Documentos de Académico
Documentos de Profesional
Documentos de Cultura
Page1of3
1.DataFunctions
Internal Logical File/External Interface File Type Reference Description
Elements of complexity DET RET Complexity
ILF
IR Records
Reference No. Detection Date Reported Date Closure Date Reported By Incident Category Targeted Attack Incident Owner Severity level Status Attacking IP Affected Targets Additional Info. Attachments GITSIR Investigated Infection Date GITSIR Closure Date Impact Cause of Infection link to malware DB
ILF
AV Records
Event Computer Name Source Risk Name File Path Actual Action Event Date User Name Client Group
DH/ATA/SSCFP/OM/SCFP17/V1.22005ISS.Allrightsreserved
ISSFunctionPointCountingWorksheets
Page2of3
ILF
MALWARE Records
IRDB Reference Malware File Name MD5 Hash SSDeep Values File Size Malware Classification Related Malwares/ Dropped Files Malicious IP/Domain Malware Mutex/Event Names Malware Persistent Method Program Flow Attachment
ILF
USER Records
User name Password Role Active Date Of Creation Agency Name Date of Deletion Security Question Security Answer
DH/ATA/SSCFP/OM/SCFP17/V1.22005ISS.Allrightsreserved
ISSFunctionPointCountingWorksheets
Page3of3
DH/ATA/SSCFP/OM/SCFP17/V1.22005ISS.Allrightsreserved
ISSFunctionPointCountingWorksheets
Page4of3
2.TransactionalFunctions
Input/Output/Enquiry Type Reference Description
Elements of complexity DET FTR Complexity
EI
CreateIncident
Reference No. Detection Date Reported Date Closure Date Reported By Incident Category Targeted Attack Incident Owner Severity level Status Attacking IP Affected Targets Additional Info. Attachments GITSIR Investigated Infection Date GITSIR Closure Date Impact Cause of Infection link to malware DB
EI
ModifyIncident
Detection Date Reported Date Closure Date Reported By Incident Category Targeted Attack Incident Owner Severity level Status Attacking IP Affected Targets
DH/ATA/SSCFP/OM/SCFP17/V1.22005ISS.Allrightsreserved
ISSFunctionPointCountingWorksheets
Page5of3
Additional Info. Attachments GITSIR Investigated Infection Date GITSIR Closure Date Impact Cause of Infection link to malware DB
EI
CreateReport
Report Type Period Filter By Y axis X axis
EI
CreateAVRecord
Event Computer Name Source Risk Name File Path Actual Action Event Date User Name Client Group Operating System Risk Threat Identifier Remediation Status
EI
CreateUser
User name Password Role Active Date Of Creation Agency Name
DH/ATA/SSCFP/OM/SCFP17/V1.22005ISS.Allrightsreserved
ISSFunctionPointCountingWorksheets
Page6of3
EI
ModifyUser
User name Password Role Active Date Of Creation Agency Name Date of Deletion Security Question Security Answer
EI
DeleteUser
Active
EI
CreateMalwareRecord
IRDB Reference Malware File Name MD5 Hash SSDeep Values File Size Malware Classification Related Malwares/ Dropped Files Malicious IP/Domain Malware Mutex/Event Names Malware Persistent Method Program Flow Attachment
EO
ListIncidents
Reference No. Detection Date Reported Date Closure Date
DH/ATA/SSCFP/OM/SCFP17/V1.22005ISS.Allrightsreserved
ISSFunctionPointCountingWorksheets
Page7of3
Reported By Status
EO
DisplayReports
DH/ATA/SSCFP/OM/SCFP17/V1.22005ISS.Allrightsreserved
ISSFunctionPointCountingWorksheets
Page8of3
DH/ATA/SSCFP/OM/SCFP17/V1.22005ISS.Allrightsreserved
ISSFunctionPointCountingWorksheets
Page9of3
DH/ATA/SSCFP/OM/SCFP17/V1.22005ISS.Allrightsreserved
ISSFunctionPointCountingWorksheets
Page10of3
3.UnadjustedFunctionPointCountSummary
ITEM External Input External Output Internal File Interface file External Inquiry
LOW x3 = x4 = x7 = x5 = x3 =
AVERAGE x4 = x5 = x10 = x7 = x4 =
TOTAL
4.CalculateValueAdjustmentFactor
CHARACTERISTIC Data Communications Distributed Functions Performance Heavily Used configuration Transaction Rate On-line Data Entry End User efficiency On-line Update Complex Processing Re-usability Installation Ease Operational Ease Multiple Sites Facilitate Change Total Degree of Influence Adjustment Factor DI
5.AdjustedFunctionPointCountSummary
Adjusted FPC = Unadjusted FPC* Adjustment Factor = _________
DH/ATA/SSCFP/OM/SCFP17/V1.22005ISS.Allrightsreserved