logo

Stages of System Development Life Cycle - PDF

8 Pages1974 Words134 Views
   

Added on  2021-02-20

Stages of System Development Life Cycle - PDF

   Added on 2021-02-20

ShareRelated Documents
Report
Stages of System Development Life Cycle - PDF_1
Table of ContentsINTRODUCTION ..........................................................................................................................2MAIN BODY...................................................................................................................................2Process that defines planning, building and managing phase of network security design.135. . .2Why attacks occur and who they may come from......................................................................2Security risks that requires protection..........................................................................................3Categories the risks for the company...........................................................................................3Risk management plan.................................................................................................................4Network security design..............................................................................................................5Security policy for organisation...................................................................................................5What is incident response plan ?..................................................................................................5Some typical incidents ?..............................................................................................................5Process that happen when incident is identified. ........................................................................6CONCLUSION ...............................................................................................................................6REFERENCES................................................................................................................................61
Stages of System Development Life Cycle - PDF_2
INTRODUCTION The Report is based on Tera Tax Australia Pty.Ltd. It is a privately owned tax agencywhich is located in Melbourne and it has three other branches. Firm use's legacy tax software thathas reached end of life. Owner of firm has decided to interconnect all the offices and improvesecurity to maintain laws under Australian law and legislation. TeraTax wants to develop ICTnetwork security solution as number of clients will increase in coming months . The Report willoutline process of network security design, why attacks happen, types of security risk, incidentresponse plan etc.MAIN BODYProcess that defines planning, building and managing phase of network security design.135Software development life cycle is the process that is used for developing a new softwaresystem. This will help to meet the demands of clients with less expenditure. Planning stage-Under this, TeraTax will develop project goals. It is the most important organizational phase. Itinvolves feasibility assessment, identification of the system, developing project plan etc.Building stage-It is also called development phase. It involves developing the infrastructure of IT,database and code etc. It only provides the blue print of the IT infrastructure. Firm will installsoftware and hardware to support the infrastructure (Layton, 2016).Managing stage-Under this stage, firm will make required modifications to ensure that system will work.It is essential to upgrade the system from time to time for adapting to changing businessenvironment.The major benefit of the process is that, it helps to control the process of development toa particular extent.Why attacks occur and who they may come from.There are various types of cyber-attacks that happens due to various reasons. The attacksin network security in TeraTax may occur due to various reasons such as when another personwants financial details of the business. These also happen due to the requirement of sensitivepersonal data, due to outdated infrastructure of information technology, due to informationtechnology services, intellectual property etc. Generally, cyber-attacks against companies are2
Stages of System Development Life Cycle - PDF_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cybercrime: Definition, Examples, and Case Study
|8
|656
|46

Incident Response Procedure, Business Continuity Plan, Data Breach, and Network Security
|23
|1494
|171

Cyber Security Report
|10
|3317
|98

Big Data Privacy: Balancing Personalization and Privacy
|19
|4957
|121

Cybersecurity Assignment 2022
|12
|3058
|22

Cyber Crime Fundamental Report 2022
|11
|2538
|17