Preview

GMU SOM 301 Reading Review Guidelines

Satisfactory Essays
Open Document
Open Document
319 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
GMU SOM 301 Reading Review Guidelines
Professor Nima Zahadat
George Mason University
MIS 301
In-Class SDLC Exercise
Purpose
The purpose of this exercise is to get you acquainted with your group partners and also to get you started thinking about your final project. The idea is that you begin the process of systems thinking, planning, diagramming, and designing. Be sure to bring this exercise to class each session.
Requirements
You are to use the SDLC to create a system for mobile security in your organization. The concern revolves around personnel bringing in their own devices and using them. You are tasked with coming up with a project that allows such a system. You are to determine the project requirements and scope. Follow the example in plugin B14 to get started, then chapter 9 and plugin B18 as we go through the class and continue with building on this exercise. For example, consider having the users
Register their devices with the company
This is electronically with the existing IT system and manually using paperwork
Agree to proper use of their devices when working with company data both on-site and off-site
“Proper” is left to you to determine; it can mean not storing company data on their devices, not sharing company data and apps, reporting missing devices promptly, etc.
Agree to report a lost or stolen device within a required period of time
Understand and agree to policies set by the company
And IT to
Identify which devices will be allowed
Identify which operating systems and their version will be allowed and supported
The extent to which they will support the devices or the company apps on the devices
The security measures they will take to protect company data, resources, and systems
How they will implement, monitor, and enforce the policies (policy management)
Expand on this. This is a start for your final project. Use the SDLC cycle to project manage the
Planning
Analysis
Design
Development
Testing
Implementation
Maintenance

You May Also Find These Documents Helpful

  • Satisfactory Essays

    For starters, the security policies for account management need to be updated. The user’s password needs to changed every 90 days. Any employee that has remote access should have a token key on a USB drive that provides the user’s credentials. When an employee retires, quits, or gets fired, they accounts should be locked until IT administrators can go through the account.…

    • 550 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to the local network will be secured by user authentication passwords. Users will be limited to only the system resources that they absolutely need to complete their work. Users’ passwords must be changed every 90 days.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Microsoft Project will be the tool used to create a model of the project tasks.…

    • 869 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Prepare a 2-3 page plan for gathering requirements. Build on the systems development selected in Week Two. Begin gathering the requirements for the project. State any assumptions you make. State the difficulties of gathering the requirements.…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Employees will be also using the workstation domain is where they will connect to the company’s network. Tight security and access controls will be enforced on company equipment and users must have proper access rights…

    • 539 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1330 Final Exam Paper

    • 645 Words
    • 3 Pages

    What do you do if a client wants to adjust their schedule, example: they want you to arrive early to your next shift?…

    • 645 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Prepare a 2-3 page plan for gathering requirements. Build on the systems development selected in Week Two. Begin gathering the requirements for the project. State any assumptions you make. State the difficulties of gathering the requirements.…

    • 406 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Task 3

    • 4254 Words
    • 17 Pages

    Complete a thorough analysis of the mobile device policies. Periodically examine mobile device usage and identify security risks/threat.…

    • 4254 Words
    • 17 Pages
    Powerful Essays
  • Better Essays

    The process of information-gathering is crucial to the success of this project. A plan must be followed and executed flawlessly to make sure the requirements and specifications have been defined. “Without a formalized, organized approach to developing information systems software [we] might see a project fail due to premature development of the software before all the functional requirements are clearly defined and agreed upon.” (Shelley 2004) The IT Team will use the Systems Development Cycle or SDLC with the waterfall methodology. Through this method, the team will be able to understand the user requirements and efficiency of the current system in comparison to related industry technological standards. The SDLC method is a tried and true approach for developing applications for companies that want to upgrade their systems.…

    • 1264 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Is305 Project 1

    • 2310 Words
    • 10 Pages

    The project is divided into three major deliverables and four smaller assignments as detailed below:…

    • 2310 Words
    • 10 Pages
    Satisfactory Essays
  • Better Essays

    There are two kinds of SDLCs approaches, one is predictive and another one is adaptive. A predictive approach which is organised and planned well in advance and new information can be developed according to the plan. While adaptive approach is when the exact requirement or user’s need are not known in advance. In this approach, some requirement of the system has be to determined after the initial development work. Generally projects have both the approaches. Predictive approaches are more traditional and were invented in 1970. Most of the adaptive approaches are created during 1990.…

    • 947 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Course Project

    • 1183 Words
    • 5 Pages

    This is the most important part of the project, because it sets the direction for all other sections. In this section, you establish the strategy for an organization.…

    • 1183 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Sikhism vs Judaism

    • 1311 Words
    • 6 Pages

    The project is divided into four milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final submissions. These milestones will be submitted in Modules Two, Three, Five, and Seven.…

    • 1311 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    It must be noted, that the implementation stage of this project is where all the information…

    • 1463 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    internal and external users to whom access to the organization’s network, data or other sensitive…

    • 3990 Words
    • 15 Pages
    Good Essays