0% found this document useful (0 votes)
265 views

Cybernetics Protector

The document outlines a proposed software system called the Cybernetics Protector for facilitating secure communication and evidence sharing between secret intelligence agencies and undercover agents. The system would allow agency chiefs to manage agent profiles and assign cases, agents to upload encrypted evidence, and all users to generate reports. Key requirements include secure access, 24/7 availability, and supporting browsers like IE, Firefox and more. The proposed technologies are J2EE, XML, AJAX, web services, and the deliverables would include help documentation, deployment files, database scripts and full source code.

Uploaded by

wityamit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
265 views

Cybernetics Protector

The document outlines a proposed software system called the Cybernetics Protector for facilitating secure communication and evidence sharing between secret intelligence agencies and undercover agents. The system would allow agency chiefs to manage agent profiles and assign cases, agents to upload encrypted evidence, and all users to generate reports. Key requirements include secure access, 24/7 availability, and supporting browsers like IE, Firefox and more. The proposed technologies are J2EE, XML, AJAX, web services, and the deliverables would include help documentation, deployment files, database scripts and full source code.

Uploaded by

wityamit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 3

The Great Mind Challenge - Project Scenario Template

Note: Already flled information should not be changed


1.
Name of the
Project
Cybernetics Protector
2. Objective/ Vision
The Secret Intelligence Agency has always used
undercover agents to solve complex cases and
dismantle criminal organizations. We are
conceptualizing this software as a solution so
that Secret Intelligence Agencies and their
agents can communicate through this Software for
the exchange of evidences in a secure way.
3.
Users of the
System
A. Citizen
B. Under Cover Agent
C. Secret Intelligence Agencys chief
D. Ministry of Defence
4. Functional
Requirements
(Atleast Eight)
Secret Agencys Chief:
i. Chief should be able to create/edit/view Agents profle
ii. Appointing of Agent to a particular case.
iii. Secure retrieval of evidences received from Agent.
iv. Access to Data Base logs.
v. Should be able to trace Agents location (using IP
addresses)
vi. Generate Reports
vii. Ability to store data with history (archive cases).
viii. Ability to create Digital Signature certifcates.
Agent:
i. Able to view case details.
ii.Should be able to encrypt & upload evidence or data to
Data Base.
iii.Able to view resources from ministry or chief.
iv.Generate Report.
v. Should be able to view the dynamic map of anywhere in
the world.
Defense Ministry:
i. Should be able to send resources to Secret
Agency.
ii.Receive reports
iii.Ability to assign cases to the Agency.
Citizen:
i. Ability to see Success Stories.
ii.Chat assistance from Intelligence Agency.
iii.Ability to apply for a job in Secret Intelligence Agency.
iv.Ability to give tips & suggestion.
.
5.
Non-functional
requirements
(Atleast Four)
i. Secure access of confdential data (users details).
SSL can be used.
ii. 24 X 7 availability
iii.Better component design to get better performance at
peak time
iv.Flexible service based architecture will be highly
desirable for future extension
6. Optional features
a. Login using face recognition.
b. GPS functionality.
c. News Feed facility.
7.
User interface
priorities
A. Professional look and feel
B. Use of AJAX atleast with all registration forms
C. Browser testing and support for IE, NN, Mozila, and
Firefox.
D. Use of Graphical tool like JASPER to show strategic
data to admin
E. Reports exportable in .XLS, .PDF or any other
desirable format
8. Reports
A. Case Report
B. Success Report
C.Report regarding most wanted criminals and bounty
information if available.
9.
Other important
issues
A. Good hashing and encryption techniques to protect
information.
B. Use of Google Map API (freeware license)
10. Team Size 2 4 members
11.
Technologies to
be used
UML, J2EE, XML, e-Forms, AJAX, Web 2.0, Web-services,
SOA
12. Tools to be Used ROSE/RSA / WebSphere Modeler
Eclipse/ RAD / Lotus Forms Designer / Portlet
Factory
WebSphere Portal/ WAS/ WAS CE / WPS
DB2 Express C or DB2 UDB
Tivoli CDP/TSM / Tivoli Directory Server
Linux will be the preferred OS.
13.
Final Deliverable
must include
A. Online or ofine help to above said users,
Application deployment executive and developer
B. Application archive ( .war/.ear ) with source code
C. Database backup and DDL Script
D. Complete Source code

You might also like