Thursday, December 12, 2019

System development life cycle Essay Example For Students

System development life cycle Essay The study contains the brief overview of the system development life rhythm followed in Shriv Commedia Solutions Pvt Ltd. The undertaking includes the equal proficient inside informations about the different stages including the practical illustration of Bank direction system developed by SCMS for its client Corporate Bank. The methodological analysis followed by SCMS for scheduling the undertaking ( utilizing Gantt chart ) and the package used in helping the planning procedure are described in study. Assorted trials including the feasibleness trial conducted by system analyst and proficient trials conducted by developer are mentioned with the process followed during the proving procedure. The possible menaces which may ensue to the loss of information have been described in the study and the recommendations ( solutions ) to avoid such menaces are besides discussed. In general, the study includes the process of the information system development in SCMS along with the practical description of the SDLC procedure, Gantt chart, proving procedure and the menaces for the information system ( with recommendations ) . Relevant illustrations are included wherever felt necessary to ease the reader for easy apprehension of the study. Shriv Commedia Solutions Pvt ltd ( SCMS ) is a dedicated package based company which focuses in countries like Software development, Web designing, Multimedia services, Outsourcing, E-commerce, Technical authorship, Search engine optimisation and proving solutions, supplying the services to the clients runing from public to private sector. Shriv Commedia Solutions Pvt Ltd has been runing under the package development atmosphere since 2001. It has its caput office located in India and the subdivisions in UK, Canada and US, all of them concentrating on finest, cost-efficient and timely solutions. With the chief pillars, mission, vision and values, SCMS has been quickly come oning in today s competitory IT universe. It has been successful in supplying the advanced and perfect solutions to its clients with the client based attack. From the list of systems developed by SCMS we have decided to discourse the Bank direction system developed for ‘corporate bank’ by SCMS. Corporate bank was established on 1906 and is one of the imperative clients of SCMS since 2004. The system developed by SCMS for Corporate bank is designed in the manner to accomplish the maximal security for the databases used to hive away the inside informations about all the banking minutess every bit good as the history inside informations of the costumiers. It is besides capable of entering the information of the bank employees. For illustration, Employee paysheet records, inside informations of employee and the attending of employee. The system developed is able to work with all, cyberspace, intranet every bit good as extranet. It was besides optimized to work with different runing system and was capable to be upgraded along with the debut of the new engineering. Taking the same banking direction system developed by SCMS into consideration, each of the development methodological analysis is discussed farther in the undertaking. Outline1 Information System Model in Shriv ComMedia Solutions Pvt. Ltd.2 1. Planing Phase: 3 2. Analysis Phase: 4 3. Design stage: 5 4. Execution stage: 6 5. Support: 7 1. All activities or undertaking are listed in program8 2. Ploting the undertakings onto the program9 3. Schedule the undertakings10 1. Operational Feasibility:11 2. Agenda feasibleness:12 3. Technical feasibleness:13 4. Economic feasibleness:14 1. Functional Testing:15 a. Validation Test16 B. Specific functional trial ( UNIT TEST )17 2. System Trial:18 3. Integration Trial:19 4. Performance Testing:20 5. Arrested development Testing:21 1. Waiter Downtime:22 Hazard:23 Solution:24 2. Disused application and tools:25 Hazard:26 Solution:27 3. Computer Virus, Worms and Trojans:28 Hazards:29 Solutions:30 4. Denial of Service ( DoS ) onslaught:31 Hazard:32 Solution:33 5. Back doors:34 Hazard:35 Solutions:36 6. Hardware Failure:37 Hazard:38 Solutions: Information System Model in Shriv ComMedia Solutions Pvt. Ltd. Information System Model states an simple conceptual lineation for the major constituents and activities of information system. In Shriv Commedia Solution Pvt. Ltd, information system depends on the resource of people, package, hardware, informations and webs to execute input, processing, end product and storage and control activities that converts information resource into information merchandises. Information system Model of Shriv ComMedia Solutions Pvt. Ltd. illustrates that information system consists of 5 major Components: 1. Peoples RESOURCES: In SCMS people ( terminal users and IS specializers ) are necessary for the map of all information system. 2. SOFTWARE RESOURCES: it includes all sets of information processing instructions 3. HARDWARE RESOURCES: It comprises of all the physical stuffs and devices used in information processing. Machines: All physical devices: Computers, peripherals and telecommunication webs. Media: all touchable objects in which information is recorded Hardware resource in SCMS 4. DATA RESOURCE: Datas are natural facts and figures typically approximately physical phenomena or concern dealing. Data constitutes a valuable organisational resource. SCMS procedure informations into information and form it for future usage. In SCMS data resource of information system are typically organized into 5. NETWORK RESOURCE: It includes the agencies of communicating within the organisation or with the outside universe like cyberspace, intranet by which informations or information can be transferred between the different sections of the organisation. Telecommunication web like cyberspace, intranet and extranet have become indispensable for the organisations. Network resources includes System Development Lifecycle by and large consists of the five stages including Planning, Analysis, design, execution and support. All the five stages are arranged together and used to construct the information system. Followings are some of the SDLC theoretical account used by SCMS depending on the package s demand: Waterfall Model Prototype Model Iterative Model Coiling Model Agile package Development Model RAD Model In Shriv Commedia Solutions ( SCMS ) they foremost take the user demands and make up ones mind which type of theoretical accounts should be followed for the development of the system. The 2nd measure will be to form the activities by grouping them into larger classs called stages. In this manner the stages are formed into the cringle with support stage indicating to the planning stage whenever there is the necessity to alter in the information system. The alteration is determined by the users want of information in different format, release of new version, or due to the hardware going disused. When the alterations occur the planning stage begins once more and some portion of whole of the system is modified and the system development lifecycle starts once more. Independent Spirit EssayDifferent stages of functional testing were: a. Validation Test It fundamentally checked the Windows GUI criterions, Valid, invalid and bound informations input, Screen and field expression and visual aspect, and Overall consistence with remainder of the units. B. Specific functional trial ( UNIT TEST ) Low degree trials which were conducted to prove the single procedure and information flow. 2. System Trial: This trial was performed to look into whether all the units of the application were working together to bring forth the end product and there is no spreads in the informations flow from one unit to other. 3. Integration Trial: Integration trial was performed by linking the application with the different other application. The public presentation of the application with different other package was noted and the application was verified based on the consequences. 4. Performance Testing: This trial was carried out to verify that the system provides the acceptable response clip ( should non transcend 4 seconds ) . 5. Arrested development Testing: The chief aim of the arrested development trial was to detect the functionality and stableness of the package. It was automated with the aid of the machine-controlled testing tools. Test environment available in ocular studio and NUnit package was used to automatize the testing of the application designed for Corporate Bank. Several formal reappraisals were carried before and during the trials and they were documented. The major formal reappraisal points were placed in different phases of proving as shown in the diagram: When all the trials were performed by the developer and all the mistakes /bugs were fixed, the extra trials were performed to guarantee that system was working in incorporate mode. In this manner the application designed for the corporate bank was verified by the developer s squad. During the system development in SCMS there are assorted security that arises which may take to the information loss. Following are some of the security hazards and their solutions to forestall the information loss: 1. Waiter Downtime: Hazard: Server downtime may do the waiter to halt working so that the full computing machine bridged with the waiter will be unable to link with waiter. This may do the loss of the information when the information is being sent to server. Solution: Before upgrading or migrating to a different physical waiter, make certain waiters pass all trials prior to full deployment, and trial and debug all applications prior to full deployment. 2. Disused application and tools: Hazard: Due to the defect in the application and tools the loss of the information may happen. Hardware clangs and Software failure may happen doing the information loss. Solution: Make the careful stock list of the all applications and tools presently in usage, prior to system execution. Always use the sure Hardware trade names and package trade names to avoid the hardware/software failure. Benchmarking proving can turn out fruitful to look into the hardware or package. 3. Computer Virus, Worms and Trojans: Hazards: These are the malicious-logic plan which act without user cognition can change the computing machine s operation and consequence to information loss. Solutions: Following steps can be adopted to forestall the computing machine viruses, worms and Dardans: Prevent get downing the computing machine with removable media in thrusts. Never open an e-mail fond regard from beginning other than trusted. Set the macro security degree to medium in the word processing or spreadsheet plans. Install the echt version of the operating system Install the good antivirus package ( updatable, dependable and efficient ) 4. Denial of Service ( DoS ) onslaught: Hazard: A DoS onslaught is designed to overload the waiter. The culprits use the packages of codifications to direct 1000 of petitions to the waiter so that the valid user ca nt link the waiter. Solution: The best manner to forestall the DoS onslaught is non allowing the DoS manner onslaughts near the webserver. The tools like Apache s mod_security or mod_dosevasive/mod_evasive can be used to drop the opprobrious IP reference at the firewall before they get anyplace near the webserver. 5. Back doors: Hazard: Back doors are the coder created algorithms which beltway security mechanisms and provides the entree to the plans so as to entree the plan for trouble-shooting or salvaging the development clip. But hackers and crackers use back doors to derive entree to plan and shoot the malicious codification to the plan doing the information loss. Solutions: Scan for the Back doors with the aid of tools available in market. Eg: SpyHunter security tool Update the antispyware package For developer: Try avoiding the back doors during the design stage or extinguish the back doors before the bringing of the package to the client. 6. Hardware Failure: Hazard: Hardware failure can do the loss of information stored in difficult thrusts. Solutions: Frequently backup the difficult thrusts Use Redundant Array of Independent Disks ( RAID ) to forestall hardware clangs Online Storage of the informations and information After the research conducted on the System Development lifecycle of Shriv Commedia Solutions Pvt Ltd we came to reason that the company ( SCMS ) follows the general five stages of the information system development rhythm for the undertaking received. It follows all the five stages exhaustively and tends to run into the user demands by developing the perfect duplicate solutions for their concern. We came to cognize that the system analyst has the major function in the development procedure as he/she Acts of the Apostless as the span between both users and developers. Analyst is the individual who conducts the feasibleness trials and decides the suitableness of the undertaking for company. The undertaking development squad dwelling of different degree of employees work on the undertaking, as scheduled on Gantt chart, designed by the undertaking leader. SCMS conducts the different trials during and after the designing of the application to do the application error-free before it is delivered to the client. There are besides many security menaces for the application which may do the information loss. By the aid of the research we came to cognize the steps to extinguish the security hazards and protect the loss of information. In general, after the research on SCMS and its system development methodological analysis in instance of Corporate Bank ( one of its client ) we had the elaborate cognition of the different stages of the information system development lifecycle and the possible menaces for the information loss.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.