EBK MANAGEMENT OF INFORMATION SECURITY
6th Edition
ISBN: 9780357752869
Author: WHITMAN
Publisher: CENGAGE CO
expand_more
expand_more
format_list_bulleted
Question
Chapter 11, Problem 13RQ
Program Plan Intro
Management maintenance model:
A management maintenance model includes the procedures and methods to manage and maintain the operations or tasks performed in the business. It helps to utilize the resources in an efficient way.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
In a construction company, a new system has been in place for a few months and now there is a list of possible changes/updates that need to be done. For each of the changes/updates, specify what type of maintenance needs to be done: (a) corrective, (b) adaptive, and (c) perfective.
An error in the size of one of the fields has been identified and it needs to be updated status field needs to be changed.
The company is expanding into a new type of service and this will require enhancing the system with a new set of tables to support this new service and integrate it with the existing data.
The company has to comply with some government regulations. To do this, will require adding a couple of fields to the existing system tables.
In terms of maintenance operations, explain how the interactive approach differs from the waterfall model computer.
In software configuration management process, changes are reviewed, approved (or rejected), controlled, and tracked. There is a heavy focus on requiring that all changes must be reviewed and only permitted and being authorized by the Change Control Board (CCB).
Justify FOUR (4) arguments on how a properly implemented change management process can enable a greater volume of useful change?
Chapter 11 Solutions
EBK MANAGEMENT OF INFORMATION SECURITY
Ch. 11 - Prob. 1RQCh. 11 - Prob. 2RQCh. 11 - Prob. 3RQCh. 11 - Prob. 4RQCh. 11 - Prob. 5RQCh. 11 - Prob. 6RQCh. 11 - Prob. 7RQCh. 11 - Prob. 8RQCh. 11 - Prob. 9RQCh. 11 - Prob. 10RQ
Ch. 11 - Prob. 11RQCh. 11 - Prob. 12RQCh. 11 - Prob. 13RQCh. 11 - Prob. 14RQCh. 11 - Prob. 15RQCh. 11 - Prob. 16RQCh. 11 - Prob. 17RQCh. 11 - Prob. 18RQCh. 11 - Prob. 19RQCh. 11 - Prob. 20RQCh. 11 - Prob. 1ECh. 11 - Prob. 2ECh. 11 - Prob. 3ECh. 11 - Prob. 4ECh. 11 - Prob. 5ECh. 11 - Prob. 1DQCh. 11 - Prob. 2DQCh. 11 - Prob. 1EDM
Knowledge Booster
Similar questions
- You are asked to do some requirement development. Suppose you are asked to develop a booking system for a public library system Define a possible scope for the system using the following steps. First list a wide range of things that the system could do. Then narrow down the scope by selecting the most important features that you would implement in the first release of the system. Finally, give a precise problem statement for the system. Identify stakeholders of the system. Then select one important stakeholder and design a list of questions for interviewing that stakeholder. Give functional requirements and quality requirements of the system. Create a list of use cases and describe two of them in detail using the method discussed in class (two-column method). Then draw use cases diagram to describe the system Using UML. Indicate extension, generalization and inclusion, if there are any.arrow_forwardCourse: System analysis and Design In assignment #1, you were requested to write the preliminary investigation report, which is the result/output of the first phase of the SDLS. The preliminary investigation report is used as input to the next phase i.e., systems analysis phase, where a system requirements document is created that captures the needs of all stakeholders.A successful project manager must determine the requirements before starting the design process. In this assignment you are requested to write the requirements of a student registration system. There are several techniques used for representing requirements. In this assignment you are asked to represent the requirements of the student registration system using Natural Language, Functional Decomposition Diagram, and Use Case Diagrams.arrow_forwardDifferentiate between Component and Deployment Diagram in the context of System Design.arrow_forward
- In terms of maintenance operations, explain how the interactive approach differs from the waterfall model.arrow_forwardA valuable team member is one who contributes meaningfully to the development of systems.Is it possible to guarantee that the developers and other designers on your team can implement your ideas with the aid of thorough documentation?arrow_forwardIn the context of testing, what is the difference between test criteria and test requirements?arrow_forward
- Evaluate the following action taken by the team during the validation. For each scenario, identify its appropriateness (of action taken) by writing ‘appropriate’ or ‘not appropriate’ then map the case with the related validation principles. 1. The requirements engineer conducts an inspection of the requirements as mandated in the process and invites system architect, a programmer, a tester, and a legal compliance expert as inspectors. 2. Since no other project member was suitable to moderate the inspection meeting, the requirements engineer decides to be the moderator of the moderator meeting. 3. The requirements engineer decides to conduct the validation only once due to budget constraint. 4. Before the validation session begins, the requirements engineer reminds all reviewers to immediately correct the errors found in the document. 5. The inspection team requests for additional development artifact directly from the author. 6. The inspection team…arrow_forwardThe principle of component independence means that it ought to be possible to replace one component with another that is implemented in a completely different way. Using an example, explain how such component replacement could have undesired consequences and may lead to system failure.arrow_forwardWhen doing system analysis and design, why is it helpful to use an object-oriented approach?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage LearningManagement Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning