Module 3
Module 3
Module 3
Module - 3
1
Learning Objectives
2
Chapter 1
Project Management for SDLC
3
Introduction
4
Capability Maturity Model Integration (CMMI)
5
Key Concepts of Project Management
• Project Initiation
• Project Planning
• Project Execution
• Project Controlling and Monitoring
• Project Closing
6
Program and Project Management and
Organization
• Portfolio/Program Management
• Program/Project Management Organization Forms
7
Project Initiation
• Project Management Methodology
• Project Context and Environment
• Project Communication and Culture
• Project Objectives
• Project Management Practices
8
Project Planning
Project Controlling
• Management of Scope
• Resource Management
• Project Risk Management Standards and Methods
o PMBOK of PMI
o ISO/IEC 25010:2011
o ISO/IEC 25012:2008
o ISO/IEC 25023:2016
9
Project Risk Management Standards and
Methods
Project Planning Phase
• Plan Risk
• Identify Risk,
• Qualitative Analyses of Risks
• Quantitative Analysis of Risks
• Plan Risk Response
10
Project Risk Management Standards and
Methods
11
Project Closing
• Project deliverables are completed and are ready to be
implemented
• Project is suffering from Risk Materialization and has to be
terminated
12
Roles and responsibilities
Steering Committee Technology Specialist
Project Sponsor Systems Analyst
Project Manager Programmers/Developers
Senior Management Testers
Business Management Documentation Specialist
Systems Development Project Database Administrator (DBA)
Team
Business Function Data Administrator (DA)
Representatives/Domain
Specialists
Security Officer User Manager
Quality Assurance (QA) IS Auditor
13
SDLC Project Management Techniques and
Tools
14
Project Controlling Tools and Techniques
15
Summary
16
Practice Questions
17
1. Who among the following is responsible for ongoing
facilitation of a SDLC project?
A. Project Sponsor
B. Project Manager
C. Steering Committee
D. Board of Directors
18
2. A Multi-National organization has decided to
implement an ERP solution across all geographical
locations.The organization shall initiate a:
A. Project
B. Program
C. Portfolio
D. Feasibility study
21
5. Which of the following tools and techniques primarily
help in improving productivity of SDLC project team
members?
A. Use of Standard Methodology
B. Software Sizing using FPA
C. Developers’ Workbench
D. Appropriate HR Policies
23
7. A Project Manager's main responsibility in a project
meant to create a product is:
A. Ensuring it is high grade
B. To pack exciting features in the product
C. Ensuring it is high quality
D. Creating a product within allocated cost and schedule
24
8. The Project Manager should be able to fulfill the
role of:
A. An Integrator
B. A Functional Manager
C. A Line Manager
D. A Sponsor
25
9. The most successful Project Manager usually:
A. Works his/her way up from Assistants in the project office to
full-fledged Project Managers, supplementing that experience
with formal education.
B. Comes right from Harvard's MBA program into managing
very large projects.
C. Are theTechnical Experts.
D. Have considerable experience as a Functional Manager before
moving into the Project Management arena.
26
Chapter 2
SDLC – Need, Benefits and Phases
27
Learning Objectives
• Traditional SDLC phases and overview of the main activities;
• Additional phases due to availability of outsourcing and
generic customizable software; and
• Steps added in different phases due to security requirements
(Secure SDLC or SSDLC).
28
SDLC
• Relevance of SDLC for Business Process Automation
• Need for SDLC
• Benefits of SDLC
29
Phases of SDLC
• Phase 1 – Feasibility Study – Gap Analysis
• Phase 2 – Requirement Analysis
• Phase 3a – System Analysis
• Phase 3b – System Design
• Phase 4 – Development
• Phase 5 – Testing
• Phase 6 – Implementation
• Phase 7 – Maintenance
30
Types of SDLC Model
• Waterfall Model
• Incremental Model
• Software Engineering and Reverse Engineering
• Object Oriented Software Development
• Component Based Development
• Web-Based Application Development
31
New Development Iterative Model
• Prototyping Methodology
• Spiral Model
• Rapid Application Development
• Agile Software Development Methodology
32
• DevOps: integration of development and
operations processes
33
Summary
34
Practice Questions
35
1. SDLC primarily refers to the process of:
A. Developing IT based solution to improve business service
delivery.
B. Acquiring upgraded version of hardware for existing
applications.
C. Redesigning network infrastructure as per service provider’s
needs.
D. Understanding expectations of business managers from
technology.
36
2. Organizations should adopt programming/coding
standards mainly because, it:
A. Is a requirement for programming using High Level
Languages.
B. Helps in maintaining and updating System Documentation.
C. Is required for Security and Quality Assurance function of
SDLC.
D. Has been globally accepted practice by large organizations.
39
5. IS Auditor has been part of SDLC project team. Which
of the following situation does not prevent IS Auditor
from performing post implementation review? The IS
Auditor has:
A. Designed the Security Controls.
B. Implemented Security Controls.
C. Selected Security Controls.
D. Developed Integrated Test facility.
42
8. Which of the following is the primary reason for
organization to outsource the SDLC project? Non-
availability of:
A. Skilled Resources
B. Budgetary Approvals
C. Security Processes
D. Infrastructure
43
9. Which of the following is an example of addressing
social feasibility issue in SDLC project?
A. Organization decides to use existing infrastructure.
B. Beta version of the application is made available to users.
C. Configuration of purchased software requires more cost.
D. Allowing employees to access social media sites.
44
10. Which of the following is not an indicator to assess
benefit realization for internal application software
developed in-house?
A. Increase in number of customers because of new application.
B. Decrease in audit findings related to regulatory non-
compliance.
C. Reduced number of virus attacks after implementing new
software.
D. Increase in productivity of employees after implementation.
45
Chapter 3
Software Testing and Implementation
46
Importance of Software Testing
47
Comparison of Testing Methods
Black-Box Testing Grey-Box Testing White-Box Testing
No Knowledge of Limited Knowledge of Complete Knowledge
internal workings internal workings of internal workings
Closed-Box, Data Translucent Testing Clear-Box, Structural
Driven or Functional or Code-based testing
testing
Performed by end Performed by end Performed by testers
users, testers and users, testers and and developers
developers developers
Based on external basis of high-level Tester can design test
expectations database diagrams and on the basis of internal
data flow diagrams and external working
exhaustive and the least Partly time-consuming The most exhaustive
time-consuming and exhaustive and time-consuming 48
Levels of Testing
• Functional Testing
• Non-Functional Testing
49
Types of Software Testing
Unit Testing
• Functional Tests
o Positive Test
o Negative Test
• Performance Test
• Stress Test
• Structural Test
• Parallel Test
50
Types of Software Testing (Contd…)
• Static Testing
o Desk Check
o Structured Walk-through
o Code Inspection
• Load Testing
• Usability Testing
• Portability Testing
• Integration Testing
o Bottom-up Integration
o Top-down Integration
51
Types of Software Testing (Contd…)
• Regression Testing
• System Testing
o Recovery Testing
o Security Testing
o Stress or Volume Testing
o Performance Testing
52
Other Types of Software Testing
• Alpha Testing
• Beta Testing
• Automated Testing
• Integrated Testing
• Accreditation of Software
• Security Testing (Application scan or Penetration
testing)
• Final testing
• Quality Assurance Testing
• User Acceptance Testing
53
Implementation Strategies
• Cut-off or Direct Implementation / Abrupt Change-Over
• Phased Changeover
• Pilot Changeover
• Parallel Changeover
54
Preparing for Implementation
• Site preparation and hardware installation
• Conversion of data to the new system files;
• Training of end users;
• Completion of user documentation;
• System changeover
• Post implementation review and evaluation
55
Conversion
• Data Conversion
• Procedure Conversion
• System Conversion
• Scheduling Personnel and Equipment
56
Change Management Process
• Emergency Changes
• Implementing Changes into Production
• Segregation of Duties
• Configuration Management
57
Summary
58
Practice Questions
59
1. Which of the following is main reason to perform
User Acceptance Test (UAT)?
A. To train and educate users on features of new solution.
B. To confirm from users that solution meets requirements.
C. To complete formality of sign-off to mark end of project.
D. To finalize the implementation plan for new IT solution.
62
4. A tester is executing a test to evaluate that it complies
with the user requirement that a certain field be
populated by using a dropdown box containing a list of
values.Tester is performing __________
A. White-Box Testing
B. Black-Box Testing
C. Load Testing
D. RegressionTesting
68
B is the correct answer.
Portability Testing shows the ease with which a computer software
component or application can be moved from one environment to
another, e.g. moving of any application from Windows XP to Windows 7.
Option A Interoperability testing checks whether software can inter-
operate with other software component, softwares or systems. Option C
Usability Testing, is a non-functional testing technique that is a measure
of how easily the system can be used by end users. Option D
Performance Testing is the process of determining the speed,
responsiveness and stability of a computer, network, software program
or device under a workload.
69
10. Boundary value analysis belongs to?
A. White Box Testing
B. Black Box testing
C. White Box & Black Box testing
D. None of the above
70
Chapter 4
Application Controls
71
Application Control
• Logical access controls
• Data entry/field validations
• Business rules
• Field entries being enforced based on predefined values
• Work flow rules
• Work steps being enforced based on predefined status
transitions Reconciliations
• Review and follow-up of application-generated exception
reports
• Automated activity logs
• Automated calculations
• Management and audit trails
73
Application Control Objectives
74
• Designs and Implementation of
Application Controls
75
Business Processes and Application Controls
76
Business Risks and Information Processing
• Incomplete and/or inaccurate information
processing
• Invalid or unauthorized transactions being
processed
• Unauthorized changes to standing data
• Bypasses, overrides, manual entries that circumvent
controls
• Inefficiencies
• Loss of confidentiality
• Unavailability of information
• Lack of integrity
77
Application Controls Assurance
78
Assurance over Application Controls
Materiality
• Factor in determining the amount of evidence
necessary to support the assurance provider’s
conclusion
• Measure of the significance of a finding
relative to the subject matter
Audit risk
• Detection Risk
• Inherent Risk
• Control Risk
79
Summary
80
Practice Questions
81
1. A company’s labour distribution report requires
extensive corrections each month because of labour
hours charged to inactive jobs. Which of the following
data processing input controls appears to be missing?
A. CompletenessTest
B. Valid Code Check
C. LimitTest
D. ControlTotal
82
2. A customer inadvertently orders part number
1234-8 instead of 1243-8. Which of the following
controls would detect this error during processing?
A. Hash Total
B. Check Digit
C. Limit Check
D. Financial Batch Total
83
3. Which of the following are not Application
Controls?
A. Numerical Sequence Check
B. Access Security
C. Manual follow-up of Exception Reports
D. Chart of Accounts
84
4. Which of the following ensures completeness and
accuracy of accumulated data?
A. Processing Control Procedures
B. Data File Control Procedures
C. Output Controls
D. Application Controls
87
Thank You
88