Analyze the itil service management guidelines and principle

Assignment Help Computer Network Security
Reference no: EM13969507

Question:

Assignment: Software Engineering, CMMI, and ITIL

Realizing that an organization's CMMI level impacts an organization's success on requests for proposals (RFPs), your CIO wants to get the software development processes to CMMI level 3. Your organization has started developing software applications and database systems for their customers. The CIO wants to ensure that the software development and database development processes are being properly managed and audited, and he wants to ensure that the organization begins taking the necessary steps to progress to CMMI level 3. In preparation for your response, review the CMMI information available at the Carnegie Mellon Website, located at https://www.sei.cmu.edu/cmmi/.

IT managers will commonly manage software development and systems integration activities. Write a three to five (3-5) page paper in which you:

Describe the software engineering process, the challenges in managing software development activities, and the potential interface issues from the software development perspective.

Analyze the CMMI levels and define a roadmap that the organization will need to follow in order to get their software development processes to CMMI level 3. Note: This is important because the CMMI level that an organization achieves impacts their software development reputation.

Explain the auditing tasks that must be performed in order to achieve level 3.

Determine the continuous assurance auditing activities that the organization will need to implement to help achieve CMMI level 3.

Analyze the ITIL service management guidelines and principles.

Examine how ITIL service management practices relate to CMMI levels and continuous service auditing.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Describe the process of performing effective information technology audits and general controls.

Describe information technology general controls based on the Information Technology Infrastructure Library (ITIL) best practices.

Describe the various general controls and audit approaches for software and architecture to include operating systems, telecommunication networks, cloud computing, service-oriented architecture and virtualization.

Use technology and information resources to research issues in information technology audit and control.

Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Verified Expert

The assignment summaries the requirement and impacts of CMMI level 3 framework for the software development process in an organization. It also describes how auditing and ITIL process can help in implementing the CMMI guidelines and principles.

Reference no: EM13969507

Questions Cloud

Distinguish between administrator and liquidator : In relation to corporate insolvency distinguish between an administrator and a liquidator.
Examine the impact of the media on gender socialization : Examine the impact of the media on gender socialization and stereotypes. In this discussion forum, students are required to provide a reaction or brief summary and analysis of a selected supplementary material (e.g. professional web-site, journal ..
What is the profit that studio expects to make : How many CDs should Top Gun expect to sell at a discount? What is the profit that studio expects to make?
Problem regarding the issue of debentures : As Secretary of Ouse Ltd write a memorandum for the Board explaining the differences between raising finance: (a) by an issue of shares;
Analyze the itil service management guidelines and principle : Describe the software engineering process, the challenges in managing software development activities, and the potential interface issues from the software development perspective.
Create an xy plot of ecg vs. time : Create an XY plot of ECG vs. time, and place the plot on the Plots worksheet. Give the plot an appropriate title and labels for axes, and adjust various parameters of the plot to make it look pleasing and professional. Resize it to approximately..
How many books does borders expect to sell at a discount : The marginal production cost for the publisher is $1 per book. How much profit does the publisher make given Borders actions?
Explain to jane what action she should take : Jane, who is a minority shareholder not on the board, gets no dividends and wishes to do something about this state of affairs. Explain to Jane what action she should take.
What are the central beliefs of islam : What are the central beliefs of Islam, and how are they reflected in the Five Pillars? What is the origin and importance of the Qur'an? What are the Islamic understandings of the Judaic and Christian traditions

Reviews

Write a Review

Computer Network Security Questions & Answers

  Calculate the crc or fcs for the sender

The pattern or generator is P 1001. Calculate the CRC or FCS for the sender. You must give the details of this calculation.

  Procedure to select key uniformly at random from keys-hash

Describe a procedure that selects a key uniformly at random from among the keys in the hash table and returns it in expected time O(L.(1 + 1/α)).

  Explain the use of file transfer protocol

Explain the use of File Transfer Protocol

  Largest threats against network security

Research and discuss what you believe are the largest threats against network security, and what measures should be taken to protect against such intrusions.

  Each discussion question should be answered with about 200

each discussion question should be answered with about 200 words. no references should be used. responses should be

  Is this how a 33,600 bps modem operates

If a telephone line can carry a signal with a baud rate of 6000 and we want to transmit data at 33,600bps,

  Brief statement describing an it acquisition

Write a brief statement describing an IT acquisition by an organization about which you have knowledge. State whether the organization believes the acquisition met its objectives (e.g., improved the performance of the organization). State why you ..

  Evaluate computer forensic analysis procedures and

computer crime and forensic analysisprovide two examples to distinguish the difference between what is considered a

  Network engineer, you are presented

As the network engineer, you are presented with the following, 172.16.0.0. / 18 IP addressing information and are asked to identify all of the possible subnet ID from the list below, assuming that the /18 subnet is used throughout the network. (Choos..

  Analyze the industry researched for each security model

From the first e-Activity, analyze the industry researched for each security model would be most applicable, and explain why you believe that to be the case. Identify the security models from your findings

  Find an united states based online article regarding it risk

Find an United States based online article (or resource) regarding IT risk assessment, cyber law, OR auditing

  What security vulnerabilities and threats can you see

What security vulnerabilities and threats can you see? What measures would you put in place to remove or minimize the vulnerabilities - Choose all the necessary and suitable MAC address, IP address for interfaces and port addresses implied by the a..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd