際際滷

際際滷Share a Scribd company logo
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 1
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 2
For an in-depth understanding of use case issues, it is a good idea to refer to
the book provided by the Founder of Use Cases, Jacobson.
https://www.ivarjacobson.com/sites/default/files/field_iji_file/article/use-case_2_0_jan11.pdf
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 3
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 4
Use Case View?
Captures system functionality as seen by users Built in early stages of development Developed
by analysts and domain experts System behavior, that is what functionality it must provide, is
documented in a use case model.
Use Case Model illustrates the systems intended functions (use cases), its
surroundings (actors), and relationships between the use cases and actors (use
case diagrams)
High level architecture
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 5
 Actor ?
 An actor is a person, organization, or external
system that plays a role in one or more
interactions with your system. Actors are
drawn as stick figures.
 Orderer - someone who places an order to buy.
 Warehouse Office Clerk is to assist in
performing the daily administrative
and organizational functions of the
warehouse office.
o Warehouse Clerk is responsible for
ensuring that products are registered and
packed correctly for shipping or storage.
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 6
Use Case ?
A use case is a list of actions or event steps typically defining
the interactions between a role (known in the Unified Modeling
Language (UML) as an actor) and a system to achieve a goal.
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 7
1. Association:
 A relationship that represents communication between an actor and a use
case; can be navigable in both ways or in only one way.
2. Uses (includes) and extends are two types of relationships between use cases.
An extends relationship is used to show:
- Optional behavior
- Behavior that is only run under certain conditions,
- Different flows which may be run based on actor selection
A uses of includes relationship is used to show:
- functionality shared by multiple use cases.
- can be placed in a separate use case, related to these uses cases by a
uses relationship
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 8
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 9
1. Kinds:
Withdraw Cash is a kind of Bank ATM Transaction.
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 10
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 11
1. The application will record and maintain the product quantity in the
stock in the central database.
2. The storekeeper can remove products from the database.
3. The storekeeper can add products into the database.
4. The storekeeper can change the product quantity in the database.
5. The cashier can bill the item by manually entering the bar code or
with a bar code reader.
6. Only the products recorded in the database can be billed.
7. The billed items can be removed from the bill until it has been closed.
 The retail support application requirements.
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 12
8. The billed item removal must be approved by a store manager by
entering his authentication data.
9. The billed items will be printed on the cash desk bill as they are
entered. The bill will consist of the store name, billed items,
information on removed billed items, the total amount of money to
be paid, and date and time.
10. The product price can be entered or modified only by a properly
authenticated store manager.
 The retail support application requirements.
 Consider each use case as a capability to cover one or more requirements
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 13
 Consider each use case as a capability to cover one or more requirements
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 14
.愕愀忰 惡悋悋惠惘 惆惘 惆惡惘悽悋 愕愕惠 悋愕惠悋惆 惘惆悋 惆惆擯悋
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 15
2.愕愕惠 惡惘悋 悋愕惠悋惆 惘惆悋 惆惆擯悋 悋慍 惺悋惘
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 163.悋惘惆 悋悋 愕惘愕悋 惡愕惠 惡惘悋 悋愕惠悋惆 惘惆悋 惆惆擯悋
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 17
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 18
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 19
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 20
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 21
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 22
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 23
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 24
 Each use case is documented with a flow of events, use-case scenario,
which is a description of the events needed to accomplish the required
behavior.
 The scenario is written in the language of the domain and describe what
the system should do and not how the system does it.
 The flow of events should include:
-When and how the use case starts and ends
-What interaction the use case has with the actors
-What data is needed by the use case
-The normal sequence of events for the use case
-The description of any alternate or exceptional flows
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 25
 X Flow of Events for the Use Case
 X.1 Preconditions & Postconditions
 X.2 Main Flow
 X.3 Subflows (if applicable)
 X.4 Alternative Flows
 Where X is a number from 1 to the number of use cases
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 26
 Main flow of events:
(E1) The use case starts when the system prompts the User for a PIN
number. The User can now enter a
PIN number via the keypad.
(E2) The User commits the entry by pressing the Enter button.
(E3) The system then checks this PIN number to see if it is valid. If the
PIN number is valid, the system acknowledges the entry, thus
ending the use case.
 Subflows:
S1: The system invokes Validate use case.
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 27
 Alternative flow of events:
E1: The User can clear a PIN number any time before committing it and
reenter a new PIN number.
E2: The User can cancel a transaction at any time by pressing the Cancel
button, thus restarting the use
case. No changes are made to the Users account.
E3: If the User enters an invalid PIN number, the use case restarts. If this
happens three times in a row, the
system cancels the entire transaction, preventing the User from
interacting with the ATM for 30
minutes.
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 28
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 29
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 30
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 31
Web Customer actor uses some web site to make purchases
online.
Top level use cases are View Items, Make
Purchase and Client Register.
View Items use case could be used by customer as top level use case
if customer only wants to find and see some products. This use case
could also be used as a part of Make Purchase use case.
Client Register use case allows customer to register on the web site,
for example to get some coupons or be invited to private sales.
Note, that
Checkout use case is included use case not available by itself -
checkout is part of making purchase.
4/21/2020 S. Parsa (www.parsa.iust.ac.ir)
32
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 33
 View Items use case is extended by several optional use cases -
customer may search for items, browse catalog, view items
recommended for him/her, add items to shopping cart or wish list.
 All these use cases are extending use cases because they provide some
optional functions allowing customer to find item.
 Customer Authentication use case is included in view
Recommended Items and Add to Wish List because both
require the customer to be authenticated.
 At the same time, item could be added to the shopping cart without
user authentication.
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 34
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 35
 Checkout use case includes several required uses cases.
 Web customer should be authenticated. It could be done through
user login page, user authentication cookie ("Remember me") or
Single Sign-On (SSO).
 Web site authentication service is used in all these use cases, while
SSO also requires participation of external identity provider.
 Checkout use case also includes Payment use case which could be
done either by using credit card and external credit payment service
or with PayPal.
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 36
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 37
Main functional flow of an online shopping system
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 38
 An example of high level sequence
diagram for online bookshop. Online
customer can search book catalog,
view description of a selected book,
add book to shopping cart, do
checkout
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 39
Each customer has unique id, linked to one account.
Account owns shopping cart and orders.
Customer could register as a web user to buy items online.
Customer could purchases by phone or by ordering from catalogues.
Web user has login name which also serves as unique id.
Web user could be in several states - new, active, temporary blocked,
or banned, and be linked to a shopping cart.
Shopping cart belongs to account.
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 40
Account owns customer orders. Customer may have no orders.
Each order could refer to several payments, possibly none.
Every payment has unique id and is related to exactly one account.
Both order and shopping cart have line items linked to a specific
product.
Each line item is related to exactly one product. A product could be
associated to many line items or no item at all.
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 41
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 42
 As shown in the next slide, the webStore subsystem contains three components:
Search Engine, Shopping Cart, and Authentication.
 Search Engine component allows to search or browse items by exposing provided
interface Product Search and uses required interface
 Search Inventory provided by Inventory component.
 Shopping Cart component uses Manage Orders interface provided by Orders
component during checkout.
 Warehouses subsystem provides two interfaces Search Inventory and Manage
Inventory used by other subsystems and wired through dependencies.
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 43
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 44
 UML Deployment Diagram Example
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 45
 Package diagrams depict the organization of model elements into Packages
and the dependencies amongst them, including Package imports and
Package extensions. They also provide a visualization of the corresponding
namespaces.
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 46
The Nesting connector between ConnSeq and
Controller reflects what the Package contents
reveal. The Package contents can be listed by
clicking on the diagram background to
display the diagram's 'Properties' dialog,
selecting the 'Elements' tab and selecting the
'Package Contents' checkbox in the 'Show
Compartments' panel
The 束import損 connector indicates that the elements within the
target Integer Package, which in this example is the single Class
Integer, have been imported into the Package Controller
If an element already exists within GenApply, such as Loader
and Time, these elements' definitions are expanded by those
included in the Package Controller. All elements added or
updated by the merge are noted by a generalization
relationship back to that Package.
iCloud
S. Parsa (www.parsa.iust.ac.ir) 47
悋惘悋惶惺惠  惆悋愆擯悋惺
擧悋拆惠惘 惆愕 惆悋愆擧惆
惷惺:
悋惘慍悋惘 惠愕惺 悋忰悋惠惘悽
惆惆 悋惘悋:拆悋惘愕悋 愕惺惆
惡悋惘1395
4/21/2020
1-1惆
悋惠 惠惷
48
悋-忰惘悋擯
(Confidentiality):惠惺
忰惆惆惆愕惠惘愕惡惘悋
擧悋惘惡惘悋悴悋慍悋惺惠
悋慍惆愕惠惘愕擧悋惘惡惘悋愃惘
悴悋慍
惡-擧拆悋惘擯(Integrity):
悋惡惠悋愀悋惆惘惘惆
惺惆惠愃惘悋悋愕惡
愃惘悴悋慍悋惡惺悋愀悋惺悋惠
惆悋惆悋
愕悋
悋 惡 忰悋惠 惘悽 愀 惆惘 惠悋  擯
 悋惠 惆愕惠 悋惆悋
4/21/2020 S. Parsa (www.parsa.iust.ac.ir)
494
9
1-2惘悽忰悋惠惠惆
惘悋慍悋惘悋
4/21/2020 S. Parsa (www.parsa.iust.ac.ir)
惠 忰悋惠惘悽惆
悋悋慍悋惘惘
50
4/21/2020 S. Parsa (www.parsa.iust.ac.ir)
悋慍悋 惠惺
悋 悛愃悋悋慍 悋慍悋 惠惺 惡悋 悋慍悋惘 惘 惠惆 惘悋惆
愆惆.悵悋 惡惺 悋惘 悋慍 悋惠 悋慍悋 惠惺 惡惘悋
惆 悋愕惠悋惆 惠悋  擧 忰悋惠 惆惘:
1-悋慍悋 惡惘悋 擧 悋慍悋 悋惡 惆惘 悋惠
惺悋惠
2-惺悋惠 悋慍悋 悋惡 惆惘 悋惠
3-擧悋惘惡惘悋 惘悋悋惠
4-悋愕惠悋惆 愕 惘惆悋
514/21/2020 S. Parsa (www.parsa.iust.ac.ir)
悋愕惠悋惆 愕 惘惆悋
惆悋惆 拆悋愕悽 愕悧悋 悋 惡 悋愕惠悋惆 惘惆
悋悋惘  悋惺 悋惘惡惘  惡惘悋 愕愕惠 
惆惆 悋悴悋 惡悋惆.
悋愕悋惠悋惆 惘惆悋 悽悋 悋愕惠悋惆 愕悄 惘惆
悋悋  愕愕悋惠 悋 悋愕悋惠 惘惠悋悋惘 惠惷忰 
悛 悽悋悋惆 愕愕惠 悋悴惆惠惘惠悋悋惘
愆惆 悋悴悋.
悋惆悋
≒悋悋悴 惡悋 悋惘惠惡悋愀 惆惘 悋愕惠悋惆 愕悄 惘惆
拆悵惘 悛愕惡 擧 惆悋悽
≒悋擧 拆悋悵惘 悛愕惡 惡悋 惆悋悽 悋悴 惘悋惡愀
悋擧愕拆惠
≒悋悋悴 惡悋 悋惘惠惡悋愀 惆惘 悋愕惠悋惆 愕悄 惘惆
惠惆惆 擧 惡惘
3-use-casemodelling
55
"忰悋惴惠擧悋愀悋惺悋惠惘悋"惆惘悋惺
悋惺惘惆愕悋愕惠悋惆愕惘惠擧
悋愀悋惺悋惠擧悋惘惠悋惺惠惡悋惘惘悋"
惡悋愆惆.4/21/2020 S. Parsa (www.parsa.iust.ac.ir)
565
6
惘悽忰悋惠悋
悋擧惘愕悋惠(SDL)
悋慍悋 惆愕
愕悋慍 拆悋惆
惠忰
愀惘悋忰
拆愆惠惡悋  惶惡
擧惆 惘惘  惡惘惘愕
悛慍 擧悋惘悋 惘悋
忰惶
Threat
Modeling
4/21/2020 S. Parsa (www.parsa.iust.ac.ir)
惠惆惆 惆愕悋慍
574/21/2020 S. Parsa (www.parsa.iust.ac.ir)
惡惆悋慍悋惘 惘惠悋惘 惠忰 悋擧悋慍
惠惆惆 惆愕悋慍
58
1-悋 惆悋惘悋  悋惡惺 惠惺
擧惆 悋愀悋惺悋惠 惆悋惆 擯 惘 愆悋 悋惡惺
忰悋惴惠 惡悋愕惠  擧 悋愕惠 慍  愕悋惠 惡
愆惆.
悋愕惠 悋悴 惺悋 惘惆 擧 慍 悛 惘
惡悋愆惆  惆悋惘悋.愕惠  惡惘悋
惡悋愆惆 惆悋惘悋 擧 惠悋惆  悽惆 擧悋惘惆悋.
悋 惆 悋慍 惠悋 BPMN惆悋惘悋 惠惺 惡惘悋
惆 悋愕惠悋惆 悋.
惠悴:惠悋愕 悋愀悋惺悋惠:悋  悋 愆悋
惡悋愆惆  惠悋愕 悴慍悋惠  擯惘惆 惠悋愕.
2-愕愕惠 惺悋惘 悋慍 悋 悽悋惶 悋悴悋惆
59
-惆惆擯悋 悋慍 惺悋惘 惠惺
愕  悋愕惠悋惆 惘惆悋
悋愕惠悋惆
- 悋 愕愕惠 慍惘 惠惺 惠惺
惆愕惠惘愕 悴慍悋
3-愕愕惠 惠悴慍
-慍惘 惘 悋 悽惘悴  悋 惘惆 惡惘惘愕
悛悋 悋惠  愕愕惠
- 悋悴慍悋 惡 愕愕惠 慍惘 惘 惠悴慍
惡惘悋 悴悋慍 悋 惘悋悽悋惆 惠惺
惘悴慍悄
-悋 拆悋  悋 惆悋惆 悴惘悋 惠惺
悋悴慍悋 惡 愆惆 惡悋惆
-悋惠 拆惘悋 惠惺
4/21/2020 S. Parsa (www.parsa.iust.ac.ir)
60
悋愕悋愕 惡惘 慍悋惡惆 惡惡惆  悋惘 擯惘悋 慍悋惡惆 拆愆
惡悋慍 惴惘悋
60
3-惠悴慍愕愕惠
悋惠 拆惘悋 惠惺:愕愕惠 愀惘悋忰 惆惘 愀惘忰 愕悋悋惠
悋
愀悧 愕惘忰惆悋惠 愆愕惠 惆惘惠 惘惆 悋惘慍悋惡
悋 惆悋惆 悴惘悋 拆悋擯悋惘 惠 惠惺
惘惆 悋愀 惆愕惠擧悋惘
拆悋惘悋惠惘悋
悴慍 惠惺
悋惠悋慍 惡悋 擧惆

惆惘惠悋愕惠惓悋 惆惘惠惠惘擧惡
惓惡惠  慍
愕悋惡
忰愕悋愕 悋 惆悋惆
愀惘忰 愕悋 惺
惡惘惘愕
惡愀惘 惠 悛悋悋惘愕悋 愆惡擧 惆惘 悋
 愆惆 
惠惺
惠
惘悋 惺惡惘 擧  擧悋惘惡惘 悋 悛悋
惠悋忰惆愕 慍惆
惘悋惘 悋愕惠悋惆 惘惆 愕 擧 愆 悛悋
 擯惘惠
惠 愆悋愕悋 悋愕悋愕 惡惘 惆愕惠惘愕 悛悋
 愆惆 惡惆 愀惡
悴慍
惆愕惠惘愕
慍悋 悋愕悋愕 惡惘 悋 惆悋惆 悛悋
 悋惆 愆惆 惡惆 愀惡 忰惘悋擯
拆愆悋惆:愕悋悋惠 惡 惠悴
愕惠 擧 惆惘 愀惘忰
愕愕惠 悋惠 悋
愆惆 愀惘悋忰 悋.
4/21/2020 S. Parsa (www.parsa.iust.ac.ir)
4-惠惆惆悋惠 惠惺
61
悋悋悴惠愆悋愕悋
惠惆惆悋惠悋慍惡惆悋愆
悋悋惺悛愕惡拆悵惘悋
忰悋惠悋愕惠.悛愕惡拆悵惘
悋悋惺悛
4/21/2020 S. Parsa (www.parsa.iust.ac.ir)
6262
惠惆惆悋擧愕愕惠悋惺悋惡愆愆惆愕惠擧
惠忰惠惺悋STRIDE惠愕愆惆擧
惡惠惘惠惡惺惡悋惘惠惆悋慍:
1.悴惺惠Spoofing identity
惆惘惠惆惆悴惺惠惺悋惠惆惆
悽惆愆惘悋悋惘惡惘愆惘惺愕愕惠悴悋
慍惆.
2.惆愕惠擧悋惘惆悋惆悋Tampering with data
愕愕惠惘惆悋惆惘惆惘悋惡悋慍
悵悽惘悋悋愕惠悋惆惡惘悋拆惘惆悋慍愆悛惘悋
悋惺惠惡悋惘愕悴惆.
悋惆悋惆惆惘惘惘愕悋悵悽惘愕悋慍忰悋惴惠
愆惆.
惺悋惠惆惆惡悋惆惡惠悋惆悋惆悋惆惘悋
4/21/2020 S. Parsa (www.parsa.iust.ac.ir)
63
4悋愆悋悋愀悋惺悋惠-Information disclosure
.1愕愕惠惡悋惆惠惘惡惘悋悴擯惘
悋慍悋愆悋悋愀悋惺悋惠惆悋愆惠惡悋愆惆.
5.悋擧悋惘愕惘愕-DoS
愀惘悋忰愕愕惠悋慍惷惺悋惠愕愕惠悽惆
悋愕惠惘惆忰DoS惘悋惘擯惘惆惡悋惆
悛擯悋惡悋愆惆悋惆悋悋惠惠悋惡惘悋惆惘
愕愕惠愕悋慍拆悋惆惆.
6.悋慍悋愆忰悋惠悋慍Elevation of privilege
惆惘愕愕惠愆悋惘惡惘愆惆惘
愕愕惠惡悋惆悴惆悋惡悋愆惆.
-悋慍惺惆悋悋悋慍悋愆悴慍悋惘惡惘惡悋惆
愀悧愆惆.
4/21/2020 S. Parsa (www.parsa.iust.ac.ir)
惠悴:
惠悋 愆愆 悴惺Stride悛愕惡 擧惠 惡悋擯惘
愕惠惆 悋 拆悵惘.
惠惆惆悋惠 惆 悋 拆悵惘 悛愕惡 惡 惠悴 惡悋
愆惆  悋悴悋惆.
4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 64
惠惆惆 惆惘悽惠 悋慍 悋 
65
悋愀悋惺悋惠 惡 惆愕惠惘愕
擧悋惘惡惘 愆悽惶
1
惆愕惠惘愕
愕惠
拆悋擯悋 惡
悋 惆悋惆
1.1
Login惆惘
悋惡
擧悋惘惡惘
惴惘 惘惆
1.2
惘惡惆
悋 愆愕惠
Session
擧悋惘惡惘
1.3
惆悋惆 愀惺
悋
愆悽惶
1.4
惡惘
惡惘惆悋惘
擧 悋慍
悵
1.1.1
Login
忰愆悋
悋brute-
force
1.2.1
惘惡惆
擧擧
愆愕惠
擧悋惘惡惘
1.3.1
惠惺
悋惠惶悋
悛愃悋慍
擧悋惘惡惘
1.4.1
愕惘惠
悋惺惠惡悋惘
擧悋惘惡惘
1.2.2
愆惡擧 愆惆
惡惘悋
惆悋惆悋
愆悽惶
1.4.1
惠惺
擧
惺惡惘
擧悋惘惡惘
1.2.1.2
惠惺
悋
擧悋惘惡惘
1.2.1.1
and
惠惆惆 悋惶 惆 惆惘悽惠 惘愆 惆惘
愀惘 擧惆悋 惘 惘愆 惘慍惆悋
惆 惡 惘愕惆 惡惘悋 惠悋惠
惆惘悽惠惠惆惆惡惶惘惠悵慍愆悽惶愆惆:
.1惆愕惠惘愕惡悋愀悋惺悋惠愆悽惶擧悋惘惡惘
Or1.1惆愕惠惘愕愕惠惡拆悋擯悋惆悋惆
悋
1.2login惆惘悋惡擧悋惘惡惘惘惆惴惘
or1.2.1login忰愆悋悋brute-
force
and1.2.1.1惠惺悋擧悋惘惡惘悋
user name
1.2.1.2惠惺擧惺惡惘
1.2.2愕惘惠悋惺惠惡悋惘擧悋惘惡惘
1.3惘惡惆愆愕惠悋session擧悋惘惡惘
1.3.1惘惡惆擧擧愆愕惠擧悋惘惡惘
1.4愀惺惆悋惆悋愆悽惶
or1.4.1惠惺悋惠惶悋悛愃悋慍擧悋惘惡惘
1.4.2愆惆愆惡擧惡惘悋惆悋惆悋4/21/2020 S. Parsa (www.parsa.iust.ac.ir)
66
悋愀悋惺悋惠 惡 惆愕惠惘愕
擧悋惘惡惘 愆悽惶
1
惆愕惠惘愕
愕惠
拆悋擯悋 惡
悋 惆悋惆
1.1
Login惆惘
悋惡
惘惆 擧悋惘惡惘
惴惘
1.2
愆愕惠 惘惡惆
悋
Session
擧悋惘惡惘
1.3
惆悋惆 愀惺
悋
愆悽惶
1.4
惡惘
惡惘惆悋惘
擧 悋慍
悵
1.1.1
Login惡悋
愆悋惘
悋brute-
force
1.2.1
惘惡惆
擧擧
愆愕惠
擧悋惘惡惘
1.3.1
惠惺
悋惠惶悋
悛愃悋慍
擧悋惘惡惘
1.4.1
愕惘惠
悋惺惠惡悋惘
擧悋惘惡惘
1.2.2
愆惡擧 愆惆
惡惘悋
惆悋惆悋
愆悽惶
1.4.1
惠惺
擧
惺惡惘
擧悋惘惡惘
1.2.1.2
惠惺
悋
擧悋惘惡惘
1.2.1.1
惡惘慍
惘愕悋
悋 惶
patch
惡 悋慍
HTTPS
惡 悋慍
HTTPS
and
and
愆悽惶惆惘擯惠惆悋惠惡惘悋悋惡
惡悋惠惆惆悋惡惺惡悋惘惠惆擯惘愕惡擧擧惘惆
惠惆惆悋惆惘惆悋悽惆惘悽惠忰:
4/21/2020 S. Parsa (www.parsa.iust.ac.ir)
6.惘愕擧 惠惺
67
1-拆惠悋愕惶惆:惆惘惶惘惠擧惠惆惆惡悋惠
惘惆惡惘惡惘惆悋惘惘悋惘擯惘惆愕悽惠惡悋慍擯愆惠愕惠.
2-悋惡惠惠擧惓惘:慍悋愕惠悋悴悋惆悴惆惆忰
忰悋惶悋慍惠惆惆惆惘悋愕惠.
3-惡惘惡惘惆悋惘:慍悋愕惠悋悴悋忰忰悋惶
悋慍惠惆惆惆惘悋愕惠.
4-擧悋惘惡惘悋惠忰惠惠悋惓惘:惆惘惶惘惠惠忰
惠惺惆悋惆擧悋惘惡惘惠忰惠惠悋惓惘惘悋惘擯惘惆惠悋
忰惆悛擧悋惘惡惘悋愕惠惆.
5-悋惡惠擧愆:惠悋忰惆惠愆悽惶悛愕惡拆悵惘
愕悋惆悋愕惠.
5/(悴惺悋擧惠惘悋1惠悋5)=
惘愕擧(惠惆惆)4/21/2020 S. Parsa (www.parsa.iust.ac.ir)
7.惠惆惆悋 愕悋慍 愕惠惆
68
惠惆惆:login惡悋愆悋惘悋惡惘惠-惘愕
惠忰惠惠悋惓惘:愀惺悋login
惡惘悋惠忰惠惡
愆惘忰:擧悋惘惡惘惠悋惆惡悋悛慍擧惺惡惘
悋擧悋惘惡惘拆愕悋慍惆惘惠惡惠悋愆惡惆愕惠悛惘惆.
惠悴:惆愕惠惘愕愃惘悴悋慍擧悋惠悋悋慍愀惘
悋擧悋惘惡惘擧惺惡惘愕惘惠愆惆.
惘愆悋惡:拆悋悽愀悋擧愃惘悋惡惡惘悋
悋悴悋愕惠惆悋惆惓惡惠愆惆惺悋惡惘悋拆愕
悋慍惆惡悋惘惠悋愆悋惡惘悋惘惆惡愕愕惠
悋擧悋惘惡惘擧惺惡惘愆惆.
惘愕擧:1.
拆惠悋愕惶惆:6
2.悋惡惠悋悴悋惆悴惆惆:8
3.悋惡惠惡惘惡惘惆悋惘:4
4.擧悋惘惡惘悋惠悽惠惠悋惓惘:5
4/21/2020 S. Parsa (www.parsa.iust.ac.ir)
愕悋
悋悋擧惆 惠悋  擯悴悋惆
擧惘惆
愕悋 惡悋惘1395
Second Page
悋 愕 惡惘悋 悋惶
714/21/2020 S. Parsa (www.parsa.iust.ac.ir)
悋 愕 惡惘悋 悋惶
72
1-忰 愕愀忰 忰惆悋
2-愕愕惠 愕悋惘 悋 惺惆 惡惘 惘惷悋
3-悽愀悋 拆悵惘 惠忰
4-惆愕惠惘愕 悋擧悋 忰惆悋
5-擧惆  惆悋惆 悋惆愃悋 悋擧悋 惺惆
6-悋 愕悧惠 悋愕惡 惠慍惺
4/21/2020 S. Parsa (www.parsa.iust.ac.ir)
73
1-忰 愕愀忰 忰惆悋
2-悋 惺惆 惡惘 惘惷
愕愕惠 愕悋惘悋
3-悽愀悋 拆悵惘 惠忰
4-惆愕惠惘愕 悋擧悋 忰惆悋
5-悋惆愃悋 悋擧悋 惺惆
擧惆  惆悋惆
6-悋 惆 惆悋惺
р忰悋惠惓惠慍惘擧惆惡悋愕愀悋惆愃悋
悋愕擧惘拆惠惡悋悛惆惘愕惆惘悽悋愕惠悋惡
悋擧悋拆悵惘愆惆悋愕惠.悋惆愃悋悋愕擧惘拆惠惡悋
拆愕惠悋擧惠惘擧慍悋擧悋忰惘悋悋慍
悋愀惘惡悴惆悛惘惆悋愕惠.
р惆:
1-忰悋惠惠慍惘擧惆惠慍惘悋愕擧悋
2-悋惘愕悋悋愕擧惘拆惠悋慍愀惘拆愕惠
悋擧惠惘擧
3-悋惆愃悋悋愕擧惘拆惠惆惘惠惶悋惘
4-擧惘悋WORD
-愕惘悋悋惡惡惠惠惡惆惆悋惆惡擧惆
悋悴惘悋惘悋惆惘慍悋悋悴惘悋惆悋惘惆.
-惆悋惆悋擧悋惡悋悴惘悋惡悋愆惆惠悋惆
4/21/2020 S. Parsa (www.parsa.iust.ac.ir)
74
р惺惆惠惆惆悋惠悋惠惡悋愕愀悛愕惡拆悵惘慍惡悋悋
惡惘悋愕悋慍悋愕惠.
р悋慍惆惆擯悋悋惠惡悋愕惠慍惡悋惡惘悋愕悋慍悋
悋惠悽悋惡擧惘惆擧:
-惡悋愆惆 惠悴 惘惆
-惡悋愆惆 惆悋愆惠 惘悋 悋 拆悵惘 悛愕惡 忰惆悋.
р愕悋: 愕惠 悽愀悋 惡悋 拆悵惘 悛愕惡 惠悋惠
4/21/2020 S. Parsa (www.parsa.iust.ac.ir)
惡惆悋慍悋惘 惘惠悋惘 惠忰 悋擧悋慍
惘 惡 愆惆悋惘悋
愕忰
By Kaspersky Lab on October 30, 2013. 2:44 am
1-慍悋擧悴悋悋愀惘悋忰愆惆惆惘惺忰悋惠悋慍愀惘
愕悋愕惠悋惆悋慍悛愕惡拆悵惘悋悴惆惆悋愆惠.
2-悋愕惠悋惆惡愆悋慍忰惆悋慍悴悋悋悴惡惠悴惡愆悋慍
忰惆悋悴擧惘悋惡悋慍惡悋愆惆悋愕惠.惡悋惡惘
悋惴悋惘悋惠悋惘悋擧慍惡悋悴悋悋惘惆悋愕惠悋惆惆惘惡愆
悋慍愕惡悋惡慍悋惘惆惘愕惘悋愕惘悴悋惡惆悋愕惠.
3-悋愕惠悋惆慍悋惆悋慍悴悋悋惆悛愆擧悋惘愆惆悛愕惡
惠悋忰惡惘惘愕悋悋悴悋愆惆
惆惘惘擧慍惠忰悋惠擧愕拆惘悋愕擧惡惘悋惆惠12悋悋慍
愕悋2012惠悋2013惆惘拆悋愕悽惡愕悋:惘悋悛愕惡
拆悵惘悋悴悋悋惡悋惠惺惆悋惆慍悋惆愕惠惆
惡惆悋慍悋惘 惘惠悋惘 惠忰 悋擧悋慍
The U.S. Department of Homeland Security warned that a
security update of Oracle Corp's Java software for Web
browsers does not do enough to protect computers from attack,
sticking to its previous advice that the program be disabled.
Technology | Mon Jan 14, 2013 4:16pm ESTRelated: TECH
U.S. says Java still risky, even after security update
BY JIM FINKLE
Java was responsible for 50 percent of all cyber attacks last
year in which hackers broke into computers by exploiting
software bugs, according to Kaspersky Lab (2012).
惘擧慍悋惠惆悛惘擧悋愆惆悋惘惆悋惆擧
惡惘慍惘愕悋惠惶忰忰悴悋悋惠愕愀愆惘擧惠
悋惘悋擧惡惘悋惘惘擯惘悋惡惠悴惡悽愆惡惆
惠悋惆悋惺忰悋惠惡愕愕惠悋
擧悋拆惠惘愆惆.
惠悽惶惶悋悋惠愆惆悋惘惆悋惆悋惆擧
擧悋拆惠惘悋愆悽惶擧惆惘惘惘擯惘悽惆悴悋悋
惘悋惡悋悴惘悋惆惘悛惘惆擧悋愕惠惘惆
惠悋悴悴惘惘悋惘擯惘惆.
惡悋惡惘惡悋擧愕拆惘悋愕擧50%擧忰悋惠
愕悋惡惘惆惘愕悋擯悵愆惠惡悋惘惆擧惘悋悋慍
愀惘悛愕惡拆悵惘悋悴悋悋悋悴悋愆惆
愕忰 惘悋 惡 愆惆悋惘
惡惆悋慍悋惘 惘惠悋惘 惠忰 悋擧悋慍
The Web Just Became More Secure:
Google Drops Support for Java
Written by Matthew HughesSeptember 11, 2015
Ads by Google
Its safe to say that Java  particularly in the browser  has lost
its shine. A large part of this is due to security concerns. The
next version of Google Chrome (version 45, scheduled for
December) has removed support for it entirely.
愕忰 惘悋 惡 愆惆悋惘
Second Page
Ad

Recommended

Antlr part3 getting_started_in_c_sharp
Antlr part3 getting_started_in_c_sharp
Morteza Zakeri
Antlr part1 introduction
Antlr part1 introduction
Morteza Zakeri
Antlr part2 getting_started_in_java
Antlr part2 getting_started_in_java
Morteza Zakeri
9-roslyn-guidelines
9-roslyn-guidelines
Morteza Zakeri
7-clean-code
7-clean-code
Morteza Zakeri
8-bad-smells
8-bad-smells
Morteza Zakeri
6-TDD
6-TDD
Morteza Zakeri
5-modular-design
5-modular-design
Morteza Zakeri
4-architectural-views
4-architectural-views
Morteza Zakeri
2-requirements-modelling
2-requirements-modelling
Morteza Zakeri
1-requirements-elicitation
1-requirements-elicitation
Morteza Zakeri
Analysis of Social Phenomena Using Machine Learning Techniques: A Mixed Resea...
Analysis of Social Phenomena Using Machine Learning Techniques: A Mixed Resea...
Morteza Zakeri
Internet of Things: Middle-ware Platforms, Security, and Intrusion Detection
Internet of Things: Middle-ware Platforms, Security, and Intrusion Detection
Morteza Zakeri
Community Detection with Genetic Algorithm
Community Detection with Genetic Algorithm
Morteza Zakeri
SpotifyX Architectural Review
SpotifyX Architectural Review
Morteza Zakeri
An overview of anomaly detection techniques
An overview of anomaly detection techniques
Morteza Zakeri
SQLite and object-relational mapping in Java
SQLite and object-relational mapping in Java
Morteza Zakeri
Apache Mesos: Architecture, Design and Code Review
Apache Mesos: Architecture, Design and Code Review
Morteza Zakeri
悋惆擯惘 惠悋 惡 惠悋 惡悋 愆惡擧 悋 惺惶惡
悋惆擯惘 惠悋 惡 惠悋 惡悋 愆惡擧 悋 惺惶惡
Morteza Zakeri
Sequence to sequence learning with neural networks
Sequence to sequence learning with neural networks
Morteza Zakeri
Bridge Management System Using NoSQL Solutions
Bridge Management System Using NoSQL Solutions
Morteza Zakeri
Extracting architectural model of software from source code
Extracting architectural model of software from source code
Morteza Zakeri
Software Fault Avoidance in Implementation
Software Fault Avoidance in Implementation
Morteza Zakeri
Introduction to Apache Mesos
Introduction to Apache Mesos
Morteza Zakeri
Introduction to Oracle Grid Engine
Introduction to Oracle Grid Engine
Morteza Zakeri
Introduction to Web Programming: PHP vs ASP.NET
Introduction to Web Programming: PHP vs ASP.NET
Morteza Zakeri
Tutorialspoint UI Analysis
Tutorialspoint UI Analysis
Morteza Zakeri
An Introduction to ANTLR
An Introduction to ANTLR
Morteza Zakeri

More Related Content

More from Morteza Zakeri (20)

4-architectural-views
4-architectural-views
Morteza Zakeri
2-requirements-modelling
2-requirements-modelling
Morteza Zakeri
1-requirements-elicitation
1-requirements-elicitation
Morteza Zakeri
Analysis of Social Phenomena Using Machine Learning Techniques: A Mixed Resea...
Analysis of Social Phenomena Using Machine Learning Techniques: A Mixed Resea...
Morteza Zakeri
Internet of Things: Middle-ware Platforms, Security, and Intrusion Detection
Internet of Things: Middle-ware Platforms, Security, and Intrusion Detection
Morteza Zakeri
Community Detection with Genetic Algorithm
Community Detection with Genetic Algorithm
Morteza Zakeri
SpotifyX Architectural Review
SpotifyX Architectural Review
Morteza Zakeri
An overview of anomaly detection techniques
An overview of anomaly detection techniques
Morteza Zakeri
SQLite and object-relational mapping in Java
SQLite and object-relational mapping in Java
Morteza Zakeri
Apache Mesos: Architecture, Design and Code Review
Apache Mesos: Architecture, Design and Code Review
Morteza Zakeri
悋惆擯惘 惠悋 惡 惠悋 惡悋 愆惡擧 悋 惺惶惡
悋惆擯惘 惠悋 惡 惠悋 惡悋 愆惡擧 悋 惺惶惡
Morteza Zakeri
Sequence to sequence learning with neural networks
Sequence to sequence learning with neural networks
Morteza Zakeri
Bridge Management System Using NoSQL Solutions
Bridge Management System Using NoSQL Solutions
Morteza Zakeri
Extracting architectural model of software from source code
Extracting architectural model of software from source code
Morteza Zakeri
Software Fault Avoidance in Implementation
Software Fault Avoidance in Implementation
Morteza Zakeri
Introduction to Apache Mesos
Introduction to Apache Mesos
Morteza Zakeri
Introduction to Oracle Grid Engine
Introduction to Oracle Grid Engine
Morteza Zakeri
Introduction to Web Programming: PHP vs ASP.NET
Introduction to Web Programming: PHP vs ASP.NET
Morteza Zakeri
Tutorialspoint UI Analysis
Tutorialspoint UI Analysis
Morteza Zakeri
An Introduction to ANTLR
An Introduction to ANTLR
Morteza Zakeri
4-architectural-views
4-architectural-views
Morteza Zakeri
2-requirements-modelling
2-requirements-modelling
Morteza Zakeri
1-requirements-elicitation
1-requirements-elicitation
Morteza Zakeri
Analysis of Social Phenomena Using Machine Learning Techniques: A Mixed Resea...
Analysis of Social Phenomena Using Machine Learning Techniques: A Mixed Resea...
Morteza Zakeri
Internet of Things: Middle-ware Platforms, Security, and Intrusion Detection
Internet of Things: Middle-ware Platforms, Security, and Intrusion Detection
Morteza Zakeri
Community Detection with Genetic Algorithm
Community Detection with Genetic Algorithm
Morteza Zakeri
SpotifyX Architectural Review
SpotifyX Architectural Review
Morteza Zakeri
An overview of anomaly detection techniques
An overview of anomaly detection techniques
Morteza Zakeri
SQLite and object-relational mapping in Java
SQLite and object-relational mapping in Java
Morteza Zakeri
Apache Mesos: Architecture, Design and Code Review
Apache Mesos: Architecture, Design and Code Review
Morteza Zakeri
悋惆擯惘 惠悋 惡 惠悋 惡悋 愆惡擧 悋 惺惶惡
悋惆擯惘 惠悋 惡 惠悋 惡悋 愆惡擧 悋 惺惶惡
Morteza Zakeri
Sequence to sequence learning with neural networks
Sequence to sequence learning with neural networks
Morteza Zakeri
Bridge Management System Using NoSQL Solutions
Bridge Management System Using NoSQL Solutions
Morteza Zakeri
Extracting architectural model of software from source code
Extracting architectural model of software from source code
Morteza Zakeri
Software Fault Avoidance in Implementation
Software Fault Avoidance in Implementation
Morteza Zakeri
Introduction to Apache Mesos
Introduction to Apache Mesos
Morteza Zakeri
Introduction to Oracle Grid Engine
Introduction to Oracle Grid Engine
Morteza Zakeri
Introduction to Web Programming: PHP vs ASP.NET
Introduction to Web Programming: PHP vs ASP.NET
Morteza Zakeri
Tutorialspoint UI Analysis
Tutorialspoint UI Analysis
Morteza Zakeri
An Introduction to ANTLR
An Introduction to ANTLR
Morteza Zakeri

3-use-casemodelling

  • 1. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 1
  • 2. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 2 For an in-depth understanding of use case issues, it is a good idea to refer to the book provided by the Founder of Use Cases, Jacobson. https://www.ivarjacobson.com/sites/default/files/field_iji_file/article/use-case_2_0_jan11.pdf
  • 3. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 3
  • 4. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 4 Use Case View? Captures system functionality as seen by users Built in early stages of development Developed by analysts and domain experts System behavior, that is what functionality it must provide, is documented in a use case model. Use Case Model illustrates the systems intended functions (use cases), its surroundings (actors), and relationships between the use cases and actors (use case diagrams) High level architecture
  • 5. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 5 Actor ? An actor is a person, organization, or external system that plays a role in one or more interactions with your system. Actors are drawn as stick figures. Orderer - someone who places an order to buy. Warehouse Office Clerk is to assist in performing the daily administrative and organizational functions of the warehouse office. o Warehouse Clerk is responsible for ensuring that products are registered and packed correctly for shipping or storage.
  • 6. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 6 Use Case ? A use case is a list of actions or event steps typically defining the interactions between a role (known in the Unified Modeling Language (UML) as an actor) and a system to achieve a goal.
  • 7. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 7 1. Association: A relationship that represents communication between an actor and a use case; can be navigable in both ways or in only one way. 2. Uses (includes) and extends are two types of relationships between use cases. An extends relationship is used to show: - Optional behavior - Behavior that is only run under certain conditions, - Different flows which may be run based on actor selection A uses of includes relationship is used to show: - functionality shared by multiple use cases. - can be placed in a separate use case, related to these uses cases by a uses relationship
  • 8. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 8
  • 9. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 9 1. Kinds: Withdraw Cash is a kind of Bank ATM Transaction.
  • 10. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 10
  • 11. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 11 1. The application will record and maintain the product quantity in the stock in the central database. 2. The storekeeper can remove products from the database. 3. The storekeeper can add products into the database. 4. The storekeeper can change the product quantity in the database. 5. The cashier can bill the item by manually entering the bar code or with a bar code reader. 6. Only the products recorded in the database can be billed. 7. The billed items can be removed from the bill until it has been closed. The retail support application requirements.
  • 12. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 12 8. The billed item removal must be approved by a store manager by entering his authentication data. 9. The billed items will be printed on the cash desk bill as they are entered. The bill will consist of the store name, billed items, information on removed billed items, the total amount of money to be paid, and date and time. 10. The product price can be entered or modified only by a properly authenticated store manager. The retail support application requirements. Consider each use case as a capability to cover one or more requirements
  • 13. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 13 Consider each use case as a capability to cover one or more requirements
  • 14. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 14 .愕愀忰 惡悋悋惠惘 惆惘 惆惡惘悽悋 愕愕惠 悋愕惠悋惆 惘惆悋 惆惆擯悋
  • 15. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 15 2.愕愕惠 惡惘悋 悋愕惠悋惆 惘惆悋 惆惆擯悋 悋慍 惺悋惘
  • 16. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 163.悋惘惆 悋悋 愕惘愕悋 惡愕惠 惡惘悋 悋愕惠悋惆 惘惆悋 惆惆擯悋
  • 17. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 17
  • 18. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 18
  • 19. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 19
  • 20. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 20
  • 21. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 21
  • 22. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 22
  • 23. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 23
  • 24. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 24 Each use case is documented with a flow of events, use-case scenario, which is a description of the events needed to accomplish the required behavior. The scenario is written in the language of the domain and describe what the system should do and not how the system does it. The flow of events should include: -When and how the use case starts and ends -What interaction the use case has with the actors -What data is needed by the use case -The normal sequence of events for the use case -The description of any alternate or exceptional flows
  • 25. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 25 X Flow of Events for the Use Case X.1 Preconditions & Postconditions X.2 Main Flow X.3 Subflows (if applicable) X.4 Alternative Flows Where X is a number from 1 to the number of use cases
  • 26. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 26 Main flow of events: (E1) The use case starts when the system prompts the User for a PIN number. The User can now enter a PIN number via the keypad. (E2) The User commits the entry by pressing the Enter button. (E3) The system then checks this PIN number to see if it is valid. If the PIN number is valid, the system acknowledges the entry, thus ending the use case. Subflows: S1: The system invokes Validate use case.
  • 27. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 27 Alternative flow of events: E1: The User can clear a PIN number any time before committing it and reenter a new PIN number. E2: The User can cancel a transaction at any time by pressing the Cancel button, thus restarting the use case. No changes are made to the Users account. E3: If the User enters an invalid PIN number, the use case restarts. If this happens three times in a row, the system cancels the entire transaction, preventing the User from interacting with the ATM for 30 minutes.
  • 28. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 28
  • 29. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 29
  • 30. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 30
  • 31. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 31 Web Customer actor uses some web site to make purchases online. Top level use cases are View Items, Make Purchase and Client Register. View Items use case could be used by customer as top level use case if customer only wants to find and see some products. This use case could also be used as a part of Make Purchase use case. Client Register use case allows customer to register on the web site, for example to get some coupons or be invited to private sales. Note, that Checkout use case is included use case not available by itself - checkout is part of making purchase.
  • 32. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 32
  • 33. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 33 View Items use case is extended by several optional use cases - customer may search for items, browse catalog, view items recommended for him/her, add items to shopping cart or wish list. All these use cases are extending use cases because they provide some optional functions allowing customer to find item. Customer Authentication use case is included in view Recommended Items and Add to Wish List because both require the customer to be authenticated. At the same time, item could be added to the shopping cart without user authentication.
  • 34. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 34
  • 35. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 35 Checkout use case includes several required uses cases. Web customer should be authenticated. It could be done through user login page, user authentication cookie ("Remember me") or Single Sign-On (SSO). Web site authentication service is used in all these use cases, while SSO also requires participation of external identity provider. Checkout use case also includes Payment use case which could be done either by using credit card and external credit payment service or with PayPal.
  • 36. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 36
  • 37. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 37 Main functional flow of an online shopping system
  • 38. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 38 An example of high level sequence diagram for online bookshop. Online customer can search book catalog, view description of a selected book, add book to shopping cart, do checkout
  • 39. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 39 Each customer has unique id, linked to one account. Account owns shopping cart and orders. Customer could register as a web user to buy items online. Customer could purchases by phone or by ordering from catalogues. Web user has login name which also serves as unique id. Web user could be in several states - new, active, temporary blocked, or banned, and be linked to a shopping cart. Shopping cart belongs to account.
  • 40. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 40 Account owns customer orders. Customer may have no orders. Each order could refer to several payments, possibly none. Every payment has unique id and is related to exactly one account. Both order and shopping cart have line items linked to a specific product. Each line item is related to exactly one product. A product could be associated to many line items or no item at all.
  • 41. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 41
  • 42. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 42 As shown in the next slide, the webStore subsystem contains three components: Search Engine, Shopping Cart, and Authentication. Search Engine component allows to search or browse items by exposing provided interface Product Search and uses required interface Search Inventory provided by Inventory component. Shopping Cart component uses Manage Orders interface provided by Orders component during checkout. Warehouses subsystem provides two interfaces Search Inventory and Manage Inventory used by other subsystems and wired through dependencies.
  • 43. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 43
  • 44. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 44 UML Deployment Diagram Example
  • 45. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 45 Package diagrams depict the organization of model elements into Packages and the dependencies amongst them, including Package imports and Package extensions. They also provide a visualization of the corresponding namespaces.
  • 46. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 46 The Nesting connector between ConnSeq and Controller reflects what the Package contents reveal. The Package contents can be listed by clicking on the diagram background to display the diagram's 'Properties' dialog, selecting the 'Elements' tab and selecting the 'Package Contents' checkbox in the 'Show Compartments' panel The 束import損 connector indicates that the elements within the target Integer Package, which in this example is the single Class Integer, have been imported into the Package Controller If an element already exists within GenApply, such as Loader and Time, these elements' definitions are expanded by those included in the Package Controller. All elements added or updated by the merge are noted by a generalization relationship back to that Package.
  • 47. iCloud S. Parsa (www.parsa.iust.ac.ir) 47 悋惘悋惶惺惠 惆悋愆擯悋惺 擧悋拆惠惘 惆愕 惆悋愆擧惆 惷惺: 悋惘慍悋惘 惠愕惺 悋忰悋惠惘悽 惆惆 悋惘悋:拆悋惘愕悋 愕惺惆 惡悋惘1395 4/21/2020
  • 51. 悋慍悋 惠惺 悋 悛愃悋悋慍 悋慍悋 惠惺 惡悋 悋慍悋惘 惘 惠惆 惘悋惆 愆惆.悵悋 惡惺 悋惘 悋慍 悋惠 悋慍悋 惠惺 惡惘悋 惆 悋愕惠悋惆 惠悋 擧 忰悋惠 惆惘: 1-悋慍悋 惡惘悋 擧 悋慍悋 悋惡 惆惘 悋惠 惺悋惠 2-惺悋惠 悋慍悋 悋惡 惆惘 悋惠 3-擧悋惘惡惘悋 惘悋悋惠 4-悋愕惠悋惆 愕 惘惆悋 514/21/2020 S. Parsa (www.parsa.iust.ac.ir)
  • 52. 悋愕惠悋惆 愕 惘惆悋 惆悋惆 拆悋愕悽 愕悧悋 悋 惡 悋愕惠悋惆 惘惆 悋悋惘 悋惺 悋惘惡惘 惡惘悋 愕愕惠 惆惆 悋悴悋 惡悋惆. 悋愕悋惠悋惆 惘惆悋 悽悋 悋愕惠悋惆 愕悄 惘惆 悋悋 愕愕悋惠 悋 悋愕悋惠 惘惠悋悋惘 惠惷忰 悛 悽悋悋惆 愕愕惠 悋悴惆惠惘惠悋悋惘 愆惆 悋悴悋.
  • 53. 悋惆悋 ≒悋悋悴 惡悋 悋惘惠惡悋愀 惆惘 悋愕惠悋惆 愕悄 惘惆 拆悵惘 悛愕惡 擧 惆悋悽 ≒悋擧 拆悋悵惘 悛愕惡 惡悋 惆悋悽 悋悴 惘悋惡愀 悋擧愕拆惠 ≒悋悋悴 惡悋 悋惘惠惡悋愀 惆惘 悋愕惠悋惆 愕悄 惘惆 惠惆惆 擧 惡惘
  • 56. 565 6 惘悽忰悋惠悋 悋擧惘愕悋惠(SDL) 悋慍悋 惆愕 愕悋慍 拆悋惆 惠忰 愀惘悋忰 拆愆惠惡悋 惶惡 擧惆 惘惘 惡惘惘愕 悛慍 擧悋惘悋 惘悋 忰惶 Threat Modeling 4/21/2020 S. Parsa (www.parsa.iust.ac.ir)
  • 57. 惠惆惆 惆愕悋慍 574/21/2020 S. Parsa (www.parsa.iust.ac.ir)
  • 58. 惡惆悋慍悋惘 惘惠悋惘 惠忰 悋擧悋慍 惠惆惆 惆愕悋慍 58 1-悋 惆悋惘悋 悋惡惺 惠惺 擧惆 悋愀悋惺悋惠 惆悋惆 擯 惘 愆悋 悋惡惺 忰悋惴惠 惡悋愕惠 擧 悋愕惠 慍 愕悋惠 惡 愆惆. 悋愕惠 悋悴 惺悋 惘惆 擧 慍 悛 惘 惡悋愆惆 惆悋惘悋.愕惠 惡惘悋 惡悋愆惆 惆悋惘悋 擧 惠悋惆 悽惆 擧悋惘惆悋. 悋 惆 悋慍 惠悋 BPMN惆悋惘悋 惠惺 惡惘悋 惆 悋愕惠悋惆 悋. 惠悴:惠悋愕 悋愀悋惺悋惠:悋 悋 愆悋 惡悋愆惆 惠悋愕 悴慍悋惠 擯惘惆 惠悋愕.
  • 59. 2-愕愕惠 惺悋惘 悋慍 悋 悽悋惶 悋悴悋惆 59 -惆惆擯悋 悋慍 惺悋惘 惠惺 愕 悋愕惠悋惆 惘惆悋 悋愕惠悋惆 - 悋 愕愕惠 慍惘 惠惺 惠惺 惆愕惠惘愕 悴慍悋 3-愕愕惠 惠悴慍 -慍惘 惘 悋 悽惘悴 悋 惘惆 惡惘惘愕 悛悋 悋惠 愕愕惠 - 悋悴慍悋 惡 愕愕惠 慍惘 惘 惠悴慍 惡惘悋 悴悋慍 悋 惘悋悽悋惆 惠惺 惘悴慍悄 -悋 拆悋 悋 惆悋惆 悴惘悋 惠惺 悋悴慍悋 惡 愆惆 惡悋惆 -悋惠 拆惘悋 惠惺 4/21/2020 S. Parsa (www.parsa.iust.ac.ir)
  • 60. 60 悋愕悋愕 惡惘 慍悋惡惆 惡惡惆 悋惘 擯惘悋 慍悋惡惆 拆愆 惡悋慍 惴惘悋 60 3-惠悴慍愕愕惠 悋惠 拆惘悋 惠惺:愕愕惠 愀惘悋忰 惆惘 愀惘忰 愕悋悋惠 悋 愀悧 愕惘忰惆悋惠 愆愕惠 惆惘惠 惘惆 悋惘慍悋惡 悋 惆悋惆 悴惘悋 拆悋擯悋惘 惠 惠惺 惘惆 悋愀 惆愕惠擧悋惘 拆悋惘悋惠惘悋 悴慍 惠惺 悋惠悋慍 惡悋 擧惆 惆惘惠悋愕惠惓悋 惆惘惠惠惘擧惡 惓惡惠 慍 愕悋惡 忰愕悋愕 悋 惆悋惆 愀惘忰 愕悋 惺 惡惘惘愕 惡愀惘 惠 悛悋悋惘愕悋 愆惡擧 惆惘 悋 愆惆 惠惺 惠 惘悋 惺惡惘 擧 擧悋惘惡惘 悋 悛悋 惠悋忰惆愕 慍惆 惘悋惘 悋愕惠悋惆 惘惆 愕 擧 愆 悛悋 擯惘惠 惠 愆悋愕悋 悋愕悋愕 惡惘 惆愕惠惘愕 悛悋 愆惆 惡惆 愀惡 悴慍 惆愕惠惘愕 慍悋 悋愕悋愕 惡惘 悋 惆悋惆 悛悋 悋惆 愆惆 惡惆 愀惡 忰惘悋擯 拆愆悋惆:愕悋悋惠 惡 惠悴 愕惠 擧 惆惘 愀惘忰 愕愕惠 悋惠 悋 愆惆 愀惘悋忰 悋. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir)
  • 62. 6262 惠惆惆悋擧愕愕惠悋惺悋惡愆愆惆愕惠擧 惠忰惠惺悋STRIDE惠愕愆惆擧 惡惠惘惠惡惺惡悋惘惠惆悋慍: 1.悴惺惠Spoofing identity 惆惘惠惆惆悴惺惠惺悋惠惆惆 悽惆愆惘悋悋惘惡惘愆惘惺愕愕惠悴悋 慍惆. 2.惆愕惠擧悋惘惆悋惆悋Tampering with data 愕愕惠惘惆悋惆惘惆惘悋惡悋慍 悵悽惘悋悋愕惠悋惆惡惘悋拆惘惆悋慍愆悛惘悋 悋惺惠惡悋惘愕悴惆. 悋惆悋惆惆惘惘惘愕悋悵悽惘愕悋慍忰悋惴惠 愆惆. 惺悋惠惆惆惡悋惆惡惠悋惆悋惆悋惆惘悋 4/21/2020 S. Parsa (www.parsa.iust.ac.ir)
  • 64. 惠悴: 惠悋 愆愆 悴惺Stride悛愕惡 擧惠 惡悋擯惘 愕惠惆 悋 拆悵惘. 惠惆惆悋惠 惆 悋 拆悵惘 悛愕惡 惡 惠悴 惡悋 愆惆 悋悴悋惆. 4/21/2020 S. Parsa (www.parsa.iust.ac.ir) 64
  • 65. 惠惆惆 惆惘悽惠 悋慍 悋 65 悋愀悋惺悋惠 惡 惆愕惠惘愕 擧悋惘惡惘 愆悽惶 1 惆愕惠惘愕 愕惠 拆悋擯悋 惡 悋 惆悋惆 1.1 Login惆惘 悋惡 擧悋惘惡惘 惴惘 惘惆 1.2 惘惡惆 悋 愆愕惠 Session 擧悋惘惡惘 1.3 惆悋惆 愀惺 悋 愆悽惶 1.4 惡惘 惡惘惆悋惘 擧 悋慍 悵 1.1.1 Login 忰愆悋 悋brute- force 1.2.1 惘惡惆 擧擧 愆愕惠 擧悋惘惡惘 1.3.1 惠惺 悋惠惶悋 悛愃悋慍 擧悋惘惡惘 1.4.1 愕惘惠 悋惺惠惡悋惘 擧悋惘惡惘 1.2.2 愆惡擧 愆惆 惡惘悋 惆悋惆悋 愆悽惶 1.4.1 惠惺 擧 惺惡惘 擧悋惘惡惘 1.2.1.2 惠惺 悋 擧悋惘惡惘 1.2.1.1 and 惠惆惆 悋惶 惆 惆惘悽惠 惘愆 惆惘 愀惘 擧惆悋 惘 惘愆 惘慍惆悋 惆 惡 惘愕惆 惡惘悋 惠悋惠 惆惘悽惠惠惆惆惡惶惘惠悵慍愆悽惶愆惆: .1惆愕惠惘愕惡悋愀悋惺悋惠愆悽惶擧悋惘惡惘 Or1.1惆愕惠惘愕愕惠惡拆悋擯悋惆悋惆 悋 1.2login惆惘悋惡擧悋惘惡惘惘惆惴惘 or1.2.1login忰愆悋悋brute- force and1.2.1.1惠惺悋擧悋惘惡惘悋 user name 1.2.1.2惠惺擧惺惡惘 1.2.2愕惘惠悋惺惠惡悋惘擧悋惘惡惘 1.3惘惡惆愆愕惠悋session擧悋惘惡惘 1.3.1惘惡惆擧擧愆愕惠擧悋惘惡惘 1.4愀惺惆悋惆悋愆悽惶 or1.4.1惠惺悋惠惶悋悛愃悋慍擧悋惘惡惘 1.4.2愆惆愆惡擧惡惘悋惆悋惆悋4/21/2020 S. Parsa (www.parsa.iust.ac.ir)
  • 66. 66 悋愀悋惺悋惠 惡 惆愕惠惘愕 擧悋惘惡惘 愆悽惶 1 惆愕惠惘愕 愕惠 拆悋擯悋 惡 悋 惆悋惆 1.1 Login惆惘 悋惡 惘惆 擧悋惘惡惘 惴惘 1.2 愆愕惠 惘惡惆 悋 Session 擧悋惘惡惘 1.3 惆悋惆 愀惺 悋 愆悽惶 1.4 惡惘 惡惘惆悋惘 擧 悋慍 悵 1.1.1 Login惡悋 愆悋惘 悋brute- force 1.2.1 惘惡惆 擧擧 愆愕惠 擧悋惘惡惘 1.3.1 惠惺 悋惠惶悋 悛愃悋慍 擧悋惘惡惘 1.4.1 愕惘惠 悋惺惠惡悋惘 擧悋惘惡惘 1.2.2 愆惡擧 愆惆 惡惘悋 惆悋惆悋 愆悽惶 1.4.1 惠惺 擧 惺惡惘 擧悋惘惡惘 1.2.1.2 惠惺 悋 擧悋惘惡惘 1.2.1.1 惡惘慍 惘愕悋 悋 惶 patch 惡 悋慍 HTTPS 惡 悋慍 HTTPS and and 愆悽惶惆惘擯惠惆悋惠惡惘悋悋惡 惡悋惠惆惆悋惡惺惡悋惘惠惆擯惘愕惡擧擧惘惆 惠惆惆悋惆惘惆悋悽惆惘悽惠忰: 4/21/2020 S. Parsa (www.parsa.iust.ac.ir)
  • 69. 愕悋 悋悋擧惆 惠悋 擯悴悋惆 擧惘惆 愕悋 惡悋惘1395
  • 71. 悋 愕 惡惘悋 悋惶 714/21/2020 S. Parsa (www.parsa.iust.ac.ir)
  • 72. 悋 愕 惡惘悋 悋惶 72 1-忰 愕愀忰 忰惆悋 2-愕愕惠 愕悋惘 悋 惺惆 惡惘 惘惷悋 3-悽愀悋 拆悵惘 惠忰 4-惆愕惠惘愕 悋擧悋 忰惆悋 5-擧惆 惆悋惆 悋惆愃悋 悋擧悋 惺惆 6-悋 愕悧惠 悋愕惡 惠慍惺 4/21/2020 S. Parsa (www.parsa.iust.ac.ir)
  • 73. 73 1-忰 愕愀忰 忰惆悋 2-悋 惺惆 惡惘 惘惷 愕愕惠 愕悋惘悋 3-悽愀悋 拆悵惘 惠忰 4-惆愕惠惘愕 悋擧悋 忰惆悋 5-悋惆愃悋 悋擧悋 惺惆 擧惆 惆悋惆 6-悋 惆 惆悋惺 р忰悋惠惓惠慍惘擧惆惡悋愕愀悋惆愃悋 悋愕擧惘拆惠惡悋悛惆惘愕惆惘悽悋愕惠悋惡 悋擧悋拆悵惘愆惆悋愕惠.悋惆愃悋悋愕擧惘拆惠惡悋 拆愕惠悋擧惠惘擧慍悋擧悋忰惘悋悋慍 悋愀惘惡悴惆悛惘惆悋愕惠. р惆: 1-忰悋惠惠慍惘擧惆惠慍惘悋愕擧悋 2-悋惘愕悋悋愕擧惘拆惠悋慍愀惘拆愕惠 悋擧惠惘擧 3-悋惆愃悋悋愕擧惘拆惠惆惘惠惶悋惘 4-擧惘悋WORD -愕惘悋悋惡惡惠惠惡惆惆悋惆惡擧惆 悋悴惘悋惘悋惆惘慍悋悋悴惘悋惆悋惘惆. -惆悋惆悋擧悋惡悋悴惘悋惡悋愆惆惠悋惆 4/21/2020 S. Parsa (www.parsa.iust.ac.ir)
  • 74. 74 р惺惆惠惆惆悋惠悋惠惡悋愕愀悛愕惡拆悵惘慍惡悋悋 惡惘悋愕悋慍悋愕惠. р悋慍惆惆擯悋悋惠惡悋愕惠慍惡悋惡惘悋愕悋慍悋 悋惠悽悋惡擧惘惆擧: -惡悋愆惆 惠悴 惘惆 -惡悋愆惆 惆悋愆惠 惘悋 悋 拆悵惘 悛愕惡 忰惆悋. р愕悋: 愕惠 悽愀悋 惡悋 拆悵惘 悛愕惡 惠悋惠 4/21/2020 S. Parsa (www.parsa.iust.ac.ir)
  • 75. 惡惆悋慍悋惘 惘惠悋惘 惠忰 悋擧悋慍 惘 惡 愆惆悋惘悋 愕忰 By Kaspersky Lab on October 30, 2013. 2:44 am 1-慍悋擧悴悋悋愀惘悋忰愆惆惆惘惺忰悋惠悋慍愀惘 愕悋愕惠悋惆悋慍悛愕惡拆悵惘悋悴惆惆悋愆惠. 2-悋愕惠悋惆惡愆悋慍忰惆悋慍悴悋悋悴惡惠悴惡愆悋慍 忰惆悋悴擧惘悋惡悋慍惡悋愆惆悋愕惠.惡悋惡惘 悋惴悋惘悋惠悋惘悋擧慍惡悋悴悋悋惘惆悋愕惠悋惆惆惘惡愆 悋慍愕惡悋惡慍悋惘惆惘愕惘悋愕惘悴悋惡惆悋愕惠. 3-悋愕惠悋惆慍悋惆悋慍悴悋悋惆悛愆擧悋惘愆惆悛愕惡 惠悋忰惡惘惘愕悋悋悴悋愆惆 惆惘惘擧慍惠忰悋惠擧愕拆惘悋愕擧惡惘悋惆惠12悋悋慍 愕悋2012惠悋2013惆惘拆悋愕悽惡愕悋:惘悋悛愕惡 拆悵惘悋悴悋悋惡悋惠惺惆悋惆慍悋惆愕惠惆
  • 76. 惡惆悋慍悋惘 惘惠悋惘 惠忰 悋擧悋慍 The U.S. Department of Homeland Security warned that a security update of Oracle Corp's Java software for Web browsers does not do enough to protect computers from attack, sticking to its previous advice that the program be disabled. Technology | Mon Jan 14, 2013 4:16pm ESTRelated: TECH U.S. says Java still risky, even after security update BY JIM FINKLE Java was responsible for 50 percent of all cyber attacks last year in which hackers broke into computers by exploiting software bugs, according to Kaspersky Lab (2012). 惘擧慍悋惠惆悛惘擧悋愆惆悋惘惆悋惆擧 惡惘慍惘愕悋惠惶忰忰悴悋悋惠愕愀愆惘擧惠 悋惘悋擧惡惘悋惘惘擯惘悋惡惠悴惡悽愆惡惆 惠悋惆悋惺忰悋惠惡愕愕惠悋 擧悋拆惠惘愆惆. 惠悽惶惶悋悋惠愆惆悋惘惆悋惆悋惆擧 擧悋拆惠惘悋愆悽惶擧惆惘惘惘擯惘悽惆悴悋悋 惘悋惡悋悴惘悋惆惘悛惘惆擧悋愕惠惘惆 惠悋悴悴惘惘悋惘擯惘惆. 惡悋惡惘惡悋擧愕拆惘悋愕擧50%擧忰悋惠 愕悋惡惘惆惘愕悋擯悵愆惠惡悋惘惆擧惘悋悋慍 愀惘悛愕惡拆悵惘悋悴悋悋悋悴悋愆惆 愕忰 惘悋 惡 愆惆悋惘
  • 77. 惡惆悋慍悋惘 惘惠悋惘 惠忰 悋擧悋慍 The Web Just Became More Secure: Google Drops Support for Java Written by Matthew HughesSeptember 11, 2015 Ads by Google Its safe to say that Java particularly in the browser has lost its shine. A large part of this is due to security concerns. The next version of Google Chrome (version 45, scheduled for December) has removed support for it entirely. 愕忰 惘悋 惡 愆惆悋惘

Editor's Notes

  • #37: n example of油activity diagram油for油online shopping. Online customer can browse or search items, view specific item, add it to shopping cart, view and update shopping cart, checkout. User can view shopping cart at any time. Checkout is assumed to include user registration and login. This example does not use partitions, most of the actions are assumed to be fulfilled by online customer.
  • #38: n example of油activity diagram油for油online shopping. Online customer can browse or search items, view specific item, add it to shopping cart, view and update shopping cart, checkout. User can view shopping cart at any time. Checkout is assumed to include user registration and login. This example does not use partitions, most of the actions are assumed to be fulfilled by online customer.
  • #45: An example of油web application油UML油deployment diagram. Book club web application油artifact book_club_app.war油is deployed on Catalina Servlet 2.4 / JSP 2.0 Container which is part of Apache Tomcat 5.5油web server. The油book_club_app.war油artifact油manifests油(embodies) OnlineOrders油component. The artifact contains three other artifacts, one of which油manifests油UserServices油component. The Application Server油束device損油(computer server) has油communication path油to Database Server 束device損 (another server).
  • #50: 悋惠 惘 悋慍悋惘 惡 惆愕 擧惘惆 惘 悋慍悋惘 惡 惶惘惠 悋愕惠 擧 惘 悋慍悋惘悋 惘惆 悋慍 惶惘惠 惡 惺 惆 悋惆惘 擧惠惘 惠惆惆悋惠 悋惠 惆惘 擯悋 忰悋惠 惡惆悽悋悋 惡悋愆惆. 惘愆 惶忰忰 惆愕 惘 悋慍悋惘 悋 悋愕惠 擧 惆惘 惘惆 悋惠 悋慍 悛愃悋慍 惘悽 忰悋惠 悋惆悋 愆惆. 惡惘 愀惡 惠惺惘 悋愀悋 悋慍 惘 悋慍悋惘 悋 愕悋惠惘 悋愆惘愕 慍悋 悋愀悋 悋慍 惺惆 悛愕惡 拆悵惘 惘 悋慍悋惘 惡悋愆惆. 惆惘 愆擧 悴惘悽 忰悋惠 惠惆 惘 悋慍悋惘 悋 愆悽惶 愆惆 悋愕惠. 悋 惘悽 忰悋惠 悵悋惠悋 惠擧惘悋惘 悋愕惠. 悋擯惘 擧惡惆 惡惺惆悋 惡惘悋 惘忰 悋 愆悋惆 愆惆 惡悋惆 惡 悛 惘忰 惡惘擯愆惠 擧惡惆 惘悋 悴惡惘悋 擯惘惆. 惡惘悋 悋擯惘 擧 愕愕惠 拆悋 擯悋惘 惘悋 悋悴悋惆 擧惆 惡惺惆悋 愆悋惆 擧惆 擧 悋慍悋 悋惆惆 擯惘惠 愆惆 惡悋惆 惡 惘忰 惠惺 悋慍 惡悋慍擯愆惠 惆 悛 悋慍悋 惘悋 惡惘慍惘愕悋 擧惘惆.
  • #52: Before defining security requirements, security engineers need to identify those parts of the software system that requires security. These parts of the software system are called Target of Evaluation (TOE). Once TOE is identified then finding security functional requirements (SFR) for those parts becomes simple. [8] lists different set of classes depending on the nature of application. Different set of SFRs can be chosen for the required TOE. Once required SFRs are chosen, then table can be designed to monitor its implementation in required software application. SFRs are chosen to counter threats in TOE of software system. For example; if we are trying to gather SFR of a web application; Table 1 lists related SFRs and their activity. There can be different TOE in a single software application; therefore different set of SFRs are collected for each TOE. Once the uncertain requirements are refined by SFR module, then we are ready to start designing our software. Design phase is important and requires more consideration in terms of security. Based on the information provided by analysis phase (Security Requirements by user stories and SFR) a threat model is developed. If security engineer feels some of the information is missing or some other security threats are possible then it goes back to analysis for the refinement of the security requirements. If security expert finds no problems, then a mitigation plan is designed to cater all those threats listed in threat model. Requirements engineering is the main building block for any software development. Security engineers try to elicit security requirements by different methods, e.g. user stories, abuse cases, etc. Most of the occasion requirements gathered from user stories and other sources are not well defined. These requirements can be refined by security functional requirements (SFR) module (Details are given in section IV-A).
  • #60: 惠惺 慍惘愕愕惠 悋 悴慍悋 惆愕惠惘愕 惡 惘 慍惘 愕愕惠 惡惘悋 惆愕惠惘愕 惡 慍惘 愕愕惠 悋 惠惺 惘 悋慍悋惘悋 惡惘 悋愕悋愕 慍悋 悋惷愀惘悋惘
  • #61: Privileged Code When you design and build secure assemblies, be able to identify privileged code. This has important implications for code access security. Privileged code is managed code that accesses secured resources or performs other security sensitive operations such as calling unmanaged code, using serialization, or using reflection. It is referred to as privileged code because it must be granted permission by code access security policy to be able to function. Non-privileged code only requires the permission to execute. Auditing is the practice of inspecting logs for the purpose of verifying that the system is in a desirable state In software engineering, software configuration management (SCM) is the task of tracking and controlling changes in the software
  • #63: 惡悋惆 惡悋 惠悴 惡 愆愆 惆愕惠 惠惆惆悋惠 惆 惠惆惆 惘悋 愆悽惶 惆.