4.3 ACTIVITY DIAGRAM
It demonstrates the workflow behaviour of a system which describes the state of activities by showing the sequence of activities performed in different order. The diagram has branches and forks to describe conditions and parallel activities.
Activity diagrams are graphical representations of workflows of stepwise activities and actions with support for choice, iteration and concurrency. In the Unified Modeling Language, activity diagrams are intended to model both computational and organizational processes (i.e. workflows). Activity diagrams show the overall flow of control.
Activity diagrams are constructed from a limited number of shapes, connected with arrows. The most important shape types:
• rounded rectangles represent
…show more content…
Ensuring that physical access to the device you want to secure is restricted to authorized personnel.
• Procedural Security, Organizational policies and procedures in place to preven unauthorized access to equipment.
• Strong encryption. Prevention of off-site access using an unencrypted connection.
• Firewalls. Limiting which network protocols can communicate with which machines in your network.
• Programmes that has security as a main design consideration. These are programmes that are algorithmically secure and have been written in a secure manner.
4.4.2.3 Essential Terminologies
Threat: An action or event that might compromise security. A threat is a potential violation of security.
Vulnerability: Existence of a weakness, design or implementation error that can lead to an unexpected and undesirable event compromising the security of the system.
Target of Evaluation: An IT system, product or component that is identified/subjected to require security evaluation.
Attack: An assault on the system security that is derived from an intelligent threat. An attack is any action that violated security.
Exploit: A defined way to breach the security of an IT system through
…show more content…
A hacker attacks an easy target first, and then uses it to hide his identity and traces of launching attacks at more secured sites. The aim of an attack is to gain complete control of the system (in order to edit, delete, install or execute any file in any user’s directory), often by gaining access to a “ super-user” account. This will allow both maximum access and the ability to hide your presence.
Often attacks are based on software bugs that a hacker can use to give himself or herself super-user status. Also one can get a copy of the password file (which stores user names and encrypted passwords and is often publically accessible) and either do a brute-force attack trying all possible combinations, or encrypt a dictionary and compare the results to see if anyone choose a password that is a dictionary word.
Another method of hacking is to email someone a program that either automatically runs or that runs when they click on an attachment. This helps to install a program that will give control of their
They show the interaction between objects to create a functioning system and emphasize what must happen in the system being modeled. Since behavior diagrams illustrate the behavior of a system, so they are used extensively to describe the functionality of software systems, and all
“A Business Process Explorer: Recovering and Visualizing E-Commerce Business Processes” is a research paper developed by the author: Jin Guo, King Chun Foo, Liliane Barbour, and Ying Zou. The focus of this paper is a business process and how it affects e-commerce systems. Business process can be defined as an assortment of linked, designed actions or responsibilities that are linked together by control flow foundations. E-commerce uses business processes to systematize the day-to-day work flow of an organization.
Workflows are tools that manage personal, office, department or an entire organization's processes. A SharePoint workflow is an automated flowchart that takes a lot of the effort, guesswork, and arbitrariness out of your regular work processes and makes it simpler for you to streamline your tasks. It is most useful in automating existing conceptual or manual work processes of the company and reducing human dependence on enterprise as far as possible.
Security risk analysis is performed periodically and when a change occurs in the practice or the technology.
Vulnerability is a weakness is a system that leaves the system open to attacks. Exposure is the known vulnerabilities that make a system weak and open to attacks without protection.
Linton (2011, p.44) stated that hacking of network of common users and attacking their personal computers is one of the most threatening problems at present. It is happening in every second that results in a loss in several ways like loss of credentials, personal information etcetera. Although the use of personal computers and the internet has been increased rapidly, numbers of users who are the expert and have good knowledge to tackle the matters are very rare. In addition, time, as well as required equipment to protect hacking, is also very.
UML activity diagrams are used to provide code completeness and user interactions. Activity diagrams are referenced in sequence diagrams.
12. A graphical depiction of the logical steps to carry out a task and show how the steps relate to
An activity diagram is typically used when generating business processes and describes numerous activities, what user is in charge of each action and the stream of all events. The diagram shows graphic features of a workflow throughout a specific business process that functions
Attack on a systems or network is defined on your network infrastructure. Attacker will first analyse network environment and collect information in order to take advantage of the existing open ports or vulnerabilities. It may include unauthorized access to company’s resources.
Vulnerability: - Vulnerability in this context can be defined as the diminished capacity of an individual or group to anticipate, cope with, resist and recover from the impact of a natural or man-made hazard. The concept is relative and dynamic. Vulnerability is most often associated with poverty, but it can also arise when people are isolated, insecure and defenceless in the face of risk, shock or stress. (IFRC, what is vulnerability?, 2015).
Flowcharts are the ideal diagrams for visually representing business processes. For example, if you need to show the flow of a custom-order process through various departments within your organization, you can use a flowchart. This paper provides a visual representation of basic flowchart symbols and their proposed use in communicating the structure of a well-developed web site, as well as their correlation in developing on-line instructional projects. A typical flowchart from older Computer Science textbooks may have the following kinds of symbols:
An event diagram represents the final area of my discussion of the Process Modeling method. An event diagram represents a context diagram that focuses on the inputs, outputs, and data store interactions for a single event. In addition, most event diagrams are also representative of a single process, which can be referenced back to the event identified for a decomposition diagram. Event diagrams therefore are valuable for identifying and addressing event driven factors, which when combined with other
Security threats defined by acts or objects that pose a danger to a system’s security
In today’s society, the term hacker is very well known across the world. It is scary to know that you are being a victim of any individual who works with remote computers. People who use unauthorized entries to other computers through communication networks such as the Internet, are known as hacker. Since the technology has improved, all people should have information about hackers and how we can protect our systems against them.