logo

Cloud-Based Solutions for Headspace: Security, Non-Functional Requirements, SDLC

Build a system to capture the 'story' of young people with mental illness to assist professionals in providing appropriate help.

15 Pages3198 Words388 Views
   

Added on  2023-06-12

About This Document

This article explores the aspects of cloud-based solutions for Headspace, including security considerations, non-functional requirements, strengths and weaknesses of cloud-based solutions, and the best SDLC approach for Headspace. It discusses the advantages and disadvantages of predictive and adaptive SDLC methodologies.

Cloud-Based Solutions for Headspace: Security, Non-Functional Requirements, SDLC

Build a system to capture the 'story' of young people with mental illness to assist professionals in providing appropriate help.

   Added on 2023-06-12

ShareRelated Documents
Running head: CLOUD-BASED SOLUTIONS FOR HEADSPACE 1
Cloud-Based Solutions for Headspace
Name
Institutional Affiliation
Cloud-Based Solutions for Headspace: Security, Non-Functional Requirements, SDLC_1
CLOUD-BASED SOLUTIONS FOR HEADSPACE 2
Executive Summary
Cloud computing has experienced significant and rapid growth in the past few years. It is
a great change from the customer server model to a model that offers location and faster
independent services. In the current world, cloud computing is becoming essential and is
anticipated to have a large effect on how things are used and designed in the internet. An
essential aspect of migrating everything into the cloud is ensuring that everything is secure and
safe. It is now clear that in the near future, cloud computing will be broadly employed in
healthcare areas. Diagnosed images are essential record, as such, storage repository requires
redundancy to be a dependable system. Cloud providers provide backup system and data security
without extra charges for clients.
Cloud-Based Solutions for Headspace: Security, Non-Functional Requirements, SDLC_2
CLOUD-BASED SOLUTIONS FOR HEADSPACE 3
Table of Contents
Executive Summary.........................................................................................................................2
Introduction......................................................................................................................................4
Aspects of Cloud-Based Solution....................................................................................................4
Security Considerations...............................................................................................................4
Resource Optimization.................................................................................................................5
Capability Delivery......................................................................................................................5
Value Preposition.........................................................................................................................6
Non-Functional Requirements.........................................................................................................6
Strengths and Weaknesses of Cloud-Based Solutions.....................................................................8
Advantages of Cloud-Based Solutions........................................................................................8
Disadvantages of Cloud-Based Solutions....................................................................................9
Software Development Lifecycle (SDLC)....................................................................................10
Advantages of Predictive SDLC................................................................................................10
Disadvantages of Predictive SDLC............................................................................................11
Advantages of Adaptive SDLC..................................................................................................11
Disadvantages of Adaptive SDLC.............................................................................................11
Best SDLC for Headspace.........................................................................................................11
Conclusion.....................................................................................................................................12
References......................................................................................................................................13
Cloud-Based Solutions for Headspace: Security, Non-Functional Requirements, SDLC_3
CLOUD-BASED SOLUTIONS FOR HEADSPACE 4
Introduction
Cloud computing has experienced significant and rapid growth in the past few years. The
cloud computing term emerged to describe the change that happens when services and
applications are migrated into the cloud (internet). Cloud computing is a great change from the
customer server model to a model that offers location and faster independent services. There are
various essential features of cloud computing. They include device independence, minimized
cost, scalability, security, agility, location independence, reliability and resource sharing.
However, the main function of cloud is to offer services. In the current world, cloud computing
is becoming essential and is anticipated to have a large effect on how things are used and
designed in the internet. An essential aspect of migrating everything into the cloud is ensuring
that everything is secure and safe. The context will explore the cloud computing security aspects,
non-functional requirements of cloud-based solutions, advantages and disadvantages of cloud-
based solutions, andadvantages and disadvantages of adaptive and predictive methodologies.
Aspects of Cloud-Based Solution
Security Considerations
There are various security threats and issues in the cloud and can be grouped depending
on the area of the security that is under attack. They include:
Privacy: privacy makes sure that data, personal identity and information of a cloud
service customer (CSC) must be hidden to unapproved users. The decryption and encryption
keys are normally present with the customer and thus the cloud service provider (CSP) is unable
to view information in the clear. CSC should be cautious when selecting a CSP. Insider threat is
another privacy threat (Pandith, 2014). A CSP insider could access CSC’s personal details, if the
Cloud-Based Solutions for Headspace: Security, Non-Functional Requirements, SDLC_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cloud-Based Solution for Headspace
|13
|2847
|277

System Analysis 8 System Analysis Name Affiliate Institution Name
|11
|2890
|169

System Analysis and Design: Cloud Computing
|13
|2906
|228

Paper On Headspace Company- Cloud System
|16
|2469
|40

Aspects of Cloud Based Solution
|10
|2418
|130

System Analysis and Design
|12
|3126
|147