Research Article

System Health Monitoring Using a Novel Method: Security Unified Process

Table 2

Activities of the inception phase.

DisciplineWorkflowActivity

Business ModelingAssess Business StatusIdentify Organization Security Vision-Identify Organization Security Mission-Identify Organization Security Strategy-Identify Organization Security Policy-Identify Organization Security Value
Identify Business ProcessesIdentify Business Structure-Identify Business Process-Identify Internal Rule-Identify External Rule-Identify Partner-Identify Cooperator
Identify Roles and ResponsibilitiesIdentify Human-Identify Role

AssetIdentify Human AssetIdentify Human
Identify Logical AssetIdentify Organization Data-Identify Personal Data-Identify Organization Software-Identify Country Software-Identify Foreign Software-Identify Platform-Identify Network Services-Identify Network Design-Identify Protocol-Identify Communication Services
Identify Physical AssetIdentify Media-Identify Storages-Identify Organization Map and Position-Identify Organization Hardware Components (Printer, Scanner, Fax, Modem, Antenna, Receiver, Sender, Camera, Fire Control, Access Control, Server Room, Server, Earthing Hole, Manhole, Duct, Riser, UPS, Mobile Computer, PC, USB, CD/DVD Writer, CD/DVD Reader, Flash Reader, FDD, Firewall, IDS, Switch, Router,…)

Security PolicyIndicate team membersEstablish Management Team

ImplementationIndicate Scope of ImplementationIndicate Scope of Implementation
Indicate Team MembersEstablish Management Team-Establish Executive Team-Establish Advisor team
Indicate Security ToolsIdentify Organization Current Tools-Identify Security Tools-Identify Permitted tools-Indicate Buy Requirements

Configuration and Change ManagementPlan Project Configuration and Change ControlEstablish Configuration Management Policies-Establish Change Control Process
Create Project Configuration Management EnvironmentSet up Configuration Management Environment

Project ManagementConceive New ProjectInitiate Project-Develop Business Case-Identify and Assess Project Risks
Create Security PlanDefine Project Organization and Staffing-Define Monitoring and Control Processes-Plan Phases and Iterations-Make Security Development Plan
Monitor and Control ProjectMonitor Project Status-Schedule and Assign Work-Report Status-Handle Exceptions and Problems
Manage IterationAcquire Staff-Initiate Iteration-Assess Iteration
Evaluate Project Scope and RiskIdentify and Assess Risks-Develop Business Case
Close-Out PhasePrepare for Phase Close-Out
Plan for Next IterationDevelop Iteration Plan-Develop Business Case