Essay: Vivint Home Security System

Pages: 5 (1496 words)  ·  Bibliography Sources: 5  ·  Level: College Senior  ·  Topic: Business - Management  ·  Buy This Paper

SAMPLE EXCERPT:

[. . .] The relevant authorities are, therefore, expected to come up with meaningful responses in the case of incidents that may result to unexpected losses and other negative outcomes. The real design of what the security system will appear like is developed in this phase, giving the developers a clear view of what is expected at the end of the project. There are several factors considered in this stage, and they include; a strategy for continuity planning, where Vivint home has to ensure they come up with a strategy that will cover the security system, in case of any barriers and inconsistencies in their system. Secondly, an incident response needs to be designed, so that the hosts of the system are aware of the steps to take, in case the system is attacked in any way whatsoever. Thirdly, a disaster recovery measure ought to be designed, so that Vivint home will actually be able to recover any data stored in their systems immediately before an incident.

In the physical design, there is evaluation of blueprints in the logical phase, and security measures are in place to support any technological developments of the system. The physical design is submitted to the management, who either sponsors its implementation or delivers it to other sponsors, in case they are not in a position to fund the implementation phase. Vivint home management has the opportunity to scrutinize and approve the project, so that it is ready for implementation (Shelly & Vermaat, 2010).

The implementation phase

In the implementation phase, all the strategies, designs, and applications are brought to reality. The solutions for the security system are acquired, through either purchase or development, and then they are tested and implemented. After implementation of the system according to the design, it is tested for a second time, to ensure efficiency. Skilled individuals and implementers also evaluate issues related to personnel at this late stage, and specific training is provided to the users (Vivint home), together with other educational programs that will assist them in the use of the new security system. After the implementation stage, the systems are forwarded to upper management to be approved, so that the system is compliant to the legal provisions of the firm and the state offices too. In summation, the implementation process entails developing or buying the software to be used, ordering for components, integrating information into the system, training users, updating the feasibility checks and testing the system (Barry, Conboy & Lang, 2008).

Systems support and security phase

This is the last phase of systems development, and is usually concerned with the management of the already existing system. Many a times, the maintenance of the systems could be expensive, making it very important to consider the inputs even before planning for and implementing the systems. This phase is characterized by constant modifications to suit the current needs of Vivint home, frequent monitoring and testing of the systems to avoid any breakdowns, constant updating of the system, and repairs when necessary. It is also advisable that maintenance is at close intervals, to avoid more expenses that may be as a result to more severe breakages of systems (Whitman & Mattord, 2011).

Conclusion

In summary, the five phases of developing a security system need to be followed strictly to ensure an effective system. For the planning stage, outlines of the system need to be assessed and goals set. There has also to be an evaluation of existing resources and an analysis of the organizations feasibility. In the analysis phase, a plan has to be developed that will be used to realize the objectives of the project. Solutions are recommended in the analysis stage. At the design stage, the real structures are designed so that they are implemented in the implementation phase. The implementation phase involves the application of what has been planned for and designed in the preceding phases. System support ensures maintenance of the systems, to reduce the expenses used on repairs and replacements.

References

Crabtree, C. (2007). Presenting a Conceptual Model for the Systems Development Life Cycle. New York: ProQuest Publishers.

Whitman, M.E. & Mattord, J.H. (2011). Principles of Information Security. New York: Cengage Learning Publishers.

Rivard, S. & Aubert, B.A. (2007). Information Technology Outsourcing. New York: Sharpe Publishers

Shelly, G. & Vermaat, J. (2010). Discovering Computers: Living in A Digital World: Fundamentals. New York: Cengage Learning Publishers.

Barry, C., Conboy, K. & Lang, M. (2008). Information System Development: Challenges in Practice, Theory and… [END OF PREVIEW]

Four Different Ordering Options:

?
Which Option Should I Choose?

1.  Buy the full, 5-page paper:  $28.88

or

2.  Buy + remove from all search engines
(Google, Yahoo, Bing) for 30 days:  $38.88

or

3.  Access all 175,000+ papers:  $41.97/mo

(Already a member?  Click to download the paper!)

or

4.  Let us write a NEW paper for you!

Ask Us to Write a New Paper
Most popular!

Comparing and Contrasting Our Social Security System With That of Canada Research Paper


Security Overview Businesses Today Research Paper


Security Policy Term Paper


Home Security Market in the U.S.A., Australia Term Paper


Designing a Procedural Security System-Wk4-Writ Oakland International Research Paper


View 999 other related papers  >>

Cite This Essay:

APA Format

Vivint Home Security System.  (2013, May 6).  Retrieved May 25, 2019, from https://www.essaytown.com/subjects/paper/vivint-home-security-system/8111664

MLA Format

"Vivint Home Security System."  6 May 2013.  Web.  25 May 2019. <https://www.essaytown.com/subjects/paper/vivint-home-security-system/8111664>.

Chicago Format

"Vivint Home Security System."  Essaytown.com.  May 6, 2013.  Accessed May 25, 2019.
https://www.essaytown.com/subjects/paper/vivint-home-security-system/8111664.