Principles of Information Security (MindTap Course List)
Principles of Information Security (MindTap Course List)
6th Edition
ISBN: 9781337102063
Author: Michael E. Whitman, Herbert J. Mattord
Publisher: Cengage Learning
bartleby

Concept explainers

Expert Solution & Answer
Book Icon
Chapter 10, Problem 18RQ

Explanation of Solution

Basic conversion strategies:

There are four basic conversion strategies which is used at what time of converting into new system. They are,

  • Direct changeover
  • Phased implementation
  • Pilot implementation
  • Parallel operations

Direct changeover:

The direct changeover is also referred as cold turkey which helps to ending the old method and staring the new method.

  • This is simple strategy that employees follow the existing procedure for one week, and then later use a new procedure.
  • Some direct changeover is simple, such as a modification that includes requiring workers to use a new password starting on an announced date.
  • Some may be complex, such as requiring the complete company to modify procedures at time of network team restricts an old firewall and starts a new one.
  • The major problem of direct changeover approach is that when new system fails or required for changes, then the system’s bugs are worked out without help of user services.
  • The new system testing in advance helps to decrease the possibility of these problems.

Phased implementation:

The phased implementation is the common conversion strategy and includes rolling out a system part over the whole organization.

  • This mean that the security group implements a small part of the new security outline, then giving chance to users to get used to it and solving the small problems as they rise...

Blurred answer
Students have asked these similar questions
Consider the following program: LOAD AC, IMMEDIATE(30)                                                     ADD AC, REGISTER(R1)                                                     STORE AC, MEMORY(20) Given that the value of R1 is 50, determine the value stored at memory address 20 after the program is executed. Provide an explanation to support your answer.
Pattern RecognitonDecision Tree please write the steps not only last answer
Pattern RecognitionPCA algorithmplease write the steps not only last answer
Knowledge Booster
Background pattern image
Computer Science
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
MIS
Computer Science
ISBN:9781337681919
Author:BIDGOLI
Publisher:Cengage
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning