digital security management

60
1 Digital Security Management 1.Introduction About DSM Module Description 2. Feasibility study 2.1 operational Feasibility 2.2 Technical Feasibility 2.3 Economical Feasibility 3. System Analysis 3.1 Problem Analysis 3.2 Existing System 3.3 Proposed System 3.4 Software Requirement Specification 3.4.1 Software Requirements 3.4.2 Hardware Requirements 4. System Design 4.1 Tables 4.2 UML Diagrams 5. Implementation 6.Deployment Diagram 7. System Testing 8. Coding 9. Conclusion 10.Annexure 10.1. User Manual 10.2. Screens 11. Bibliography

Upload: others

Post on 14-May-2022

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Digital Security Management

1

Digital Security

Management

1.Introduction

About DSM

Module Description

2. Feasibility study

2.1 operational Feasibility

2.2 Technical Feasibility

2.3 Economical Feasibility

3. System Analysis

3.1 Problem Analysis

3.2 Existing System

3.3 Proposed System

3.4 Software Requirement Specification

3.4.1 Software Requirements

3.4.2 Hardware Requirements

4. System Design

4.1 Tables

4.2 UML Diagrams

5. Implementation

6.Deployment Diagram

7. System Testing

8. Coding

9. Conclusion

10.Annexure

10.1. User Manual

10.2. Screens

11. Bibliography

Page 2: Digital Security Management

2

Page 3: Digital Security Management

3

Abstract

This project is fully developed for the Digital Security

Management. A project to access the current ongoing project in the

software company by its technical professionals. This project is based on

the requesting the system for project access. There are several roles to

play in requesting the project. The project Details can be added or viewed

by only the authenticated roles.

The Roles/Responsibilities which have to be assigned to the

users are under the operation of the Administrator. The Administrator has

own powers to get back the responsibilities assigned to the user. He has

the sole power to view the details of the registered users, assigning the

projects to the users, security for the users and the reports of the projects

Page 4: Digital Security Management

4

Page 5: Digital Security Management

5

1.INTRODUCTION

This project is fully developed for the Digital Security

Management. A project to access the current ongoing project in the

software company by its technical professionals. This project is based on

the requesting the system for project access. There are several roles to

play in requesting the project. The project Details can be added or viewed

by only the authenticated roles. Each Role has its own authentication and

each user assigned role can only see the details of the information for

which he is authenticated for.

The Roles/Responsibilities which have to be assigned to the

users are under the operation of the Administrator. The Administrator has

own powers to get back the responsibilities assigned to the user. He has

the sole power to view the details of the registered users, assigning the

projects to the users, security for the users and the reports of the projects

The administrator can monitor, detect and prevent the users

from accessing the unauthenticated information through assigning roles,

responsibilities and creating users or removing users. He can have up-to-

date information about whether the security system has been going on

Page 6: Digital Security Management

6

efficiently and can make up-to-date changes when thereof the situation

demands.

1.1 PROBLEM DEFINITION:

1.2 EXISTING SYSTEM:

The existing system maintains the total information manually

which creates some problems.

• Very difficult to retrieve the information. It is a time consuming process.

• Information stored is not secured.

• Preparing reports by extracting data from various registers is time

consuming and difficult process.

• The system is not automated.

1.3 PROPOSED SYSTEM:

The online automated system is proposed to overcome

the above mentioned problems.

Objectives are:

• System maintains the information related to different areas and

stored at central database, which leads to easy accessibility and

consistency.

• Easy tracking of details.

• Facilitate on-line services.

• Keeps data more secure.

Page 7: Digital Security Management

7

• Minimum wastage of time and cost.

• Accurate and fast process.

• Provides user friendly interface.

• Good user interface screens and reports are possible to

generate

Page 8: Digital Security Management

8

2.FEASIBILITY STUDY:

The feasibility of a system can be studied in three major areas. They

are:

1. Operational feasibility.

2. Technical feasibility.

3. Economical feasibility.

2.1 OPERATIONAL FEASIBILITY:

This system provides all sorts of facilities to give right

information to the management of hostel and it is user friendly. Since the

proposed system helps in reducing the hardships encountered in existing

manual system, the new system is considered to be operational feasible.

2.2 TECHNICAL FEASIBILITY:

The system is self-explanting and does not need any entire

sophisticated training. A system has been built by concentrating on the

graphical uses interface concepts, the application can also be handled very

Page 9: Digital Security Management

9

easily with a novice uses. The overall time that a user needs to get trained is

less than 15 minutes the technology needed for the system is available in the

organization and the organization has expertise to use it. So, it is technically

feasible.

2.3 ECONOMICAL FEASIBILITY:

As the software that were used as developing this application

are very economical and are readily available in the market the only time that

is lost by the customer is just installation time. The cost/benefit analysis

concluded that the system is beneficial to the management than the existing

system. So, it is economically feasible.

Page 10: Digital Security Management

10

Page 11: Digital Security Management

11

3.Analysis: 3.1 Structred Analysis: 3.1.1 Class Diagram: Class Diagram

Page 12: Digital Security Management

12

Page 13: Digital Security Management

13

3.1.2 Dynamic Modeling: 3.1.2.1 State Diagram:

Page 14: Digital Security Management

14

3.1.2.2 Activity diagram

Page 15: Digital Security Management

15

3.1.3 Functional Modeling:

Page 16: Digital Security Management

16

3.1.3.1 Data Flow Diagrams:

Data Flow Diagrams:

This Diagram serves two purposes

� Provides an indication of how data is transformed as it

moves through the system.

� Disputes the functions and sub functions that transforms

the dataflow

Page 17: Digital Security Management

17

Page 18: Digital Security Management

18

3.2 REQUIREMENT ANALYSIS:

Before we start working upon Digital Security Management System, we

need to gather some information like software requirements used to develop

this project and technologies used that you need to be familiar with. The

details are below:

3.2.1 SOFTWARE REQUIREMENTS:

• Programming languages : jdk1.6

• Technologies : jsp, servlets

• Database Backend : Oracle 10g

• Operating system : Windows XP Professional

• Web technology : HTML

• Server

3.2.2HARDWARE REQUIREMENTS:

• Processor : Intel Pentium IV

• RAM : 512 MB

• Hard disk : 80 GB

Page 19: Digital Security Management

19

4.DESIGN:

4.1 MODULES DESCRIPTIONS:

1] Admin Module:

In this Module it deals with the authentication of the administration login

with the valid user name and pass word and designation

1.1] User Management Module In this module it deals with the managing the users by the administrator Administrator allows permissions for the users who are login in to DSM He can delete the users he can update the users 1.2] Client Management

In this Module It deals with the managing the clients for the company who are the clients adding the clients and deleting the clients

1.3] Project Management In this Module it deals with the Managing the projects to the company

An administrator can add the projects and updating the projects

1.4] Roll management

In this module it deals with the assigning the projects to the users

and marinating the clients to the users allowing permission to the

users

2] Login Module

In this Module we are going to provide a registration form for the users

which are new employee’s for the company

3] User Module: In this Module It deals with the authentication of the

Users login whether the valid user name and password validated by

the administrator and accessing the project

Page 20: Digital Security Management

20

3.2] Issue Management

This module will provide a technical support to the professional involving

in the project .it deals with issues arises at the time doing the project.

Whatever the issues they can directed by this module to send the issue as

a complaint it will be rectified report wills end to the professional who met

with the issues.

4.2 UML Diagrams:

UML Diagrams:

.

UML is a notation that resulted from the unification of object

modeling technique and object oriented software technology.UML has been

designed for broad range of application.

An Overview of UML in three notations:

4.2.1 Use case diagrams:

Use cases are used during requirements elicitation and

analysis to represent the functionality of the system. Use case focus on the

behavior of the system from the external point of view. The actors are outside

the boundary of the system ,where as the use cases are inside the boundary

of the system.

Page 21: Digital Security Management

21

Page 22: Digital Security Management

22

. DATABASE DESIGN-Client Info

KEY FIELD NAME DATA TYPE REMARKS

PRIMARY KEY Clientid Number Client Identification Number

clientName Text Client Name

Project Text Project Name from the client

Description Text Description about project

Sdate Date Starting date of a

project

2. DATABASE DESIGN-DSM_UM_DSMLOGIN :

KEY FIELD NAME DATA TYPE REMARKS

PRIMARY KEY USERNAME VARCHAR(20) NAME OF THE LOGIN

USER

PASSWORD VARCHAR(20) PASSWORD OF THE LOGIN USER ID

DESIGNATION VARCHAR(20) DESIGNATION OF THE USER

Page 23: Digital Security Management

23

3.DATABASE DSM_ Priority Info

KEY FIELD NAME DATA TYPE REMARKS

Uname Text Name of user

clientname Text Name of the client

Pname Text Name of project

Moduname Text Name of module

Allowance Text User allowing

4. DATABASE DESIGN-ProjectInfo

KEY FIELD NAME DATA TYPE REMARKS

PRIMARY KEY id Number ProjectidentifyNumber

ProjectName Text Name of the project

Client Number Client Identity Number

Start Date Date Date of the project started

Project Description Text Information about the project

Status Text Status Of the Project

Page 24: Digital Security Management

24

5.Database design_Dsm_UserInfo

Allow Text Giving permission whether yes or no

KEY FIELD NAME DATA TYPE REMARKS

PRIMARY KEY UserId Number User Identity Number

Username Text Name Of the User

Password Text Password For the User

Designations Text Designations Of the user

Page 25: Digital Security Management

25

Page 26: Digital Security Management

26

5. Implementation

5.1 Description about Tools:

NetBeans:

A free, open-source Integrated Development Environment for software

developers. You get all the tools you need to create professional desktop,

enterprise, web, and mobile applications with the Java language, C/C++,

and even dynamic languages such as PHP, JavaScript, Groovy, and Ruby.

The NetBeans IDE is easy to install and use straight out of the box and

runs on many platforms including Windows, Linux, Mac OS X and Solaris.

ROLE OF ORACLE IN DATABASE:

The database required for this project should contain security,

relationship, constraints and provision to support huge data. ORACLE 10g

is one of the many database services that plug into a client/server model. It

works efficiently to manage resources, a database information, among the

multiple clients requesting & sending.

5.1.1 INTRODUCTION TO ORACLE:

ORACLE is a comprehensive operating environment that packs the

power of a mainframe system into user micro computer. It provides a set of

functional programs that user can use as tools to build structures and perform

tasks. Because application developed on oracle are completely portable to

environment and then it can be moved into a multi user platform. Users need

not be an expert to appreciate ORACLE, but the better user understands the

programmer, the more productivity and creativity will be as one uses the tools

Page 27: Digital Security Management

27

it provides. Hence, this system has used oracle as database backend as it is

a global database and it supports easy storage and maintainance of data.

5.2 ABOUT JAVA:

James Gosling conceived Java. Patrick Naughton, Chris Warth,

Ed Frank and Mike Sheridan at Sun Micro Systems Incorporation in

1991. It took 18 months to develop the first working version. This

language was initially called “OAK” in 1992 and public announcement

of Java in 1995, many more contributed to the design and evolution of

the language.

Here we list the basic features that make Java a powerful and

popular programming language:

• Platform Independence : The compile-Once-Run-Anywhere is

achieved.It can run in different operating systems.

• Object Oriented : Object oriented throughout - no coding outside of

class definitions, including main(). An extensive class library available

in the core language packages.

• Compiler/Interpreter Combo :Code is compiled to bytecodes that are

interpreted by a Java virtual machines (JVM).This provides portability

to any machine for which a virtual machine has been written.The two

steps of compilation and interpretation allow for extensive code

checking and improved security.

• Robust : Exception handling built-in, strong type checking (that is, all

data must be declared an explicit type), local variables must be

initialized.

Page 28: Digital Security Management

28

Client AdminPage <%@ page contentType="text/html; charset=UTF-8" language="java"

import="java.sql.*" errorPage="" %>

<%@ page import="java.util.*" %>

<html>

<head>

<meta http-equiv="Content-Type" content="text/html;

charset=UTF-8">

<title>Client Management</title>

<style type="text/css">

<!--

.style1 {

color: #FF0000;

font-style: italic;

}

-->

</style>

<SCRIPT TYPE="text/javascript">

function login()

{

var usr=f1.cid.value;

var p=f1.cname.value;

var k=f1.pname.value;

var l=f1.pdesc.value;

var m=f1.sdate.value;

if(usr=="")

{

alert("Enter ClientId");

return false;

}

if(p=="")

{

alert("Enter Client Name");

return false;

}

if(k=="")

{

alert("Enter Project Name");

return false;

}

if(l=="")

Page 29: Digital Security Management

29

{

alert("Enter Project Description");

return false;

}

if(m=="")

{

alert("Enter Date");

return false;

}

}

</script>

</head>

<b>

<%

Class.forName("sun.jdbc.odbc.JdbcOdbcDriver");

Connection

con=DriverManager.getConnection("jdbc:odbc:dsm","scott","tiger");

Statement stmt=con.createStatement();

%>

<form action="/DsmKM/ClientAdmin" method="get" name="f1"

OnSubmit='return login()'>

<img src="clients.jpg" width="977" height="145">

<h2 align="Center" class="style1">Client Management</h2>

<%

ResultSet rs1=stmt.executeQuery("select * from clientinfo ");

if(rs1.next()){

%>

<table align="center" border="1">

<thead>

<tr>

<th bgcolor="blue"><font color="white">Client

ID</th>

<th bgcolor="blue"><font color="white">Client

Name</th>

<th bgcolor="blue"><font

color="white">Project</th>

<th bgcolor="blue" ><font

color="white">Project Description</th>

<th bgcolor="blue"><font color="white">Submit

Date</th></font>

</tr>

</thead>

<tbody>

<%

Page 30: Digital Security Management

30

ResultSet rs=stmt.executeQuery("select * from

clientinfo ");

while(rs.next()) {

String cid=rs.getString(1).toString();

String cname=rs.getString(2).toString();

String project=rs.getString(3).toString();

String pdesc=rs.getString(4).toString();

String sdate=rs.getString(5).toString();

%>

<tr>

<td height="20"><%=cid%></td>

<td><%=cname%></td>

<td><%=project%></td>

<td><%=pdesc%></td>

<td><%=sdate%></td>

</tr>

<% } %>

<% } %>

</tbody>

</table>

<br><br>

<table border="0" align="center" >

<tbody>

<tr>

<td width="20%">

<p align="center"><img src="cm.jpg" width="446"

height="309"></p>

</td>

&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbs

p&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp

<td><pre><font color="#C71585" size=3>

ClientId <input type="text" name="cid" value=""

size="25"><br>

ClientName <input type="text" name="cname" value=""

size="25" ><br>

ProjectName <input type="text" name="pname" value=""

size="25" ><br>

Projectdesc <input type="text" name="pdesc" value=""

size="25" ><br>

SubmitedDate <input type="text" name="sdate" value=""

size="25"><br></pre>

<ul>

<li> Enter the client name for delete the Client</li>

</ul>

</td>

Page 31: Digital Security Management

31

</tr>

<tr>

<td> </td>

<td><input type="submit" value="update" name="update">

<input type="submit" value="delete" name="update"></td>

</tr>

</tbody>

</table>

<center>

<TABLE WIDTH="17%" height="87" ALIGN="center" CLASS="DARK">

<TR>

<TD>

<TH ALIGN="center" bgcolor="#fffaf0">

<A HREF="/DsmKM/home.html"

CLASS="WHITE">

Home</A>

<TH ALIGN="center" bgcolor="#fffaf0">

<A HREF="/DsmKM/contact.html"

CLASS="WHITE">

ContactUs</A>

<TH ALIGN="center" bgcolor="#fffaf0">

<A HREF="/DsmKM/adminhome.html"

CLASS="WHITE">

Back</A>

</TD>

</TR>

</TABLE>

</CENTER>

</form>

</body>

Issue Details Page: <%--

Document : issuedetails

Created on : Feb 16, 2009, 3:16:40 PM

Author : nspel123

--%>

Page 32: Digital Security Management

32

<%@ page contentType="text/html; charset=windows-1252"

language="java" import="java.sql.*" errorPage="" %>

<%@ page import="java.util.*" %>

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"

"http://www.w3.org/TR/html4/loose.dtd">

<html>

<head>

<meta http-equiv="Content-Type" content="text/html;

charset=windows-1252">

<title>JSP Page</title>

</head>

<body>

<%! String h,k;%>

<%

String username = (String)session.getAttribute("UN");

%>

<%

Class.forName("sun.jdbc.odbc.JdbcOdbcDriver");

Connection

con=DriverManager.getConnection("jdbc:odbc:dsm","scott","tiger");

Statement stmt=con.createStatement();

%>

<P>

<TABLE width="111" BORDER=3 ALIGN="CENTER" bordercolor="#333333">

<TR>

<TH width="97" BGCOLOR="#6699CC" CLASS="TITLE">Issue

Details</TH>

</TR></TABLE>

<P>

<table border="2" align="center" bordercolor="#333333">

<thead>

<tr>

<th bgcolor="#66CCCC">Issue</th>

<th bgcolor="#66CCCC">Solution</th>

<th bgcolor="#66CC99">PostedBy</th>

</tr>

</thead>

<tbody>

<tr>

<%

Page 33: Digital Security Management

33

ResultSet rs=stmt.executeQuery("select * from

issolu");

while(rs.next()) {

String prid=rs.getString(1).toString();

String name=rs.getString(2).toString();

String name1=rs.getString(3).toString();

%>

<td><%=name1%></td>

<td><%=prid%></td>

<td><%=name%></td>

</tr>

<%}%>

</tbody>

</table>

<p>&nbsp;&nbsp;&nbsp;</p>

<p>&nbsp;&nbsp;&nbsp;</p>

<p>&nbsp;&nbsp;&nbsp;</p>

<p>&nbsp;&nbsp;&nbsp;</p>

<TABLE WIDTH="100%" CLASS="DARK">

<TR>

<TH ALIGN="center" bgcolor="#fffaf0">

<A HREF="/DsmKM/home.html"

CLASS="WHITE">

Home</A>&nbsp;&nbsp;&nbsp;

<A HREF="/DsmKM/WelcomeUser.jsp"

CLASS="WHITE">

Back</A>

</TH>

</TR>

</TABLE>

</body>

</html>

Page 34: Digital Security Management

34

Page 35: Digital Security Management

35

6.Deployment Diagram:

Page 36: Digital Security Management

36

Page 37: Digital Security Management

37

7. SYSTEM TESTING

Testing is the process of detecting errors. Testing performs a very

critical role for quality assurance and for ensuring the reliability of software.

The results of testing are used later on during maintenance also.

Psychology of Testing :

The aim of testing is often to demonstrate that a program works by

showing that it has no errors. The basic purpose of testing phase is to detect

the errors that may be present in the program. Hence one should not start

testing with the intent of showing that a program works, but the intent should

be to show that a program doesn’t work. Testing is the process of executing a

program with the intent of finding errors.

Testing Objectives :

The main objective of testing is to uncover a host of errors,

systematically and with minimum effort and time. Stating formally, we can say,

� Testing is a process of executing a program with the intent of finding

an error.

� A successful test is one that uncovers an as yet undiscovered error.

� A good test case is one that has a high probability of finding error, if

it exists.

� The tests are inadequate to detect possibly present errors.

� The software more or less confirms to the quality and reliable

Standards.

Page 38: Digital Security Management

38

Levels of Testing :

In order to uncover the errors present in different phases we have the

concept of levels of testing. The basic levels of testing are as shown below..

Client Needs

Requirements

Design

Code

White Box Testing:

This is a unit testing method where a unit will be taken at a time and

tested thoroughly at a statement level to find the maximum possible errors.

The testing is performed on every piece of code, taking care that every

statement in the code is executed at least once.

The reason for choosing white box testing here is this application does not

consist of complex logic paths.So,white box testing is chosen as an

application test . A list of test cases has been generated, sample data which

is used to check all possible combinations of execution paths through the

code at every module level. Some small bugs were identified and were

corrected immediately.

System Testing

Integration Testing

Unit Testing

AcceptanceTesting

Page 39: Digital Security Management

39

Black Box Testing :

Black box testing alludes to test that are conducted at the software interface.

These are used to demonstrate that software functions operational,that input

is properly accepted and correctly produced. This testing method considers a

module as a single unit and checks the unit at interface and communication

with other modules rather getting into details at statement level.

Unit Testing :

Unit testing focuses verification effort on the smallest unit of software i.e.

the module. Using the detailed design and the process specifications testing

is done to uncover errors within the boundary of the module. All modules must

be successful in the unit test before the start of the integration testing begins.

In this system each service can be thought of a module. There are so many

modules like Login,administration,payments and user administration.Giving

different sets of inputs has tested each module. When developing the module

as well as finishing the development so that each module works without any

error. The inputs are validated when accepting from the user.

Integration Testing :

The goal of integration testing is to see if modules can be integrated

properly, the emphasis being on testing interfaces between modules. This

testing activity can be considered as testing the design and hence the

emphasis is on testing module interactions.

Page 40: Digital Security Management

40

System Testing :

Here the entire software system is tested. The reference document for this

process is the requirements document, and the goal as to see if software

meets its requirements.

Here entire application has been tested against requirements of project

and it is checked whether all requirements of project have been satisfied or

not.

Acceptance Testing :

Acceptance Test is performed with realistic data of the client to

demonstrate that the software is working satisfactorily. Testing here is

focused on external behavior of the system; the internal logic of program is

not emphasized.

It is the process of finding errors and missing operations and also a

complete verification to determine whether the objectives are met and the

user requirements are satisfied.

Verification and Validation is used in association with software testing.

Verification:

Verification is the testing of items including software for conformance and

consistency with an associated specification.

Validation:

Validation is the process of testing what has been specified is what the user

actually wanted. Validation test succeed when the software performs exactly

in the manner as expected by the user. Alpha testing can be carried out to

ensure the validity of the system.

Page 41: Digital Security Management

41

Test Cases:

Some of the validations used in this system are as follows:

• The Employee has to register in to system to access various

transactions.

• Administrator should validate the employees in order to login.

• In order to post the issues employee should login in to the system with

valid account.

• With assigning the project employee can not access the project details.

Page 42: Digital Security Management

42

Page 43: Digital Security Management

43

Conclusion

The entire system has been developed and deployed as per the

requirements. The system ‘Digital security management ’ provides

maintenance of accurate data and flexibility. By using the proposed system

we can add the project details easily we can maintain the project details

securely. And the employs will access the projects according to roles hence

the derived system provides security for projects.

Limitations of the system:

.

• Changing and recovery of passwords is not allowed.

• Reports Management is difficult

Future Enhancements:

• As the technology emerges, it is possible to upgrade the system and

can be easily adaptable to desired environment.

.

• Facility of changing and recovery of passwords can be involved.

• We provide reports More efficiently

Page 44: Digital Security Management

44

Page 45: Digital Security Management

45

User Manual

1] Register into the digital security management system.

2] Login into the system after getting the permission from the administrator

3] Access the project details assigned by the administrator

4] Post a issues on the project

5] Solve the issues posted by other employees in the company.

Page 46: Digital Security Management

46

Page 47: Digital Security Management

47

This is home page of digital security management System

Page 48: Digital Security Management

48

This is new user login page

Page 49: Digital Security Management

49

This is user login page.

Page 50: Digital Security Management

50

This is admin login page.

Page 51: Digital Security Management

51

User tasks

Page 52: Digital Security Management

52

User updation screen

Page 53: Digital Security Management

53

Available users and roles

Page 54: Digital Security Management

54

Maintaining the project details

Page 55: Digital Security Management

55

Maintaining the Client details

Page 56: Digital Security Management

56

Maintaining the roles of user and clients

Page 57: Digital Security Management

57

Posting issues

Page 58: Digital Security Management

58

Posting issues by users

Page 59: Digital Security Management

59

Page 60: Digital Security Management

60

BIBLOGRAPHY

• “Database Management System” by Henry F.Korth, Mc.Graw Hill,New

York,1991.

• “Software Engineering,A Practitioner’s approach” by

Roger.S.Pressman,Mc.Graw Hill,New York,first edition,1992.

• “Software Engineering Concepts” by Richard Fairely, Mc.Graw Hill,New

York,first edition ,1985.

• Fundamentals of Database System by Elmasri Navathe, Addison

Wesley,Singapore,third edition,2000.

• “Database Management System” by A.Silberschatz Mc.Graw Hill,New

York,1991.

• “Oracle Database 10g The complete Reference by Oracle Press (Kevin

Loney,author of oracle press),Mc.Graw Hill ,New York,2004.