Preview

Rdd for Postal System

Powerful Essays
Open Document
Open Document
957 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Rdd for Postal System
Assignment No 1

TITLE: Requirements Definition Document for Postal System

Group Members: Rupali Lokhande I-8 Purva Maloo I-14 Jyoti Mayne I-18

Post Office Transaction System

------------------------------------------------- Table of Contents 1. CONTEXT 2. PROBLEM 3. SOLUTION 4. benefits

1. Context Meghdoot Millenium software is used by almost all the post offices all over the country. Prior to the use of this software, in a manual environment specific counters had been put in place for different types of transactions. A customer would generally need to interact with two counters to get any transaction done. All the data, which was captured at the counter, was duplicated again at the back-end and all the accounting and integrating functions were being done manually. As manual calculations were involved on a large scale there were chances of error and the process was time consuming. So there was a need for software that could solve these problems. The Meghdoot software aims at computerizing the PO counter work. All the counter operations except savings bank transactions can be carried out through this package. The software is capable of handling all the following transactions that are performed at the PO counter .The software works in a Client Server environment with the server storing the data and clients connecting to the server for all types of transactions. The software has no doubt been able to solve the above mentioned problems to a great extent, package has still not stabilized even after five years due to incomplete incorporation of Departmental rules and inadequate data integrity. Many facilities in different modules of the package have not yet been implemented. IT security related control measures in place are not adequate. As a result, reliance on manual work continues, which is a setback to the objectives set by DoP for introduction of the package such as reducing

You May Also Find These Documents Helpful

  • Best Essays

    Aircraft Solutions

    • 2805 Words
    • 12 Pages

    As Aircraft Solutions takes the next step in its growth, it is imperative that its IT infrastructure keep pace as to not counteract gains made by the company during this expansion. This is especially important given it designs and fabricates components for both commercial and defense related industry. Given the increase in staff as well as outside vendors accessing the network, a more centralized approach to antivirus protection has to be adopted. It is equally important that certain elements within the network that have been done manually, such as Access Control List policy, be automated to avoid consuming the IT department in an ever escalating bar of employee hours.…

    • 2805 Words
    • 12 Pages
    Best Essays
  • Powerful Essays

    Main Security Concerns: As a rapidly growing business that primarily utilizes IT resources for intranet company communications between and among a single home office and three satellite offices; internal network access controls and remote employee user’s access controls seem to be of primary importance. Priority number one should be hardening and the safeguarding of access and data integrity of the Oracle database servers housed as the main office in Reston, VA. And separately at the San Diego satellite office A comprehensive security policy will be developed and approved by management that will detail the specific guidelines administrators must follow when allowed admin access to company IT resources and services, and when and how those permissions should be denied or allowed. Additionally, auditing and logging of critical events should be implemented utilizing a reliable SEIM (Security Information and Event Management) system. Moreover, control of user access from remote sites via the company intranet via VPN’s and remote access via RADIUS should be strengthened and monitored for both qualitative and quantitate analysis and measuring. Cryptographic techniques will be enhanced and login and password requirements will be strengthened. Of significant importance is the company web presence and corporate access to its knowledge base portal within the company intranet. The company web presence is of vital importance to allow customers to access information concerning the company’s products and services. The knowledge portal is vital for company employees to have access to propriety information while protecting their confidentiality, integrity, and availability of the data. We will separate and hardened both the web server and the knowledge portal via…

    • 2606 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    The following outline presents the fundamental solutions for the safety of data and information that belongs to Richman Investments. As part of the general security plan of the organization the IT department puts together a proposal to provide multi-layered security strategies that can be applied at every level of the IT structure. The plan will lay out the importance of improving and safeguarding the levels of each domain and the process of protecting the information of the organization.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    RLOT2 Task 2 B rev 1

    • 569 Words
    • 2 Pages

    The only zero cost opportunity, standardizing polices and procedures, is also the most difficult. Processes for incident response, patch management, and preventative maintenance must be developed, refined and communicated to the appropriate staff. Incident response processes must further be exercised so all incident responders know exactly what to do in the event of a (D)DoS. Development and deployment policies must be developed defining the process for development and deployment and use of University owned and managed computing devices. Security must be forefront-outlining security in the software development life cycle (SDLC) for both University developed applications and off the shelf applications.…

    • 569 Words
    • 2 Pages
    Good Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Good Essays

    week 3

    • 580 Words
    • 3 Pages

    In the ongoing process of analyzing the HR department of Riordan Manufacturing and integrate the existing tools into a single application, the project now transitions from the analysis phase to the design phase. This phase will include a description of the application architecture and process design as well as a high-level description of recommended security tools. A description of the system’s architecture in terms of data, processes, interfaces, and network are also included in this phase and will be addressed in this portion of the paper. Finally, a physical data flow diagram will be included to show how the system will take in data and deliver and expected output.…

    • 580 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    With business always changing and data always needing to be protected, it has become an issue to determine the level of security for confidentiality and integrity purposes while allowing it all to be properly available for use. To put Global in front of the competition with its customers it implements its Global Connect-Link for collaboration. Through the use of its security division, CIS, Global prioritizes its data according to the risk of activity of usage against the potential business reward. It conducts constant supervision and monitoring to maintain confidentiality, integrity and availability. Global also has its own Continuity Manager software to manage large amounts of external users while maintaining the necessary centralized security from unauthorized access. Another level of security Global offers is its DLP or data loss prevention product. This keeps all data whether structured or unstructured when in motion or at rest from being compromised and deleted. Lastly in regards to Global’s controls and the documentation of the effectiveness of these controls, CompScan, an audit program is in place to collect and analyze all the data.…

    • 560 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Townsend & Townsend

    • 577 Words
    • 3 Pages

    There is also another issue, the segregation of duties within the IT department as this is a great concern as it can create a high possibility of unauthorized changes, therefore reducing the integrity of the data and a lack of accountibility among the IT employees. We would recommend that you clearly define the duties and restrictions among the IT staff and monitor these…

    • 577 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Briargrove

    • 403 Words
    • 2 Pages

    Briargrove, a multinational organization, has a wide-range of computer systems and applications of which need to communicate with each other quite frequently. However, being that different backup systems are located globally and online, Briargrove only implemented data back-ups and lab test network without having any particular policy or procedure put into place. The impact of not implementing administrative controls is that, a vast amount of management has taken it upon themselves to download unknown software of which has counteracted with the system therefore causing a complete system failure and thereby affecting the organization as a whole entity. Subsequently, after the system failure, Briargrove has been advised to provide both a…

    • 403 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    | 5. Batches checks 6. Sends checks to cashier 7. Uses payments stub to enter payments into computer…

    • 787 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Dear Itunes

    • 885 Words
    • 4 Pages

    Form the start you will face with the problems such; as reliability feedback and goal changing; analysis, place of change and transaction security. In this email I will try to explain why are they problem? And how you can fight with them…

    • 885 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Several new products and services constituted the next historical milepost; these were chains of Automated-Clearing-Houses (ACHs), an extensive system comprising shared Automated-Teller-Machine (ATM) terminals, and enhanced capability for online Point-Of-Sale (POS) transactions;sophisticated check authorisation procedured;preauthorised debit and credit systems,particularly their wide-spread use by governments to distribute…

    • 14840 Words
    • 60 Pages
    Powerful Essays
  • Good Essays

    The distributions can be valuable as rules for implementation of security tenets and as lawful references if there should be an occurrence of case including security issues. There are many kinds of SP-800 today. One kind of NIST 800 Series is NIST SP 800-12 that give explain of an abnormal state review of data security standards by presenting related ideas and the security control families (as characterized in NIST SP 800-53, Security and Privacy Controls for Federal Information Systems and Organizations) that associations can use to successfully secure their frameworks. Another kind of NIST 800 Series is NIST SP800-50, which building An Information Technology of Security Awareness and Program of trainer, gives direction to building a powerful data innovation (IT) security program and backings prerequisites indicated in the Federal Information Security Management Act. Solid IT security program can't be set up without huge consideration given to preparing office IT clients on security approach, systems, and strategies, and also the different administration, operational, and specialized controls fundamental and accessible to secure IT assets. Likewise, those in the office who deal with the IT framework need the vital aptitudes to do their doled out obligations…

    • 715 Words
    • 3 Pages
    Good Essays
  • Good Essays

    IoT

    • 977 Words
    • 3 Pages

    Secondly, the paper details that many applications only consider the installation of “information security, privacy and data protection” only as an afterthought, rather than in the beginning, at the drawing board. This compromises the application’s security and the user’s privacy substantially, as the capabilities of these measures would be reduced.…

    • 977 Words
    • 3 Pages
    Good Essays