ASSIGNMENT 2ITECH 2305Saurav Dhakal | 30379328
PAGE 1Table of ContentsExecutive Summary...................................................................................................................3Link to the News.......................................................................................................................3Analysis of the current situation..............................................................................................3Key Processes in Optus.........................................................................................................3Use Case Diagram.................................................................................................................4Roles Likely to exist in Optus...............................................................................................6Technologies in use...............................................................................................................6Current Situation......................................................................................................................6Key Stakeholders.......................................................................................................................6Elicitation to Identify Requirements........................................................................................7General Requirement............................................................................................................7Technical Requirements.......................................................................................................7Functional Requirements.....................................................................................................7Non-Functional Requirement...............................................................................................7Evaluation Criteria....................................................................................................................8Solution Design.........................................................................................................................9First solution Design.............................................................................................................9Required Element..............................................................................................................9Implementation Process...................................................................................................9Solution Benefits...............................................................................................................9Second Solution Design........................................................................................................9Required Element..............................................................................................................9Implementation Process.......................................................................................................9Solutions Benefits............................................................................................................10Value Analysis.........................................................................................................................10First Solution Value Analysis..............................................................................................10Second Solution Analysis....................................................................................................10Ideal Solution...................................................................................................................10References................................................................................................................................11
PAGE 2
PAGE 3Executive SummaryThe company Optus had a huge cyber-attack that breached the information about theirpast and present customers. The report consists of a proper analysis of this issue givingout the expected solution for the issue. The key aspect of the solution for the issueinvolves backing up the data to secure it more for the customer to stay happy and safe.Link to the News-security-tips/101466504Analysis of the current situationOptus noticed unusual activity in their system and when checked found that they were atarget of a cyber attack that led to the breaching of all past and future customers. Optushowever said that their internet services and mobile serviceshaven’tbeen affected by theattack. All the customers on the Optus network (past or present) are to be served with thisissue as the information in the system of Optus was compromised. (htt1)KEY PROCESSES IN OPTUSThe key processes that Optus already has in place are:1.Updating their devices to the newest software with a proper security update tohave less access to their system virtually.2.Optus is in plans to protect their system and information in their system with atwo-factor authentication which provides proper and secured access to theinformation stored.
PAGE 4USE CASE DIAGRAM1.Updating their devices to the newest software with a proper security update tohave less access to their system virtually.
Upload your study docs or become a
Course Hero member to access this document
Upload your study docs or become a
Course Hero member to access this document
End of preview. Want to read all 12 pages?
Upload your study docs or become a
Course Hero member to access this document
Term
Three
Professor
NoProfessor
Tags
Optus