diff_months: 5

Project Title: Cyber Incident Response Plan

Flat 50% Off Order New Solution
Added on: 2025-01-27 18:30:10
Order Code: SA Student Sachin Management Assignment(7_24_43982_461)
Question Task Id: 511454

Project Title: Cyber Incident Response Plan

Building a Comprehensive Cyber Incident Response plan for healthcare Organization.

Team Details :Sno Student ID Student Name Responsibility

1 202311662 Sachin Kumar Group Leader

2 202210961 Sandip Khatiwada Group member task

3 202210847 Abinash Kumar shah Group member

4 202210797 Bharati Joishi Group Member

5 202211264 Mohammad Razi Hossain Group Member

Please describe the type of system being developed.

We are going to create the good cyber incident response plan building a Comprehensive Cyber Incident Response plan for healthcare Organization.

Who is the system being developed for?

The system is being developed for the different healthcare institutions and organizations to build the response plan.

Why is such a system required?

This arrangement is planned to assist the organization successfully get ready for, react to, and recoup from cyber occurrences that seem compromise quiet information, disturb healthcare administrations, or harm the organization's notoriety.

What will be the main challenge for you in building the system?

Recognizing and classifying massive amounts of sensitive data, ensuring compliance with strict controls like HIPAA, and integrating modern security measures without disrupting IT infrastructure are the biggest challenges in building a comprehensive Cyber Occurrence Reaction Plan for a healthcare organization.

What new ideas and theory will you need to learn to build the system?

ICT-328 Capstone Project I Cyber Security

Weekly Journal Submission

Week 2

Team Details:

Sno Student Name Student ID

1 2 3 4 The aim of this weekly journal is to do a literature review related to existing research and developments in your field of study. By reviewing existing literature,

You need to identify the methodologies and approaches that have been used by other researchers.

You must avoid redundancy by ensuring that your project is not replicating work that has already been done.

You need to identify key concepts, theories, and models relevant to your project.

Project Title:

Literature Review

References

Project Specification Form

A. Project Title

Quick-witted security with quickened system performance

B. Project Background

Problem Context

In todays computing generation fragmented disk, unnecessary file storage, unnecessary shortcuts are a big threat that can lead to errors, viruses and cause instability in the users pc. Also, cyber frauds and other illegal activities are increasing very much. Even on a brand new system with plenty of RAM and high-end processors, the performance of the hard disk may be a bottleneck causing system performance issues. One of the ways to tackle such problems is to defragment the disk. Disk Defragmentation rearranges fragmented data so as disks and drives can work more efficiently.When a system is new, the registry is quite small with just the required information to enable your system to function on your PC. However, as you start working on the PC, the registry starts building up. Over time, a lot of unwanted, invalid, and incorrect data accumulates within the registry and causes registry bloating. A bloated registry easily gets damaged and starts generating several Windows related errors on the system. Moreover, a large registry easily gets fragmented and considerably slows down your PC and is the reason behind system freezes and system crashes. Nextly, if a computer is used a lot, it very well might be, especially if software applications are uninstalled frequently, any small pieces of information from the software that are left on the computer can clog up the computer and cause it to slow down. Multiply that by the number of times you uninstall software, and you can see how it adds up to a slow computer, a performance issue. Cleaning registry of the system at times can be the best solution to the performance related problems. Then, emerging USB storage technology allows massive amounts of data to be transferred at lightning speeds. Devices continue to decrease in size, and the storage capacity keeps multiplying. All this makes for fast, efficient, and convenient information exchange, but there is a downsidesecurity. Employees in an organization can use these tiny, portable USB storage devices to download sensitive data and upload potentially harmful apps or viruses. Thus, Safety and Security is a big issue for any system within a network in todays enterprise environment. So, to enhance the network security, the developer thinks that it would be prudent to disable the ports on all workstations in the organization/office so that no one could use USB drives to put stuff onto or pull stuff off of the network. The other issue specially related to home users is, if children are allowed completely unrestricted access to the family computer with no monitoring, they can quickly, and easily, find themselves in situations that they simply are not equipped to handle. This is because there are many unscrupulous users out there with malicious intentions, such as older individuals posing as someone else with the intention of luring younger children out of home. These inappropriate relationships can easily go unnoticed by parents who don't have any form of computer surveillance installed on their family computers. Also in many companies, employees may use PCs for non-work-related purposes, or for some illegal acts that could damage the company. Also, terrorist may use PCs anywhere, like in cyber caf for dangerous acts, people around them being unaware what is going around them. Keylogging is then the only answer to such issues that is designed to secretly monitor and log all keystrokes. The utility of the application named Quick-witted security with quickened system performance relies in the fact that all the above mentioned features are integrated into one single system.

Rationale

Because of the above mentioned problems, there is a need to implement this system which is useful for various types of users and is the best answer to security, privacy and performance issues. There are certain elementary benefits serving to account for implementation of the proposed system:

Tangible Benefits

The application uses facial recognition technology to authenticate the desired user which is quicker and more secure than using password or other biometric technique for authentication

The disk defragmenter of the application allows the programs and data to run more efficiently and quickly as the operating system does not have to read from multiple locations and hence results in faster load times and faster performance.

The application has an in-built task manager that acts as a powerful troubleshooting tool and resolves issues. It monitors the computer's performance, closes a program that is not responding, view network status and graphs, view processes and services running.

The application disables USB ports of PC for specific devices, hence preventing people from taking out data from personal computer without permission or spreading viruses through the use of USB (pen and flash) drives.

The Registry Cleaner module scans the registry directory and tries to identify empty, useless and corrupted files and removes those unwanted configuration files from the system.

The keylogger module smartly tracks the keystrokes hit from the system preventing the illegal actions.

The application removes useless shortcuts and internet files that get downloaded automatically while browsing internet.

Message/Notification to the users mobile phone in case any blocked URL or application is accessed from the users pc.

Intangible Benefits

The application enhances security by incorporating facial recognition technique of biometrics for authenticating the user.

It frees up disk and memory space, hence improving the performance with the help of disk defragmenter.

The application helps in troubleshooting and performance monitoring by the task manager.

Registry cleaner increase the efficiency of the computer by cleaning the unwanted files from the registry.

It helps employers maintain productivity, protect valuable bandwidth and ensure optimum use of networked resources by monitoring employee activity online with the help of keylogger and prevents illegal actions.

Maintains security with its folder lock feature and USB port disabling feature.

Problem Area

The greater the fragmentation, the more time it takes for the fragmented files to be read, thus slowing down the PC performance. This is the reason why this particular choice of defragmenting the PC was made to solve the performance issues for business and home users.

In business areas, where the computers are used frequently, programs/files being installed/ uninstalled regularly, the deletion of temporary or potentially unwanted files left by certain programs including various browsers is a big issue that slows down the performance of the system as it updates the registry each time. This is the reason why the business users would want to implement the proposed system to avoid PC performance problems.

In organizations, the employees can use the PC for personal and illegal purposes apart from the work purpose, can steal the confidential data from the system with the help of USB devices and hence can destroy business relationships. Thus, there is a need for such system in organizations for employers to keep any eye on their employees, whether they are using the PC, internet etc. for work purpose only.

At homes, children can misuse the PC and internet behind their parents, their parents being unaware of the bad motives the strangers have with whom their children are communicating. Therefore, there is a need to develop such system to serve the purpose for home users, especially for parents.

USB devices being inserted into the computer frequently creates an easy path for any person/ employees to steal confidential data in any business organization leading to illegal actions or crimes. Also, insertion of USB devices into a PC creates an easy path for viruses to hit the users PC with damage, slowing down the performance. The proposed system hence prevents the illegal actions and crimes, and protects the PC in any kind of business organizations or at homes.

These are the problem areas where the proposed system is to be implemented to enhance the performance, security and privacy of the users PC.

Nature of Challenge

The main challenge in the system is the solution to window registry problems that is the development of the tool to boost the performance of PC that will deep scan user registry to identify problems and errors that can cause instability. For making the system on windows the developer is required to have thorough understanding of Windows Forms. Learning Face recognition technique to authenticate the user is the next challenge in the project for which the developer needs to have understanding of algorithms, graphics and GDI+. The next challenge is to maintain the security of the users PC at various levels to protect personalized data. Also, the Keylogging feature that can track the keystrokes being pressed on the users keyboard is a challenging task that uses hooks to be achieved. The other challenging task is to gather system statistics, monitor system health, and manage system components for which WMI technology is to be used. The implementations of technologies such as web services, Windows Hooks Windows Management Instrumentation, Ribbon Control, algorithms, GDI+ to achieve above mentioned tasks are major challenges which will be incorporated in this project.

Target Audience

The system serves variety of users ranging from home users to business users who are conscious about protecting their precious data from unauthorized access.

Business Organizations: It is also useful in organizations for business purposes where certain information such as project information is strictly hidden. USB port disabling and Keylogging feature ensure that the employees use the computers for legal and business purposes only.

Call centers: The system is of high utility in call centers or other areas where PCs are used on a large scale. In such areas, performance of the system is a big issue that is enhanced using the proposed system.

Home Users: Keyloggers are used in the home, where they may be used to monitor the activities of children or teenagers by their parents. Also, registry cleaner is also of high utility for home users.

Other security (e.g. law enforcement): Using keylogger records to analyze and track incidents linked to the use of personal computers.

C. Project Objectives

Objectives

The projects objective is to deliver the proposed system within time and budget and with appropriate quality.

The system objective is to integrate various modules together to come up with the best solution to security and performance issues.

The next objectives include implementation of advanced C# concepts for disabling USB ports, developing keylogger, authenticating user through facial recognition technique, and creating folder level security to enhance the security of the system.

The next objective is to view and manage all the processes and services running on the users PC with the help of task manager.

The other objectives are to develop a window registry repairer tool, defragmentation tool to enhance the system speed.

Other Learning Objectives

To analyze advanced programming techniques, software engineering principles, project management concepts, security concepts and integration of varied technologies.

To put upon or implement all the knowledge and concepts for the development of the system.

Scope

The proposed system intends to provide solution to performance and security issues by detecting the threats to the system that may enter the system through USBs or Internet. It is primarily focused on identifying windows registry problems, fragmentation issues, disabling USB ports, and incorporating folder level security, and developing keylogger. The system also reports to system administrator in case the user accesses vulgar websites or use some restricted words. In that case the system will be locked and user password will be changed automatically when the system restarts. The system thus has the potential to monitor all the unauthorized events and processes running on the PC and control them with the help of keylogger. This system thus supports security and speed.

Registration Module

Profile Management Module

Defragmentation Module

Registry Repair Module

Task Management Module

Authentication Module

Hidden Camera Activation Module

Keylogging Module

Folder Security Module

Theme Building Module

Gadgets Module

Modes Module

Notification Module

Description of Functionalities/ Features (Module wise)

Core Functionalities

Registration

The registration process registers both admin and the regular user. The admin has its default username and password. The regular user is registered by admin who will provide the permissions to the users.

Profile Management

Two different profiles are maintained, one for the admin and other for the regular users. Both of them have different authorities. A user has the authority to disable USB ports, defragment disks, view task manager, clean registry, track Keylogging, secure folders, change themes and customize gadgets etc. An admin has all the authorities that a regular user has. Furthermore, admin can view the history and log files, control the devices for which USB ports will be disabled and manage the different profiles, send notifications etc.

Defragmentation

This feature of the application defragment the disk and not only helps put file pieces back together, but can also consolidate free space so that there are larger blocks of space available to write new files thus preventing further fragmentation. The module is responsible for improving the efficiency of users PC

Registry Repair

Registry repairer locates and corrects problems in the Windows registry, such as missing references to shared DLLs, unused registration entries for file extensions, marks the registry items which are safe to remove as well as those which are not advisable to remove. And it will automatically back up the deleted registry. It cleans the registry by removing obsolete, temporary, invalid and redundant registry items from windows registry.

Task Management

The Task Manager, that manages the tasks is broken up into multiple tabs. Each tab is associated with a particular category such as the running applications, running processes, Windows services, the computer's performance, network utilization, and various corresponding graphs. Using this module, the user can tune the computer to run optimally and efficiently by disabling programs that may be using too many resources and thus slowing down your computer.

Enhanced Functionalities

Authentication

User (Admin/Regular User) is authenticated using facial recognition technique of biometrics using the camera that acquires the image of the face. The technique uses the spatial geometry of the distinguish features of the face. The face recognition technique is preferred over password authentication and other technique of biometrics because it is more secure and quicker. Butpermanence and uniqueness of the face might remain a limiting factor of this biometric solution.

Hidden Camera Activation

If any unauthorized user tries to access the system for more than three times, the hidden camera of the system gets activated and will capture the image automatically.

USB Ports Tracking

This disables USB ports of the computer for some specific devices, not allowing USB drives to be inserted into the computer, thus preventing the confidential data from stealing and also protecting the computer from viruses that can enter the computer through USB drives. The devices for which USB ports are disabled/ enabled are controlled by the admin only.

Special Functionalities

Keylogging

This feature records thekeystrokes on a computer by monitoring a user's inputand keeping a log of all keys that are pressed. The logs are then saved to a file. Those keystrokes can then be accessed at a later date to see what the users have typed on that machine and thus it ensures that the computer is not used for illegal actions in someones absence. Also, this feature has the capability to report to system administrator in case the user accesses vulgar websites or use some restricted words. In that case the system will be locked and user password will be changed automatically when the system restarts.

Folder Security

The feature allows the user to secure their folders using password as the authentication technique, thus protecting the files safe from prying eyes, hence enhance the security through an intuitive and simple interface. It can be easily used by any novice user as it is very simple to use.

Theme Building

It controls changing the theme of the application to enhance the visibility. The application can be customized with colors, fonts and many more things.

Gadgets

This is an accessory that makes life easier or more enjoyable.

Modes

The application consists of three modes namely normal mode, fast mode and game mode that can be switched as per the user requirements. Normally, normal mode runs. When fast mode runs, graphical applications are switched off. When game mode runs, graphical applications are switched on, switching off other unused applications.

Notification

The feature enhances the security by sending a message to the users mobile phone in case any blocked URL or application is accessed from the users pc.

Limitations

The proposed system is Windows Specific, which is, it works only on Windows Operating System.

The system prevents threats that come from internet when some file is installed but it does not have the ability to scan and remove virus.

This is a desktop based application.

Deliverables

Draft Proposal

Project Proposal

Project Specification form

Implemented Modules of the system

Hard copy of final documentation

Soft copy of final documentation

Final Presentation and Demonstration

D. Resources needed by the Project

Hardware Resources

Processor : At least Pentium IV with at least 1.6 MHz speed

Hard Drive Space: At least 20GB Free space and 80GB for better performance

Memory: At least 1 GB RAM for better performance

Monitor: Any Standard Monitor

Web Camera

Keyboard and Mouse.

Printer: For Printing the documents, throughout the project.

Any external storage device i.e. USB Drives or DVD/CD ROMs.

Software Resources

Operating System : Windows 7 Ultimate or Windows XP

Software Development Tools: Microsoft Visual Studio .NET 3.5

Database Management System: Microsoft SQL Server 2008

Software Modeling Tools: Microsoft Visio

Project Management Tools : Microsoft Project

System Documentation and Presentation Tools: Microsoft Office

Graphic Design Tools: Paint, Giffy, Photoscape

Web Browser: Any standard browser but above Internet Explorer 8.

Access to Information/Expertise and User Involvement

Improved quality of the system arises from more accurate user requirements so as to implement/ avoid system features that the user wants/ did not want to use and hence improving levels of acceptance of the system. Therefore, user involvement is necessary to produce a fruitful system. Users shouldbe directly involved in development projects, particularlywhen the scope of development project includesproduct and services where the end users will be external customers or consumers.

Various users involved are:

Employers

Investigators

Software Developer

Software Designer

Network administrators

For gathering information and user requirements, the following have highlighted the fact-finding techniques to be used throughout the research stages. These techniques are listed below:

Domain & Technical Research

Also calledliterature search,involves reviewing all readily available materials. These materials include internal organization information, relevant trade publications, newspapers, magazines, and any other published materials. It is a very inexpensive method of gathering information, although it often does not yield timely information. Literature searches over the web are the fastest and are preferred more, while library literature searches can are also to be considered as one the most powerful research method.

Interview

Interview will be carried out for a short time period to obtain opinion and the perspective from professionals who are specialized in programming field (like Lecturer, Software Developer, Software Designer) or even those who have experience in implementing and using such system in order to allow the developer to further enhance and refine the system ideas and features of the system that is going to be developed. End-users who are going to implement this system are also to be interviewed to improve the acceptance level of the system and produce a fruitful and usable system.

Software Developer and Software Designer- Interview those software developers and software designers who have already made such similar systems to come up with deep knowledge from the technical aspects.

Organization Employers- Interviewing the end-users is the most important factor towards the systems success. The developer of the proposed system gets the required functionalities, pros and cons of each module only by the actual end-users who are going to implement the system in their companies or organizations.

Questionnaire

Different type of questionnaires will be designed for different group of users, for employers of business organizations, and for employers of call centers because such a big number of peoples views cannot be judged by interviewing each one of them. So, this technique suits best when there are a large number of people who are to be judged within short span of time. It will give quantitative results. Questionnaire will be very useful to get proper idea about users needs.

E. Academic research being carried out and other information, techniques being learnt

Organized and controlled research enables developer to test and compare different theories and approaches, explore different methods, obtain other peoples views and learn from other peoples experience. It also enables to rule out or at least consider external factors which might influence their results. Researching about the proposed project gives the perfect platform for developing the project. In order to complete a project successfully a far-reaching research work must be carried out. Whether the research is domain based or technical research it will work as the basic developmental criteria for any project. One must have a proper knowledge on the type of system that is being made to make the project more efficient and effective.

Secondary Research Areas:

Academic/Theoretical Research Areas:

The first and foremost part of academic research is to compare as how the system named Quick-witted security with quickened system performance is better than the existing system. The question what are the new features to be added has to be the major research area.

Then, academically for carrying out the project, the developer is required to have a research on the advanced concepts of the Programming languages is done.

The system has to be made in such a way that it will have a good interaction between human and the computer. So, Human Computer Interaction Principles are to be researched upon.

Different types of software development methodologies are available. So, comparisons between all those are to be made and the methodology that best suits this security and performance based system, is chosen.

As security and performance booster concepts are to be implemented, so, those concepts accounts for another research area. This is to be included both as academic and technical research.

Information and Resources:

Books:

Leslie Ann Robertson, 2003, Simple Program Design, 2nd Edition , Boyd and Fraser

Shelly, G.B., Cashman, T.J. & Rosenblatt, H.J. (2005) System Analysis and Design, 5th or 6th Edition, Course Technology

OConnell, F. (2001) How to Run Successful Projects III: The Silver Bullet. Addison Wesley, ISBN: 0201748061

Websites:

http://www.codeproject.comTechnical/Programming Research Areas:

The Programming language chosen for developing the system is Visual C# and the database is Microsoft SQL Server 2008. A list of various techniques, programming languages and technical research area is given below:

Key Concepts and Strategy of developing a security and performance booster system.

Advanced APIs of Visual C# for implementing keylogger and registry cleaning.

Concepts of Windows Management Instrumentation.

Ribbon Control Technology

Algorithms and Graphical techniques for face recognition

Web Services for sending notifications

Security Concepts

Information and Research Sources:

Books

Deitel & Deitel, Listfied,Nieto, Yaeger, and Zlatkina, C# for Experienced Programmers, 2003, Prentice Hall.

John Sharp (2013)Microsoft Visual C# 2012: Step by Step,: Microsoft Press.

Andrew Stellman (2010)Head first C#, 2nd edn., Beijing: O'Reilly.

Websites

Security

http://www.securelist.com Last Accessed: 28 September 2013

http://www.bestsecuritytips.com Last Accessed: 28 September 2013

http://www.governmentsecurity.org Last Accessed: 27 September 2013

http://www.keelog.com Last Accessed: 29 September 2013

http://isafesoft.com Last Accessed: 27 September 2013

Efficiency

http://windows.microsoft.com Last Accessed: 28 September 2013

http://www.wisecleaner.com Last Accessed: 28 September 2013

Task Management

http://www.pcworld.com Last Accessed: 29 September 2013

Face Recognition Biometrics Technique

http://www.face-rec.org Last Accessed: 29 September 2013

Programming Language

www.c-sharpcorner.com Last Accessed: 29 September 2013

http://www.completecsharptutorial.com/ Last Accessed: 1 October 2013

Other Sources

Newspapers and Journals

F. Development Plan

Project Plan

Start Date: July, 2023

Duration: 12 Weeks

End Date:

Project Requirements

Duration:

Tasks:

Project Definition:

Idea Generation and identifying all the functionalities.

Project Title Selection

Feasibility Studies

Draft Proposal

Project Plan:

Development plan

Work Breakdown Structure

Scheduling

Gantt chart

Pert Chart

Project Proposal Form

Project Requirements Identification and Specification:

Project Background

Resources required

Techniques to be learnt

Goals and Objectives

Determine System Functionalities

Identify scope of research

Project Specification Form

Research by:

Interview with various stake holders (software developers and designers)

User requirements

Analysis

User Modeling and Profiling

Domain analysis on the tools (ASP. Net/ C#)

System analysis

Risk analysis

System design and Prototyping

Data flow Diagram

UML Diagrams

Story-Boarding

UI Prototype

Functional Prototype

Implementation

Code generation

Module Integration

Testing

Duration:

Evaluation of Different Prototypes

Different Types of Testing

Generating Test Plans

Project ending and finally maintenance

Duration: Submission of the Final product

Presentation

User Manual and Generating Documentation

Methodology

The methodology that best suits for the proposed system is Iterative Waterfall Model.

Iterative Waterfall Model is quite similar to traditional waterfall model but the basic principle is differing. Waterfall model approach is predicated on the principle of completing, in detail, each stage before moving on to the next. While, Iterative Waterfall Model adopts the logical sequence of events of the Waterfall model but it follows the full lifecycle several times within a single project.

Phases of Iterative Waterfall Model

Requirements specification-In this phase, research is being conducted which includes requirements about the software. It clearly and unambiguously indicates the requirements for the system. A small amount of top-level analysis and design is also documented in this phase. In this phase, the users involved such as employers, network administrators are to be interviewed, questionnaires are obtained so as to research and analyze the system requirements.

System Design and Software Design- This step involves originating the basic design of the software. It will be done after the first phase gets successfully completed. System design included designing of software and hardware i.e. functionality of hardware and software is separated-out. After separation design of software modules is done, the design process translates requirements into representation of the software that can be assessed for quality before generation of code begins

Implementation and Unit Testing- Now that the developer has system design, code generation begins. Code generation is conversion of design into machine-readable form. Software modules are now further divided into units. And unit testing is performed with the generation of each module described above, namely registration, keylogger etc.

Integration and System testing- Now the units of the software are integrated together and a system is built. So we have complete system named Quick-witted security with quickened system performance at hand which is tested to check if it meets thefunctional and performance requirements. Testing is done, as per the steps defined in the test plan, to ensure defined input produces actual results which agree with the required results. A test report is generated which contains test results.

Operation & maintenance- Now that the developer has the completed system, she is to deliver the same. This phase goes on till the software is retired.

As it is an iterative Waterfall Model, each iteration goes through the activities of Requirements, Design, Implement, Integration and Testing and produces production-quality software at the end of the iteration. The contents of each iteration is determined according to risk - the new, the most challenging; the most critical elements are built first, so that the true nature of the project and its implications in terms of cost and time are constantly under review.

Why Iterative Waterfall Model?

For the project, Quick-witted security with quickened system performance, quality is the most crucial factor and Iterative Waterfall methodology is preferred where quality is more important as compared to schedule or cost.

The iterative model is quite appropriate to be implemented here because at the such early stage, the developer is not much sure about the all the requirements of the system and an iterative lifecycle model does not attemptto startwith a full specification of requirements. Instead, development begins by specifying and implementing just part of the software,which canthen be reviewed in order to identify further requirements. This process is then repeated, producing anew versionof the software for each cycle of the model.

While developing the system named Quick-witted security with quickened system performance, though major requirements have been described at an early stage but certain will be evolving with time. Therefore the iterative model is chosen because it best suits when the developer needs the flexibility to incorporate more features in the system with time.

The developer of the system Quick-witted security with quickened system performance is required to build the system step by step with a deliverable at each step and in iterative model; the projects are built and improved step by step. Hence the developer is able to track the defects at early stages. This avoids the downward flow of the defects.

The model also involves feedback loop. This is what required for developing the system Quick-witted security with quickened system performance. For this also, user is required to obtain feedback at each phase, lessening the chances of immense burden of changes and massive evaluation at the end.

Hardest Tasks

Keylogger is hardest module to implement. Its implementation requires learning completely new concepts such as Windows Hooks.

The other hard task is implementing face recognition technique of biometrics for authentication because it requires knowledge of Windows Hooks, various algorithms and graphical concepts such as GDI+.

G. Evaluation & Test Plan

The project is using Iterative Waterfall Model; testing plan is based upon the phases of the proposed model only.

Requirement Phase Testing; Simulation Testing

The first phase of the Iterative Model is the Requirements Phase. During the requirements analysis phase, test planning and design also starts as per the model selected. Though planning for integration and system test is done as the last steps to complete before system release but in iterative model, these testing strategies are planned at the first opportunity. The requirements that are specified in the first phase are verified to look for ambiguities, completion, consistency, and reasonability; in addition, whether it is achievable, traceable and measurable from a testing standpoint. If the specification satisfies the user requirements, a simulation environment can be built up by following the specifications which may be called prototype. The prototype is a solution at an early stage in order to prepare for later development. It, not a real product, also highlights certain properties of the intended system. The simulation testing in this phase is to validate the prototype, which is established according to the specification, with the designed cases/data in order to certify these test cases/data, and expected results, because they will be used to test the real system.

Unit Testing (At Implementation phase)

Then comes the design phase in which software architecture and components to meet the requirements are designed. Testing activity here begins to focus on the most atomic element--the unit that is done by the developer herself that asks the developer to take the smallest piece of testable software in the application and determine whether it behaves exactly as expected. Each unit is tested separately before integrating them into modules to test the interfaces between modules.

Tester for unit testing is the developer who is developing the proposed system.

Regression Testing; Core of Iterative Model

In the first iteration of a project, there may not be much to do here. In subsequent iterations, the focus will be on how new or changed components will affect the system called regression testing. The regression testing means the retesting of asoftwaresystem that has been modified to ensure that anybugshave been fixed and that no other previously working functions have failed as a result of the reparations. Tests performed in the previous iteration should be applied here again against the changes and/or additions. In all iterations, the implementation phase will be saturated with testing.

Tester for Regression testing is the developer herself.

Integration

Integrated testingwill start after completion of unit testing. Integration testing verifies that when two or more modules interact, produced result satisfies with its original functional requirement or not and it fall in Black box testing. Its main purposeis to identify the functional, requirement and performance levelbugs. When modules are not integrated, they perform as per requirement but when the modules such as keylogger, task manager, registry repairer integrate, functional, requirement and performance related issues will occurs due to the integration. This is the reason the developer needs to perform integration testing even if unit testing is already conducted.

Tester for Integration testing is the developer.

System Testing

System testingis the testing of behavior of a complete and fully integrated software product based on the software requirements specifications. In main focus of this testing is to evaluateBusiness / Functional / End-user requirements. For this type of testing do not required knowledge of internal design or structure or code.

Tester for Integration testing is the developer and End-User.

UserAcceptance testingUserAcceptance testingis the software testing process where system tested foracceptability& validates the end to end business flow. It is performed inseparate environment (similar to production environment) & confirmswhether system meets the requirements as per requirement specification or not. End users concentrate on end to end scenarios & it typically involves running a suite of tests on the completed system. TheAcceptance testingis black box tests, means end- users who is testing the system need not to beaware of internal structure of the code; they just specify the input to the system & check whether systems respond with correct result.

Tester for User Acceptance Testing is the End-User (Employers).

Criteria for a Successful Project

Meeting User Requirements: A successful system is supposed to meet all the user requirements. The system is to be developed in such a way that it fulfills all the requirements collected from research and investigation through interviews and questionnaires. The system is checked against the user requirements that are specified in the Requirement Specification phase. The evaluation is done by checking whether the proposed system meets the user requirements to which extent.

Research and Analysis: The phase is the initiation phase of any project. The proposed system is supposed to be user friendly, intuitive and quick so that users will stay with the system easily and not be deterred. The evaluation is done by checking how much in-depth research is done on the proposed area. The success is of the project is guaranteed if the developer does good amount of well investigated research and analysis.

Implementation of Modules: The desired modules are implemented in a way that the desired system produced runs without any bugs and quickly.

Special and Enhanced functionalities: The proposed system developed aims to fulfill the core as well as enhanced and special functionalities mentioned in the project specifications

Usability of the proposed system: Application's usability depends upon proven Human-Computer Interaction (HCI) principles and aims to achieve in the application ease of use, Navigation, time for completion and errors.

Documentation: The skills to turn up with documentation at the end which is very well formatted along with appropriate organization of information and standard level of English.

  • Uploaded By : Pooja Dhaka
  • Posted on : January 27th, 2025
  • Downloads : 0
  • Views : 108

Order New Solution

Can't find what you're looking for?

Whatsapp Tap to ChatGet instant assistance

Choose a Plan

Premium

80 USD
  • All in Gold, plus:
  • 30-minute live one-to-one session with an expert
    • Understanding Marking Rubric
    • Understanding task requirements
    • Structuring & Formatting
    • Referencing & Citing
Most
Popular

Gold

30 50 USD
  • Get the Full Used Solution
    (Solution is already submitted and 100% plagiarised.
    Can only be used for reference purposes)
Save 33%

Silver

20 USD
  • Journals
  • Peer-Reviewed Articles
  • Books
  • Various other Data Sources – ProQuest, Informit, Scopus, Academic Search Complete, EBSCO, Exerpta Medica Database, and more