Professional Documents
Culture Documents
Specification
for
Prepared by
0314101
0315048
0315321
0309284
Instructor:
Course:
wanhoy.cheong@sd.taylors.edu.m
y
kengchye.koh@sd.taylors.edu.my
kajiunngoh@gmail.com
Oscaryip4315@hotmail.com
Lab Section:
Teaching Assistant:
Date:
Page ii
Contents
CONTENTS ................................................................................................................................................................II
REVISIONS .............................................................................................................................................................. IV
1
INTRODUCTION ...............................................................................................................................................1
1.1
1.2
1.3
1.4
1.5
1.6
OVERALL DESCRIPTION............................................................................................................................... 4
2.1
2.2
2.3
2.4
2.5
2.6
2.7
Page iii
4.2.6
Data Integrity.......................................................................................................................................14
4.3
SOFTWARE QUALITY ATTRIBUTES ...........................................................................................................14
4.3.1
Portability ............................................................................................................................................14
4.3.2
Maintainability ....................................................................................................................................15
4.3.3
Correctness ..........................................................................................................................................15
4.3.4
Reliability.............................................................................................................................................15
5
Page iv
Revisions
Version
Primary Author(s)
Description of Version
Draft Type
and
Number
Full Name
Date Completed
00/00/00
Page 1
1 Introduction
1.1 Document Purpose
The purpose of the document is to provide a detailed overview of the software, as well as
giving the outline for the requirement in order to give better understanding of the software. This
document will focus on the functionality of the software. This document will also specify the
requirements that will be needed to develop the software.
Acronym
CSS
Literal Translation
Cascading Style Sheets
Page 2
FTP
GUI
HTML5
HTTP
HTTPS
IEEE
OS
Operating System
SRS
TCP/IP
UML
XHTML
iOS
iphone OS
RAID 0
DMZ
Demilitarized Zone
Term
Definition
Constraints
Feasible
Privilege
Page 3
Level
Troubleshoot
Verification
Page 4
2 Overall Description
2.1 Product Perspective
Profect is an extension of online website-developing software and is therefore a follow-on member
of a product family. Profect functions very much like many web-developing software and allows for
quick and easy design of web pages. However, Profect is a unique variant that concentrates on
the production of professional electronic documents and portfolios. Profect provides a way for
users to easily generate professional and quality e-portfolios from scratch quickly and easily.
Additionally, employers are able to search through a rich e-portfolio database of job candidates
based on specific keywords and filters.
Page 5
Page 6
Page 7
3 Specific Requirements
3.1 External Interface Requirements
3.1.1 User Interfaces
Web Page Outline:
Homepage (Sign in Button, Page menu button bar)
My Portfolio
o Sign in Screen: Email & password input box, Radio button for New user Or
Existing user, A Remember me checked box, A GO button
o Sign in successfully message: Go to dashboard page which consists of all the
portfolio created
o Unsuccessful login message: Invalid email or password.
o Dashboard Screen (If log in is successful): Create new portfolio button, Edit
button , delete button,
Explore Portfolio
o Gallery of portfolio examples
o A search bar included (Filter the types and category)
Page 8
The login information will be shared across the different web browser in a local machine if the
user used the Remember Me option which will store the username and password as a local
internet cache. The web browsers will be automatically use this local cache to fill in the login
information for the consecutive logins. However, there is one constraint for the implementation
which is the local cache that created on the local machine are only available to that machine
alone. You need to re-input the login information for others machine or computers.
Page 9
Active auto-saving
o
All changes made to the content of the e-portfolio are automatically saved every
time changes are made. This function is utilized throughout the e-portfolio
modification process.
Page 10
Employers can enter specific keywords and choose filters to screen out the job
candidates that meet their criteria. Examples of keywords are independent,
and multilingual. Filters are more specific and can be chosen from drop-down
lists and checkboxes. Examples of filters are years of work experience, field of
study/work, spoken languages, and country of residence.
Page 11
Page 12
Web browsers is the external actor which associate with the user to interact with the
system in order to fully utilize the functionality of the system.
3.3.1.2 Use Case
The key use case that are being captured in the system are as following:
Sign Up Account
One of the initial Use Case that showing the unregistered user need to sign up account
before they can fully utilize the functionality of the system.
Login Account
One of the initial Use Case that the registered user can log in to access our core
system for the purpose of create portfolio, delete portfolio and etc..
Explore Portfolio
One of the initial Use Case shows that both registered or unregistered users are able to
explore the example of created portfolio by using keyword filtered-based search.
Verify Account Validity
This Use Case only occurs if the registered user want to login their account. This is
consider a verification action for unauthorized access. Hence, the extension point for
this use case is invalid login attempt.
Check Account Availability
This Use Case is for the purpose for checking account availability in the systems web
server to verify whether the sign-up information provided by the users is conflicting with
the existing accounts.
Send Error Message
Web browsers will send the error message to the users if the invalid login or sign up
attempts.
Manage Account Settings
Allow registered users to change certain settings for the account created.
Log Out Account
Registered users might log out of the account for security purpose.
Create Portfolio, Edit Portfolio, Delete Portfolio
Registered users can manage their portfolio through creating a new portfolio, delete
existing portfolio, and make changes to the content of the portfolio.
Page 13
4.2.3 Firewalls
Usually hacking is done by different kind of hacker such as black hat hacker, white hat hacker, or
many others, that why the server has to be strengthen to prevent this happen. So by having this
solution is to provide the databases and the server with the feature of double firewall, which known
Page 14
as demilitarized zone (DMZ) configuration because with the double solid layer of protection, it
actually can help detect most of the penetration made on the internal network. Besides that, with
this safeguard, it actually filter everything more than just one time, making it more safe when
accessing databases and server, and it also helped to guard more sensitive internal network from
nefarious external users. Actually this security that provided is much better than the single
configuration.
4.2.5 Authentication
For this security, authentication actually addresses security and safety requirements to ensure
those who are using the system are actually their own self who access it. This is definitely one of
the biggest concern when data is being involved. A users authentication is primarily done through
usernames and passwords, which actually each users will have their own account and it can be
only accessed by their own self, so that their data will be kept safe and only them can see their
own data and others people cannot simply access peoples data without the users username and
password.
Page 15
4.3.2 Maintainability
For the maintainability, it actually refer to the ability of the system should be able and easy to
extend. By allowing for testing of different functions, and the test environment will be build for
the system. Besides that, the codes will be written in a way that it favors implementation of
new functions in the future. The system will also be fit and fulfill all the requirements to perform
system testability. By achieving it, we can actually making the maintainability work to be easy
by making the line of codes to be easy to understand with comment on it, so that when another
person who come in and in charge of this, he or she will understand each line of the code and
how did it work. Other than that, we can also make the codes short and organize for easy to
maintain.
4.3.3 Correctness
Correctness should be there to provide facilities for legal persons only. A boundary has been
set to ensure privacy and precision as appropriate. Any classified information can only be
viewed by restricted audience.
4.3.4 Reliability
Since this is a security product the reliability is a major requirement to achieve security goals.
The system must be efficiently available 24/7 and be able to handle a high maximum number
of load.
Page 16
5 Other Requirements
<This section is Optional. Define any other requirements not covered elsewhere in the SRS. This
might include database requirements, internationalization requirements, legal requirements, reuse
objectives for the project, and so on. Add any new sections that are pertinent to the project.>
Page 17
Length
8~36
Data Type
String
Purpose
Authentication
Data Owner
Security Dept.
accountPassword
8~36
String
Authentication
Security Dept.
accountAccessLevel
24
String
Access Privileges
accountFirstName
24
String
User Details
Database
Admin
Database Dept.
accountLastName
24
String
User Details
Database Dept.
accountCreatedDate
N/A
Date
Account Record
Database Dept.
accountContactNo
24
Numeric
User Details
Database Dept.
accountEmail
36
String
User Details
Database Dept.
Page 18
Meeting Minute 1
Date:
7 April 2015
Time:
Attendance
Koh Keng Chye, Cheong Wan Hoy, Goh Ka Jiunn, Oscar Yip
Agenda Items
Outcomes
All of the team members need to do research regarding the projects methodologies.
Meeting Minute 2
Date:
9 April 2015
Time:
Attendance
Koh Keng Chye, Cheong Wan Hoy, Goh Ka Jiunn, Oscar Yip
Agenda Items
Page 19
Outcomes
Next meeting need to discuss and identify the functional requirement for the system.
Meeting Minute 3
Date:
10 April 2015
Time:
Attendance
Koh Keng Chye, Cheong Wan Hoy, Goh Ka Jiunn, Oscar Yip
Agenda Items
Outcomes
Cheong Wan Hoy is responsible in filling the (2. Overall Description) in SRS.
Koh Keng Chye is responsible in fill the (3. Specific Requirements) in SRS.
Meeting Minute 4
Date:
14 April 2015
Time:
Attendance
Koh Keng Chye, Cheong Wan Hoy, Goh Ka Jiunn, Oscar Yip
Page 20
Agenda Items
Outcomes
All team members are required to further refine and fix the mistakes in SRS.
Cheong Wan Hoy is going to design the prototype based on the design outline which
has been established.