Demonstrate best practice in software processes

Assignment Help Software Engineering
Reference no: EM131497174

Fundamentals of Software Engineering Assignment

Related objectives from the unit outline:

  • Apply concepts and strategies associated with each phase in the engineering of software.
  • Demonstrate best practice in software processes and in the quality of the developed software by applying appropriate concepts, strategies and techniques in the various phases of software engineering.
  • Develop appropriate artefacts/deliverables for each phase involved in the engineering of software.

Task: Automatically Modelling Security Requirements

In Assignment, you drew a Misuse Case Diagram by generating candidate misuse cases using a STRIDE matrix. Given that the number of misuse cases could be large, is there a way to automatically generate a complete set of candidate misuse cases from information contained in a Use Case Diagram and/or a STRIDE matrix and then prune them, leaving a smaller set of viable misuse cases?

You should ask questions on the unit discussion board about the assignment in order to clarify ambiguities.

Teams

Team size 3-4 people. It is very important that each team member is assigned to a specific part of the assignment and that this is recorded on the submitted assignment. Ensure that your team uses a shared document repository (suggest one with version control) and that you provide your lecturer with access to this repository by Friday 12/5/2017. By the same date, please provide the names/student numbers of your team members. All versions of all documents must be placed in the repository. Use the following structure: TeamNNN\minutes, TeamNNN\build (the code), TeamNNN\docs, TeamNNN\refs.

Key Deliverables

You need to submit several deliverables for this assignment in the areas of feasibility (F) requirements (R), project management (PM), design (D), implementation (I) and testing (T).

F - Research on the techniques you could use to solve the problem;

R -  A list of the Requirements;

D -  A design artifact (e.g., a class diagram);

PM - Minutes of meetings held (template in Appendix 1);

PM - A peer assessment of the contribution of each of your colleagues to the system (this may contribute to your assessment) - template in Appendix 2;

I - The system itself (which need not be fully  functional);

I - A 'readme' file which will explain how to install, configure and run the system. Note: This document shall be designed to assist your lecturer in assessing your deliverables - it is not intended to be a user manual; and

T - A test plan showing how you intend to show that your system conforms to the requirements (test case template in Appendix 3).

The System Prototype -

You may choose any development system to build your prototype (e.g. Java, Visual Basic, Python, Swift etc.) as long as it can be demonstrated, delivered and marked as an assessable item. If, however, you choose a development environment that is not readily available (i.e. in the labs), then you are responsible for providing a legal copy of the environment otherwise your submission will not be assessed. Given that the prototype need not be fully functional to gain a passing grade, the use of stubs to indicate call/return values is recommended. You are welcome to use code from other sources provided that the code is available for non-commercial use and you acknowledge the source.

Meetings

Do not leave the compilation of minutes to the end of the project - it is an on-going activity. This deliverable is marked on a pass/fail basis, with a fail resulting in the loss of up to five (5) marks. Record your minutes by starting a thread on the unit discussion board in BlackBoard with the heading "Team#nnn - Minutes, where nnn is your team number. Five meetings are the minimum expected.

Note that each item on the action list must have a unique identifier across the life of the project. Further, at any time before the final submission date, you may be asked to provide evidence that the minutes are a true record of the progress of your team. Failure to do so will result in a five (5) mark penalty.

Peer Assessment

Each person's peer assessment (Word document) should be submitted to BlackBoard by the same date/time as other deliverables. Any team member who does not submit a valid peer assessment by the due date/time will receive a mark of zero (0) for the assignment.

PCN Case Study

Palladium Chain Nursing (PCN) wish to build a tablet-based app that allows health care professionals (HCPs) to sign up patients on-site. They have commissioned you, as an experienced security requirements engineer, to provide some initial models for their app. On start-up, the tablet performs a self-check to ascertain whether its operating system or the app have been tampered with. If the computed check sum does not match the checksum stored on a smart device that is connected to the tablet prior to start-up, then the tablet powers down again. The app must let an HCP authenticate to the PCN Health Server, where the patient records are also stored. Following authentication, an HCP can be authorised to create, modify or delete a patient record (with an appropriate audittrail). To create a record, the HCP asks the patient salient details and inputs the details into a form generated by the app. Following the creation of a patient record, an HCP can use the app to create a service contract between PCN and the patient. As part of the service contract, the patient's health insurance fund may be optionally contacted by the app to confirm that the patient has the correct level of health insurance cover to allow him/her to be able to cover the cost of the service contract. To finalise the contract, the patient signs the form on the tablet in the appropriate place on the form. At that point the service contract is considered active once the data captured on the app is sent to the PCN Health Server.

Attachment:- Assignment File.rar

Reference no: EM131497174

Questions Cloud

Assuming simple interest for the rate of return : What is Suzanne's dollar-weighted rate of return in this financial agreement, assuming simple interest for the rate of return?
Explain the theory of normal backwardation : Explain the theory of Normal Backwardation. Explain the expected effects on price relationships and risk premiums.
Discuss relationship-benchmarking and value chain analysis : Perform a value chain analysis for an organization of your choice.
Compare the financial ratio analysis for volkswagen : How could the "process of performing an internal audit" differ across countries, given varying global management styles?
Demonstrate best practice in software processes : CSI6108 Fundamentals of Software Engineering Assignment. Demonstrate best practice in software processes and in the quality of the developed software
Conduct a google search for value chain analysis : What competitive advantages would Amazon have over Wal-Mart stores in doing business outside the United States?
Prepare a culture assessment table : Prepare a culture assessment table, as presented in the chapter, for a local business that you are familiar with. Rate the business on the 15 culture criteria.
What types of memory will you use and why : What types of memory will you use and why? In the example of a music-streaming device, we can use cache memory to store temporary song as they are being played.
List some specific characteristics of advertisements : Why is human resource management particularly challenging for international firms?

Reviews

len1497174

5/16/2017 1:24:02 AM

Business IT report. Templates are given. You must: Provide a zip file containing your assignment as a Word document. No other compression formats accepted. No other document formats accepted. In the zip file also include separately any other deliverables e.g., code, journal articles. Use the project directory structure mentioned in Teams above. You must include digital copies (in the zip file) of all references you cite in your assignment otherwise your assignment will not be accepted or assessed. Separately (not in the zip file), provide the MD5 hash value of your assignment (Word) document. Submissions without a hash value will not be accepted or assessed.

len1497174

5/16/2017 1:23:56 AM

Your document must be in MS-Word format (.doc/.docx), body text 12 point Arial font, double spaced, fully justified and include page numbers. The document should include a title page and table of contents with page number one (1) starting after the table of contents. No executive summary or abstract required. The title page should not be numbered but the pages between the title page and the main body of the document should be numbered with lower case roman numerals. Marks will be deducted if you do not adhere to this style.

Write a Review

Software Engineering Questions & Answers

  Prove the effectiveness of the agile methods used

Prove the effectiveness of the agile methods used to development the requirements, documentation, and software by describing the agile approach.

  Describe a different sdlc model

The paper will be five pages: (a) Describe the 7 Step SDLC - 2 pages, (b) Describe a different SDLC Model (4 step or 12 step) - 2 pages, (c) Compare and contrast the 7 Step Model and the second model you selected.

  Reply article swastikas and hacked twitter accounts

Reply this article in 200 words with references. Swastikas and Hacked Twitter Accounts On 15 March 2017, many users including some which are considered high in profile discovered tweets were made from their accounts by an unauthorized hacker

  1give reasons why the process of requirements elicitation

1.give reasons why the process of requirements elicitation and validation is an iterative one?2.what roles does the

  Write a function that takes one string made of numbers

write a function that takes one string made of numbers separated by comma. the function must return an integer of the maximum of the numbers.

  Software tools for managing and analyzing qualitative data

Craft a 3- page paper and 5 references in which you do the following: Compare and contrast software tools for managing and analyzing qualitative data

  Which could be an actor found on a use case diagram

Which of the following could be an actor found on a use case diagram? Why? Ms. Mary Smith, Supplier, Customer, Internet customer, Mr. John Seals, Data-entry clerk and Database administrator.

  Discuss overall trends and statistics for various attacks

Explain why you think that topic is the most important and back it up with data and quotes from the report.

  Use case dependency for making an account deposit

Describe (in a one to two (1-2) page narrative) a use case dependency for making an account deposit. Illustrate this use case with Visio or a similar product

  Describe concepts of object-oriented software development

Describe basic concepts of object-oriented software development.

  The abafm first letter of all group members names

the abafm first letter of all group members names landscaping corporation is located at 1 park place drive markham

  Explain why testing every line of code for correctness

Explain why testing every line of code for correctness is still insufficient for ensuring that a program is bug-free.  Give an example supporting the statement above.Compare and contrast the key differences in agile and non-agile approaches specific ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd