Vivint Home Security System

Security Systems Development Life Cycle

Don't use plagiarized sources. Get Your Custom Essay on
Security Systems Development Life Cycle
Just from $13/Page
Order Essay

In the system development cycle, are accountable and they are all integrated into phases. As mentioned in the abstract earlier, five stages/phases are used as guidelines when developing the security system, or any other system. In the planning system, the project is reviewed to realize its applicability. In the case of Vivint home security system, the proposal of the system development has to be reviewed by experts, who go ahead to prioritize the requests brought forward in the project. In addition, in the same phase, resources are allocated and an able team is selected to oversee the entire development processes. Details of the planning phase are discussed in the proceeding paragraphs.

At the analysis stage, the team selected and responsible for the systems development conducts a preliminary analysis/investigation, and conducts a performance analysis that includes analyzing any system that is currently available, if any, determine the requirements of the user, who in this case happen to be the Vivint home. During this stage, different solutions are recommended, so that the systems development team has a vivid idea of what is expected. At the design phase, the necessary software and hardware are acquired according to specifics, and the details of what the system will entail are developed.

The fourth stage is the implementation stage, where the real development of the system is actualized, the system is installed and a test is run to ensure there is effective and efficient system performance. The older system, if necessary, is abandoned and the new system is adopted. In the last phase, that involves support of the system and its security, a post-implementation review is conducted, all the errors and adjustments are done, enhancements are integrated into the system, and there is strict monitoring of the system’s performance (Crabtree, 2007).

Planning phase

This phase is constituted of investigations concerning the project or system. The top management is involved in the phase. The upper management of Vivint home will be expected to dictate the entire process of development and ensure there are objectives and expected outcomes. They should ensure objectives sand goals are in place and more importantly, a realistic budget will be drafted which includes all the inputs required for the completion of developing the security system. Both software and hardware are mandatory for the development of an efficient home security system, and should be included in the budget.

A program policy may be adopted in the planning stage, which will ensure those responsible for the system’s development; managers, skilled staff, contractors and other employees, are well organized with different personnel having . At this very early phase, and objectives are set, and any potential constraints are analyzed. For our case, it is necessary that a feasibility test be done for Vivint Home, to ensure it has the potential in terms of resources and other commitments that are necessary for the completion of the security systems development. After all these procedures are completed, then the development of the system is ready to go for the analysis phase (Whitman & Mattord, 2011).

Analysis phase

In the analysis phase, there is intensive analysis of the systems development requirements. In this phase, specifications are analyzed which include all the necessities required for the completion of the system. For the case of Vivint home security system, both the hardware and software will be required, not forgetting the manpower the home needs to invest in. It is necessary that all the detailed be documented to avoid any ambiguities in future. Documentations of the full plans is also mandatory, so that the parties involved in the systems development can refer to the documents, and also avoid neglecting certain specific processes and steps.

The analysis team, which includes both the management and the workforce, has to meet according to their convenience, to conceptualize and discuss any mechanisms that could be relevant in developing the security system for Vivint home. Cooperation strategies need to be adopted, that will assist to create a link between the management and workforce. There has to be mutual agreement between the two parties, to ensure transparency through the development processes, and integrate effective communication during the development of the system (Rivard & Aubert, 2007).

Design phase

At this stage, the logics of the security system are created so that development is actualized. There is creation of blueprints for the system, and all the key policies and strategies are designed which usually affect the other following phases. The relevant authorities are, therefore, expected to come up with meaningful responses in the case of incidents that may result to unexpected losses and other negative outcomes. The real design of what the security system will appear like is developed in this phase, giving the developers a clear view of what is expected at the end of the project. There are several factors considered in this stage, and they include; a strategy for continuity planning, where Vivint home has to ensure they come up with a strategy that will cover the security system, in case of any barriers and inconsistencies in their system. Secondly, an incident response needs to be designed, so that the hosts of the system are aware of the steps to take, in case the system is attacked in any way whatsoever. Thirdly, a ought to be designed, so that Vivint home will actually be able to recover any data stored in their systems immediately before an incident.

In the physical design, there is evaluation of blueprints in the logical phase, and security measures are in place to support any technological developments of the system. The physical design is submitted to the management, who either sponsors its implementation or delivers it to other sponsors, in case they are not in a position to fund the implementation phase. Vivint home management has the opportunity to scrutinize and approve the project, so that it is ready for implementation (Shelly & Vermaat, 2010).

The implementation phase

In the implementation phase, all the strategies, designs, and applications are brought to reality. The solutions for the security system are acquired, through either purchase or development, and then they are tested and implemented. After implementation of the system according to the design, it is tested for a second time, to ensure efficiency. Skilled individuals and implementers also to personnel at this late stage, and specific training is provided to the users (Vivint home), together with other educational programs that will assist them in the use of the new security system. After the implementation stage, the systems are forwarded to upper management to be approved, so that the system is compliant to the legal provisions of the firm and the state offices too. In summation, the implementation process entails developing or buying the software to be used, ordering for components, integrating information into the system, training users, updating the feasibility checks and testing the system (Barry, Conboy & Lang, 2008).

Systems support and security phase

This is the last phase of systems development, and is usually concerned with the management of the already existing system. Many a times, the maintenance of the systems could be expensive, making it very important to consider the inputs even before planning for and implementing the systems. This phase is characterized by constant modifications to suit the current needs of Vivint home, frequent monitoring and testing of the systems to avoid any breakdowns, constant updating of the system, and repairs when necessary. It is also advisable that maintenance is at close intervals, to avoid more expenses that may be as a result to more severe breakages of systems (Whitman & Mattord, 2011).

Conclusion

In summary, the five phases of developing a security system need to be followed strictly to ensure an effective system. For the planning stage, outlines of the system need to be assessed and goals set. There has also to be an evaluation of existing resources and an analysis of the organizations feasibility. In the analysis phase, a plan has to be developed that will be used to realize the objectives of the project. Solutions are recommended in the analysis stage. At the design stage, the real structures are designed so that they are implemented in the implementation phase. The implementation phase involves the application of what has been planned for and designed in the preceding phases. System support ensures maintenance of the systems, to reduce the expenses used on repairs and replacements.

References

Crabtree, C. (2007). Presenting a Conceptual Model for the Systems Development Life Cycle. New York: ProQuest Publishers.

Whitman, M.E. & Mattord, J.H. (2011). Principles of Information Security. New York: Cengage Learning Publishers.

Rivard, S. & Aubert, B.A. (2007). Information Technology Outsourcing. New York: Sharpe Publishers

Shelly, G. & Vermaat, J. (2010). Discovering Computers: Living in A Digital World: Fundamentals. New York: Cengage Learning Publishers.

Barry, C., Conboy, K. & Lang, M. (2008). Information System Development: Challenges in Practice, Theory and Education, Volume 1. New York: Springer Publishers.