Please enable JavaScript.
Coggle requires JavaScript to display documents.
3.3 (2) (SDLC (business application development has occurred largely…
3.3 (2)
-
SDLC Phases
:one: Feasibility Study #
-
-
achieves the following:
-
• Determines an optimum alternative risk-based solution for meeting business needs and general information resource requirements (e.g., whether to develop or acquire a system). :ok_hand::skin-tone-5:
-
• Determines whether an existing system can correct the situation with slight or no modification (e.g., workaround) :desktop_computer:
• Determines whether a vendor product offers a solution to the problem :convenience_store: #
-
-
-
Requirements Definition
concerned with identifying and specifying the business requirements of the system chosen for development during the feasibility study.
include descriptions of
-
• How users will interact with a system :sweat_smile: :slightly_smiling_face: :open_mouth: :arrow_right: :desktop_computer:
• Conditions under which the system will operate :performing_arts: :bicyclist: :mountain_bicyclist::skin-tone-3: :partly_sunny_rain:
-
This phase also deals with overarching issues that are sometimes called nonfunctional requirements (e.g., access control).
Many IT security weaknesses can be corrected with a more critical focus on security within the context of the SDLC and, in particular, during the requirements definition
successfully complete the requirements definition phase, the project team should perform the following activities:
• Identify and consult stakeholders :man_in_business_suit_levitating: to determine their requirements.
• Analyze requirements to detect and correct conflicts :crossed_swords:(mainly, differences between requirements and expectations) and determine priorities.
• Identify system bounds and how the system should interact with its environment. :speech_balloon: :arrow_left: :computer:
-
• Convert user requirements into system requirements (e.g., an interactive user interface prototype that demonstrates the screen look and feel). :page_facing_up: :arrow_right: :desktop_computer:
-
• Verify that requirements are complete, consistent, unambiguous, verifiable, modifiable, testable and traceable. :bulb:
Because of the high cost of rectifying requirements’ problems in downstream development phases, effective requirements reviews have a large payoff.
-
-
The users in this process specify their information resource needs and how they wish to have them addressed by the system :stars: BASED ON THAT ,
:ONE: a general preliminary design of the system may
be developed and presented to user management for review and approval
:TWO: project schedule is created for developing, testing and implementing the system.
-
IS auditor role
IS auditor should pay close attention to the degree the organization’s system security engineering team is involved
in the development of SECURITY CONTROLS throughout the data life cycle within the business application
whether adequate AUDIT TRAILS are defined as part of the system because these affect the auditor’s ability to identify issues for proper follow-up.
IDENTIFY LEGAL, STATUTORY AND REGULATORY REQUIREMENTS for the solution being developed.
IN THIS PHASE, User involvement is necessary to obtain commitment and full benefit from the system.
Without management sponsorship, clearly defined requirements and user involvement, the benefits may never be realized
Impact assessment
-
An impact assessment is a study of the potential future effects of a development project on current projects and resources.
-