C 726 Cyber Engineering And Architecture

Task:

Use the following sections to describe why a new system is being developed or why an existing system is undergoing a significant modification. Identify the goals, and objectives of the new system

Project Purpose

Identify the fundamental purpose of this project (e.g., create a brand-new system, replace an existing system, or significantly alter an existing system).

System Goals And Objectives

Briefly describe the goals and objectives of the new or modified system. Clearly state the problem that will be solved.

Proposed System

Provide a succinct description of the proposed system. Sections 5 and 6 will describe the proposed system in more detail.

System Scope

Describe the scope of the proposed system. This subsection should clearly identify the boundaries of the proposed system.

Processes Supported

Briefly identify and describe the processes that the proposed system will support. Please note that this section should not describe the processes in extreme detail. 

High-Level Functional Requirements

Briefly describe the high-level business and user requirements for the system. The purpose of this subsection is to provide enough requirements information to inform the proposed technical design. Detailed requirements should be in the “Business Requirements Document Template” from Task 1 instead of this document.

Factors Influencing Technical Design

Use the following sections to describe the standards, assumptions, constraints, and design goals that influence the technical design of the proposed system.

Relevant Standards

Explain the relevant content management system (CMS), government, and industry standards that govern the technical design.

Assumptions And Dependencies

Describe any assumptions or dependencies regarding the system and its use.

Constraints

Describe any limitations or constraints that have a significant impact on the design of the system.

Design Goals

Describe any goals, guidelines, principles, or priorities that guide the technical design.

Proposed System

High-Level Operational Requirements and Characteristics

Use the following sections to describe the operational requirements and technical design of the proposed system.

User Community Description

Using the table below, identify the user community for the proposed system and the key characteristics that will influence the technical design.

Table 1: User Community Description

User Group Description/Expected Use of System Type

(Federal Employee, Contractor) Geographic Location Network Profile

(LAN, WAN, External) Total Users Concurrent Users

<User Group> <Description/Expected Use of System> <User Type> <Geographic Location> <Network Profile> <Total # Users> <Total # Concurrent Users>

<User Group> <Description/Expected Use of System> <User Type> <Geographic Location> <Network Profile> <Total # Users> <Total # Concurrent Users>

<User Group> <Description/Expected Use of System> <User Type> <Geographic Location> <Network Profile> <Total # Users> <Total # Concurrent Users>

Nonfunctional Requirements

Include the complete table of nonfunctional requirements from Section 5.2 of the “Business Requirements Document Template” from Task 1.

ID Requirements

High-Level Architecture

Provide a high-level overview of how system functionality will be allocated to logical subsystems or components. This section should identify the logical user groups, application components, data components, and interfacing systems. Using the information in Section 4.2 of the “Business Requirements Document Template” from Task 1, create a diagram that illustrates the collaboration and interaction between the major components. Identify any relevant design patterns or reuse relevant to the design, then insert diagram here:

In the table below, identify the alternatives considered for the overall architecture. For example, discuss any decision-making around building a brand-new system versus enhancing an existing system. This alternatives discussion is intended to differentiate between the fundamental options for designing a technical solution. If more detailed alternatives analysis was completed for specific architectural layers, discuss those in one of the following subsections.

Table 2: Alternatives Considered for the Overall Architecture

Alternative Description Pros Cons Preferred Alternative? Rationale

<Alternative> <Description> <Pros> <Cons> <Yes or No> <Rationale>

<Alternative> <Description> <Pros> <Cons> <Yes or No> <Rationale>

<Alternative> <Description> <Pros> <Cons> <Yes or No> <Rationale>

Application Architecture

Using the table below, describe the application components in the architecture diagram above. If you considered alternatives around a particular application component, discuss them in this subsection.

Table 3: Description of Application Components

Diagram ID Application Component Description

(Business Process Supported, Purpose of Component) Type

(Identify both (1) Operational or Analytical and (2) Batch or Online) Strategy

(Build, Buy, Reuse, Rewrite) Alternatives Pros Cons Preferred Alternative

<ID> <Component> <Description> <Type> <Strategy> <Alternatives> <Pros> <Cons> <Preferred Alternative>

<ID> <Component> <Description> <Type> <Strategy> <Alternatives> <Pros> <Cons> <Preferred Alternative>

<ID> <Component> <Description> <Type> <Strategy> <Alternatives> <Pros> <Cons> <Preferred Alternative>

Information Architecture

Describe the information components required to support the system. Start by identifying and describing the conceptual data entities relevant for the system. These should be the highest-level information categories for the system (e.g., claims, provider, beneficiary, clinical data.) This is not intended to be a complete logical or physical data model.

Using the matrix in the table below, describe the information required for the system. If you considered alternatives around a particular information component, discuss them in this subsection.

Table 4: Description of Information Components

Diagram ID Conceptual Information (Entity) Description Type of Data Store (Transactional or Analytical) System of Record?

(Does this system or another system serve as system or record for information?) Data Acquisition Approach

(e.g., User Data Entry, Interface) Alternatives Pros Cons Preferred Alternative

<ID> <Conceptual Information> <Description> <Type of Data Store> <System of Record?> <Data Acquisition Approach> <Alternatives> <Pros> <Cons> <Preferred Alternative>

<ID> <Conceptual Information> <Description> <Type of Data Store> <System of Record?> <Data Acquisition Approach> <Alternatives> <Pros> <Cons> <Preferred Alternative>

<ID> <Conceptual Information> <Description> <Type of Data Store> <System of Record?> <Data Acquisition Approach> <Alternatives> <Pros> <Cons> <Preferred Alternative>

Interface Architecture 

Not required for performance assessment.

Technology Architecture

Instructions: Describe the anticipated infrastructure that will be required to support the application and information architecture. At this point in the project, focus on describing the technology architecture at a high level only.

Platform

Instructions: Identify the target platform expected for the system (e.g., mainframe, mid-tier, other).

System Hosting

Identify the target hosting for the system (e.g., electronic data capture, business data capture, other).

Connectivity Requirements

Identify network connectivity requirements for the system (e.g., internet, extranet).

Modes Of Operation

Describe the modes that the system will operate in.

Security And Privacy Architecture

Describe the anticipated security and privacy architecture. The purpose of this discussion is to identify the general approach to security to ensure that proper controls will be implemented into the system. This is not intended to be a detailed security design.

Authentication

Instructions: Describe the basic user authentication approach to verify user identity before allowing access to the system. For example, will the system use the identity access control system (IACS) single-sign-on solution?

Authorization

Instructions: Describe the anticipated approach for authorizing users to perform functional activity once logged into the system.

Encryption

Based on the business risks and the nature of the information, identify if there are any anticipated needs to encrypt the data.

Analysis Of The Proposed System

Use the following section to analyze the proposed system by prioritizing risks from the DREAD analysis.

Risks

Prioritize and describe the top five risks that the preferred alternative presents. For each risk, describe if it will be mitigated or accepted, and justify your decision.

StudyAcer
Calculate your paper price
Pages (550 words)
Approximate price: -
StudyAcer

Quality Researched Papers

We always make sure that writers follow all your instructions precisely. You can choose your academic level: high school, college/university or professional, and we will assign a writer who has a respective degree.

StudyAcer

Qualified Writers

We have hired a team of professional writers experienced in academic and business writing. Most of them are native speakers and PhD holders able to take care of any assignment you need help with.

StudyAcer

Unlimited Revisions

If you think we missed something, send your order for a free revision. You have 10 days to submit the order for review after you have received the final document. You can do this yourself after logging into your personal account.

StudyAcer

Prompt Delivery

All papers are always delivered on time. In case we need more time to master your paper, we may contact you regarding the deadline extension. We will always strive to deliver on time.

StudyAcer

Original & Confidential

We use several writing tools checks to ensure that all documents you receive are free from plagiarism. Our editors carefully review all quotations in the text.

StudyAcer

24/7 Customer Support

Our support agents are available 24 hours a day 7 days a week and committed to providing you with the best customer experience. Get in touch whenever you need any assistance.

Try it now!

Calculate the price of your order

Total price:
$0.00

How it works?

Follow these simple steps to get your paper done

StudyAcer

Place your order

Fill in the order form and provide all details of your assignment.

StudyAcer

Proceed with the payment

Choose the payment system that suits you most.

StudyAcer

Receive the final file

Once your paper is ready, we will email it to you.

Academic Writing Services

If you are looking for exceptional academic writing services, then you are in the right place. Studyacer offers customised academic assignments and academic papers for students at all levels.

StudyAcer StudyAcer

Essays

Essay Writing Help

Writing an essay can be a challenge. However, we know what every student needs. And we purpose to deliver. Here at StudyAcer, we do all we can to help with academic essays and assignments. We have a dedicated team of professional essay writers.

StudyAcer StudyAcer

Assignment

Assignment Help

We understand students need satisfactory results. Our cheap assignment writing service helps and never leaves any doubt. We always strive to ensure the ultimate and best results. It is our joy to offer a cheap reliable essay writing service.

StudyAcer StudyAcer

Term paper

Term Paper Help

Have you been asking yourself, where can get a pre written research papers for sale? Worry no more, the fact that you have a term paper that is due tonight and you haven’t touched it. At Study Acer it is our responsibility to get your paper on time.

StudyAcer StudyAcer

Dissertation

Dissertation Writing Service

Several master’s students seek professional help with their thesis.Students from different parts of the world experience different challenges. Dissertations have different stages and the challenges are different too. Do not struggle in silence, order now .