SlideShare a Scribd company logo
CHAPTER 14
PROJECT MANAGEMENT
Anjan Mahanta
anjan.mahanta@satreephuketipc.com
1
Cambridge International A Level IT
Part 2
14.06 Disaster recovery management
● Sometimes disasters occur, such as a power cut, flood, fire, theft of data,
malware, corruption of data, loss of network admin password or loss of
the network manager.
● When this happens it is necessary to recover from the disaster.
● A disaster recovery plan (DRP) is needed for such events so that recovery
can be completed as quickly and effectively as possible, minimising
disruption to the organisation.
2
Risk assessment
● Risk assessment involves identifying the potential risks to an organisation, analysing the
potential impact to the organisation and the likelihood of each risk occurring.
● This is often carried out alongside a systematic process known as business impact
analysis (BIA), which quantifies the impact of a disaster in terms of financial and
nonfinancial costs.
● A risk assessment will identify a number of potential hazards including:
○ power cut
○ fire
○ flood
○ denial of access to premises
○ malware
○ unauthorised access to data
○ theft of data
○ corruption of data
○ loss of key personnel 3
Risk assessment
● Some of these risks involve people who could deliberately cause problems. These
people are known as perpetrators.
● Each risk will then be quantified in terms of its likelihood on a scale from 0.0 to 1.0.
where 0.0 represents it never happening to 1.0 which represents it as being almost
inevitable.
● Within an organisation, there will be a number of business activities that are carried out.
Each business activity will need to be identified.
● The impact of that business activity not being able to take place then needs to be
analysed.
● The impact for each activity not being able to take place will be measured on a scale
from 0.0 to I .0 where 0.0 means that there is no impact to 1.0 meaning that the impact
is absolutely critical to the aims of the organisation.
4
Risk assessment
● loss of revenue
● damage to organisations image
● penalty fees
● cost of recovery
● effect on other business activities.Impacts could include:
From this analysis, activities can be categorised. for example:
● activities which must continue
● activities which could be scaled down
● activities which could be suspended.
5
Risk assessment
● Analysis of the impacts should also cover how the impact changes over different time
periods, for example in the first hour. 24 hours, 48 hours. week etc.
● The overall risk to an organisation of each potential disaster/risk can now be quantified
by multiplying the likelihood by the impact:
Risk = Likelihood x Impact
● This will now show which risks are the most important to guard against and ensure that
recovery plans are robust.
● This can be done for each risk, for each business activity or for a combination of each.
6
Risk assessment
7
Securing the risk
● Once the risks have been identified and prioritised, measures need to be put into place
to protect against those risks.
● Most of these measures includes access rights and passwords, biometric methods,
firewalls, backups, encryption, malware security and physical security methods.
● One of the risks that hasn't been discussed previously is the potential to lose key
personnel. If a person leaves, is suddenly ill, dies or has to be dismissed, then the
organisation loses all of that person's knowledge which has not been documented.
● It is therefore important to guard against personnel loss by requiring key personnel to
document procedures that they follow. It's also wise to have at least two people who
know the main system administration password or to have a copy of it written down in
a sealed envelope in a safe that has limited access.
8
Recovery management
Procedures need to be put into place to plan for recovery after a disaster has occurred. This
can include planning for:
● restoration of backups
● replacement of hardware
● reinstallation of software
● emergency replacement of key personnel
● emergency office accommodation.
When planning for these situations, any resources in terms of personnel, technology, data,
supplies and premises that are required to recover from the disaster must be identified and
planned for.
9
Recovery management
● The recovery point objective (RPO) must also be identified. The RPO is the point in time
prior to the disruption to which data must be recovered.
● It is important to plan how long each recovery process will take. There will be some
parts of recovery where the time is fixed, but other parts where if more resources are
allocated then the recovery can be quicker. When planning for the recovery time, two
key measurements should be considered:
○ maximum tolerable downtime (MTD): this is the maximum time that each
business activity could tolerate not having access to their essential system
functionality
○ recovery time objective (RIO): this is the estimated maximum amount of time that
the organisation or business activity has in which to recover its systems and
resume operations. 10
Recovery testing
● Plans are important, and a plan is better than no plan, but plans don't always work. It is
therefore important to test disaster recovery plans.
● This is particularly applicable to restoring data and systems.
● Backed up data should be tested daily to ensure that the backup process has
succeeded and that the backup data is accessible.
● Full system restorations should be tested periodically by attempting to restore whole
server backups onto a clean server and testing their success.
11
12
Prototyping
● A prototype is a "mock-up' of a software solution in a primitive form.
● It is used during the design stage to demonstrate how a system will look and work. It is
usually focused on the user interface, rather than any data structures.
● It is used so that the client can get a feel for the new system before it is developed and
can provide feedback that can then be acted upon.
● The client is also able to compare the prototype against the requirements specification.
● The client also has an opportunity to explain their requirements more clearly having
seen the designer's interpretation.
13
Types of prototyping
Evolutionary/incremental prototyping
This type of prototyping takes an iterative
approach in that requirements are specified, an
initial prototype is developed, the prototype is
reviewed and then requirements are clarified and
the prototype is improved based on feedback.
14
Types of prototyping
Evolutionary/incremental prototyping
● Each prototype will be build upon the previous one and include more functionality
until a final product is built.
● At each stage, only clearly understood requirements are developed.
● Each prototype can be functional and if required can be used by the client until the
next evolution of the prototype is ready.
● This means that the end users may request enhanced or new features that they
discover they require as the prototypes are being developed, features they wouldn't
have envisaged at the initial requirements specification stage.
15
Types of prototyping
Throwaway/rapid prototyping
● With throwaway prototyping, also known as
rapid prototyping, the prototype will never
become part of the final delivered software,
but will be discarded.
● A loosely working model is created
following a short investigation, with the aim
being to get something tangible to the client
as soon as possible for feedback as to how
well the requirements are being met.
16
Advantages and disadvantages of prototyping
17
Methods of software development
Rapid application development
● Rapid application development (RAD) uses prototyping to develop a system in a very
short time frame, usually less than six months. Instead of following a traditional
requirement gathering approach, requirements are gathered through focus groups.
● Users are key players in the prototyping stage and provide feedback for refinements.
● This type of user involvement is known as joint application development (JAD)
because the user is jointly involved with the developer in the development of the
system.
● Less time is spent on planning and design and more emphasis is put on the
development phase. 18
Methods of software development
Rapid application development
● Strict deadlines are allocated throughout the development of the system to ensure that the
product is developed and finished on time by allocating time boxes to the development of
each requirement.
● This requires understanding from the user that, if requirements are too complex, then they
must be simplified or removed from the project.
● The RAD approach will also try to reuse any modules of software that already exist and are
available. rather than always developing from scratch. Software application frameworks can
be used to develop the solution whereby a complex graphical user interface can be created
using drag and drop functionality. This enables users to be involved in the actual design of
the interface as part of the JAD approach and they can see the interface taking shape in
real time. 19
Methods of software development
Rapid application development
● The waterfall method involves gathering all
the user requirements at the beginning of
the project.
● There will be considerable communication
with the user at this stage in order to elicit
the requirements of the potential solution.
● When the requirements are defined, the
process runs 'downhill' like a waterfall.
20
Methods of software development
Rapid application development
● During the design stage, the interface and the structure of the system will be
designed.
● During implementation, often referred to as development, the system will be
developed, which often involves programming.
● The purpose of the verification phase is to ensure that the project meets the
customer's requirements.
● The system will then be used and during its use there may be problems that are
discovered that need to be corrected or other changes that need to be made. This is
known as maintenance.
21
Advantages and disadvantages of RAD
22
Advantages and disadvantages of RAD
23
14.08 Computer-aided design and manufacturing
● Computer-aided design (CAD) involves the use of
computers to design physical products.
● Computer-aided manufacturing (CAM) involves
the use of computers to manufacture physical
products.
● CAD/CAM applications involve the use of
computers to design the physical products and
then the application uses the design to
manufacture the physical product to match the
exact design. 24
14.08 Computer-aided design and manufacturing
● CAD uses vector graphics to create objects in two
dimensions (2D) or three dimensions (3D).
● Due to the manufacturing nature of CAD, it is
common to use 3D tools. A plan view is often used
in 2D and the CAD software will render a 3D view,
which can be viewed from any angle and zoomed
in or out.
● Objects can be stretched, resized and moved and
properties such as material and colour can be
changed.
25
14.08 Computer-aided design and manufacturing
CAD/CAM applications include:
● Landscaping
● Vehicle manufacturing
● Textile production
● Carpentry
● Manufacturing of components
● Printed circuit board
26
Benefits and drawbacks of CAD/CAM
27
28
29
30

More Related Content

PDF
Emerging Technologies
ODP
CISSP Week 12
ODP
Cissp Week 23
PDF
Expert Systems
PPTX
6.12 expert systems
PDF
Network operations center best practices (3)
PPTX
Safety and security in distributed systems
PDF
Network Operations Center Processes- Isaac Mwesigwa
Emerging Technologies
CISSP Week 12
Cissp Week 23
Expert Systems
6.12 expert systems
Network operations center best practices (3)
Safety and security in distributed systems
Network Operations Center Processes- Isaac Mwesigwa

Similar to Project management part 2 (20)

PPTX
Net profit gross margin it’s sources .
PPTX
crisc_wk_6.pptx
PPTX
System Analysis and Design (Health Informatics)
PPTX
CISA_WK_3.pptx
PPT
Project management
PPTX
Building cbis, mis, csvtu
DOCX
Week 7 - Choices in Systems Acquisition and Risks, Security,.docx
PPTX
Chapter 02
PDF
Contingency Planning And Disaster Recovery Planning
PPTX
Software engineering (Unit-1 Introduction)
PPT
Information Systems Life Cycle
PDF
Half Prepared?: Business Survey on Disaster Recovery
PPT
8.project management chapter 8
PPTX
2.1 Tools and techniques.pptx
DOCX
Chapter 11
PPT
System development
DOCX
ModuleLearningOutcomesassessedinthispiec.docx
PPTX
Project Management for IT-related Projects (Logitrain)
PPTX
Concepts Of business analyst Practices - Part 1
PPTX
Database Project management
Net profit gross margin it’s sources .
crisc_wk_6.pptx
System Analysis and Design (Health Informatics)
CISA_WK_3.pptx
Project management
Building cbis, mis, csvtu
Week 7 - Choices in Systems Acquisition and Risks, Security,.docx
Chapter 02
Contingency Planning And Disaster Recovery Planning
Software engineering (Unit-1 Introduction)
Information Systems Life Cycle
Half Prepared?: Business Survey on Disaster Recovery
8.project management chapter 8
2.1 Tools and techniques.pptx
Chapter 11
System development
ModuleLearningOutcomesassessedinthispiec.docx
Project Management for IT-related Projects (Logitrain)
Concepts Of business analyst Practices - Part 1
Database Project management
Ad

More from Anjan Mahanta (20)

PDF
Paper 2 – Exam Revision Notes.pdf
PDF
Project management part 1
PDF
13.03 - Satellite communication systems
PDF
13.02 Network Security
PDF
13.01 Network Components
PDF
The role and impact of IT in society
PDF
Conditional statistical functions
PDF
Spreadsheet if and nested if function
PDF
Spreadsheet lookup functions
PDF
Spreadsheet text functions
PDF
Spreadsheet Date & Time Functions
PDF
Networks and the effects of using them
PDF
Scratch Animation
PDF
Storage devices and media
PDF
Using Network
PDF
The Digital Divide
PDF
Chapter 4 E-Safety and Health & Safety
PDF
Chapter 3 Monitoring and Control
PDF
Chapter 2 Hardware and Software
PDF
Data, Information, Knowledge and Processing
Paper 2 – Exam Revision Notes.pdf
Project management part 1
13.03 - Satellite communication systems
13.02 Network Security
13.01 Network Components
The role and impact of IT in society
Conditional statistical functions
Spreadsheet if and nested if function
Spreadsheet lookup functions
Spreadsheet text functions
Spreadsheet Date & Time Functions
Networks and the effects of using them
Scratch Animation
Storage devices and media
Using Network
The Digital Divide
Chapter 4 E-Safety and Health & Safety
Chapter 3 Monitoring and Control
Chapter 2 Hardware and Software
Data, Information, Knowledge and Processing
Ad

Recently uploaded (20)

PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Insiders guide to clinical Medicine.pdf
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
Institutional Correction lecture only . . .
PPTX
Cell Types and Its function , kingdom of life
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Business Ethics Teaching Materials for college
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
Classroom Observation Tools for Teachers
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Insiders guide to clinical Medicine.pdf
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PPH.pptx obstetrics and gynecology in nursing
Institutional Correction lecture only . . .
Cell Types and Its function , kingdom of life
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
human mycosis Human fungal infections are called human mycosis..pptx
Business Ethics Teaching Materials for college
Week 4 Term 3 Study Techniques revisited.pptx
Classroom Observation Tools for Teachers
VCE English Exam - Section C Student Revision Booklet
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
TR - Agricultural Crops Production NC III.pdf
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Renaissance Architecture: A Journey from Faith to Humanism

Project management part 2

  • 1. CHAPTER 14 PROJECT MANAGEMENT Anjan Mahanta anjan.mahanta@satreephuketipc.com 1 Cambridge International A Level IT Part 2
  • 2. 14.06 Disaster recovery management ● Sometimes disasters occur, such as a power cut, flood, fire, theft of data, malware, corruption of data, loss of network admin password or loss of the network manager. ● When this happens it is necessary to recover from the disaster. ● A disaster recovery plan (DRP) is needed for such events so that recovery can be completed as quickly and effectively as possible, minimising disruption to the organisation. 2
  • 3. Risk assessment ● Risk assessment involves identifying the potential risks to an organisation, analysing the potential impact to the organisation and the likelihood of each risk occurring. ● This is often carried out alongside a systematic process known as business impact analysis (BIA), which quantifies the impact of a disaster in terms of financial and nonfinancial costs. ● A risk assessment will identify a number of potential hazards including: ○ power cut ○ fire ○ flood ○ denial of access to premises ○ malware ○ unauthorised access to data ○ theft of data ○ corruption of data ○ loss of key personnel 3
  • 4. Risk assessment ● Some of these risks involve people who could deliberately cause problems. These people are known as perpetrators. ● Each risk will then be quantified in terms of its likelihood on a scale from 0.0 to 1.0. where 0.0 represents it never happening to 1.0 which represents it as being almost inevitable. ● Within an organisation, there will be a number of business activities that are carried out. Each business activity will need to be identified. ● The impact of that business activity not being able to take place then needs to be analysed. ● The impact for each activity not being able to take place will be measured on a scale from 0.0 to I .0 where 0.0 means that there is no impact to 1.0 meaning that the impact is absolutely critical to the aims of the organisation. 4
  • 5. Risk assessment ● loss of revenue ● damage to organisations image ● penalty fees ● cost of recovery ● effect on other business activities.Impacts could include: From this analysis, activities can be categorised. for example: ● activities which must continue ● activities which could be scaled down ● activities which could be suspended. 5
  • 6. Risk assessment ● Analysis of the impacts should also cover how the impact changes over different time periods, for example in the first hour. 24 hours, 48 hours. week etc. ● The overall risk to an organisation of each potential disaster/risk can now be quantified by multiplying the likelihood by the impact: Risk = Likelihood x Impact ● This will now show which risks are the most important to guard against and ensure that recovery plans are robust. ● This can be done for each risk, for each business activity or for a combination of each. 6
  • 8. Securing the risk ● Once the risks have been identified and prioritised, measures need to be put into place to protect against those risks. ● Most of these measures includes access rights and passwords, biometric methods, firewalls, backups, encryption, malware security and physical security methods. ● One of the risks that hasn't been discussed previously is the potential to lose key personnel. If a person leaves, is suddenly ill, dies or has to be dismissed, then the organisation loses all of that person's knowledge which has not been documented. ● It is therefore important to guard against personnel loss by requiring key personnel to document procedures that they follow. It's also wise to have at least two people who know the main system administration password or to have a copy of it written down in a sealed envelope in a safe that has limited access. 8
  • 9. Recovery management Procedures need to be put into place to plan for recovery after a disaster has occurred. This can include planning for: ● restoration of backups ● replacement of hardware ● reinstallation of software ● emergency replacement of key personnel ● emergency office accommodation. When planning for these situations, any resources in terms of personnel, technology, data, supplies and premises that are required to recover from the disaster must be identified and planned for. 9
  • 10. Recovery management ● The recovery point objective (RPO) must also be identified. The RPO is the point in time prior to the disruption to which data must be recovered. ● It is important to plan how long each recovery process will take. There will be some parts of recovery where the time is fixed, but other parts where if more resources are allocated then the recovery can be quicker. When planning for the recovery time, two key measurements should be considered: ○ maximum tolerable downtime (MTD): this is the maximum time that each business activity could tolerate not having access to their essential system functionality ○ recovery time objective (RIO): this is the estimated maximum amount of time that the organisation or business activity has in which to recover its systems and resume operations. 10
  • 11. Recovery testing ● Plans are important, and a plan is better than no plan, but plans don't always work. It is therefore important to test disaster recovery plans. ● This is particularly applicable to restoring data and systems. ● Backed up data should be tested daily to ensure that the backup process has succeeded and that the backup data is accessible. ● Full system restorations should be tested periodically by attempting to restore whole server backups onto a clean server and testing their success. 11
  • 12. 12
  • 13. Prototyping ● A prototype is a "mock-up' of a software solution in a primitive form. ● It is used during the design stage to demonstrate how a system will look and work. It is usually focused on the user interface, rather than any data structures. ● It is used so that the client can get a feel for the new system before it is developed and can provide feedback that can then be acted upon. ● The client is also able to compare the prototype against the requirements specification. ● The client also has an opportunity to explain their requirements more clearly having seen the designer's interpretation. 13
  • 14. Types of prototyping Evolutionary/incremental prototyping This type of prototyping takes an iterative approach in that requirements are specified, an initial prototype is developed, the prototype is reviewed and then requirements are clarified and the prototype is improved based on feedback. 14
  • 15. Types of prototyping Evolutionary/incremental prototyping ● Each prototype will be build upon the previous one and include more functionality until a final product is built. ● At each stage, only clearly understood requirements are developed. ● Each prototype can be functional and if required can be used by the client until the next evolution of the prototype is ready. ● This means that the end users may request enhanced or new features that they discover they require as the prototypes are being developed, features they wouldn't have envisaged at the initial requirements specification stage. 15
  • 16. Types of prototyping Throwaway/rapid prototyping ● With throwaway prototyping, also known as rapid prototyping, the prototype will never become part of the final delivered software, but will be discarded. ● A loosely working model is created following a short investigation, with the aim being to get something tangible to the client as soon as possible for feedback as to how well the requirements are being met. 16
  • 17. Advantages and disadvantages of prototyping 17
  • 18. Methods of software development Rapid application development ● Rapid application development (RAD) uses prototyping to develop a system in a very short time frame, usually less than six months. Instead of following a traditional requirement gathering approach, requirements are gathered through focus groups. ● Users are key players in the prototyping stage and provide feedback for refinements. ● This type of user involvement is known as joint application development (JAD) because the user is jointly involved with the developer in the development of the system. ● Less time is spent on planning and design and more emphasis is put on the development phase. 18
  • 19. Methods of software development Rapid application development ● Strict deadlines are allocated throughout the development of the system to ensure that the product is developed and finished on time by allocating time boxes to the development of each requirement. ● This requires understanding from the user that, if requirements are too complex, then they must be simplified or removed from the project. ● The RAD approach will also try to reuse any modules of software that already exist and are available. rather than always developing from scratch. Software application frameworks can be used to develop the solution whereby a complex graphical user interface can be created using drag and drop functionality. This enables users to be involved in the actual design of the interface as part of the JAD approach and they can see the interface taking shape in real time. 19
  • 20. Methods of software development Rapid application development ● The waterfall method involves gathering all the user requirements at the beginning of the project. ● There will be considerable communication with the user at this stage in order to elicit the requirements of the potential solution. ● When the requirements are defined, the process runs 'downhill' like a waterfall. 20
  • 21. Methods of software development Rapid application development ● During the design stage, the interface and the structure of the system will be designed. ● During implementation, often referred to as development, the system will be developed, which often involves programming. ● The purpose of the verification phase is to ensure that the project meets the customer's requirements. ● The system will then be used and during its use there may be problems that are discovered that need to be corrected or other changes that need to be made. This is known as maintenance. 21
  • 24. 14.08 Computer-aided design and manufacturing ● Computer-aided design (CAD) involves the use of computers to design physical products. ● Computer-aided manufacturing (CAM) involves the use of computers to manufacture physical products. ● CAD/CAM applications involve the use of computers to design the physical products and then the application uses the design to manufacture the physical product to match the exact design. 24
  • 25. 14.08 Computer-aided design and manufacturing ● CAD uses vector graphics to create objects in two dimensions (2D) or three dimensions (3D). ● Due to the manufacturing nature of CAD, it is common to use 3D tools. A plan view is often used in 2D and the CAD software will render a 3D view, which can be viewed from any angle and zoomed in or out. ● Objects can be stretched, resized and moved and properties such as material and colour can be changed. 25
  • 26. 14.08 Computer-aided design and manufacturing CAD/CAM applications include: ● Landscaping ● Vehicle manufacturing ● Textile production ● Carpentry ● Manufacturing of components ● Printed circuit board 26
  • 27. Benefits and drawbacks of CAD/CAM 27
  • 28. 28
  • 29. 29
  • 30. 30