what checklist is needed for a security system upgrade
Using the Continuing Case: Security Monitoring case study found in your module resources, you will create a systems requirement checklist to be submitted as a Word document. To complete the assignment, describe your approach to this task, specifically regarding how a systems analyst transposes information into requirements. Consider in your document the problem of incorrect interpretation of a requirement. Is this normal? Describe how iterations of requirements can help resolve incorrect interpretation.
For additional details, please refer to the Module Three Homework Activity Guidelines and Rubric document.
Also included is the security system business proposal.