CISA Domain 3 Information Systems Acquisition, Development, and Implementation – PART 3

PART 3 – CISA Domain 3 Information Systems Acquisition, Development and Implementation
What are the roles and responsibilities each person has in an IS environment?
What are the best practices for project management?
What are the methods for estimating software size? (1) SLOC, (2) FPA
How can you measure the time it takes to complete a project? (1) Gantt charts, (2) CPM, and (3) PERT
What is the traditional SDLC approach?
What are the different approaches to test plans? (1) Bottom-up and (2) Top-down

1. Roles and Responsibilities
Senior Management – Approves the resources and makes commitments to the project.
User management – Takes ownership of the project, resulting systems, and allocates qualified resources. Actively participates in business process design, system requirements definitions, acceptance testing, and user training.
Project steering committee – It provides direction and is also responsible for all deliverables and costs.
Project sponsor – Provides funding for the project.
Systems development management – Provides technical support for hardware and software environments by developing, installing User team – Completes assigned task, communicates effectively to user by actively including them in the development process, as a subject matter specialist.
Security officer – Assures that the systems controls and supporting processes offer an effective level of protection, based on data classifications
Quality assurance – Person who reviews the results and deliverables in each phase and at each phase’s end and confirms compliance with the requirements and operates the requested systems.
Project manager – Day-to-day management and leadership of the project
Systems development team – Completes assigned task, communicates effectively and involves user in the development process.
Here are some points to keep in mind:
CISA candidates should be familiar with the roles and responsibilities of individuals or groups involved in system development.

2. Project Management practices:
Project management is the application knowledge, skills and techniques to a wide range of activities in order to achieve a stated goal, such as meeting defined user requirements, budget, and deadlines for an IS-project.
The best way to describe project management knowledge and practices is through their components ofInitiating.
Planning,
Executing and controlling
Closing a Project

Initiation of a project
A terms of reference, or a project charter, is often compiled. It outlines the objectives of the project, the stakeholders involved in the system, and the sponsor.
Approval of a Project Initiation Document (PID), or a Project Request Document (PRD), is the authorization for a new project to start.

Project planningThe project manager should decide the following as part project planningProject scope
There are many tasks required to create the business application system.
These tasks must be completed in the correct order.
The time frame or duration of each task
Priority of each task
These tasks require the IT resources available and required
Budgeting and costing each of these tasks
Source and method of funding

System Development Project Cost EstimationThe four methods used to estimate the cost of a system development project are: Analogous estimating
Parametric estimating
Bottom-up estimating
Actual costs

Software size estimationRelates to methods for determining the relative size of the software application to be developed
It can be used to guide the allocation of resources, estimate the time and cost of its development, and to compare the total effort required using the available resources
Software sizing methods

One line of co

Related Posts

Drive Letters

By Val Bakh 2.4.1 Drive letters (part 1)Disk drives can be referred to using alphabet letters. Drives A and C were used commonly for floppy disk drives….

Drive Letters (Part 2)

By Val Bakh 2.4.2 Drive letters (part 2) In the first part, we covered the basics of drive letter assignment and the changes that Windows Vista has…

Activation Part 2

2.2.2 A product code in an answer file. Let’s say you have a WIM image of Windows 7 Enterprise and a Multiple Activation Key (MAK). How do…

Activation Part 1

By Val Bakh2.2 Activation 2.2.1 Volume activation Every Windows 7 installation must be activated. It is a legal requirement to ensure that the operating system is properly…

Microsoft Vista Tips and Tricks

By Val Bakh 1. Vista 1.1. Boot architecture All Windows versions that are designed for business, starting with Windows NT include built-in support to multiboot configurations. Multiple…

Multicloud Storage Service Spans AWS Microsoft Azure Nimble Storage Inc. has today launched a beta offering that claims to be the only enterprise-grade multicloud block store service for Amazon Web Services Inc. (AWS), and Microsoft Azure public cloud. The product is called Nimble Cloud Volumes, and its enterprise-grade availability as well as data services can be used to help organizations move new types enterprise apps to the cloud. Nimble Storage believes that the first wave cloud apps will be mostly content-centric, native Web and mobile apps. They lack enterprise-friendly features like data durability and data services such as snapshots, and the ability to share the same volumes with multiple hosts. The next wave of cloud applications comprises traditional transactional-centric workloads — like transactional databases — moving to the public cloud space, with stringent storage requirements. The company stated that NCV flash-based storage could provide enterprise functionality, opening up new frontiers. It also offers other benefits, such as the elimination of cloud vendor lock-in, better data reliability, and uninterrupted data access. Ajay Singh, a senior executive at AWS, stated that the NCV service delivers flash storage volumes or block storage to AWS EC2 instances and Azure Virtual machines. It offers significant advantages over native cloud block storage services such as Amazon EBS and Azure Disk Volumes. The company highlighted the following three main benefits of the new NCV service:

Data mobility between public clouds or on-premises datacenters is easy without large data egress fees. Global visibility and predictive analytics allow for information such as usage history,…