preview

Nt1310 Unit 4.3 Activity Diagrams

Good Essays

4.3 ACTIVITY DIAGRAM
It demonstrates the workflow behaviour of a system which describes the state of activities by showing the sequence of activities performed in different order. The diagram has branches and forks to describe conditions and parallel activities.
Activity diagrams are graphical representations of workflows of stepwise activities and actions with support for choice, iteration and concurrency. In the Unified Modeling Language, activity diagrams are intended to model both computational and organizational processes (i.e. workflows). Activity diagrams show the overall flow of control.
Activity diagrams are constructed from a limited number of shapes, connected with arrows. The most important shape types:
• rounded rectangles represent …show more content…

Ensuring that physical access to the device you want to secure is restricted to authorized personnel.
• Procedural Security, Organizational policies and procedures in place to preven unauthorized access to equipment.
• Strong encryption. Prevention of off-site access using an unencrypted connection.
• Firewalls. Limiting which network protocols can communicate with which machines in your network.
• Programmes that has security as a main design consideration. These are programmes that are algorithmically secure and have been written in a secure manner.
4.4.2.3 Essential Terminologies
Threat: An action or event that might compromise security. A threat is a potential violation of security.
Vulnerability: Existence of a weakness, design or implementation error that can lead to an unexpected and undesirable event compromising the security of the system.
Target of Evaluation: An IT system, product or component that is identified/subjected to require security evaluation.
Attack: An assault on the system security that is derived from an intelligent threat. An attack is any action that violated security.
Exploit: A defined way to breach the security of an IT system through …show more content…

A hacker attacks an easy target first, and then uses it to hide his identity and traces of launching attacks at more secured sites. The aim of an attack is to gain complete control of the system (in order to edit, delete, install or execute any file in any user’s directory), often by gaining access to a “ super-user” account. This will allow both maximum access and the ability to hide your presence.
Often attacks are based on software bugs that a hacker can use to give himself or herself super-user status. Also one can get a copy of the password file (which stores user names and encrypted passwords and is often publically accessible) and either do a brute-force attack trying all possible combinations, or encrypt a dictionary and compare the results to see if anyone choose a password that is a dictionary word.
Another method of hacking is to email someone a program that either automatically runs or that runs when they click on an attachment. This helps to install a program that will give control of their

Get Access