SDLC DQ-2 What Component Of Term Paper

PAGES
1
WORDS
381
Cite

SDLC

DQ-2 What component of an SDLC is typically overlooked or not emphasized in a project

The final screening stage of the SDLC systems testing process is without a doubt the most overlooked aspect of the development sequence. Once a new system has been running for a while, the system should continue to be evaluated for potential problems. The system must be maintained, and checked for existing and potential problems such as unnecessary delays, vulnerability to crashing if overloaded, to newly released viruses or worms that render the system vulnerable to attacks, or simply to the potential for the system's unintentional misuse by the designated users. How can security be improved? How can the use of the system be simplified for the uninitiated? What new threats are posed to the system inside and outside not in existence when the system was first designed? All of these are important questions. Also, the users of the system should be kept up-to-date concerning the latest modifications and procedures designed to alleviate these problems. ("Define the systems development lifecycle," 2006, VB Definitions)

At the end of the development process, after the system's initial bugs have been worked out, it is only natural that the software development personnel wish to move onto new projects, rather than dwell upon a project that has already been completed. Often the final stage requires the staff to again deal again with laypersons, whose naive questions may seem frustrating to an experienced developer.

There also may be a tendency to see vulnerabilities as defects to the initial process, which causes resistance to this final stage. Designers must not take this personally, as the security and quality of any technology will vary as time wears on. Unexpected problems will invariably occur that could not be foreseen when the first tests were conducted. Finally, non-technical managers may resist the final evaluative stage because of cost of re-retesting, and a feeling that 'if it works well enough, don't fix it.' But fixing something before critical problems occur is actually the most cost-effective solution for management, and causes the least headaches for the proud designers of the system.

Works Cited

Define the systems development lifecycle." (2006) A definition from VB definitions, powered by Whatis.com. Retrieved 24 May 2006 at http://searchvb.techtarget.com/sDefinition/0,sid8_gci755068,00.html

Cite this Document:

"SDLC DQ-2 What Component Of" (2006, May 24) Retrieved May 19, 2024, from
https://www.paperdue.com/essay/sdlc-dq-2-what-component-of-70572

"SDLC DQ-2 What Component Of" 24 May 2006. Web.19 May. 2024. <
https://www.paperdue.com/essay/sdlc-dq-2-what-component-of-70572>

"SDLC DQ-2 What Component Of", 24 May 2006, Accessed.19 May. 2024,
https://www.paperdue.com/essay/sdlc-dq-2-what-component-of-70572

Related Documents

This report will hopefully pull together the research available with regard to this issue, and also identify what users are most at risk for virus attacks. The research currently available also confirms that modern viruses are becoming more insidious and complex, with the potential to incur more damage to computers and data than in the past. Studies suggest that newer versions of viruses may escape detection using standard anti-viral software.

computer virus is among the greatest enemy of computer technology's globalization. In just a few split of seconds, it can turn our endeavor of automating our diverse activities into a nightmare. This is especially a catastrophe to businesses whose operation at a large percentage depends on computerized data access and retrieval. Globally, computerization is the trend among businesses. Thus, the damage that computer viruses can cause is a global

Computers and Work -- and
PAGES 1 WORDS 457

" (Wahlgren, 2004) Telecommuting, conversely, can cause the opposite problem -- isolating employees from the input of other individuals, and also the system of rewards that comes from having a manager praise -- or critique one's performance in a personal basis, rather than through emails or online correspondence. The Internet seems to act to decrease social connections on the whole. "13% of heavy Internet users reported spending less time attending

(Hackers Chronology, 2006). 1989 The first case of cyber espionage is recognized in Germany (west). This reportedly involved the CHAOS computer club. "Mentor releases the hacker manifesto Conscience of a hacker, which ends with the intriguing line: 'You may stop the individual, but you can't stop us all.'" (Hackers Chronology, 2006). 1990 Electronic Frontier, Freedom on the Internet advocacy group, is launched Polymorphic viruses (which modifies themselves when they spread), along with other sophisticated kinds of

Phishing is another criminal technique used to cull bank account or credit card information. Lovet (2007) describes how simple and potentially lucrative phishing can be: "the total costs for sending out 100,000 phishing emails can be as little as $60. This kind of 'phishing trip' will uncover at least 20 bank accounts of varying cash balances, giving a 'market value' of $200 - $2,000 in e-gold." Most incidents of

Hacking, the apolitical counterpart of hacktivism, is also not necessarily a form of terrorism. However, cyberterrorists often use hacking as a tool of terrorism. Terrorists may be tempted to use computer attacks for several reasons including the following. First, cyberterrorism can be relatively inexpensive. Second, terrorists can easily remain anonymous when they use computer terrorism. Third, the scope of the attack can potentially be larger than physically combative ones. Fourth,