Tuesday, May 5, 2020

Journal of Hybrid Information Technology †MyAssignmenthelp.com

Question: Discuss about the Journal of Hybrid Information Technology. Answer: Introduction In the selected YouTube video, it is being seen that a software product would be launched early without any proper encryption added to it. A software without proper encryption involved can create problem in the near future relating to the security in the software. This can make the software vulnerable to hackers who can easily hack the system. The main ethical problem, which is being identified in the video, is that a software without any proper encryption is being delivered to the client. The aspect would directly reduce the security, which is related to the organization when they use the software in the live environment. The problem can be termed as ethical problem due to the factor that if the software is implemented into the live environment without proper encryption it could be vulnerable. The vulnerable concept would be implemented in the sector of the security of the data. The data when relating to any organization is very much on the part of private data. If this data is not secured then it could produce problem and later the working of the overall organization (Sadeghi et al., 2017). The person who is responsible for this issue is the project manager. The project manager mainly decides what has to be in the software and what should not be incorporated into the software. In this problem, it was the call of the project manager to deliver the software early without proper encryption being involved into the process. He had suggested the project director to initiate a patch of the encryption few days after the launch of the software (Kumar, Khan Khan, 2015). The affected sector is the client who would be using the software in the live environment. The data, which is stored in the software, is liable to be vulnerable for hackers to indulge into it. This can be stated as a problem as the data can be important and if it goes into the hand of others, it can affect the working of the organization (Sadeghi et al., 2017). There are different project management strategies that can be incorporated into any project initiation. The different phases, which are involved into the concept, is the initiation, planning and execution (Pires et al., 2016). Taking into consideration a software development scheme the best project management scheme that can be implemented is the waterfall model. This can be considered as a very basic model for the for software model which incorporates the entire requirement needed in the different phases in development of a software (Scott-Hayward, Natarajan Sezer, 2016). Among the different options available, which are stated in the YouTube video the best option that can be used is that the project director ignores the recommendation of the project manager. This is selected due to the factor that a software without proper encryption involved into it can be a big problem when the software is presented into a live environment. If any other person accesses the data in the software, expect the authorized user it could lead to a big problem (Sadeghi et al., 2017). This problem can be resolved by the implementation of the encryption into the software. The best option other than the three stated in the YouTube video is to delay the delivery of the software. This could reinforce problem in the sector of time framework but on the other hand, it would be beneficial because the after sales service would not be required. As stated in the video a patch would be generated after the launch this could be a problem. Sometimes the compactible issue plays a role, which could create problem in the sector of development and the implementation of the software (Pires et al., 2016). The person who would be taking the best action should know all the details of the software. In this case, the project director would take the best action. This is due to the factor that the project director knows the overall working of the software. He can make the best call regarding the implementations that are required into the software (Scott-Hayward, Natarajan Sezer, 2016). It should be taken into consideration that the project director always wants to dispatch a software with all the implementations that are required so that in the future there are no problem faced with the security issue of the software. Projects time: The implementation of the best action would eventually affect the factor of the time, which is involved into the delivery of the software. It would result in delay in the delivery but on the other hand, it can incorporate all the necessary details and the security aspects, which should be involved into a software (Chen et al., 2016). Cost: As the delivery of the project would be delayed by the implementation of the best action. The utilization of the resources, which would be along the process of development, could involve cost aspect in it. The cost would be directed affected in this scenario. Quality: The quality of the product or the software would not be neglected in this scenario. It can be seen that there would be delay in the delivery of the software but on the other hand, the encryption would be involved into the software because of which the security factors would be obliged with (Kumar, Khan Khan, 2015). A software should always be delivered to the client with the best quality so that in the near future security issues are not encountered. The project manager and the project director would be answerable to the stakeholders about the reason of the delay of the delivery from the pre estimated time framework. The stakeholders would be concerned about the cost related factor, which would be faced due to the delivery of the software exceeding the delivery date (Ding et al., 2014). There are more concern sector relating to the stakeholders for example if one projects deadline is extended it would affect the other projects, which are in the queue. References Chen, M., Qian, Y., Mao, S., Tang, W., Yang, X. (2016). Software-defined mobile networks security.Mobile Networks and Applications,21(5), 729-743. Ding, A. Y., Crowcroft, J., Tarkoma, S., Flinck, H. (2014). Software defined networking for security enhancement in wireless mobile networks.Computer Networks,66, 94-101. Kumar, R., Khan, S. A., Khan, R. A. (2015). Revisiting software security: durability perspective.International Journal of Hybrid Information Technology (SERSC),8(2), 311-322. Pires, R., Pasin, M., Felber, P., Fetzer, C. (2016, November). Secure content-based routing using intel software guard extensions. InProceedings of the 17th International Middleware Conference(p. 10). ACM. Sadeghi, A., Bagheri, H., Garcia, J., Malek, S. (2017). A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software.IEEE Transactions on Software Engineering,43(6), 492-530. Scott-Hayward, S., Natarajan, S., Sezer, S. (2016). A survey of security in software defined networks.IEEE Communications Surveys Tutorials,18(1), 623-654.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.