Professional Documents
Culture Documents
Assignment 2
1
Table of Contents
TABLE OF FIGURES .......................................................................................................................... 3
LIST OF TABLES .................................................................................................................................. 3
P6 Use appropriate software analysis tools/techniques to carry out a software investigation and create
supporting documentation. ..................................................................................................................... 6
1.Stackholders : .......................................................................................................................................... 6
2.Costs :............................................................................................................................................................. 6
3. Security considerations ................................................................................................................................. 7
4. Use case diagram .......................................................................................................................................... 8
5. DFD diagrams : .............................................................................................................................................. 9
5.1.Login function level 0 : ............................................................................................................................ 9
5.2.Login function level 1 : ............................................................................................................................ 9
6. Legacy system : ........................................................................................................................................... 10
P7 Explain how user and software requirements have been addressed. ............................................. 11
* LOG IN FORM INTERFACE :........................................................................................................................... 11
*Log in function implemented in C# : ............................................................................................................. 12
*Verify login function implemented in C# : .................................................................................................... 13
REFERENCES ......................................................................................................................... 14
2
TABLE OF FIGURES
LIST OF TABLES
3
P5
P5 Undertake a software investigation to meet a business need.
1.Questionnaire technique :
Information can be collected in short period of time from a large number of people, often
geographically dispersed.
Questionnaires allow respondents to take time to consider their responses carefully without
interferences from others or interviewer.
4
3. Steps to approach data finding with questionnaire .
4.List of questions :
1.How many times do the visitors can free listen to the music sample ?
2.Which payments can be used for purchase individual downloads at a fixed fee per download.
3.What is the suitable cost for customers whom subscribe monthly account for unlimited download .
5.Which keywords were prioritized in search system ? (artirst, album, singer, playlist, single, video )
5
P6
Use appropriate software analysis tools/techniques to carry out
a software investigation and create supporting documentation.
1.Stackholders :
2.Costs :
TABLE 1 : COSTS
6
3. Security considerations
Websites are always be threaten of security risks. Cyber crime impacts our business by hacking website
and install malicious software or malware on visitor’s computer.
Hackers may steal important data from users such as credit card information, destroy business and puplic
sensitive information on the internet.
Updated Software
It is very importance to keep the software updated because it plays vital role in keeping website secure.
SQL Injection
It is an attempt by the hackers to manipulate your database by insert easily rogue code into query that can
be used to change tables, get information or delete data.
It allows the attackers to inject client side script into web pages. Therefore, It is good to endure that we
check the data being submitted and encode or strip out any HTML.
Error Messages
If the user fails to log in the error message should not let the user know which field is incorrect: username
or password.
Validation of Data
The validation should be performed on both server side and client side.
Passwords
It is good to enforce password requirements such as of minimum of eight characters, including upper
case, lower case and special character. It will help to protect user’s information in long run.
SSL
It is good practice to use SSL protocol while passing personal information between website and web
server or database.
7
4. Use case diagram :
8
5. DFD diagrams :
Verify
Account
Access
1 1.2
request
USER LOGIN VIA GOOGLE ACCEPT PERMISSION
Verify
Account
Check
D2 GOOGLE DATABASE
D2
9
6. Legacy system :
System OS Window
10
P7
Explain how user and software requirements have been
addressed.
11
*Log in function implemented in C# :
namespace AS1
{
class Class1
{
public int checkLogin(string username, string password)
{
string query = "SELECT userID FROM User WHERE username = ? AND password = ?";
int userId = -1;
SqlConnection conn = null;
SqlDataReader reader = null;
return userID;
}
}
12
*Verify login function implemented in C# :
namespace AS1
{
class Class2
{
{
private string username;
private string password;
public int verifyLogin()
{
int userId = -1;
UserDataAccess uda = new UserDataAccess();
userId = UserDataAccess.checkLogin(this.username, this.password);
return userId;
}
}
}
13
REFERENCES
Creately.com. (2018). Creately - Online Diagram Editor - Try it Free. [online] Available at:
https://creately.com/app/?tempID=i1rmvtsp1&login_type=demo# [Accessed 18 Dec. 2018].
14