Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.

QUESTION

Exercise One Project Setup The purpose of Secure Acquisition is to identify and mitigate any risks in the ICT acquisition/ supply chain. Please...

Exercise One Project Setup

The purpose of Secure Acquisition is to identify and mitigate any risks in the ICT acquisition/ supply chain. Please prepare response to the following items:

For this first exercise you will define the potential functions required as well as who will supply them. You will take the following steps:

1.     Identify a process at Wild Blue Yonder Technologies that you intend to support by a software application - this should include a scope, business case and assurance case statement

2.     Define top-level functions required to carry out the desired process - these must be coherent (e.g., logically related and complete set of activities)

3.     Decompose the top level functions into a second level of component functions

4.     Decompose the second level functions into a third level of component functions (e.g., formulate a component tree)

5.     Assign a (imaginary) supplier for each component at all tiers - these will be assumed to be subcontracted relationships (e.g., the work will be done by a subcontractor directly employed by the higher level entity)

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question