The Requirements Document for the Student Registration System does not address security issues. Prepare a section on security issues, which might be included in a more realistic Requirements Document.

What will be an ideal response?


Some security issues – assuming passwords are used:
1. Howdo users get passwords
2. What if a user forgets her password
3. Are the passwords sent over the network in encrypted form
4. Howare the user’s passwords stored in the database — are they encrypted?
5. Howdoes the system remember between use cases that the user has logged in with her password.
6. Does the information sent by transactions have to be encrypted — the password
information, other information?

Computer Science & Information Technology

You might also like to view...

Answer the following statement(s) true (T) or false (F)

1. Only one file can appear in the Document window at one time. 2. After you finish working on a file, you should close it to save system resources on your computer. 3. Dragging a title bar in a stack of panels will move only the top panel in the stack. 4. You must select a layer from the Layers panel before working on it.

Computer Science & Information Technology

Which of the following is an example of technical controls that can be used for physical security?

A. Audit trails/access logs B. Fire suppressions systems C. HVAC D. Mantraps

Computer Science & Information Technology

If you want to be a designer or developer of interactive material you need to know current usability and accessibility standards and practices.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The tabs at the top of the Optimization dialog box present options for previewing images with and without compression.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology