Question
The purpose of Secure Acquisition is to identify and mitigate any risks in the ICT acquisition/ supply chain. Please prepare a response to the following
The purpose of Secure Acquisition is to identify and mitigate any risks in the ICT acquisition/ supply chain. Please prepare a response to the following items:
For this first exercise you will define the potential functions required as well as who will supply them. You will take the following steps:
Identify a process at Wild Blue Yonder Technologies that you intend to support by a software application this should include a scope, business case and assurance case statement
Define top-level functions required to carry out the desired process these must be coherent (e.g., logically related and complete set of activities)
Decompose the top level functions into a second level of component functions
Decompose the second level functions into a third level of component functions (e.g., formulate a component tree)
Assign a (imaginary) supplier for each component at all tiers these will be assumed to be subcontracted relationships (e.g., the work will be done by a subcontractor directly employed by the higher level entity)
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started