Featured Post

John Keats-ode to autumn Essay Example

John Keats-tribute to harvest time Paper This is the last sonnet Keats composed and is a tribute, which is a verse sonnet routed to someo...

Sunday, November 3, 2019

Planning Group Policy Software Deployments Assignment

Planning Group Policy Software Deployments - Assignment Example And as the systems advance, so do their working limits. 1. Efficient Installation of Software Using Each Phase of System Development Life Cycle A software installation for the security of Intellectual property is an uphill task in lieu of the complexities associated with the installation phase. System administrators are normally expected to be literate about the software and know what they are doing and thus most often no restrictions are imposed even by the most protected systems during software installs. To perform new software installations for several hundred users at a Californian firm as a junior network administrator, the problems and ambiguities faced during the installation phase cannot be over looked as they can stream in to extra costs. The threats imposed by the installation can be governed if certain strategies are employed at execution phase which includes assurance of no interference between the processing of un trusted/new software and existing packages, restriction o n the execution of new/un trusted software’s access to the operations other than that of the sand box and new/ un trusted software should be easily uninstall able if the need persists (Sun, Sekar, Liang, Venkatakrishnan, 2009 (Bender RBT Inc., 2003) (Eric Chien, 2005) (Ke Min Gu, 2009) (Russ Johnson, 2000) (Abbas Rajabifard, Ali Monsourian and Ian Williamson, 2004)). For the efficient installation of software at controlled costs and keeping in view the above requirements of maintaining a control on installation phase, System Development Life cycle (SDLC) has to be incorporated. It finally is a solution introduced by software engineering that has been evolved from the understanding of improvement needed in the development process of creating system. It basically is an abstract model that describes the stages involved in project management as it paves the methodology right from the beginning of suitability operations to the overhauling of complete performance. It is based upon the objectives of ensuring the delivery of high quality systems, strong management and control systems for projects and capitalizes on the system staff for productivity and efficient yield (Bender RBT Inc., 2003). It comes with guidance and instructions for how to install it, staying in line with its objectives of system security. It offers a very user friendly installation that can be of great help for the junior network administrator as it has the ability to support many different kinds and scopes of systems and projects, providing support to the incorporation of technical activities, providing support and coordination for all of the management activities and being user friendly and highly useable. In general, System Development Life Cycle (SDLC) has seven phases. As a Californian firm Administrator, I can incorporate them for the safe and low cost working of my systems. 1. Conceptual Planning: It is the first step to guarantee end state solutions for user’s requirements. I t assesses the expected cost and risks, project feasibility, needs for the enhancement of the system and different project planning advances s are discussed. Two major parties designated during this phase of SDLC are System Support Agent (SSA) and System Development Agent (SDA) which are updated through the system’s cycle. 2. Planning and Requirements Definitions: After the Californian firm’s Information Technology administrator has assessed the feasibility of the project

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.