Professional Documents
Culture Documents
Professional Issues
Fall-2018
Execution
Monitoring
Control
SDLC!
Bug
Requested Feature
Missing Documentation
Task
Issues as per Severity
Issues are often categorized in terms of severity
levels.
Different companies have different definitions of
severities. Two basic segmentations of issues as per
severity are:
CRITICAL COSMETIC
Critical
High:The bug or issue affects a crucial part of a system, and
must be fixed in order for it to resume normal operation.
Medium: The bug or issue affects a minor part of a system, but has some
impact on its operation. This severity level is assigned when a non-central
requirement of a system is affected.
Low: The bug or issue affects a minor part of a system, and has very little
impact on its operation. This severity level is assigned when a non-central
requirement of a system (and with lower importance) is affected.
Cosmetic
The system works correctly, but the
appearance does not match the expected
one.
This
helps to track issues and assign the right
people to resolve them.
Issue types
1. Technical
Relating to a technological problem in the project
2. Business Process
Relating to the project's design
3. Change
Relating to business, customer, or environmental changes.
4. Third Party
Relating to issues with vendors, suppliers, or another outside
party
Issues vs Risks
The exact nature of both is largely unknown before
you begin.
An issue tends to be less predictable; it can arise
with no warning.
With risks, you usually have a general idea in
advance that there's a cause for concern.
Crisis
Issue Status
Open– The issue has been identified, but no action
has yet been taken.
Investigating–The issue, and possible solutions, are
being investigated.
Implementing– The issue resolution is in process.
Escalated– The issue has been raised to management
or the project sponsor/steering committee, and
directions or approval of a solution is pending.
Resolved
In other words, if the organization’s issues management process
detects an issue in the earliest stage, more response choices–such as
product modification, the introduction of new conduct codes or
anticipatory collaboration with key interest groups–are available to
decision-makers.
As the issue matures, the number of engaged stakeholders, publics
and other influencers expands, positions on the issue become more
entrenched and the strategic choices available to the organization
shrink.
Reliability
Ethics
Privacy
Digital Piracy
Public Domain Software
Ergonomics
Environment
Security & Security Breach
Security is the means of safeguarding and
protecting an enterprise’s information technology
assets, that is by keeping away from criminals,
natural hazards, and other threats, while a breach
is a breakdown in security.
Site Security
Resource Security
Network Security
Service Security
Types of Security Breach
Destruction of Resources
Corruption of Data and Applications
Denial of Services
Theft of Services
Theft of Resources
Denial-of-Services Attack
• Employees
• Computer Viruses
• Hackers & Crackers
• Organized Crime
• Terrorists
Sources of Security Breach
Employees: This is the largest category of
computer and enterprise criminals where an
employee (insider) who gain access to certain
records or files without prior permission in order
to tamper (manipulate figures, steal records or
damage files).
Organized Crime: including imitating and fake.
Identify Theft: Loss of personal identity through a security
breach.
Sources of Security Breach
Security
involves keeping enterprise hardware,
software, data and programs safe.
Kaspersky
Avast
Panda
PC Cillin
Encryption
Encryption
Firewall
Proxy Server
Firewall: A special-purpose software program
located at a network gateway server.