Beruflich Dokumente
Kultur Dokumente
Project Requirements
Chapter 2
PROJECT REQUIREMENTS
2.1.1 Introduction:
A] Purpose:
To implement Protection Of Sensitive Data in Wireless Devices for
securing the sensitive as well as confidential data of the user. In this process the
data is secured by initially establishing the connection between the mobile
phone (server) and Laptop System (client) via a Bluetooth. Then the encryption
and decryption process Is used for securing the accessibility of the respective
data of the user.
B] Business Context:
Providing, the corporate world a scheme to secure the confidential and
secret data by using the available resources in a very efficient, inexpensive and
effective way. Our system will enrich the user’s confidence in believing that our
system secures data in a fruitful way. This system has indispensable applications
in software companies, institutions, Banks, Hospitals etc., wherever the
information is of vital use.
B) System with a inbuilt Bluetooth device, 128 MB RAM and Hard drive
with minimum 2 GB capacity.
All Security measures are taken into consideration assuming that the
mobile phone will be with the user all the time because it is the way to provide
unique access to the sensitive data of the user. The user should authenticate to
the laptop system after every 24 hours and only Then user will be allowed to
change the E-D key if required.
A] Owner:
Owner is a person who is the responsible user of both the devices.
He/she is the user for which our product will provide the assurance of securing
the sensitive data. Owner initiates the authentication process.
B] Laptop System:
C] Mobile phone:
Mobile phone is the master device which stores the key responsible for
the decrypting the data in decryption process. Whenever the user is in the
proximity this respective E-D key is sent to Laptop system. It is the devices
which is always available with the user.
The user is the owner of Laptop and Mobile phone. Hence, he/she does
not have to invest on the hardware of the system. The user carries the
authenticator (mobile phone) wherever he goes and user is not performing
burdensome job while using our application.
The Software Interface for our project is based on the Bluetooth API’s
available in JAVA.
A] Server side:
• Login
• Accept the connection
• Connected
• Discard the connection
• Disconnected
• Logout
2.8.3 Events:
The Software uses different events for various conditions that occur.
These events help the software take the required decision for handling the
respective condition. The Events occur for following cases:
A] User enters incorrect Authentication code
B] User departs from the proximity range.
C] User enters the proximity range.
A] The interface developed for the user of the software should be user-friendly.
B] The user must be satisfied with the functioning of the software.
C] The E-D keys should well be protected from the unauthorized user.
D] The software should easily handle all the types of run time errors.
A] Risk Avoidance
B] Risk Monitoring
C] Risk Management and Contingency Planning
A] Catastrophic
B] Critical
C] Marginal
D] Negligible
After analyzing the risks, the risks were prioritized based on the reviews
and consensus among the developers. The table below enumerates the various
risks.
Sr.
No. Risk Category Probability Impact
1. Project completion deadline Business 10%
Critical
2. False estimation of task allocation Project 40% Critical
After the risks had been categorized, prioritized and their probability of
occurrence determined, action was taken to control these risks, which involved
mitigation and monitoring these risks. The key steps taken for risk control are as
follows:
Risk Mitigation:
Schedule the project in such a fashion that major modules are
completed first so that they get enough time for testing and debugging.
Risk Mitigation:
Quantify the size and schedule using ranges, so that the schedule
estimate is not treated as very precise and gives sufficient padding for
schedule estimates.
Risk Mitigation:
This is not a critical risk, since the software knowledge can be
gained.
D) Resources Unavailability:
Risk Mitigation:
Risk is due to mismanagement.
Risk Mitigation:
This risk is due to the inexperience of the developers who will be
developing the software.
Risk Mitigation:
In the event that the technology of connection does not allow all
the features expected of it, or the facilities expected of the programming
language are not properly supported, this risk involves more time to find
an alternative solution to the problem.
Risk Mitigation:
The response time of the system is poor because of network
delays, low memory and low processing powers.
Risk Mitigation:
Relate existing task creation code to the proposed design and
identify code segments that can be reused.
Risk Mitigation:
Involve all team members in a joint assignment to nature the
understanding among team members.
Risk Mitigation:
Study needs of the company in detail and come up with a
comprehensive and detailed list of requirements.