Software Engineering (10th Edition)
10th Edition
ISBN: 9780133943030
Author: Ian Sommerville
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 14, Problem 14.1E
Program Plan Intro
System resilience:
System resilience is the judgement, with the help of which any system maintains continuity of systems critical resources during disruptive event which includes cyber-attack or failure of equipment. This comprises of four strategies which are mentioned below:
- Recognition
- Resistance
- Reinstatement
- Recovery
Expert Solution & Answer
Explanation of Solution
Recognition:
- In this type of strategy, the operators of the system detect any possible issues which can cause any sort of system failure and it is generally done before the failure is occurred.
Resistance:
- In this type of strategy, the critical parts of the system are focused as this strategy comes into action when there is any possibility of any cyber-attack is encountered. This action reduces the probability of system failure.
Recovery:
- This strategy is used when system has already taken place and only the critical services of the system are to be restored. With the use of this strategy the faith of the users can be maintained.
Reinstatement:
- This is the final activity that is implemented when the services of any failed system have been recovered and the system is performing all its activities in a normal condition.
Want to see more full solutions like this?
Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
How does the examination of a system provide challenges and how may they be overcome?
It is possible that the findings of a literature review will be included into the strategy that is currently being used to construct a step-by-step plan for an information system.
To what extent should the effectiveness and efficiency of interpersonal skills be assessed throughout the course of a training event?
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- A safety-critical system is one whose failure or misuse may cause human injury or death. Given that an EHR system can be considered to be such a system, which tasks associated with software implementation deserve special attention?arrow_forwardWhat are the most critical aspects of system resiliency?arrow_forwardThroughout the analytic process, three approaches to analyzing system needs were compared: a traditional approach, a current methodology, and a radical strategy. You've weighed several other strategies. When, in your opinion, would each tactic be most beneficial, and what are the drawbacks of each method?arrow_forward
- When it comes to the deployment, maintenance, and security of information systems, traditional SDLC should be compared to Agile development.arrow_forwardDistinguish between preventive maintenance and perfective maintenance in the context of an information system project.arrow_forwardMethods of analyzing systems, both old and new, are analyzed and compared in terms of their effectiveness in determining what features the systems must have. Is there ever a time when one of the assessed methods would be better than another, and what are the drawbacks to those methods?arrow_forward
- What are some common challenges and limitations associated with prototyping systems, and how can they be mitigated?arrow_forwardHow should long-term strategies for the establishment of legacy systems be formulated? When would it be more cost-effective to replace a component of the system rather than just keeping it up to date?arrow_forward1. The simplicity of using the system is one of the key features that developers should consider when developing the proposed E-Counselling System. What is the best process model to adopt in building the system? Justify your answer. 1. Suppose that you have been assigned to develop the proposed E-Counselling System and deliver it to the Department of Academic Advising in increments and in the shortest possible time. What is the best process model you should adopt in building the system? Justify your answer.arrow_forward
- Explain the concept of the V-Model in system development, and outline the key phases and activities involved in this approach.arrow_forwardIs the term "interdependence" distinct from other phrases used to describe system concepts? If yes, how does it vary from other terms?arrow_forwardThree ways for assessing system demands were compared throughout the analysis process: one classic approach, one modern methodology, and one radical strategy. You've compared a lot of various approaches. When do you believe each strategy would be most effective, and what are the disadvantages of each method?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning