You are on page 1of 4

PRE – INVESTIGATION: The requirement is the first stage in the SDLC process.

This
stage gives a clearer picture of the scope of the entire project and the anticipated
issues, opportunities, and directives which triggered the project. This helps
companies to finalize the necessary timeline to finish the work of that system.
INVESTIGATION: Once the pre - investigation is done the next step is to clearly
define and document the product requirements and get them approved from the
customer or the market analysts.
There are mainly five types of feasibilities checks:
Economic: Can we complete the project within the budget or not?
Legal: Can we handle this project as cyber law and other regulatory
framework/compliances.
Operation feasibility: Can we create operations which is expected by the client?
Technical: Need to check whether the current computer system can support the
software
Schedule: Decide that the project can be completed within the given schedule or
not.
REQUIREMENT ANALYSIS: Once the requirement is understood, the SRS (Software
Requirement Specification) document is created. The developers should
thoroughly follow this document and also should be reviewed by the customer for
future reference.
Detailed system requirements
Revised cost and benefits analysis
Revised schedule
DESIGN: This phase is focused on the design aspect of the software application
solution in terms of the selected technical and functional requirements and the
results of the thorough analysis of the software’s viability.
LOW-LEVEL DESIGN
Functional logic of the modules
Database tables, which include type and size
Complete detail of the interface
Addresses all types of dependency issues
Listing of error messages
Complete input and outputs for every module
HIGH-LEVEL DESIGN
Brief description and name of each module
An outline about the functionality of every module
Interface relationship and dependencies between modules
Database tables identified along with their key elements
Complete architecture diagrams along with technology details
CONSTRUCTION & TESTING: In this stage of SDLC the actual development starts
and the product is built. The programming code is generated. If the design is
performed in a detailed and organized manner, code generation can be
accomplished without much hassle and the testing activities are mostly involved
in all the stages of SDLC. However, this stage refers to the testing only stage of the
product where product defects are reported, tracked, fixed and retested, until the
product reaches the quality standards defined in the SRS.
INSTALLATION IMPLEMENTATION: Once the software testing phase is over and no
bugs or errors left in the system then the final deployment process starts. Based
on the feedback given by the project manager, the final software is released and
checked for deployment issues if any.
MAINTENANCE: Once when the client starts using the developed systems, then
the real issues come up and requirements to be solved from time to time. This
procedure where the care is taken for the developed product is known as
maintenance.
Information Security is not only about securing information from unauthorized
access. Information Security is basically the practice of preventing unauthorized
access, use, disclosure, disruption, modification, inspection, recording or
destruction of information. Information can be physical or electronic one.
Information can be anything like Your details or we can say your profile on social
media, your data in mobile phone, your biometrics etc. Thus Information Security
spans so many research areas like Cryptography, Mobile Computing, Cyber
Forensics, Online Social Media etc.
Information Security programs are build around 3 objectives, commonly known as
CIA – Confidentiality, Integrity, Availability.
Confidentiality – means information is not disclosed to unauthorized individuals,
entities and process. For example if we say I have a password for my Gmail
account but someone saw while I was doing a login into Gmail account. In that
case my password has been compromised and Confidentiality has been breached.
Integrity – means maintaining accuracy and completeness of data. This means
data cannot be edited in an unauthorized way. For example if an employee leaves
an organisation then in that case data for that employee in all departments like
accounts, should be updated to reflect status to JOB LEFT so that data is complete
and accurate and in addition to this only authorized person should be allowed to
edit employee data.
Availability – means information must be available when needed. For example if
one needs to access information of a particular employee to check whether
employee has outstanded the number of leaves, in that case it requires
collaboration from different organizational teams like network operations,
development operations, incident response and policy/change management.
Denial of service attack is one of the factor that can hamper the availability of
information.
Information security controls are measures taken to reduce information security
risks such as information systems breaches, data theft, and unauthorized changes
to digital information or systems. These security controls are intended to help
protect the availability, confidentiality, and integrity of data and networks, and
are typically implemented after an information security risk assessment.
Security controls come in the form of:
Access controls including restrictions on physical access such as security guards at
building entrances, locks, and perimeter fences
Procedural controls such as security awareness education, security framework
compliance training, and incident response plans and procedures
Technical controls such as multi-factor user authentication at login (login) and
logical access controls, antivirus software, firewalls
Compliance controls such as privacy laws and cyber security frameworks and
standards.

Copyright refers to the legal right of the owner of intellectual property. In simpler
terms, copyright is the right to copy. This means that the original creators of
products and anyone they give authorization to are the only ones with the
exclusive right to reproduce the work.
Copyright law gives creators of original material the exclusive right to further use
and duplicate that material for a given amount of time, at which point the
copyrighted item becomes public domain.
Copyright protects original works such as literary, dramatic, musical and artistic
works. Copyright protection is automatically provided under the Copyright Act
1968, and gives the creator of the work exclusive rights to reproduce it,
commercialise it and be recognised as its creator. There is no official register or
database, as with other forms of intellectual property, where you can search to
see if your idea is original. Copyright material is protected from the time it is first
written down, painted or drawn, filmed or taped.
While copyright does not protect information or ideas per se, it does protect the
original expression of information and ideas. The rights applicable to each of
these categories vary. Copyright doesn’t protect against independent creation of
a similar work. Legal actions against infringement are complicated by the fact that
many different copyrights may exist for some works.

You might also like