logo

Information System Project: Location Intelligence for Policy Profile Assessment

Produce a design for a new IT Infrastructure Platform for the IIL Location Intelligence for Policy Profile Assessment (LIPPA) Project.

14 Pages2968 Words426 Views
   

Added on  2023-06-04

About This Document

This Information System Project focuses on providing a single storage platform for Inshore Insurance Ltd (IIL) to accurately record the timing and location of accidents and crimes. The project includes use cases, design overview, solution architecture, capacity requirements, system interfaces, and non-functional requirements.

Information System Project: Location Intelligence for Policy Profile Assessment

Produce a design for a new IT Infrastructure Platform for the IIL Location Intelligence for Policy Profile Assessment (LIPPA) Project.

   Added on 2023-06-04

ShareRelated Documents
INFORMATION SYSTEM PROJECT 1
Information system Project
Student Name
Institutional Affiliation
Information System Project: Location Intelligence for Policy Profile Assessment_1
INFORMATION SYSTEM PROJECT 2
Table of Contents
1 Introduction..............................................................................................................................3
1.1 Introduction.......................................................................................................................3
1.2 Solution Scope..................................................................................................................3
1.3 Solution Overview............................................................................................................3
1.4 Constraints........................................................................................................................3
1.5 Exclusions.........................................................................................................................5
2 Use Cases.................................................................................................................................5
2.1 Actors................................................................................................................................5
2.2 Use Case Diagrams...........................................................................................................5
3 Design Overview......................................................................................................................6
3.1 Solution Architecture........................................................................................................6
3.1.1 Project Governance Process......................................................................................7
3.1.2 IT Infrastructure Solution..........................................................................................8
3.1.3 Infrastructure Security...............................................................................................8
3.1.4 Application Solution..................................................................................................9
3.1.5 Data Solution.............................................................................................................9
3.2 Capacity Requirements...................................................................................................10
3.3 System Interfaces............................................................................................................10
3.4 Constraints and Assumptions..........................................................................................10
4 System Object Model.............................................................................................................10
4.1 Sub Systems....................................................................................................................10
4.2 Subsystem Interfaces.......................................................................................................11
5 Object Collaboration..............................................................................................................11
5.1 Collaboration Diagrams..................................................................................................11
5.2 Access Model..................................................................................................................11
6 Non Functional Requirements................................................................................................11
6.1 Performance Considerations...........................................................................................11
6.2 Design Constraints..........................................................................................................11
6.3 Test Criteria.....................................................................................................................12
6.4 Proof of Compliance.......................................................................................................12
7 References..............................................................................................................................12
Information System Project: Location Intelligence for Policy Profile Assessment_2
INFORMATION SYSTEM PROJECT 3
1 Introduction
1.1 Introduction
Inshore Insurance Ltd (IIL) is a financial profitable organization based in Australia with its head
office in Sydney and other branches in all the other cities. The company wants to invest in an IT
solution that will provide a single storage platform and provides accurate timing and location of
accidents and crimes. This project has been named Location Intelligence for Policy Profile
Assessment (LIPPA) Project. IIL already have some infrastructure in place that it is currently
using such as web enable applications and cloud services that enable the institution to connect
with brokers and customers. The main data center is located in the headquarters and all the
information technology services are managed in-house.
1.2 Solution Scope
The scope of the LIPPA project is to provide a high level recommendation and analysis of the
proposed IT solution. Risk Analysis Product (RAP) s assumed to provide the functional
processing services required by IIL and has been hosted in the IIL main data center. The IT
solution shall provide a single storage platform to accommodate the vast volume of generated
and primary data from cloud and in-house sources.
1.3 Solution Overview
The IT solution should be able to address the current challenges faced by IIL. The amount of
data that the institution is handling is increasing and thus requires an application that will be able
to store, manage, analyze, and archive the data. The application should also have the capacity to
record the location and time when a crime and accidents occur. It should have the ability to
process low transaction and high volume of data with system access only restricted to thirteen
users (CIO and six other users to access report distribution and six users at the HQ). The IT
solution will provide episodic localized workday.
1.4 Constraints
Data sensitivity is a very crucial aspect especially when it involves private and confidential data.
Data sensitivity is one of the constraints that limits the development of the solution. As such, the
project team should be able to come up with measures to ensure data sensitivity. Benefit
realization plan is very important to ensure that the project adds value to the institution. Benefit
realization plan is important in benefit identification, execution, and sustenance. The threat
Information System Project: Location Intelligence for Policy Profile Assessment_3
INFORMATION SYSTEM PROJECT 4
model is necessary to determine the risks and threats that the system may face and prioritize
them according to the level of impact (Mehta, 2018). It also allows the project team to prioritize
the risks and develop mitigation strategies. The diagram below represents the threat model:
Figure 1: Threat Model
(Source: Malone, 2015)
Information System Project: Location Intelligence for Policy Profile Assessment_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Business Process Modelling for Inshore Insurance Ltd
|16
|2713
|137

IIL Location Intelligence for Policy Assessment (LIPPA) Project
|18
|3310
|313

Location Intelligence for Policy Assessment (LIPPA) Project
|14
|2912
|55

Threat Model for Inshore Insurance Ltd (IIL)
|14
|2096
|185

Statement of Work for Enhancement in the Cloud Security
|16
|2880
|44

Project Description and Design Criteria for a Multi-Technical University
|16
|3306
|390