Reference no: EM133131077
SBD403 Secure by Design
Assessment - Executable Development
Task Summary
You will be provided with a Microsoft excel .csv file. This file contains a large volume of data. You must develop an executable that respects the permissions and rules that the file has been created with. There are several possible rules that each cell or section can have, and they will be detailed both below and within the sheet itself.
This program should be able to read and write to the .csv file, as well as support multiple levels of user access (Guest, User, Superuser, and Administrator). Security information, terms, and definitions are detailed below in the Task Instructions.
This assessment has 4 weeks allocated, and is due on the final day of the module.
Context
One of the fundamental, core concepts of Security through Design is the separation of functionality into different roles. This assessment follows that separation. Many programs opt to make different accounts into a ‘flow - down' structure, where;
• Users have all the permissions of guests,
• ‘Superusers' have all the permissions of Users,
• and administrators have full access.
As we have illustrated thus far in SBD403, this can prove problematic in certain situations.
This assessment will evaluate your understanding of the separation of specific roles, their importance, and your implementation of the principles covered in SBD403. The submission must also include a one-to-two page document outlining the various specifications OR a design document that details justification for the appropriate architecture.
This assessment will prepare you for undertaking similar projects in the industry, where you must understand, follow, and justify your implementation of client and security requirements. Protection of User (or client) data within industry is of paramount importance, and can make the difference between success and catastrophic failure of a project.
Justification and implementation are the core qualities assessed in this assignment.
Task Instructions
Submission for this assignment should be in the form of an executable application that can be run on the university machines. The language used to develop it is up to you (discuss with the lecturer prior) but it must have an existing API to read and output to Microsoft Excel .csv files.
The User types are as follows:
Guest: This user is not ‘logged in' so to speak, and should only have a minimal level of access. At every available protected instance, the guest should have requested credentials (such as a username or password dialog that would allow a User to sign in)
User: This user is ‘logged in', and can be thought of as a ‘client login'. This user should have access to their own data, but not access to any other clients' data.
Superuser: This user is ‘logged in', and can be thought of as a staff member. This user can create new users, add and view data in their accounts, and can also view company-specific information. They can also view information on their own account, but not other Superusers. They cannot create Superuser accounts.
Administrator:
This account level cannot view user information, or create user accounts. However, the Administrator can view Superuser information, as well as create Superuser accounts. The Administrator (like the Superuser) can also view the Company information.
The security types are:
Public: This information is available to all users. This includes file names, sheet names, and other miscellaneous data. This also includes access to the tool itself. It should also be public to create a user account (which then elevates the guest to a user.)
Client / User: This information is visible to both the specific user and Superusers, but not guest or administrators. This may include client details - such as names, addresses, and other private information. Client information should be visible to the specified User and Superusers only, and not to other Clients.
Company: This information is visible to users, Superusers, and Administrators. This information is only relevant to the company. This may include employment information, or company relevant policies, procedures, and plans.
It is essential that you use the appropriate APA style for citing and referencing research.
Attachment:- Secure by Design.rar