Case Study : Software Requirement Specification

NO PLAGIARISM 

Read the case study titled A Patient Information System for Mental Health Care, located in Chapter 1 of your textbook.    

Write a paper in which you:

  1. Create a Software Requirement Specification (SRS) that includes the following:
    1. A detailed description of both user and system requirements. At least four user requirements and four system requirements should be provided. 
    2. A detailed description of both functional and nonfunctional requirements. At least four functional requirements and four nonfunctional requirements should be provided.
    3. A detailed requirement specification written in structured natural language.
  2. Structure and present the requirements in a logical and consistent manner.
  3. Design the security control assessment matrix to identify the risk and risk-reduction techniques to secure the system.
  4. Develop a use case diagram to summarize the functional requirements of the system through the use of Microsoft Visio. 

Your assignment must follow these requirements:

  • Fully develop your ideas:  While there is no specific page requirement, students are expected to fully develop their ideas using business communication language.  This means you must demonstrate to your professor you have absorbed the material and understand it.  A statement of fact should be supported by two or three sentences.  A paragraph should only contain one idea.  A fully developed idea doesnt mean an exhaustive explanation in which students write everything they know, just enough to get the point across to the reader.
  • Make sure you do your own work: Never copy and paste material from the Internet unless the assignment specifically calls for that.  When you do make a statement of fact, you should cite your source.  You can support the fact with a quote, but use these sparingly.  Most of what you submit should be your own work.
  • Include charts or diagrams created in Visio. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

122c341net

 Please see attachment for Question 

Assignment Instructions

– Complete Review Question 1.2 on page 32 in the Connolly text ensure you cover relevant content from the text you can use outside research to augment that information, but not to replace text base content.
– Answer the following question do you believe that students and the instructor have the same view of the classroom database we are using in this course explain why you feel that is or is not necessary.
– Complete Review Question 2.13 on page 55 in the Connolly text.
– Does the Classroom for this course demonstrate a need for Concurrency Control? Explain.

Include the questions with your answers
The submission should be well organized, demonstrate your understanding of the assigned material and be in the order of ~1,200+ words in length.
Your submission must be original, include supporting sentences using the terms, concepts, and theories with the page number or website from the required readings or other material. Your submission should paraphrase the material you reference, restrict your use of direct quotes (copy and paste) to less than 20% of the submission (the grade will be impacted if you exceed this limit).

The following rubric will be used to grade the submission:
Synthesis of Concepts
 Response to Question 1.2                    40%
 Response to classroom related question 10%
 Response to 2.13                               20%
 Classroom concurrency description        15%
Using APA style/reference                        5%
Writing Org/Clarity/Spelling                     10%
(-1 point for each misspelled word, may exceed 10%)
Total                                                100%

Submit your response in a word compatible attached document.
Name your document Last Name_Assignment1 (i.e. Smith_Assignment1).

Title Work

  Develop a narrated 5 -7 minute PP presentation on cyber security – a critical part of any organizations security strategy. present your research on how professionals are using big-data analytics to detect advanced cyber threats and get ahead of them.   

Research Paper: Develop A Computer/Internet Security Policy

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

 Include at least 3 scholarly references in addition to the course textbook.  The UC Library is a good place to find these references. At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.

Your paper should meet the following requirements:

Be approximately four to six pages in length, not including the required cover page and reference page.

Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.