Demonstrate best practice in software processes

Assignment Help Other Subject
Reference no: EM131454966

Assignment

Related objectives from the unit outline:

- Demonstrate best practice in software processes and in the quality of the developed software by applying appropriate concepts, strategies and techniques in the various phases of software engineering.
- Develop appropriate artefacts/deliverables for each phase involved in the engineering of software.

Task: Modelling Security Requirements

The Unified Modelling Language or UML is considered to be the de-facto standard for modelling information systems today. Despite this, there have been several extensions to the UML. One such extension involves what are called Misuse Case Diagrams, a security-oriented extension to the standard Use Case Diagrams. Security is a major concern for many mission-critical applications. If software were designed correctly the first time, vulnerabilities would not exist. Misuse Case Diagrams are an attempt to solve this problem
Your task is to read the case study below, draw a use case diagram of the case study, and then draw a Misuse Case Diagram of the same problem.

Before attempting the task, you should read Sindre and Opdahl (2001) to find out about misuse cases, then read Johnstone (2011) to find out how to generate a misuse case diagram with a STRIDE matrix.
You should ask questions on the unit discussion board about the assignment in order to clarify ambiguities.

In your Word document include:
- A Use Case Diagram of the Case Study described below;
- A Misuse Case Diagram derived from the above, using the method specified in Johnstone (2011);
- A STRIDE matrix
- A list of misuse cases derived from the above; and
- A list of security use cases derived from the above.

You must:
- Provide a zip file containing your assignment as a Word document. No other compression formats accepted. No other document formats accepted.
- In the zip file include separately the UML diagrams that you have drawn. You are expected to draw two-a use case diagram and a misuse case diagram. Use Visio to draw your UML diagram(s). Visio is available free for you to use - search for MSDNAA on the ECU web site. Submissions without two included
.vsd files readable by Visio 2010 will not be accepted or assessed.
- Separately (not in the zip file), provide the MD5 hash value of your assignment (Word) document. Submissions without a hash value will not be accepted or assessed.

Document Style

- Your document must be in MS-Word format (.doc/.docx), body text 12 point Arial font, double spaced, fully justified and include page numbers.

- The document should include a title page and table of contents with page number one (1) starting after the table of contents.

- No executive summary or abstract required.

- The title page should not be numbered but the pages between the title page and the main body of the document should be numbered with lower case roman numerals.
Marks will be deducted if you do not adhere to this style.

PCN Case Study

Palladium Chain Nursing (PCN) wish to build a tablet-based app that allows health care professionals (HCPs) to sign up patients on-site. They have commissioned you, as an experienced security requirements engineer, to provide some initial models for their app. On start-up, the tablet performs a self-check to ascertain whether its operating system or the app have been tampered with. If the computed check sum does not match the checksum stored on a smart device that is connected to the tablet prior to start-up, then the tablet powers down again. The app must let an HCP authenticate to the PCN Health Server, where the patient records are also stored. Following authentication, an HCP can be authorised to create, modify or delete a patient record (with an appropriate audit trail). To create a record, the HCP asks the patient salient details and inputs the details into a form generated by the app. Following the creation of a patient record, an HCP can use the app to create a service contract between PCN and the patient. As part of the service contract, the patient's health insurance fund may be optionally contacted by the app to confirm that the patient has the correct level of health insurance cover to allow him/her to be able to cover the cost of the service contract. To finalise the contract, the patient signs the form on the tablet in the appropriate place on the form. At that point the service contract is considered active once the data captured on the app is sent to the PCN Health Server.

Reference no: EM131454966

Questions Cloud

Different types of performance management processes : Describe at least three different types of performance management processes. Include an example of each.
What are tools available for manager in financial planning : What are the tools available for the manager in financial planning? Which of these statements is true regarding divisional WACC?
Examine the business concepts of quality management : In the modern world, businesses and individuals need to optimize their efforts to gain effectiveness and efficiency.
Compute and interpret the sample correlation coefficient : A department of transportation's study on driving speed and miles per gallon for midsize automobiles resulted in the following data.
Demonstrate best practice in software processes : CSI6108- Fundamentals of Software Engineering - Demonstrate best practice in software processes and in the quality of the developed software by applying appropriate concepts, strategies and techniques in the various phases of software engineering.
Does your argument show that slavery is absolutely wrong : Does your argument show that slavery is absolutely wrong, even if there are people that disagree
What is its forecasted dividend payout ratio : The company forecasts a net income of $475,000. If it follows the residual dividend policy, what is its forecasted dividend payout ratio?
Show relationship between jobless rate and housing loans : At the beginning of 2009. the economic downturn resulted in the loss of jobs and an increase in delinquent loans for housing.
Images to recruit employees : Can you think of three organizations that have used their images to recruit employees? What image did they try to project to potential applicants?

Reviews

len1454966

4/8/2017 2:14:43 AM

Your document must be in MS-Word format (.doc/.docx), body text 12 point Arial font, double spaced, fully justified and include page numbers. ? The document should include a title page and table of contents with page number one (1) starting after the table of contents. ? No executive summary or abstract required. ? The title page should not be numbered but the pages between the title page and the main body of the document should be numbered with lower case roman numerals.

Write a Review

Other Subject Questions & Answers

  Identifies a number of biases in the processes

The literature on attribution processes identifies a number of "biases" in the processes by which we perceive other persons. How do these biases influence the impressions we form of others as we interact with them

  Result of a major event

Have Presidential powers evolved over time, or were they a result of a major event? Explain in detail. Do you believe that the evolution of Presidential powers is a positive for our democracy, or does it infringe upon the duties of the legislature..

  Disadvantages of public access to information

Discuss the advantages and disadvantages of public access to this information, both for the researchers and those who are being " investigated".

  Ethics in psychology

Normal 0 false false false EN-US X-NONE X-NONE Ethics in Psychology

  What animal would you choose

If you were given the capability to travel back in time to any period in history, where would you head to and why? If you could be any animal in recorded history, what animal would you choose? Why?

  Create a new query for the client table

create the jms techwizard database and create a new query for the client table that includes the client number, client name, and technician number fields in the design grid for all clients where the technician number is 23.

  Describe four examples of key energy plans

Describe four examples of key energy plans. Assess the main goals of the energy-planning efforts.

  Stating that deviance is critical to society

If all deviance is constructed by society, can it be deconstructed in the same manner? In other words, is deviance a static or dynamic concept? Is Durkheim right in stating that deviance is critical to society? Explain and provide examples to supp..

  What research supports these theories and concepts

How are the concepts of transcultural nursing, the health promotion model, skill acquisition, role theory, and change theory specifically integrated into my philosophy and practice?

  Frank kafka''s the metamorphosis issues

How do you interpret Gregor's transformation? Why does Kafka have him become a dung beetle?

  What were the results of the contamination on water supply

Answer the following questions in your paper: What were the results of the contamination on the water supply? Use the stages of the hydrological cycle to describe your answer. What were the results of the contamination on the environment

  Describes the j curve

Which of the following best describes the J curve?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd