During the initiation phase of the Loyalty Points plan, the development group must store one to one interviews with key stakeholders in a secure area. The key documents in this stage are the business requirements document, and the project charter. If the documents are in electronic setup, using a disk encryption method such as, a file encryption program is acceptable to cipher documents in the event an inside or outside intruder stole hardware at some stage in the initiation phase documentation of the loyalty points program.
In the loyalty points program development, JAD session notes between stakeholders and the progress team provided with the work breakdown structure, Data Flow Diagrams, and system flow charts are the main developments for this phase. The PM stores will use these documents in an electronic setup, using a file encryption program with username, and password combination for the laptop or desktop operating systems, which will become a defense for user authentication to obtain access to these project documents. Olzak (2012) “If the deliverables are in hard copy, having the copies locked in a file cabinet in a room with a bio-metric reader would be an ideal defense since you have a diversity of defense guarding your deliverables from inside or outside threats.”
The execution phase is the hardware, operating system and application layer of the loyalty points program system, this is the physical, and logical design from the initiation, and planning stage of the loyalty points program. The physical system which needs physical, and logical security from inside or outside intruders have charged from document storage.
The hardware using servers, personal computers, and components related to the network system is secured by the development group to draft the loyalty points system. The development group has to secure the following: Documents from every phase in the software development life cycle...