The document outlines a proposed software system called the Cybernetics Protector for facilitating secure communication and evidence sharing between secret intelligence agencies and undercover agents. The system would allow agency chiefs to manage agent profiles and assign cases, agents to upload encrypted evidence, and all users to generate reports. Key requirements include secure access, 24/7 availability, and supporting browsers like IE, Firefox and more. The proposed technologies are J2EE, XML, AJAX, web services, and the deliverables would include help documentation, deployment files, database scripts and full source code.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
265 views
Cybernetics Protector
The document outlines a proposed software system called the Cybernetics Protector for facilitating secure communication and evidence sharing between secret intelligence agencies and undercover agents. The system would allow agency chiefs to manage agent profiles and assign cases, agents to upload encrypted evidence, and all users to generate reports. Key requirements include secure access, 24/7 availability, and supporting browsers like IE, Firefox and more. The proposed technologies are J2EE, XML, AJAX, web services, and the deliverables would include help documentation, deployment files, database scripts and full source code.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 3
The Great Mind Challenge - Project Scenario Template
Note: Already flled information should not be changed
1. Name of the Project Cybernetics Protector 2. Objective/ Vision The Secret Intelligence Agency has always used undercover agents to solve complex cases and dismantle criminal organizations. We are conceptualizing this software as a solution so that Secret Intelligence Agencies and their agents can communicate through this Software for the exchange of evidences in a secure way. 3. Users of the System A. Citizen B. Under Cover Agent C. Secret Intelligence Agencys chief D. Ministry of Defence 4. Functional Requirements (Atleast Eight) Secret Agencys Chief: i. Chief should be able to create/edit/view Agents profle ii. Appointing of Agent to a particular case. iii. Secure retrieval of evidences received from Agent. iv. Access to Data Base logs. v. Should be able to trace Agents location (using IP addresses) vi. Generate Reports vii. Ability to store data with history (archive cases). viii. Ability to create Digital Signature certifcates. Agent: i. Able to view case details. ii.Should be able to encrypt & upload evidence or data to Data Base. iii.Able to view resources from ministry or chief. iv.Generate Report. v. Should be able to view the dynamic map of anywhere in the world. Defense Ministry: i. Should be able to send resources to Secret Agency. ii.Receive reports iii.Ability to assign cases to the Agency. Citizen: i. Ability to see Success Stories. ii.Chat assistance from Intelligence Agency. iii.Ability to apply for a job in Secret Intelligence Agency. iv.Ability to give tips & suggestion. . 5. Non-functional requirements (Atleast Four) i. Secure access of confdential data (users details). SSL can be used. ii. 24 X 7 availability iii.Better component design to get better performance at peak time iv.Flexible service based architecture will be highly desirable for future extension 6. Optional features a. Login using face recognition. b. GPS functionality. c. News Feed facility. 7. User interface priorities A. Professional look and feel B. Use of AJAX atleast with all registration forms C. Browser testing and support for IE, NN, Mozila, and Firefox. D. Use of Graphical tool like JASPER to show strategic data to admin E. Reports exportable in .XLS, .PDF or any other desirable format 8. Reports A. Case Report B. Success Report C.Report regarding most wanted criminals and bounty information if available. 9. Other important issues A. Good hashing and encryption techniques to protect information. B. Use of Google Map API (freeware license) 10. Team Size 2 4 members 11. Technologies to be used UML, J2EE, XML, e-Forms, AJAX, Web 2.0, Web-services, SOA 12. Tools to be Used ROSE/RSA / WebSphere Modeler Eclipse/ RAD / Lotus Forms Designer / Portlet Factory WebSphere Portal/ WAS/ WAS CE / WPS DB2 Express C or DB2 UDB Tivoli CDP/TSM / Tivoli Directory Server Linux will be the preferred OS. 13. Final Deliverable must include A. Online or ofine help to above said users, Application deployment executive and developer B. Application archive ( .war/.ear ) with source code C. Database backup and DDL Script D. Complete Source code
ISC2 Certified in Cybersecurity (CC) Practice Exams: Over 650 Practice Questions of Exam-Level Difficulty with Very Detailed Explanations to Right and Wrong Answers