4.3 ACTIVITY DIAGRAM
It demonstrates the workflow behaviour of a system which describes the state of activities by showing the sequence of activities performed in different order. The diagram has branches and forks to describe conditions and parallel activities.
Activity diagrams are graphical representations of workflows of stepwise activities and actions with support for choice, iteration and concurrency. In the Unified Modeling Language, activity diagrams are intended to model both computational and organizational processes (i.e. workflows). Activity diagrams show the overall flow of control.
Activity diagrams are constructed from a limited number of shapes, connected with arrows. The most important shape types:
• rounded rectangles represent
…show more content…
Ensuring that physical access to the device you want to secure is restricted to authorized personnel.
• Procedural Security, Organizational policies and procedures in place to preven unauthorized access to equipment.
• Strong encryption. Prevention of off-site access using an unencrypted connection.
• Firewalls. Limiting which network protocols can communicate with which machines in your network.
• Programmes that has security as a main design consideration. These are programmes that are algorithmically secure and have been written in a secure manner.
4.4.2.3 Essential Terminologies
Threat: An action or event that might compromise security. A threat is a potential violation of security.
Vulnerability: Existence of a weakness, design or implementation error that can lead to an unexpected and undesirable event compromising the security of the system.
Target of Evaluation: An IT system, product or component that is identified/subjected to require security evaluation.
Attack: An assault on the system security that is derived from an intelligent threat. An attack is any action that violated security.
Exploit: A defined way to breach the security of an IT system through
…show more content…
A hacker attacks an easy target first, and then uses it to hide his identity and traces of launching attacks at more secured sites. The aim of an attack is to gain complete control of the system (in order to edit, delete, install or execute any file in any user’s directory), often by gaining access to a “ super-user” account. This will allow both maximum access and the ability to hide your presence.
Often attacks are based on software bugs that a hacker can use to give himself or herself super-user status. Also one can get a copy of the password file (which stores user names and encrypted passwords and is often publically accessible) and either do a brute-force attack trying all possible combinations, or encrypt a dictionary and compare the results to see if anyone choose a password that is a dictionary word.
Another method of hacking is to email someone a program that either automatically runs or that runs when they click on an attachment. This helps to install a program that will give control of their
Linton (2011, p.44) stated that hacking of network of common users and attacking their personal computers is one of the most threatening problems at present. It is happening in every second that results in a loss in several ways like loss of credentials, personal information etcetera. Although the use of personal computers and the internet has been increased rapidly, numbers of users who are the expert and have good knowledge to tackle the matters are very rare. In addition, time, as well as required equipment to protect hacking, is also very.
Here the model depicts five use the logical view, the process view, the physical view, development view and use case view. These views of the system are concurrent and each offers its own
Workflows are tools that manage personal, office, department or an entire organization's processes. A SharePoint workflow is an automated flowchart that takes a lot of the effort, guesswork, and arbitrariness out of your regular work processes and makes it simpler for you to streamline your tasks. It is most useful in automating existing conceptual or manual work processes of the company and reducing human dependence on enterprise as far as possible.
Security risk analysis is performed periodically and when a change occurs in the practice or the technology.
Answer: Threats are areas where there is potential for an attack An attack is an act or event that exploits those vulnerabilities.
An event diagram represents the final area of my discussion of the Process Modeling method. An event diagram represents a context diagram that focuses on the inputs, outputs, and data store interactions for a single event. In addition, most event diagrams are also representative of a single process, which can be referenced back to the event identified for a decomposition diagram. Event diagrams therefore are valuable for identifying and addressing event driven factors, which when combined with other
Flowcharts are the ideal diagrams for visually representing business processes. For example, if you need to show the flow of a custom-order process through various departments within your organization, you can use a flowchart. This paper provides a visual representation of basic flowchart symbols and their proposed use in communicating the structure of a well-developed web site, as well as their correlation in developing on-line instructional projects. A typical flowchart from older Computer Science textbooks may have the following kinds of symbols:
Security threats defined by acts or objects that pose a danger to a system’s security
In today’s society, the term hacker is very well known across the world. It is scary to know that you are being a victim of any individual who works with remote computers. People who use unauthorized entries to other computers through communication networks such as the Internet, are known as hacker. Since the technology has improved, all people should have information about hackers and how we can protect our systems against them.
12. A graphical depiction of the logical steps to carry out a task and show how the steps relate to
UML consists of several diagrams which are used in developing the project or software. Among those 6 diagrams are used frequently to develop the software. Use case diagram is the representation of the interaction between the customer or the user with the system or product. Class diagram shows the architecture of the software by determining the classes used in the system. Activity diagrams are the pictorial notation of the steps which are followed in developing the system. Collaboration diagram shows the interaction between the objects and classes of the system. Sequence diagram defines the steps involved in the project and in which order they should occur. State chart diagrams are typically used to define the properties of the software. Object diagram is alike to the class diagram, which concentrates on the attributes and classes of the product. Component diagram shows how small chunks of components are combined unitedly to form a bigger component of the product. Deployment diagram depicts how the system should deploy and where the deployment should be done.
Attack on a systems or network is defined on your network infrastructure. Attacker will first analyse network environment and collect information in order to take advantage of the existing open ports or vulnerabilities. It may include unauthorized access to company’s resources.
An activity diagram is typically used when generating business processes and describes numerous activities, what user is in charge of each action and the stream of all events. The diagram shows graphic features of a workflow throughout a specific business process that functions
UML activity diagrams are used to provide code completeness and user interactions. Activity diagrams are referenced in sequence diagrams.
Hazard: - A hazard is a situation that poses a level of threat to life, health, property, or environment (wikipedia, 2015).