in APA format and have to include at least two references. (600 Words)

 

Consider the data flow “octopus,” as shown in Figure. How can the analysis system gather data from all these sources that, presumably, are protected themselves?

Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. (600 Words)

If an attacker can retrieve the API and libraries, then use these to write an agent, and then get the attacker’s agent installed, how should Digital Diskus protect itself from such an attack? Should the business analytics system provide a method of authentication of valid agents in order to protect against a malicious one? Is the agent a worthy attack surface?