Preview

Thesis on Software Project Risk Management

Satisfactory Essays
Open Document
Open Document
30867 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Thesis on Software Project Risk Management
ABSTRACT

Title of Thesis:

A SYSTEMS MODELING DESIGN UTILIZING AN OBJECT-ORIENTED APPROACH CONCERNING INFORMATION RISK MANAGEMENT Noriaki Suzuki Master of Science in Systems Engineering, 2005 Fall Nelson X. Liu, Assistant Research Scientist, Institute for Systems Research

Degree candidate: Degree and year: Thesis directed by:

Adopting advanced information technologies within the present broad application fields requires precise security. However, security problems regarding information privacy have occurred frequently over the last 5 years despite the contribution of these technologies. To respond to the need for securing information privacy, the Information Privacy Law was enacted on April 1, 2005 in Japan. One of the responses to this law enforcement is demanding a higher level of information risk management and search for more effective tools to be used for identity protection and problem-solving. Two examples of these tools include RAPID and IRMP. However, there is no established system-development model for either of these tools. Further developments to improve the RAPID and IRMP remain as new challenges. In this thesis, a new approach on developing a system security model to be used for information risk management is proposed. To demonstrate this approach, the object-oriented language is used.

A SYSTEMS MODELING DESIGN UTILIZING AN OBJECT-ORIENTED APPROACH CONCERNING INFORMATION RISK MANAGEMENT

By Noriaki Suzuki

Thesis submitted to the Faculty of the Graduate School of the University of Maryland, College Park in partial fulfillment of the requirements for the degree of Master of Science 2005 Fall

Advisory Committee: Dr. Nelson X. Liu, Assistant Research Scientist, Institute for Systems Research Professor Eyad Abed, Director of the Institute for Systems Research Professor Michel Cukier, Assistant Professor, Reliability Engineering

© Copyright by Noriaki Suzuki 2005

ACKNOWLEDGEMENTS

I would like to express my honest thanks to



References: Information security: why the future belongs to the quants, Security & Privacy Magazine, IEEE, July-Aug. 2003, Volume 1, Issue 4, Page 24 –32 7

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Sr-Rm-022 Part 2

    • 839 Words
    • 3 Pages

    Security should be a high level of concern in any project. “Security is primarily the responsibility of the operations group, which consist of the staff responsible for installing and operating security controls such as firewalls, intrusion detection systems, and routine backup and recovery operations” (Denis, Wixom, & Roth, 2009). However, system developers also have a responsibility when it comes to security, especially within the information systems.…

    • 839 Words
    • 3 Pages
    Good Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    References: David Kim., and Michael G. Solomon. Fundamentals of Information Systems Security , 2012: Sudbury, MA 2012…

    • 634 Words
    • 3 Pages
    Better Essays
  • Good Essays

    BSA 375 Week 3 Individual

    • 793 Words
    • 3 Pages

    Valacich, J. S., George, J. F., and Hoffer, J. A. (2012). Essentials of Systems Analysis and Design (5th ed.). Upper Saddle River, NJ: Pearson Education. Retrieved from the University of Phoenix eBook Collection database.…

    • 793 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    References: 1. (2010). Principles of Computer Security: CompTIA Security+ and Beyond (2nd ed.). : McGraw-Hill.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    This course covers much material about information security in a few short weeks. Whereas the subject is much deeper than what is covered in the course material, you should obtain a useful overview of how important effective information security is, and some ways it can be effectively…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    ISS Information Systems Information NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 5…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    6 8c Chapter Excercises

    • 515 Words
    • 2 Pages

    In object-oriented analysis each object represents real people, places, events, and transactions (nouns). Unlike structured analysis, which treats data and processes separately, objects include data and processes that can affect the data. A major advantage of O-O designs is that systems analysts can save time and avoid errors by using modular objects, and programmers can translate the designs into code, working with reusable program modules that have been tested and verified…

    • 515 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (Exam SY0-301) (3rd ed.). New York, NY: McGraw-Hill Company.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    After carefully examining your OPVL on the excerpt, “Gender, Work, and Wage in Colonial New England”, I could find no faults in how it was written. Your origin statement covers all necessary bases (author, primary v. secondary, date of creation) and even ventures further by including a small description of what the source covers. You then transition into extending your source description in your purpose statement. While reading, I became drawn in by what you had stated in your purpose statement, the idea that women at the time had done the opposite of what historians would have expected. Your value was extremely analytical and detailed, as you were able to point out all in which the source had to offer. Lastly, your limitation in itself would…

    • 191 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 4 Assignment 4

    • 340 Words
    • 2 Pages

    One the first steps in implementing an effective security plan is to periodically assess Organizational risks. Identifying and mitigating risk will help in establishing a security management structure and assigning security responsibilities. Without having an understanding of your risk you are unable to determine the proper security policies, procedures, guidelines, and standards to put in place to ensure adequate security controls are implemented. The risk assessment provides a baseline for implementing security plans to protect assets against threats. Within the risk assessment some basic questions must be answered, What assets within the organization need protection, What are the risks to each of these assets, How much time, effort, and money is the organization willing to spend to upgrade or obtain new adequate protection against these threats?…

    • 340 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Rausand, M (2004) System Reliability Theory, 2nd Ed., University of Science and Technology: Trondheim, Norway…

    • 2276 Words
    • 10 Pages
    Best Essays
  • Good Essays

    To Be a Slave, Like The Red Badge of Courage is refreshing: it shows a period of history in a new light, one that we don’t see in our history textbooks. This book shows slavery for what it really was: a disgusting time full of pain and injustice. Because To Be a Slave is written through first person stories, we as readers get a more accurate portrayal of what slavery was like, rather than the watered down version written in our history books. Slavery was so much more than the “It began, it was bad, it ended with the Civil War” narrative that we are taught. Slaves were real people living real lives, they deserve to have their stories get told, and that’s exactly what Julius Lester did.…

    • 1047 Words
    • 5 Pages
    Good Essays
  • Better Essays

    References: Gueldenzoph, L. E., & Snyder, M. J. (2006). In Kaliski B. S. (Ed.), Encyclopedia of business and finance; privacy and security (2nd ed.). Detroit: Macmillan Reference USA. Retrieved from http://go.galegroup.com.library.capella.edu/ps/i.do?id=GALE%7CCX1552100254&v=2.1&u=minn04804&it=r&p=GVRL&sw=w…

    • 962 Words
    • 4 Pages
    Better Essays