0% found this document useful (0 votes)
78 views4 pages

Legacy System Reengineering Strategies

Reengineering involves restructuring or rewriting parts of a legacy system without changing its functionality. This reduces risks and costs compared to full replacement. The reengineering process includes activities like source code translation, reverse engineering, and program restructuring to improve maintainability. Defense in depth is a security strategy that uses multiple layers of defenses to minimize the impact if one defense is breached. It draws an analogy to military defenses and includes technologies, policies, and physical security measures working together. Process improvement aims to enhance processes to achieve objectives like quality, cost reduction and speed by analyzing current processes, identifying bottlenecks, training staff, and evolving improvements.

Uploaded by

Arjun Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
78 views4 pages

Legacy System Reengineering Strategies

Reengineering involves restructuring or rewriting parts of a legacy system without changing its functionality. This reduces risks and costs compared to full replacement. The reengineering process includes activities like source code translation, reverse engineering, and program restructuring to improve maintainability. Defense in depth is a security strategy that uses multiple layers of defenses to minimize the impact if one defense is breached. It draws an analogy to military defenses and includes technologies, policies, and physical security measures working together. Process improvement aims to enhance processes to achieve objectives like quality, cost reduction and speed by analyzing current processes, identifying bottlenecks, training staff, and evolving improvements.

Uploaded by

Arjun Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

4) Reengineering rather than replacing

Restructuring or rewriting part or all of a


legacy system without changing its
functionality.
Applicable where some but not all sub-systems
of a larger system require frequent
maintenance.
Reengineering involves adding effort to make
them easier to maintain. The system may be re-structured and redocumented.
Advantages of reengineering
Reduced risk

There is a high risk in new software development. There may be


development problems, staffing problems and specification problems.

Reduced cost

The cost of re-engineering is often significantly less than the costs of


developing new software.

Reengineering process

Reengineering process activities


Source code translation

Convert code to a new language.

Reverse engineering

Analyse the program to understand it;

Program structure improvement

Restructure automatically for understandability;

Program modularisation

Reorganise the program structure;

Data reengineering
Clean-up and restructure system data
5) 5 principles of dependency properties from nonfunctional properties
6) Security 6 definition (system security purpose)

7) Defense in depth (concretic circle)


Defense in depth is the coordinated use of multiple security countermeasures to
protect the integrity of the information assets in an enterprise. The strategy is
based on the military principle that it is more difficult for an enemy to defeat a
complex and multi-layered defense system than to penetrate a single barrier.
Defense in depth minimizes the probability that the efforts of malicious hackers will
succeed. A well-designed strategy of this kind can also help system administrators
and security personnel identify people who attempt to compromise a computer,
server, proprietary network or ISP (Internet service provider). If a hacker gains
access to a system, defense in depth minimizes the adverse impact and gives
administrators and engineers time to deploy new or updated countermeasures to
prevent recurrence.
Components of defense in depth include antivirus software, firewalls, anti-spyware
programs, hierarchical passwords, intrusion detection and biometric verification. In
addition to electronic countermeasures, physical protection of business sites along
with comprehensive and ongoing personnel training enhances the security of vital
data against compromise, theft or destruction

9) Process improvement.
Understanding existing processes
Introducing process changes to achieve organisational objectives which are usually
focused on quality improvement, cost reduction and schedule acceleration
Most process improvement work so far has
focused on defect reduction. This reflects the increasing attention paid by industry
to quality
However, other process attributes can be the focus of improvement

Process analysis

Model and analyse (quantitatively if possible) existing processes

Improvement identification

Identify quality, cost or schedule bottlenecks

Process change introduction

Modify the process to remove identified bottlenecks

Process change training

Train staff involved in new process proposals

Change tuning

Evolve and improve process improvements

You might also like