Analyze the itil service management guidelines and principle

Assignment Help Computer Network Security
Reference no: EM13969507

Question:

Assignment: Software Engineering, CMMI, and ITIL

Realizing that an organization's CMMI level impacts an organization's success on requests for proposals (RFPs), your CIO wants to get the software development processes to CMMI level 3. Your organization has started developing software applications and database systems for their customers. The CIO wants to ensure that the software development and database development processes are being properly managed and audited, and he wants to ensure that the organization begins taking the necessary steps to progress to CMMI level 3. In preparation for your response, review the CMMI information available at the Carnegie Mellon Website, located at https://www.sei.cmu.edu/cmmi/.

IT managers will commonly manage software development and systems integration activities. Write a three to five (3-5) page paper in which you:

Describe the software engineering process, the challenges in managing software development activities, and the potential interface issues from the software development perspective.

Analyze the CMMI levels and define a roadmap that the organization will need to follow in order to get their software development processes to CMMI level 3. Note: This is important because the CMMI level that an organization achieves impacts their software development reputation.

Explain the auditing tasks that must be performed in order to achieve level 3.

Determine the continuous assurance auditing activities that the organization will need to implement to help achieve CMMI level 3.

Analyze the ITIL service management guidelines and principles.

Examine how ITIL service management practices relate to CMMI levels and continuous service auditing.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Describe the process of performing effective information technology audits and general controls.

Describe information technology general controls based on the Information Technology Infrastructure Library (ITIL) best practices.

Describe the various general controls and audit approaches for software and architecture to include operating systems, telecommunication networks, cloud computing, service-oriented architecture and virtualization.

Use technology and information resources to research issues in information technology audit and control.

Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Verified Expert

The assignment summaries the requirement and impacts of CMMI level 3 framework for the software development process in an organization. It also describes how auditing and ITIL process can help in implementing the CMMI guidelines and principles.

Reference no: EM13969507

Questions Cloud

Distinguish between administrator and liquidator : In relation to corporate insolvency distinguish between an administrator and a liquidator.
Examine the impact of the media on gender socialization : Examine the impact of the media on gender socialization and stereotypes. In this discussion forum, students are required to provide a reaction or brief summary and analysis of a selected supplementary material (e.g. professional web-site, journal ..
What is the profit that studio expects to make : How many CDs should Top Gun expect to sell at a discount? What is the profit that studio expects to make?
Problem regarding the issue of debentures : As Secretary of Ouse Ltd write a memorandum for the Board explaining the differences between raising finance: (a) by an issue of shares;
Analyze the itil service management guidelines and principle : Describe the software engineering process, the challenges in managing software development activities, and the potential interface issues from the software development perspective.
Create an xy plot of ecg vs. time : Create an XY plot of ECG vs. time, and place the plot on the Plots worksheet. Give the plot an appropriate title and labels for axes, and adjust various parameters of the plot to make it look pleasing and professional. Resize it to approximately..
How many books does borders expect to sell at a discount : The marginal production cost for the publisher is $1 per book. How much profit does the publisher make given Borders actions?
Explain to jane what action she should take : Jane, who is a minority shareholder not on the board, gets no dividends and wishes to do something about this state of affairs. Explain to Jane what action she should take.
What are the central beliefs of islam : What are the central beliefs of Islam, and how are they reflected in the Five Pillars? What is the origin and importance of the Qur'an? What are the Islamic understandings of the Judaic and Christian traditions

Reviews

Write a Review

Computer Network Security Questions & Answers

  Basic encryption and platform security

Read and summarize "Big iron lessons, Part 5: Introduction to cryptography, from Egypt through Enigma"

  INFA 640 Cryptology and data protection

INFA 640,  Cryptology and data protection  Roberta, the daughter of Bob and Alice, is a summer intern at Encrypt-It-Rite, Inc. For her summer project, Roberta would like to implement a stream cipher using public key encryption. Is this a viable ide..

  Create and describe a comprehensive security policy

Create and describe a comprehensive security policy for this data-collection and analysis company that will: Protect the company infrastructure and assets by applying the principals of confidentiality, integrity, and availability (CIA). Note: CIA i..

  Problem on network security planning

Securing a large internetwork remains a daunting challenge. Cloud computing and social networks add to this complexity. In two to three (2-3) pages, and using the CISCO SAFE reference architecture.

  Describe and discuss the potential impact of recommendations

International politics are intermingled and cybersecurity issues carry political risks to impact the influences and outcomes on other political issues.

  Groups of people involved with computer security

What are the many groups of people who are involved with computer security? Name the groups and elaborate on their functions.

  Create a weighted ranking according to your own evaluation

Create a weighted ranking according to your own evaluation of the features and specifications of each software package.

  Decrypt the ciphertext message lfdph lvdzl frqtx huhg which

decrypt the ciphertext message lfdph lvdzl frqtx huhg which has been encryptedusing the caesar cipher. encrypt the

  Public key encryption

If you have access to public keys n and e, it is possible to reverse the public keys from them. One method is to factor the value of n to discover p and q,

  Describe a malware attack that causes the victim

Describe a malware attack that causes the victim to receive physical advertisements and describe an instance of a file that contain evidence of its own integrity and authenticity.

  What is ciphertext generated by encryption of character

A particular cipher is implemented by combining the ASCII representation of plaintext characters with pseudorandom bytes. What is the ciphertext (in binary form) generated by the encryption of the character D?

  How does csma-ca in dcf handle media contention

How does the WiMAX privacy sublayer provide security for a WiMAX network? How does CSMA/CA in DCF handle media contention?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd