- UMACTF-15-M: You have recently been appointed as a Financial Analyst for a leading investment bank in London: Corporate Financial Strategy Course Work, UWE, UK
- BAM5010: choose an organisation and make some recommendations for the delivery: Work Based Project Course Work, UOB, UK
- You are required to calculate ratios for Fresh Farms Ltd: financial Course Work, UK
- Understand the legal, ethical and theoretical context for health, safety and risk management: leadership and Management Course Work, UK
- P3 Describe the types of training and development used by a selected business: BTEC Business Extended Diploma Pearson Course Work, UK
- Describe how a selected business identifies training needs: BTEC Business Extended Diploma Pearson Course Work, UK
- Discuss your chosen business, background information and why you have chosen that business: BTEC Business Extended Diploma Pearson Course Work, UK
- Activity 7: Risk management in an organisation should be both sensible and proportionate to the level of risk involved: NEBOSH IDIP ID1 Research Paper Course Work, OU, UK
- Activity 6: Reviewing health and safety performance Critique your chosen organisation’s health and safety: NEBOSH IDIP ID1 Research Paper Course Work, OU, UK
- Activity 5: Management of contractors Review how your chosen organisation selects contractors and manages them while they are on site: NEBOSH IDIP ID1 Research Paper Course Work, OU, UK
- Activity 2: Preparing a brief research report on approaches to worker consultation: NEBOSH IDIP ID1 Research Paper Course Work, OU, UK
- Create an organisational risk profile for your chosen organisation: NEBOSH IDIP ID1 Research Paper Course Work, OU, UK
- Explain the differences between learning requirements and continuous professional development: Leadership and Management Assignment, UL, UK
- What steps, component parts and enabling tools would you use to develop a therapy: Advanced therapeutic medicinal products Course Work, TUM, UK
- CS3DS19: Construct a KNIME workflow to understand the data characteristics and quality, report: Data Science Algorithms and Tools Course Work, UOW, UK
- Explain how principles of support are implemented in health and social care practice: Diploma In Health And Social Care Level 5 Course Work, UK
- The UK Manufacturing UK LTD is facing an array of issues that require a sound understanding: Management Decision Making Assignment, USM, UK
- Identify sources of information and guidance about how to support a child or young person: child care diploma level 3 Course Work, OU, UK
- Explain why it is important to take full account of a child or young person’s level of understanding: Child care diploma level 3 Course Work, OU, UK
- Understand how to support children and young people who have experienced harm or abuse: child care diploma level 3 Course Work, OU, UK
F28SD: You are required to develop a series of design models for a software-based access control system. The system is to be called the Secure Occupancy System: Introduction to Software Engineering Coursework, HWU, UK
University | Heriot-Watt University (HWU) |
Subject | F28SD: Introduction to Software Engineering |
An Exercise in Designing a Software-Based System: From requirements through to design-level models
You are required to develop a series of design models for a software-based access control system. The system is to be called the Secure Occupancy System. The remit for SOS is described informally below:
SOS shall allow authorized individuals to access a building. Three categories of individuals shall be recognized by SOS, i.e. i) an essential staff member, ii) a non-essential staff member and, iii) a guest (i.e. someone that is not a staff member). Operationally, SOS shall interact with three existing external software systems, i.e. i) the Staff Records System (SRS), ii) the Archive Access System (AAS) and, iii) the Security Monitoring System (SMS). SOS shall maintain a record of all individuals that access the building. For staff members, it shall record their staff ID (SID) and the time at which they enter and exit the building. For guests, it shall record their name, affiliation, and the SID of the staff member that is hosting their visit. The times when a guest enters and exits the building should also be recorded respectively.
All external access points to a building shall be equipped with a keypad. All the keypads shall be connected only to SOS. These keypads support only two access modes, i.e. staff-access and guest-access. If staff-access mode is selected by an individual then a 4-digit SID is requested followed by a 4-digit PIN. Only when both the SID and PIN have been entered and validated is access to the building granted.
In the case of guest-access mode, an 8-digit one-time-code (OTC) is requested. Access to the building is conditional on the 8-digit OTC being valid and the staff member hosting the guest already being in the building. SRS holds details of all staff members and guests and can provide these details on demand, with the exception of the PIN information. For example, if X denotes a valid SID, then retrieve(X) returns the staff category associated with X, i.e. essential or non-essential. Crucially, SOS shall use SRS to validate the various access codes that it receives via the keypads. That is when SOS supplies
SRS with both a SID and PIN, SRS will respond to SOS by confirming whether or not the two codes are valid, i.e. SID is a valid staff ID and the PIN provided is correct with respect to the given SID.
If SOS supplies instead of an OTC, SRS will confirm if it is valid by returning the SID of the associated host. Non-essential staff shall not be allowed to enter a building before 08:00 each day while guests shall not be allowed to enter before 09:00. If any non-essential staff or guests are in the building at 22:00 then SOS shall generate a security alert, i.e. send a message to SMS. The message should contain the names of all the individuals that are no longer authorized to be in the building.
If any individual enters or exits the building outside the core hours of 08:00-22:00 then SOS shall send a message to SMS naming the individual. At 23:59 each day the SOS archives its records of all individuals that have entered and/or exited the building during the previous 24-hours. This archiving process shall involve SOS sending the appropriate
records to AAS. Once AAS has acknowledged receiving the records, SOS shall delete its own copy.
Are You Looking for Answer of This Assignment or Essay