Network Security and Management

by Professor Brijendra Singh.

Saturday, 30 January 2021

Importance of RAD Model

Rapid Application Development (RAD) is an incremental software process model that emphasizes a short development cycle, the RAD model is a "high-speed" adaptation of the waterfall model, in which rapid development is achieved by using a component-based construction approach.   RAD model enables rapid delivery as it reduces the overall development time due to the reusability of the components and parallel development. RAD works well only if high skilled engineers are available and the customer is also committed to achieve...

Importance of Spiral Model

Some people consider the life cycle to be spiral, in which we constantly cycle through the phases at different levels of details as shown in figure. The spiral model is a realistic approach to the development of large-scale systems and software in the light of risks involved. Spiral model demand a direct consideration of technical risks at all stages of the project and if, properly applied, should reduce risks before they become problematic. This Spiral...

Friday, 29 January 2021

Traditional Systems Life Cycle (Waterfall)

Traditional Systems Lifecycle (Waterfall)The lifecycle methodology is a very formal approach to building a system, dividing systems development into formal stages that must take place in a sequential order. All the activities in each stage must be completed before the next stage can begin.The goal of the Traditional System Life Cycle is to keep the project under control and assure that the information system produced, satisfies the requirements. The traditional system life cycle divides...

Wednesday, 27 January 2021

The Response Techniques to maintain Information Security

The response is a reaction after something is done to disturb security or something constituting a reply or a reaction to safe data/information.Response Techniques : (i) Backups (ii) Incident Response team (iii) Computer Forensics Backups:Data backups are an essential element of good storage security and overall business resilience, but they're often the source of many security woes. In fact, a significant percentage of security breaches can be attributed to the mismanagement of data backups. Many storage professionals responsible for backups...

Tuesday, 26 January 2021

Detection Techniques can help maintain Information security

Detection techniques can help to maintain Information Security. Precautions can be taken at early stage.A security breach is any incident that results in unauthorised access to computer data, applications, network or devices. It results in information being accessed without authorisation. Typically, it occurs when an intruders is able to bypass security mechanisms.Detection : the action of stopping something after detection of security breachAudit LogsIntrusion Detection SystemHoneypotsAn audit log is a record of events and changes. IT devices...

Monday, 25 January 2021

Prevention Techniques to maintain security

Information Security is concerned with protecting information and information resources. Information can be protected with the help of elements are : Prevention, Detection and Response Prevention: the action of stopping something from happening or arising.(i)  Access Controls(ii) Firewalls(ii) EncryptionAccess control is a method of guaranteeing that users are who they say they are and that they have the appropriate access to information of organisation. At a high level, access control is a selective restriction of access to information....

Sunday, 24 January 2021

Phases of System Development Methodology

It is a methodology for systematically organizing the best ways to develop systems efficiently. It includes, for example, descriptions of work to be performed at each phase of the development process and drafted documents. System development methodology consists of eight phases. A system development methodology refers to the framework that is used to structure, plan, and control the process of developing an information systemSurvey Phase:  The survey phase is also sometimes called a preliminary investigation or feasibility study....

Tuesday, 19 January 2021

Information Security

Information Security refers to the processes and methodologies which are designed and implemented to protect the print, audio, video, digital, or any other form of confidential, private, and sensitive information or data from unauthorized access, use, misuse, disclosure, destruction, modification, or disruption.Definitions of information security are suggested below: Preservation of confidentiality, integrity, availability, reliability accountability, and authenticity of the information or in other words, the protection of information...

Friday, 15 January 2021

System Development Methodology

System development methodologies are frequently confused with the system development life cycle. System development methodology in software engineering is a framework that is used to structure, plan, and control the process of developing an information system. System development methodology can be defined as : A methodology is the physical implementation of the logical life cycle that incorporates.Step-by-step activities of each phase.Individual and groups roles to be played in each activityDeliverables and quality standards for each activity...

The Role and Tasks of System Analyst

The role and tasks of a systems analyst are as:The systems analyst plays a key role in information systems development projects. The system analyst assists and guides the project team so that the team develops the right system in an effective way.A system analyst facilitates the study of business problems and needs to determine how the business system and information technology can best solve the problem and accomplish improvements, for the business.A system analyst uses a system problem-solving approach called a System development life cycle....

Thursday, 14 January 2021

System Development Life Cycle

In systems engineering, information systems and software engineering, the Systems Development Life Cycle (SDLC), also referred to as the application development life-cycle, is a process for planning, creating, testing, and deploying an information system.The concept of the systems development life cycle applies on hardware, software and a combination of both. The system can be build with the help of hardware only, software only, or a combination of hardware and software.Software Development Life Cycle (SDLC)...