Question

In: Computer Science

The Delta Insurance Company is having a policyholder subsystem which has started giving trouble. Over the...

The Delta Insurance Company is having a policyholder subsystem which has started giving trouble. Over the years, the application evolved from using fixed length, multi-record type files to using a hierarchic database to using a relational database. The programs did not change much, but the data structures changed radically. Program code was patched to provide for the new data structure. The amount of people-time allocated to policyholder maintenance grew 15% per year over the last five years and is now costing as much per year as it did in 1980 to develop the original application. No one ever considered reevaluating the subsystem for redevelopment, but they would like to now. Upon inspection, the documentation was found to be up-to-date and includes flow charts and data flow diagrams. There are no current diagrams of the data structure. There are also no historical files of decisions or of changes. Apply the concepts of change management to discuss how should the company get this application in order? What type( s) of maintenance should they consider for the next set of changes?

Solutions

Expert Solution

How to get back application in order? What type( s) of maintenance should they consider for the next set of changes?

  • To get the application back in order, first of all, we would require to hold back all the available code and start re-evaluation of the whole codes of the application and record back all the things that are noted to be useful for reinstating the application.
  • Next step would be to gather all the information from the code and all the things related to the application and try to build up the data structures and all the use case diagrams using all these information putting up a good workforce on this work.
  • Making the application back would be tough as people would have to understand the database and its interaction with the application along with the interference of multiple modules of the applications and as mentioned above in the scenario that the application was being developed during the old time the technology used is also outdated.
  • Hence, it will become tougher for the developers to understand the old use of the functions and it will take time to enhance the code and to make the code as per the modern technology the developers would also have to look after the cybersecurity concepts and also enable them in the application.
  • This will be the most important step and factor, in order to reinstate the application security, will play a major role in getting the application up to date. Hence, security will play a major role in the maintenance and next set of changes in the applications.
  • The next steps for the maintenance and development of the tools would be as follows:
    • Collecting Information:
      • The collection of information is one of the major parts that plays in the security of the organization. The URL of the target must be accessible to gain information.
      • Information caught in wrong hands can turn out to be chaos for any organization. Hence, information must always be safeguarded with levels of security.
    • Risk Profiling:
      • Checking the website for each and every type of risks/threats is a very important task and must be carried on with each and every module of the organization's availability in the internet space.
      • There must be things carried out like:
        • Automated threat scanning
        • Penetration Testing
        • Black Box Testing of the source codes
        • Assigning Risk Ratings to the Security Flaws
        • Reporting to higher Authorities
    • Updating Technology:
      • In the current world scenario, it has become very important to update the technologies that are been actively used and must be balanced accordingly.
      • The use of older versions will come with a bunch of vulnerabilities and threats along with the destruction of certain aspects of the organization.
    • Application Fingerprinting:
      • In an organization, there are certain things that must be checked for the known vulnerabilities and exposures. If there, one must always keep it the priority to overcome certain threats in order to run the organization smoothly.
      • The application fingerprinting consists of different levels of assessment. Here are some of the different scopes:
        • Defining Objectives
        • Devising Strategy to overcome threats
        • Role-Based Access Control Matrix
        • Choosing Appropriate Security Tools

Hence, these are the steps in which the reinstating of the application can be successfully carried out.


Related Solutions

An insurance company has 20, 000 policyholders. The amount claimed yearly by a policyholder has an...
An insurance company has 20, 000 policyholders. The amount claimed yearly by a policyholder has an expected value of $150 and a standard deviation of $750. Use the central limit theorem (CLT) to approximate the probability that the the total amount claimed in the coming year will be larger than 3.3 million dollars.
A fire insurance company has 3,840 policyholders. The probability that a policyholder files at least one...
A fire insurance company has 3,840 policyholders. The probability that a policyholder files at least one claim in a given year is 1/1,200. Approximate the probability that more than 6 policyholders file at least one claim in a given year.
17. Insurance is a financial contract in which the policyholder (i.e., customer) is compensated if a...
17. Insurance is a financial contract in which the policyholder (i.e., customer) is compensated if a pre-specified adverse event (e.g., accident) occurs, in exchange for premiums paid to the insurer (i.e., insurance company) by the policyholder. Consider an individual who owns a house. The value of the house is ??. When there is fire, the value of the house decreases to ??−??. The probability of fire is ??. The utility function of the house owner is ??= ln(??) where ??...
An insurance company has 10,000 automobile policy holders. The expected yearly claim per policyholder is $240,...
An insurance company has 10,000 automobile policy holders. The expected yearly claim per policyholder is $240, with a standard deviation of $800. Approximate the probability that the total yearly claims: a) exceeds $2 million b) is less than $1.5 million
A company sells life insurance policies for $550. If the policyholder dies in the next 10...
A company sells life insurance policies for $550. If the policyholder dies in the next 10 years, then the company will pay out $43,000 to the benefactor. Otherwise, the company pays out nothing. What is the expected profit per policy for the company, given that the probability of death for a policyholder in the next 10 years is 0.004? Report your answer rounded to the nearest dollar. NO CENTS.
Hello, I am having trouble getting started on my project and building these functions. How do...
Hello, I am having trouble getting started on my project and building these functions. How do I build a function that continuously adds new "slices" to the list if they are below/above the size limit? I didn't copy the entire problem, but just for reference, when the code is run it will take user input for size limit (L), time cost for a random slice(R), and time cost for an accurate slice(A). Question: In real life, a steak is a...
An auto insurance has 10,000 policyholders. Each policyholder is classi ed as (i) young or old;...
An auto insurance has 10,000 policyholders. Each policyholder is classi ed as (i) young or old; (ii) male or female; (iii) married or single. Of these policyholders, 3,000 are young, 4,600 are male, 7,000 are married. 1,320 are young males, 3,010 are married males, 1,400 are young married persons. 600 are young married males. How many of the company's policyholders are young, female, and single?   How many of the company's policyholders are unmarried males, but not young How many of...
Which of the statement is true, there can be more than one answers. Having trouble with...
Which of the statement is true, there can be more than one answers. Having trouble with these two questions. 1) A.The tibial tuberosity is found on the VENTRAL (anterior) aspect of the TIBIA bone B.The linea aspera is found on the VENTRAL (anterior) aspect of the TIBIA bone C.The intertrochanteric line is found on the VENTRAL (anterior) aspect of the FEMUR bone D.The lateral condyle is a PROXIMAL process of the TIBIA bone E.The greater trochanter is found on the...
You are using a microtome but are having trouble cutting the tissue into sections. Which troubleshooting...
You are using a microtome but are having trouble cutting the tissue into sections. Which troubleshooting strategy/strategies would you choose?
Delta Oil Company uses the successful-efforts method to account for oil exploration costs. Delta started business...
Delta Oil Company uses the successful-efforts method to account for oil exploration costs. Delta started business in 2014 and prepared the following income statements: DELTA OIL COMPANY Income Statements For the Years Ended December 31, 2014 - 2015 1 2014 2015 2 Revenue $1,000,000.00 $3,000,000.00 3 Other expenses 400,000.00 1,300,000.00 4 Exploration expenses 120,000.00 238,000.00 5 Income before income taxes $480,000.00 $1,462,000.00 6 Income tax expense (30%) 144,000.00 438,600.00 7 Net income $336,000.00 $1,023,400.00 8 Earnings per share $3.36 $10.23...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT