system analysis and design(sad)march2009@ncceducation

49
Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD) Introduction In this assignment will allow my demonstrate an understanding of the object-oriented analysis and design of a cataloguing system. I have analysis and design a system for an Art Gallery including the creation of a prototype user interface and the transfer of information held on standard paper into the system. Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009 Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 1

Upload: ibamin

Post on 15-Nov-2014

115 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: system analysis and design(SAD)march2009@NccEducation

Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Introduction

In this assignment will allow my demonstrate an understanding of the object-

oriented analysis and design of a cataloguing system. I have analysis and

design a system for an Art Gallery including the creation of a prototype user

interface and the transfer of information held on standard paper into the

system.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 1

Page 2: system analysis and design(SAD)march2009@NccEducation

Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Task 1Analysis the required system using object-oriented method and produce a function

Model including..

● Use case diagrams

● Use case specifications

● Activity diagrams

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 2

Page 3: system analysis and design(SAD)march2009@NccEducation

Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Figure: Use case diagram for loan exhibit

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no :

Order exhibit

Provide exhibit

Manage catalogue

Update record Staff

Other gallery

Privet collector

Curator Assistant Curator

Use case diagram for loan exhibit

<<Extend>>

3

Page 4: system analysis and design(SAD)march2009@NccEducation

Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Figure: Use case diagram for return exhibit

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no :

Return Exhibit

Payment

Update Record

Staff

Other gallery

Privet collector

Curator Assistant Curator

Check exhibit Record

Manage record

<<Extend>>

Fees

Due

Use case diagram for return exhibit

4

Page 5: system analysis and design(SAD)march2009@NccEducation

Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Use case speciation for loan exhibit:

Display item for public viewing to art gallery management staff are responsibilities for order

item as a loan for certain time to author gallery or privet collector E.g. curator and assistant

curator.

The author gallery and privet curator give loan item for certain time,

Management staff also keeps record and these items are held in the art gallery to exhibit in

exhibition room.

After processing of that management staff will update the records by extend manage record.

Use case speciation for return exhibit:

Display item for public viewing to art gallery management staff are responsibilities for Collect

item as a loan for certain time to author gallery or privet collector E.g. curator and assistant

curator.

After collect items, will be keeping record and these items are held in the art gallery to exhibit in

exhibition room. After complete exhibition it is responsibility of management staff to return item

to the owner. e.g. Other gallery and privet collector. In the time of return staff also requires

making payment to the owner. If the item is not return on time there will be include Due.

After processing of that management staff will update the records by extend manage record.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 5

Page 6: system analysis and design(SAD)march2009@NccEducation

Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Figure: Activity diagram for loan exhibit

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no :

Yes

Request for exhibit loan

Other gallery Privet collector

Add record

Received exhibit

Show exhibit

Activity diagram for loan exhibit

No

6

Page 7: system analysis and design(SAD)march2009@NccEducation

Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no :

Yes

Return exhibit

Other gallery Privet collector

Add record

Received exhibit

Check Due

Activity diagram for return exhibit

No

Pay fees

Pay Due

7

Page 8: system analysis and design(SAD)march2009@NccEducation

Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Figure: Activity diagram for return exhibit

Task 2

Analysis the required system using object –oriented method and produce a standard

model including.

● Class diagram

● Attribute operation

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 8

Page 9: system analysis and design(SAD)march2009@NccEducation

Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 9

Page 10: system analysis and design(SAD)march2009@NccEducation

Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no :

Name: Address: Phone: Get Loan ()Add () Update ()

Other collector

Name: Title: Employ ID Phone: Age:

ADD ()Edit ()Update () Search ()

Curator

Management staff

ID:Name: Location: Artist:Fees

Show ()Add () Delete () Search ()

Exhibit Type: Size: Room no: Show ()Update ()

Exhibition room

Loan Type:Loan id:Date of issue: Date of return:

Get loan ()Add () Update () Due ()

Loan

Name: Address: Phone: Get Loan ()Add () Update ()

Privet gallery

Name: Address: Phone: Show ()Get loan ()Return ()Add () Update ()

Art gallery

Name: Title:Employ IDPhone: Age: ADD ()Edit ()Update record () Search ()

Assistant Curator

Type: Location:

Add () Delete () Update ()

Record

Class diagram for show exhibit to art Gallery:

1

1

0…*

0….*

1

1

0….*

0….*1

0….*

Add record

Request loan

Collect exhibit

Show

Get loan

10

Page 11: system analysis and design(SAD)march2009@NccEducation

Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Task 3Analysis the required system using object –oriented method and produce a

behavioral model including.

● Sequence diagram

● State machines

● Communication diagram

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 11

Page 12: system analysis and design(SAD)march2009@NccEducation

Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Figure: Sequence diagram for exhibition

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no :

Art gallery Store room

Other collector/ privet gallery

Start search item ()

Search ()

Exhibit

Exhibition room

[Found] collect

[Not Found] Loan

Send Loan request ()

Request Confirmation

* Collect Exhibit and keep record ()

Show ()

Show () Done

Sequence diagram for exhibition

12

Page 13: system analysis and design(SAD)march2009@NccEducation

Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Figure: state machines for exhibition

Figure: Communication diagram for exhibition

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no :

Exhibit Processing Loan exhibit

Show exhibit

Held and record exhibit

Search exhibit

Search

If not found

State machines for exhibition

Staff

Record Other gallery / privet collector

1: Request loan

2: Get loan

4: show exhibit

Exhibition room

Feedback

Exhibit

Feedback

3: Upd

ate re

cord

Feedback

Communication diagram for exhibition

13

Page 14: system analysis and design(SAD)march2009@NccEducation

Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Task 4Research the possible method for adding the current paper based information

to the system. Write a brief report that:

a) Outline the possible method of transferring the data.

b) State the advantages of each method.

c) Recommendation the method should be utilized with reason for yor

recommendation

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 14

Page 15: system analysis and design(SAD)march2009@NccEducation

Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

a)

Data transferring method

Tow types of data transferring method

1. Online data transferring : it is refers to data the under the direct

control of the computer. Example floppy disk, magnetic disk,

and mass storage.

Where there is a need to refer to data frequently on line storage is

employed. Online data file are commonly referred to as an

organization’s data base. Where information is currently located in

one or several data base. How ever within a distributed processing

mode, data file are referred to as distributed data base because

many data base are scattered throughout an organizational

operation.

2. Offline data transferring : it is refers to data that are not under

the direct control of the computer. Example punched card and

magnetic card.

This data file can be use in input a computer system to permit the

updating and retrieval of information, or they can be used to

produce output from the system. Generally data needing to be

referenced only periodically, usually weekly or frequently, are good

candidates for off line storage.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 15

Page 16: system analysis and design(SAD)march2009@NccEducation

Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

b)

Advantages and disadvantages of data transferring method

Off-line data transferring:

Punched card

Advantages

Provide a check of information printed on the card

For small volumes of data

Economical and efficient from of file storage.

Disadvantages

Limited amount of storage data

Many times, it is necessary to employ more then once card to store a

record of information.

Processing of card input and card output is slow in compression of

magnetic tape and magnetic disk.

Magnetic tape

Advantages

It's inexpensive to operate and buy, and even cheaper to store,

It is used for cheap backup of the system data or the information.

The cost of storage of the data or the information in the tape drive is much

cheaper as that comparable to the other forms of the storage media.

The heads in the tape media are separated from the media..

The assumption is made in consideration with the tape drive’s internal

structure.

it is in existence along with the usage of the tape drive is that the tapes

are usually stored as the offline The most common one that can be

considered is the power failure or any power surges; can also cause the

failure of the tape drive. The reliability and the cost of operation involved is

more in the case of the tape drives. In short the tape drives are considered

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 16

Page 17: system analysis and design(SAD)march2009@NccEducation

Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

as more durable than the disk drives like the hard disks, floppy disks and the

optical storage disks.

Disadvantages

Regarding the tape backup is that of the access time or the seek time that

it requires.

Retrieving data from most tape backup drives requires that the data files

be restored to the hard disk. Other types of backup storage can be treated

as a drive letter for direct use from the media.

The access time is more in case of the tape drives than in comparison

with the other media storage devices.

On-line data transferring:

Floppy disk

Advantages

Floppy disk red and write information much faster.

Stored data are sequentially

They are very cheap to buy and floppy disc drives are very common.

Disadvantages

They are easily physically damaged if unprotected and magnetic fields can

damage the data.

They are relatively slow to access because floppy discs rotate far more

slowly than hard discs, at only six revolutions per second, and only start

spinning when requested. The access speed is about 36 KB per second.

Floppy Disc is the unreliability

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 17

Page 18: system analysis and design(SAD)march2009@NccEducation

Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Magnetic disk file

Advantages

Any item of data is as quickly obtained as any other.

Ability to process transaction without previously storing the data.

Random access operation

Direct access ability plus the vast storage capability.

Retrieve fast transfer rate made them widely used in computer operation.

Disadvantages

Higher cost over magnetic tape file

None really!  It can however be a real disaster when they eventually fail

because few home users have the data on their home computer hard

drive backed up.

Mass storage file

Advantages

Large amount of data that can be stored on line

Coast of mass storage making such a method of storage economically

feasible.

•A user is linked directly to a computer for the purpose of data input or

receiving output.

There is a direct link from transmission medium to the computer

processor.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 18

Page 19: system analysis and design(SAD)march2009@NccEducation

Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

c)

Recommendation:

My recommendation about data transferring method that Online- Mass storage

File method is better, because mass storage file provide secondary storage

capability. Such storage system reflects significant improvement in operating

efficiency and enhanced data security over conventional computer tap libraries.

For example, the CDC 38500 mass storage system from control data corporation

holds 2000 magnetic tap cartridges, each of which has a data storage capacity of

8 million byte of on-line data, totaling a maximum of 16 billion characters of

stored data system capacity is equivalent to approximately 6400 average tape

reels or 200 disk drive. Also, IBM offers a comparable system, the 3850 Mass

storage system.

The Mass storage system may be under the control of up to four computers. It

also operates through a data string process that is information transmitted to

intermediate disk storage for subsequence computer processing. Over all, such a

system has capability to meet storage requirement of any large computer

installation.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 19

Page 20: system analysis and design(SAD)march2009@NccEducation

Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 20

Page 21: system analysis and design(SAD)march2009@NccEducation

Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Task 5Create a prototype user interface for the gallery catalogue, as a minimum, the

flowing function:

a) Searching for the location of an item.

b) Editing an item’s detail

c) Adding a new item’s

d) Listing item’s due for return to their owners by a selected date

Print screenshot of the user inter face for the in a), b), c), and d) above.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 21

Page 22: system analysis and design(SAD)march2009@NccEducation

Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

I have create a prototype user interface for the art gallery catalog system including

the searching for the location of an item, editing an item’s details, adding a new item

and listing due for return to their owners by a selected data.

a) Searching for the location of an item

Step: 1 for search item. input the item name or item number in the box of item name or

item number. After input the item name or item number click to search Button. Then

display search item.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no :

Exhibition roomLocation

22

Page 23: system analysis and design(SAD)march2009@NccEducation

Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

b) Editing an item’s details

Step: 2 for Edit item. Input the item name or item number in the box of item name or item

number. After input the item name or item number click to Edit Button. Then display and

update item on database.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no :

Exhibition roomLocation

23

Page 24: system analysis and design(SAD)march2009@NccEducation

Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

c ) Adding a new item

Step: 3 for ADD item. Input the item name, item number, printer, price and Location in the

box of item name or item number, printer, price and Location. After input the item name

or item number click to Add Button. Then display and creat item on database.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no :

Location Exhibition room

24

Page 25: system analysis and design(SAD)march2009@NccEducation

Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Listing due for return to their owners by a selected data

Step: 4 listing due for return to their owners by a selected data. After

input the item name or item number click to View Button. Then display

list due for return to their owners by a selected data.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no :

View

25

Page 26: system analysis and design(SAD)march2009@NccEducation

Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Task 6Create a relational database design for the Art Gallery catalogue

system including:

a) A set of fully normalized showing the normalization process for

each.

B) Data dictionary for all items including in the database design.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 26

Page 27: system analysis and design(SAD)march2009@NccEducation

Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

a)

Normalization process

Un Normalized data

1 NF 2NF 3 NF Fully normalize

Item _name

Item_ID

artist

Price

Item Type

Loan ID

Date of issue:

Date of return:

Staff Name

Employ ID

Title

Phone:

Age:

P_Name:

P_Address:

P_Phone:

Item

Item _name

Item_ID

artist

Price

Item Type

Loan ID

Date of issue:

Date of return:

Staff Name

Employ ID

Title

Phone:

Age:

Privet gallery

P_Name:

P_Address:

P_Phone:

Item

Item _name

Item_ID

artist

Price

Item Type

Loan ID

Date of issue:

Date of return:

Staff Name

Employ ID

Title

Phone:

Age:

Privet gallery

P_Name:

P_Address:

P_Phone:

* Loan_ID

Item

Item _name

Item_ID

artist

Price

Item Type

Loan ID

Date of issue:

Date of return:

* Employe_id

Management staff

Staff Name

Employ ID

Title

Phone:

Age:

Privet gallery

P_Name

P_Address

P_Phone

* Loan_ID

Item

Item _name

Item_ID

artist

Price

Loan

Item Type

Loan ID

Date of issue:

Date of return:

* Employe_ID

Management staff

Staff Name

Employ ID

Title

Phone:

Age:

Privet gallery

P_Name

P_Address

P_Phone

* Loan_ID

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 27

Page 28: system analysis and design(SAD)march2009@NccEducation

Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

b)Data dictionary

Data dictionary for exhibit

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no :

Data Diction

ary

Title

Exhibition

System

Local art gallery

Sheet 1

Type: item Name: exhibit

Local art

gallery system

Definition:

Exhibit = Item name+ item number + Location +printer +Price

Occurrence: One or, two time per month

Operation: Show, Add, Delete, Search

Author: Md: Ibrahim

Date: 05/02/2009

Length:

120 kbps

28

Page 29: system analysis and design(SAD)march2009@NccEducation

Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Data dictionary for privet gallery

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no :

Data Diction

ary

Title

Exhibition

System

Local art gallery

Sheet2

Type: organization

Name: privet gallery

Local art

gallery system

Definition:

Privet gallery = name+ address +phone number printer +

Occurrence: One or, two time per month

Operation: Get Loan ,Add record ,Update record

Author: Md: Ibrahim

Date: 05/02/2009

Length:

60 kbps

29

Page 30: system analysis and design(SAD)march2009@NccEducation

Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Data dictionary for management staff

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no :

Data Diction

ary

Title

Exhibition

System

Local art gallery

Sheet3

Type: staff Name: management

staff

Local art

gallery system

Definition:

Management staff = staff id+ staff name +Staff title+ phone+ age

Occurrence: One or, two time per month

Operation: ADD record, Edit record, Update record,Search,

Author: Md: Ibrahim

Date: 05/02/2009

Length:

100 kbps

30

Page 31: system analysis and design(SAD)march2009@NccEducation

Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Data dictionary for Loan Item

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no :

Data Diction

ary

Title

Exhibition

System

Local art gallery

Sheet 4

Type: item Name: loan

Local art

gallery system

Definition:

Loan item = Item type+ Loan id +date of issue + date of return

Occurrence: One or, two time per month

Operation: Get loan. Add loan record. Update loan, Due

Author: Md: Ibrahim

Date: 05/02/2009

Length:

120 kbps

31

Page 32: system analysis and design(SAD)march2009@NccEducation

Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Task 7Research the security issue relating to the gallery computer system write a

brief report:

a) Explain the possible treats to security.

b) Describe the possible consequences of a branch of security.

c) States the method you would use to ensure that only the curator and

assistant curators have write, edit and delete permission.

d) Explain how you would allow the website to have read-only access to

the relevant information.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 32

Page 33: system analysis and design(SAD)march2009@NccEducation

Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

a)

Possible treats to security in an Art Gallery:

Physical attacks

Along with the many ways that a network can be attested by electronic means. There

are many ways that it can be attested physically. This can be as a result of malicious

activity, or a consequence of natural events, or by accident. In general, physical

attacks tend to result in denial of service. This kind of attest including…

Fire, either accidentally started or deliberately.

Lighting strikes

Flood

Earthquake damage

Theft of equipment

Damage to Hardware

Damage software

Virus attacks

A virus is a malicious program that can be attacked to an executable program, or can

be in other executable forms, such as macros scripts. The program can carry a

payload that causes damage to the host computer system that has been infected.

Unauthorized access

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 33

Page 34: system analysis and design(SAD)march2009@NccEducation

Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Unauthorized access System attempt to access computing facilities for which they

have not been authorized. Cracking a computer's defenses is seen as the ultimate

victimless crime. The perception is that nobody is hurt or even endangered by a little

stolen machine time. Crackers enjoy the simple challenge of trying to log in, just to see

whether it can be done. Most crackers can do their harm without confronting anybody,

not even making a sound. In the absence of explicit warnings not to trespass in a

system, crackers infer that access is permitted. An underground network of hackers

helps pass along secrets of success; as with a jigsaw puzzle, a few isolated pieces

joined together may produce a large effect. Others attack for curiosity, personal gain,

or self-satisfaction. And still others enjoy causing chaos, loss, or harm. There is no

common profile or motivation for these attackers.

A person not authorized to use information in the computer can get access to

information and use the information.

b) Possible consequences of a branch of security

Building Maintenance

A regime of planned and documented building maintenance will go a long way towards

minimizing the risk of floods, fire, theft, vandalism and invasion by pests. Routines

should include regular temperature and humidity checks in areas designated as

vulnerable to damp.

Equipment Maintenance

Equipment maintenance is essential both to ensure that equipment failure does not

cause a treats and to assure the reliability of equipment in a disaster situation. Ensure

that equipment stored to deal with a disaster is included in maintenance routines

Anti-virus software Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 34

Page 35: system analysis and design(SAD)march2009@NccEducation

Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Anti-virus is used to identify and remove computer viruses, as well as many other

types of harmful computer software, collectively referred to as malware. While the first

antivirus software was designed exclusively to combat computer viruses.

User authentication

One of the mechanisms that is used in computerized system is authentication. These

are mechanisms that allow the computer system to identify person, or system

attaching to the computer system, and to determine whatever or not are they allowed

doing so.

A simple example of an authentication mechanism is the use of a user name and

password. The systems examine the username, looks the password it expects for that

user and compares it with the password given.

In a general authentication mechanism consist of a series of one or more Challenges

from the system to the user, flowing by the response from the user to the system. In

the password example, the Challenge request the username and password the

response tells the system what they are. Other types of challenge might include the

use of …

Pin number

Finger print recognition

Smart card

Voice recognition

Handwriting (signature ) recognition

In some case these mechanism might be used in combination.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 35

Page 36: system analysis and design(SAD)march2009@NccEducation

Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

c)

Method to ensure that only the curator and assistant curator have write, edit and

delete permission:

I will be ensure only the management staff write, edit and delete by flowing

way ….

First go database and “click on” Tools ” then “click on” security and again “click on” User and

Group Permission. Figure:1

figure: 1

Than “click on” Groups and pick up Modify Design, Administer, then “click on” Apply and OK. In Figure: 2 Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 36

Page 37: system analysis and design(SAD)march2009@NccEducation

Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

Figure: 2

Staff (curator and assistant curator) is required to sign an art gallery system and

accept the Usage Policy.

For each will be an individual User-ID and password.

Patrons/ Brower are can access only display item and comment to this item.

Only staff can access ADD, Update. Search, Edit and delete function.

Database can access with a limited number of licenses needs to have regulated

access.

I will be provide filtered Internet access to staff

d)

Read only access method of web site to relevant information

In Web applications, it is very common for a page to simply display data — that is, for

the data on the page to be read-only. Typical examples include catalog listings, search

results, and so on. Users might act on the data by clicking a button to add an item to a

shopping cart or clicking a link on the page, but those actions do not directly affect the

data on the page.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 37

Page 38: system analysis and design(SAD)march2009@NccEducation

Inter national Advances Diploma in Computer Study (IADCS) System Analysis and Design (SAD)

It is possible to grant read-only repository access to people using the password-

authenticated server (The other access methods do not have explicit support for read-

only users because those methods all assume login access to the repository machine

anyway, and therefore the user can do whatever local file permissions allow her to do.)

A user who has read-only access can do only those CVS operations which do not

modify the repository, except for certain "administrative" files (such as lock files and

the history file). It may be desirable to use this feature in conjunction with user-

aliasing (*note Password authentication server ::.). However, note that read-only

access does not repeal the existing security considerations in *Note Password

authentication security.

There are two ways to specify read-only access for a user: by inclusion, and by

exclusion.

Inclusion" means listing that user specifically in the

`$CVSROOT/CVSROOT/readers' file, which is simply a new line-separated list of

users. Here is a sample `readers' file:

Melissa

Splotnik

Jrandom

(Don't forget the new line after the last user.)

"Exclusion" means explicitly listing everyone who has *write* access--if the file

$CVSROOT/CVSROOT/writers exists, then only those users listed in it have write

access, and everyone else has read-only access (of course, even the read-only users

still need to be listed in the CVS `password' file). The `writers' file has the same format

as the `readers' file.

Candidate name: MD. Ibrahim Amin NCC candidate NO: Examination Cycle: March 2009

Assignment title: Art gallery Module name: System Analysis and Design (SAD) Page no : 38