logo

Cloud Computing Security and SDLC

   

Added on  2020-05-28

12 Pages2659 Words71 Views
 | 
 | 
 | 
Running head: SYSTEM ANALYSISSystem AnalysisName of the StudentName of the UniversityAuthor Note
Cloud Computing Security and SDLC_1

1 SYSTEM ANALYSISTable of ContentsIntroduction..........................................................................................................................21. Non-Functional Requirements.........................................................................................21.1. Functionality.............................................................................................................21.2. Usability....................................................................................................................31.3. Reliability.................................................................................................................31.4. Performance..............................................................................................................31.5. Supportability...........................................................................................................42. Functional Vs Non-Functional Requirements.................................................................43. The cloud based solution: Hybrid Cloud Environment...................................................43.1. Strength.....................................................................................................................63.2. Weakness..................................................................................................................64. The chosen SDLC Approach: Predictive SDLC.............................................................74.1. Predictive SDLC.......................................................................................................74.2. Adaptive SDLC........................................................................................................8Conclusion...........................................................................................................................9References..........................................................................................................................10
Cloud Computing Security and SDLC_2

2 SYSTEM ANALYSISIntroduction Telehealth is a project that is introduced for improving the process of providinghealthcare services in rural public hospitals. This project is to deliver a high quality heath serviceirrespective of the geographical barrier. Telehealth is software that operates in a real time basis,and is a cost effective solution. It is an alternative to the traditional way of offering the healthcareservices (Steele & Lo, 2013). The use of this Telehealth software is expected to improve thepatient’s outcome and driving greater efficiency in terms of the ways in which the healthcareservices are delivered. This software will link all the emergency department of the nearesthospitals with the help of videoconferencing with an aim of delivering 24*7 emergency servicesin the rural areas as well. Use of a cloud-based solution in the software is an effective way ofaccessing and storing all the records of the hospitals and the patients (AlZain, et al., 2012). Thereport discusses various aspects of the using a cloud based solution in the project.1. Non-Functional Requirements A system’s non-functional requirements help in identifying the requirements that judgethe vital operation of a system. This includes the system requirements, hardware or softwarerequirements, and constraints. 1.1. Functionality Functionality is an important aspect in identifying the non-functional requirements ofTelehealth project as it analyzes the needs of the customers (Jain & Nandakumar, 2012). Themajor non-functional requirement is ensuring the proper security of the Telehealth system. Thisis essential to improve the security of the customers’ data stored in the system. Furthermore,since the system is to be generated for linking all the emergency departments of the hospitals, it
Cloud Computing Security and SDLC_3

3 SYSTEM ANALYSISis essential to consider the throughput of the system. A system development with highthroughput is therefore, another non-functional requirement. 1.2. Usability The non-functional requirement associated with the usability of the system determineshow effective the product is from a user’s point of view. Since the project is to be developed forproviding emergency healthcare services to the people of rural areas, the user interface should besimple and easy to use. Furthermore, the users of the system should be able to access and use theemergency services without any hazards and therefore, it is essential to implement a system thatcomes with proper step-by-step guidance about its operation. 1.3. ReliabilityThe system to be implemented should be reliable enough so as to provide anduninterrupted emergency services to the people in rural areas. Therefore, having an option ofdata backup and recovery is an essential non-functional requirement. Since the system is to beimplemented on cloud, it will not be an issue to enforce a proper disaster recovery option forimplementation of a reliable Telehealth system. 1.4. Performance The project is very important and crucial as it aims at delivering a system that will link allthe emergency healthcare centers across the rural region and provide emergency services to thepatients via video conferencing. The After-Hours Urgent Care Telehealth project shouldtherefore provide uninterrupted services to its clients. Ensuring a minimum response time of thesystem to be developed is therefore and important non-functional requirement. Another
Cloud Computing Security and SDLC_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents