際際滷

際際滷Share a Scribd company logo
際際滷s
 Idah S Muringayi H1113515V
 Fungayi Makoni H1110060Y
 Definite Shunje H1110024O
 Simbiso S Chipazi H1112229J
Online application and allocation of residence
system.
 To transform the manual residence
application into a computerized system which
is more user friendly and GUI oriented .
 Functional requirements
System accept and validate user input
Process user information and complete residence
allocation
 Non functional requirements
Better speed in loading pages
Reliability- 24/7
Security - use of passwords, CIA, firewalls, UPS
Hardware ( client computers, network, web servers)
Rapid Application Development
Why RAD?
 faster development cycle and better turnaround time
 enhanced quality due to error reduction due touse of
automation tools
 better maintenance and up gradation of the system
 Better project management(participation of all interested
parties)
RISK MITIGATION
TECHNICAL
Lack of technical expertise
Malicious use of system
 some candidates claiming to have
knowledge in managing the
systems database when they do not
know much
Training of system users
Use of passwords and firewalls to
control access and flow within the
system
 thorough practical and theoretical
interviewing before induction of new
candidates
OPERATIONAL
power outages
unintentional deletion of data
Use of UPS
implementation of remote backups
HUMAN THREATS
Theft and robbery
Vandalism
Computer crime
use of physical barriers e.g. lock &
key, security guards
implementing policy regarding
vandalism and computer crime
Use of anti-virus and anti-malware
NATURAL THREATS
Due to geographical and
environmental factors( earthquakes,
Use of remote backups
RISKS ANALYSIS AND MITIGATION
TYPE OF TESTING GENERAL SCOPE WHO GENERALLY DOES IT
UNIT small unit of code,
not lager than a class
the developers
INTERGRATION Multiple classes The developers
FUNCTIONAL
/SYSTEM
Whole system Users, administrator. Even
developers
ACCEPTANCE whole system in
users environment
users
TESTING
This is concerned with the confidentiality, Integrity and availability of
the system
 Confidentiality
Implemented through the use of access controls e.g. passwords
Different privileges are given to different users of the system
 Integrity
 Mainly concerned with the prevention of improper modification of
the overall system and database information.
 Use of Encryption
 Availability
 System availability when needed
 Use of UPS in case of power outages
 The online application and allocation system of
residence was tailor-made only for use at HIT.

More Related Content

際際滷s

  • 2. Idah S Muringayi H1113515V Fungayi Makoni H1110060Y Definite Shunje H1110024O Simbiso S Chipazi H1112229J Online application and allocation of residence system.
  • 3. To transform the manual residence application into a computerized system which is more user friendly and GUI oriented .
  • 4. Functional requirements System accept and validate user input Process user information and complete residence allocation Non functional requirements Better speed in loading pages Reliability- 24/7 Security - use of passwords, CIA, firewalls, UPS Hardware ( client computers, network, web servers)
  • 5. Rapid Application Development Why RAD? faster development cycle and better turnaround time enhanced quality due to error reduction due touse of automation tools better maintenance and up gradation of the system Better project management(participation of all interested parties)
  • 6. RISK MITIGATION TECHNICAL Lack of technical expertise Malicious use of system some candidates claiming to have knowledge in managing the systems database when they do not know much Training of system users Use of passwords and firewalls to control access and flow within the system thorough practical and theoretical interviewing before induction of new candidates OPERATIONAL power outages unintentional deletion of data Use of UPS implementation of remote backups HUMAN THREATS Theft and robbery Vandalism Computer crime use of physical barriers e.g. lock & key, security guards implementing policy regarding vandalism and computer crime Use of anti-virus and anti-malware NATURAL THREATS Due to geographical and environmental factors( earthquakes, Use of remote backups RISKS ANALYSIS AND MITIGATION
  • 7. TYPE OF TESTING GENERAL SCOPE WHO GENERALLY DOES IT UNIT small unit of code, not lager than a class the developers INTERGRATION Multiple classes The developers FUNCTIONAL /SYSTEM Whole system Users, administrator. Even developers ACCEPTANCE whole system in users environment users TESTING
  • 8. This is concerned with the confidentiality, Integrity and availability of the system Confidentiality Implemented through the use of access controls e.g. passwords Different privileges are given to different users of the system Integrity Mainly concerned with the prevention of improper modification of the overall system and database information. Use of Encryption Availability System availability when needed Use of UPS in case of power outages
  • 9. The online application and allocation system of residence was tailor-made only for use at HIT.