ix TABLE OF CONTENTS CHAPTER 1 2 TITTLE PAGE DECLARATION ii DEDICATION iii ACKNOWLEDGEMENTS iv ABSTRACT v ABSTRAK vi TABLE OF CONTENTS vii LIST OF TABLES xi LIST OF FIGURES xii LIST OF APPENDICES xiv INTRODUCTION 1.1 Background of Study 1 1.2 Statement of the Problem 2 1.3 Purposes of Study 3 1.4 Objectives of Study 4 1.5 Scope of the Study 4 1.6 Research Question 4 1.7 Significance of the Study 5 1.8 Organization of Report 5 LITERATURE REVIEW 2.1 Introduction 6 2.2 A brief description of the maintenance phase 6 2.3 Categories of maintenance 8 2.4 Maintenance of activities 9 x 2.4.1 2.5 Unique activities A brief description of risk analysis 11 2.5.1 Quantitative and Qualitative Risk Analysis 12 2.5.2 Mathematically Risk Exposure 13 2.6 Basic risk analysis approach 13 2.7 Need for maintenance 14 2.8 Maintenance process models 16 2.8.1 Quick fix model 17 2.8.2 The reuse oriented model 17 2.9 Retire software and migrate legacy software 18 2.9.1 20 Example of a migration project 2.10 Gathering requirements 21 2.10.1 Functional requirements 21 2.10.2 Technical requirements 21 2.11 Migration process 22 2.12 Methods of risk analysis 23 2.12.1 OCTAVE 24 2.12.2 CORAS 27 2.12.3 CRAMM 28 2.12.4 VECTOR Matrix method 30 2.13 Advantage and disadvantage of risk analysis Methods 3 10 33 METHODOLOGY 3.1 Introduction 38 3.2 Operational Framework 39 3.3 Research Problem Formulation 41 3.4 Proposed and Implement Hybrid RMO risk analysis Method for migration legacy software 42 3.4.1 Risk analysis method proposed 43 3.4.2 Steps of propose method 43 3.5 Evaluation of proposed method 46 3.6 System Hardware and Software Requirement 47 3.7 Summary 47 xi 4 METHOD DESIGN 4.1 Introduction 48 4.2 Process analysis 48 4.2.1 Which software should be migrate 49 4.2.2 Major phases in migration process 50 4.3 51 4.3.1 51 VECTOR Matrix Method 4.3.2 OCTAVE 52 Enhancement of VECTOR method by adapting OCTAVE method 55 4.4.1 VECTOR Matrix 57 4.4.2 Adapting OCTAVE Method 58 Enhancement of VECTOR method by adapting OCTAVE table 59 4.6 Calculate value for each risk 61 4.7 Summary 63 4.4 4.5 5 Existing risk analysis methods DESIGN IMPLEMENTATION AND RESULT EVALUATION 5.1 Introduction 64 5.2 Design Implementation 64 5.2.1 VECTOR matrix 65 5.2.1.1 Calculate the value of each risk by VECTOR method 5.2.2 Adapting OCTAVE method 5.2.2.1 Calculate the value of each risk by OCTAVE method 6 66 68 70 5.3 Comparing the value of risk using EVAO method 71 5.4 Response to risk 74 5.5 Summary 79 DISCUSSION AND CONCLUSION 6.1 Introduction: 80 6.2 Achievements 80 6.3 Constraints and Challenges 81 6.4 Aspirations 81 xii 6.5 Chapter Summary 82 REFERENCE 83 APPENDIX A 85 xiii LIST OF TABLES TABLE NO. TITTLE PAGE 2.1 Strengths and weakness of 4 methods 35 4.1 Some possible risks for phases of migration process 56 4.2 VECTOR Matrix table 57 4.3 Adopting OCTAVE Method 58 4.4 Enhancement of VECTOR method by adapting OCTAVE table 60 Enhancement of VECTOR method by adapting OCTAVE table 62 5.1 Result of sum in VECTOR matrix 65 5.2 Risk value in VECTOR matrix 67 5.3 Result of sum in adapting OCTAVE method 69 5.4 Risk value in adapting OCTAVE method 70 5.5 Enhancement of VECTOR method by adapting OCTAVE table 72 5.6 Final result for different answer in two methods 74 5.7 Header of change GUI 75 5.8 Threat of change GUI 75 5.9 Risk Reduction for change GUI 76 5.10 Header of Poor understanding of legacy system 77 5.11 Threat of Poor understanding of legacy system 77 5.12 Risk Reduction for of Poor understanding of legacy system 78 4.5 xiv LIST OF FIGURES FIGURE NO. TITTLE PAGE 1.1 The percentage of costs in each phase of software life cycle 2 2.1 Importance of security maintenance phase in Comparison with the software development life cycle 7 Distribution of maintenance effort 9 2.3 ISO/IEC Maintenance Process Activities 16 2.4 The Quick fix model 17 2.5 The Reuse model 18 2.6 Major Activities in legacy system migration 23 2.7 Comparisons of different methodologies 23 2.8 OCTAVE mentions compared to other methodologies 24 2.9 OCTAVE method 25 2.10 Phases of OCTAVE method 27 2.11 CRAMM method 29 2.12 Risk assessment of information security in bank developed using VECTOR method 32 3.1 Operational Framework 41 3.2 Problem Formulation 42 3.3 Analysis and Propose 43 3.4 Legacy System Categories 45 3.5 Possible risks in migration phases 47 3.6 Evaluation of method 48 4.1 Applications Categories 51 4.2 Major Activities in legacy system migration 53 4.3 VECTOR matrix 54 2.2 xv LIST OF APPENDICES APPENDIX. A TITTLE EVAO table PAGE