ix TABLE OF CONTENTS CHAPTER

advertisement
ix
TABLE OF CONTENTS
CHAPTER
1
2
TITTLE
PAGE
DECLARATION
ii
DEDICATION
iii
ACKNOWLEDGEMENTS
iv
ABSTRACT
v
ABSTRAK
vi
TABLE OF CONTENTS
vii
LIST OF TABLES
xi
LIST OF FIGURES
xii
LIST OF APPENDICES
xiv
INTRODUCTION
1.1
Background of Study
1
1.2
Statement of the Problem
2
1.3
Purposes of Study
3
1.4
Objectives of Study
4
1.5
Scope of the Study
4
1.6
Research Question
4
1.7
Significance of the Study
5
1.8
Organization of Report
5
LITERATURE REVIEW
2.1
Introduction
6
2.2
A brief description of the maintenance phase
6
2.3
Categories of maintenance
8
2.4
Maintenance of activities
9
x
2.4.1
2.5
Unique activities
A brief description of risk analysis
11
2.5.1 Quantitative and Qualitative Risk Analysis
12
2.5.2 Mathematically Risk Exposure
13
2.6
Basic risk analysis approach
13
2.7
Need for maintenance
14
2.8
Maintenance process models
16
2.8.1
Quick fix model
17
2.8.2
The reuse oriented model
17
2.9
Retire software and migrate legacy software
18
2.9.1
20
Example of a migration project
2.10 Gathering requirements
21
2.10.1 Functional requirements
21
2.10.2 Technical requirements
21
2.11 Migration process
22
2.12 Methods of risk analysis
23
2.12.1 OCTAVE
24
2.12.2 CORAS
27
2.12.3 CRAMM
28
2.12.4 VECTOR Matrix method
30
2.13 Advantage and disadvantage of risk analysis Methods
3
10
33
METHODOLOGY
3.1
Introduction
38
3.2
Operational Framework
39
3.3
Research Problem Formulation
41
3.4
Proposed and Implement Hybrid RMO risk analysis
Method for migration legacy software
42
3.4.1
Risk analysis method proposed
43
3.4.2
Steps of propose method
43
3.5
Evaluation of proposed method
46
3.6
System Hardware and Software Requirement
47
3.7
Summary
47
xi
4
METHOD DESIGN
4.1
Introduction
48
4.2
Process analysis
48
4.2.1
Which software should be migrate
49
4.2.2
Major phases in migration process
50
4.3
51
4.3.1
51
VECTOR Matrix Method
4.3.2 OCTAVE
52
Enhancement of VECTOR method by adapting
OCTAVE method
55
4.4.1 VECTOR Matrix
57
4.4.2 Adapting OCTAVE Method
58
Enhancement of VECTOR method by adapting
OCTAVE table
59
4.6
Calculate value for each risk
61
4.7
Summary
63
4.4
4.5
5
Existing risk analysis methods
DESIGN IMPLEMENTATION AND RESULT
EVALUATION
5.1
Introduction
64
5.2
Design Implementation
64
5.2.1 VECTOR matrix
65
5.2.1.1 Calculate the value of each risk by
VECTOR method
5.2.2 Adapting OCTAVE method
5.2.2.1 Calculate the value of each risk by
OCTAVE method
6
66
68
70
5.3
Comparing the value of risk using EVAO method
71
5.4
Response to risk
74
5.5
Summary
79
DISCUSSION AND CONCLUSION
6.1
Introduction:
80
6.2
Achievements
80
6.3
Constraints and Challenges
81
6.4
Aspirations
81
xii
6.5
Chapter Summary
82
REFERENCE
83
APPENDIX A
85
xiii
LIST OF TABLES
TABLE NO.
TITTLE
PAGE
‎2.1
Strengths and weakness of 4 methods
35
4.1
Some possible risks for phases of migration process
56
4.2
VECTOR Matrix table
57
‎4.3
Adopting OCTAVE Method
58
4.4
Enhancement of VECTOR method by adapting OCTAVE
table
60
Enhancement of VECTOR method by adapting OCTAVE
table
62
5.1
Result of sum in VECTOR matrix
65
5.2
Risk value in VECTOR matrix
67
5.3
Result of sum in adapting OCTAVE method
69
‎5.4
Risk value in adapting OCTAVE method
70
5.5
Enhancement of VECTOR method by adapting OCTAVE
table
72
5.6
Final result for different answer in two methods
74
5.7
Header of change GUI
75
5.8
Threat of change GUI
75
5.9
Risk Reduction for change GUI
76
5.10
Header of Poor understanding of legacy system
77
5.11
Threat of Poor understanding of legacy system
77
5.12
Risk Reduction for of Poor understanding of legacy system
78
4.5
xiv
LIST OF FIGURES
FIGURE NO.
TITTLE
PAGE
‎1.1
The percentage of costs in each phase of software
life cycle
2
‎2.1
Importance of security maintenance phase in
Comparison with the software development life cycle
7
Distribution of maintenance effort
9
‎2.3
ISO/IEC Maintenance Process Activities
16
‎2.4
The Quick fix model
17
‎2.5
The Reuse model
18
‎2.6
Major Activities in legacy system migration
23
‎2.7
Comparisons of different methodologies
23
‎2.8
OCTAVE mentions compared to other methodologies
24
‎2.9
OCTAVE method
25
‎2.10
Phases of OCTAVE method
27
‎2.11
CRAMM method
29
‎2.12
Risk assessment of information security
in bank developed using VECTOR method
32
‎3.1
Operational Framework
41
‎3.2
Problem Formulation
42
‎3.3
Analysis and Propose
43
‎3.4
Legacy System Categories
45
‎3.5
Possible risks in migration phases
47
‎3.6
Evaluation of method
48
4.1
Applications Categories
51
4.2
Major Activities in legacy system migration
53
4.3
VECTOR matrix
54
‎2.2
xv
LIST OF APPENDICES
APPENDIX.
‎A
TITTLE
EVAO table
PAGE
Download