Assessment item 3 back to top Requirements Report Value: 30% Due Date: 06-Oct-2018 Return Date: 26-Oct-2018 Length: Submission method options: Alternative submission method Task back to top Further...

1 answer below »

Assessment item 3


back to top


Requirements Report


Value: 30%


Due Date: 06-Oct-2018


Return Date: 26-Oct-2018


Length:


Submission method options: Alternative submission method


Task


back to top


Further Background


Refer to background information provided in Assessments 1 and 2 regarding the Headspace NewAccess project.


The project is considering cloud based solutions which should be investigated. Consider various aspects of cloud based solutions such as: data security, which includes data ownership (by Headspace, the young person, medical professionals, the Emergency Department etc). As well as other relevant aspects of cloud solutions.


Complete the Following


Please refer to the marking guide when preparing your response to see what criteria and standards will be used to assess your work and your progress.


Non-Functional Requirements



  • This sets out the critical system qualities, system interfaces, user interface requirements, and system constraints.

  • Use to ‘FURPS+’ acronym as reference, and ensure that you cover the non-functional aspects of the acronym, Usability, Reliability, Performance and Security.


Review of cloud based.


A review of the strengths and weaknesses of cloud based solutions, taking into consideration the environment in which the solution will be deployed.


SDLC Approach


Write brief description of the Pros and Cons to approaching the project using the ‘Predictive’ SDLC, then the Pros and Cons to approach the project as ‘Adaptive’ SDLC. Then recommend either Predictive or Adaptive to the SDLC for the project and briefly describe why.


Rationale


back to top


This assessment task will assess the following learning outcome/s:



  • be able to describe the context of an information system.

  • be able to compare and contrast the different methodologies of systems analysis and evaluate their appropriateness for different and complex situations.

  • be able to distinguish between requirement gathering techniques and combine these appropriately to apply to a real scenario.

  • be able to formulate and justify system requirement models based on evaluation of given situations.

  • be able to assemble the components of a requirements model using the tools and techniques of object oriented or structured systems modelling.


This assessment aligns with learning outcomes


o be able to describe the context of an information system;


o be able to compare and contrast the different methodologies of systems analysis and evaluate their appropriateness for different and complex situations;


o be able to distinguish between requirement gathering techniques and combine these appropriately to apply to a real scenario;


o be able to evaluate development requirements and prepare a feasibility proposal based on multi-disciplinary (financial, human resource, technological) analyses;


o be able to formulate and justify system requirement models based on evaluation of given situations;


o be able to assemble the components of a requirements model using the tools and techniques of object oriented or structured systems modelling.






















































































































































Marking criteria and standards

















































CRITERIA



STANDARDS



High Distinction



Distinction



Credit



Pass



Fail



1.Non-Functional Requirements




Maximum 10 Marks



Specifies the qualities/ non-behavioural requirements that can be used to judge the operation of the system. Demonstrates breadth and depth of understanding and has insights and awareness of deeper more subtle aspects of the topic content. Evidence of having researched/read more widely beyond the core materials.



Specifies the qualities/ non-behavioural requirements that can be used to judge the operation of the system. Demonstrates breadth and depth of understanding and has insights and awareness of deeper more subtle aspects of the topic. Evidence of having read beyond the core materials.



Specifies the main qualities/ non-behavioural requirements that can be used to judge the operation of the system. Demonstrates thorough understanding of material presented in core texts and readings.



Specifies some of the qualities/ non-behavioural requirements that can be used to judge the operation of the system. Demonstrates evidence of having read material presented in core texts and readings. However literature is presented uncritically in a purely descriptive manner. Content acknowledged but not really taken into account.



Poorly specifies the qualities/ non-behavioural requirements that can be used to judge the operation of the system. Demonstrates very little evidence of having read material presented in core texts and readings. Inaccurate or inconsistent acknowledgment of sources. Limited knowledge of key principles and concepts.



2.Review of cloud based solution




Maximum 8 Marks



Clearly identified strengths and weaknesses of cloud solutions. As well as apply indepth understanding of the environment that the solution would be used in. Demonstrates breadth and depth of understanding and has insights and awareness of deeper more subtle aspects of the topic. Evidence of having researched/read more widely beyond the core materials.



Clearly identified strengths and weaknesses of cloud solutions Demonstrates breadth and depth of understanding and has insights and awareness of deeper more subtle aspects of the topic. Evidence of having read beyond the core materials.



Strengths and weaknesses are identified. Demonstrates thorough understanding of material presented in core texts and readings.



Strengths and weaknesses are identified. Demonstrates evidence of having read material presented in core texts and readings. However literature is presented uncritically in a purely descriptive manner. Content acknowledged but not really taken into account.



Strengths and weaknesses are poorly expressed. Demonstrates very little evidence of having read material presented in core texts and readings. Inaccurate or inconsistent acknowledgment of sources. Limited knowledge of key principles and concepts.



3. SDLC Approach




Maximum 8 marks



Demonstrates breadth and depth of understanding in relation to SDLC approach. Has insights and awareness of deeper more subtle aspects of the topic content. Evidence of having researched/read more widely beyond the core materials.



Demonstrates breadth and depth of understanding in relation to SDLC approach. Has insights and awareness of deeper more subtle aspects of the topic. Evidence of having read beyond the core materials.



Demonstrates clear understanding in relation to SDLC approach. Demonstrates thorough understanding of material presented in core texts and readings.



Discusses the SDLC approach. Demonstrates evidence of having read material presented in core texts and readings. However literature is presented uncritically in a purely descriptive manner. Content acknowledged but not really taken into account.



Poor discussion of SDLC approach. Demonstrates very little evidence of having read material presented in core texts and readings. Inaccurate or inconsistent acknowledgment of sources. Limited knowledge of key principles and concepts.



4.Presentation, writing style, grammer and references




Maximum 4 Marks



Highly developed skills in expression and presentation of response.


Fluent writing style appropriate to assessment task.


Grammar and spelling accurate. Well organised.



Well-developed skills in expression and presentation of response.


Fluent writing style appropriate to assessment task.


Grammar and spelling accurate. Well organised.



Good skills in expression and clear presentation of response.


Mostly fluent writing style appropriate to assessment task.


Grammar and spelling accurate.



Some skills in expression and presentation of response.


Meaning apparent but writing style not always fluent or well organised.


Grammar and spelling contain errors.



Rudimentary skills in expression and presentation of response.


Not all material is relevant and/or is presented in a disorganised manner.


Meaning apparent but writing style not fluent or well-organised,


Grammar and spelling contain errors.







Presentation


back to top


Your answer should be approx. 7 pages, Times Roman size 12 (title page and references are not part of page count).


You should use your own words and avoid lengthy quotations.






Requirements


back to top


If any references are required, ensure to use APA referencing to acknowledge the sources that you have used in preparing your assessment. Please refer to the CSU referencing guide http://student.csu.edu.au/study/referencing-at-csu. In addition a very useful tool for you to use that demonstrates how to correctly use in text referencing and the correct way to cite the reference in your reference list can be found at
https://apps.csu.edu.au/reftool/apa-6

Answered Same DayOct 02, 2020ITC548Charles Sturt University

Answer To: Assessment item 3 back to top Requirements Report Value: 30% Due Date: 06-Oct-2018 Return Date:...

Ankit answered on Oct 05 2020
127 Votes
Student name
                    University name    
                    Title of assignment
Introduction
Cloud based solution is a service where user data is remotely control manage and backup by service providers. Cloud based solution helps the user to store, retrieve and access their files from any location and any time. The cloud based solution provides various advantages to users such as usability, high bandwidth, accessibility
, disaster recovery, cost saving etc. All the health care organization requires safe and reliable solution to store and access their data so cloud based solution is best.
“Cloud solution gives security at different points in order to provide secure access for cloud storage provider that depends on user authentication. Cloud based solution use secure transfer protocols which is useful in encrypting sensitive data storage. Through cloud based solution there is reliable communication of data between their storage provider and host through use of different protocols for e.g., by using cloud user upload the data automatically to cloud storage from their system.” (Gilmer 2013)
This document investigate NewAccess health record project that use cloud based solution. The various aspects of cloud based solutions such as data security and other relevant aspects of cloud solutions are considered. The main purpose of this document is to discuss non-functional requirements of project. The document discusses on strengths and weaknesses of cloud based solutions in which it would be deployed. This document also discuss pros and Cons for this project using the ‘Predictive’ SDLC, then the Pros and Cons for this project using ‘Adaptive’ SDLC.
Aspects of cloud based solution for Health record project
1. Security of data: The NewAccess health record data is secured by using various techniques. The different category of data is stored on cloud for NewAccess health record project such as data of patient, health specialist, medicine record etc. The cloud provider backup the data on daily whenever there system is linked to internet. Security of data is topmost priority for all organization so NewAccess health record project use different security measures to secure data on cloud.
2. The different security protocols are used for exchanging of data on cloud such as
“SHTTP- Secured Hyper Text Transfer Protocol is secured protocol to be used.”
3. The various cryptography methodologies ought to utilize for private information transferring like user info, bank account info, health specialist detail etc. The methodologies of cryptography use public and private keys that are useful in allocating the information from one end to another.
4. Cloud based solution use TLS i.e. Transport Layer Security that is cryptographic protocol to be famous for privacy of network connections. This is based on authentication technique that uses X.509 framework in which symmetric encryption key is produced by utilizing the public key of cryptography.
5. Cloud based solution use RFI i.e. Remote File Inclusion. “It is type of vulnerability that is finding on cloud server that provides access to the attackers to perform on the remote file via inserting scripts on their server. The threats occur due to user supplied input with invalid validation.”
Non-Functional Requirements for cloud based solution
“FURPS is an acronym representing a model for classifying software quality attributes (functional and non-functional requirements)”
Non-functional Requirements for cloud based solution consist of security, reliability, performance, maintainability, scalability, and usability as discussed below:
Security: NewAccess health record project use different security measures to secure data on cloud. The NewAccess health record data is secured by using various techniques such as Secured Hyper Text Transfer Protocol, cryptography techniques, Transport Layer Security etc. The different category of data is stored on cloud for NewAccess health record project such as data of patient, health specialist, medicine record etc. The NewAccess health record system...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here