Thesis Formate Be
Thesis Formate Be
A project
SecPod SanerNOW
(Endpoint Security and Management Subsystem)
Submitted to
She majorly worked with our development teams and has gained insightful experience in the areas of Web Development.
We thank you for your services during the period 06 January 2020 to 30 June2020.
Once again thank you for the co-operation and contribution while at work with Scketch Digital Solutions LLP. We wish
the best in your future endeavors.
Thanking you,
Samson Ratnakar
CERTIFICATE OF SUPERVISOR(S)/GUIDE
This is to certified that the work incorporated in the project “SecPod SanerNOW(Endpoint Security and
Management)” is a record of six month project work assigned by our institution, successfully carried out
by Ankita Navlani bearing Roll no. 500102117003 under my guidance and supervision for the award of
the Degree of Master of Computer of Application (MCA) of Bhilai, C.G., Affiliated to Chhattisgarh
Swami Vivekanand Technical University (CSVTU), Bhilai, C.G., India to the best of my knowledge
and belief the report embodies the work of the candidates and duly been successfully completed.
I Ankita Navlani student of 6th Semester MCA, Bhilai Institute of Technology, Durg(C.G.) India, hereby
declare that the project entitled SecPod SanerNOW(Endpoint Security and Management) has been
carried out by me under the Guidance/Supervision of Guide Dr. Jyothi Pillai, Associate Professor of
Guide Submitted in partial fulfillment of the requirement for the award of the Degree of Master of
Computer Application (MCA) by the Chhattisgarh Swami Vivekananda Technical
University(CSVTU) during the academic year 2017-2020. This report has not been submitted to any other
organization /university for any award of Degree/Diploma.
(Signature of Candidate)
Ankita Navlani
Date: 20-06-2020
Place: Durg
CERTIFICATE OF FORWARDING
This is certify that Ankita Navlani, a bonafide Student Of Master of Computer Applications (M.C.A.)
at Bhilai Institute of Technology, Durg C.G., India, has carried out there Project work as mentioned in
this project entitle “SecPod SanerNOW(Endpoint Security and Management)” at B.I.T, Durg
Chhattisgarh Swami Vivekananda Technical University (CSVTU), Bhilai, C.G., India to which the
institute is affiliated.
This certificate is issued by the undersigned does not cover any responsibility regarding the statement made
and carried out by the concerned student.
The current dissertation is hereby forwarded for evaluation for the purpose for which it has been submitted
CERTIFICATE OF APPROVAL
This is to Certify that the project the entitled “SecPod SanerNOW(Endpoint Security and
Management)”, carried out by “Ankita Navlani” students of sixth semester, M.C.A. at Bhilai Institute
of technology, Durg, C.G., India, is hereby approved after proper examination and evaluation as a
creditable work for the partial fulfillment of the requirement for awarding the degree Master of Computer
Application(M.C.A.) from Chhattisgarh Swami Vivekananda Technical University(CSVTU), Bhilai
C.G. India.
ACKNOWLEGEMENT
I have great pleasure in the submission of this project report entitled “SecPod SanerNOW(Endpoint
Security and Management)” of the Institute in partial fulfillment of the degree of Master of Computer
Application. While submitting this Project report, I like this opportunity to thanks those directly or
indirectly related to project work. I would like to thank my Guide Dr. Jyothi Pillai who has provided the
opportunity and organizing project for me. Without her active co-operation and guidance, it would have
become very difficult to complete task in time.
I would like to express sincere thanks to Dr. Ramesh, Head of Department, (Computer Applications).
While Submission of the project, I also like to thanks again Dr. Sanjeev Karmakar Sir Project Coordinator
and the all Professors of Bhilai Institute of Technology, Durg, C.G., India, for their continuous help and
guidance throughout the course of M.C.A
Acknowledgement is due to our parents, family members, friends and all those persons who have helped
us directly or indirectly in the successfully completion of the project work.
Abstract
The subsystem “Endpoint Security and Management” of the system “SecPod SanerNOW” has been
developed with a motive of providing ease to the endpoints or the users to secure their respective system
from external vulnerabilities and threats. The prime goal is to enhance system functionality of number of
users in one go with single account. This feature enhances the security as well as portability of the users’
systems.
The “Endpoint Security and Management” allows companies to create their account upon “SecPod
SanerNOW” within trial or subscription basis based upon which the services and number of users to be
subscribed depends on. The companies are provided with number of services that can be opted based on
the requirements of several departments.
The soul functionality of the subsystem is to deploy agent to each user’s personal system and scan for all
the details of the system and provide it to “SecPod SanerNOW” where all the vulnerabilities and threats
are accounted and displayed in the “Endpoint Security and Management” subsystem. It also provides the
functionality of displaying dashboard with several features of creating and maintaining groups, accounts as
well as users.
The usage and the activities can also be traced using the audit logs feature. The enhancement of this
subsystem is in creation of customized reports that can be downloaded and analyzed based on users’
requirements. An effort has been made to fulfill requirements of endpoints with user-friendly interface and
feasible functionality to enhance platform usage.
Processor: Intel core i3 1.90 GHz processor. Front End: JSP and Bootstrap.
Type of Project
List of Tables
List of Figures
1 Dynamic Modeling
16-17
1.2 State diagram
2 Functional Model
3 Database Design
List of Abbreviation/Symbol
Table Content
1. Introduction 1
3.1. Introduction 2
3.1.2 Scope 3
3.1.3 References 3
3.6.4 Security 8
4.2.1. Scenario 13
5. Implementations 27-37
8. Limitations 45
9. Conclusions 45-46
10 Bibliography 46
INTRODUCTION
1. Introduction
1.1. Project Description
This Project SecPod SanerNOW is an online application. It has focused on providing multiple
uses through single platform by simplifying the IT security and management efforts to reduce costs.
SanerNow platform Queries and Monitors Endpoints, Analyzes the Security Posture, and Responds
to Bring Endpoints or the host computers to an Approved State.
The subsystem ‘SanerNow’ empowers the system through network, takes proactive actions and
protects the system against threats. It enables the companies to register themselves with the
SanerNow platform and add its respective users along with the management tools opted for the
different users.
This platform provides with a huge amount of subscriptions to provide a cost-effective solutions to
the companies against security threats from external environment.
2. System Study
The systems existed previously faced a number of issues related to defending their endpoints
against the security threats. The companies had to pay huge amount as well as had to engage large
amount of resources like memory and other hardware components only to safeguard their endpoint
systems against security threats.
The other common problem faced by big enterprises was the platform compatibility issue since
each department couldn’t work upon same hardware configurations so providing security solutions
to these endpoints was a bigger challenge.
The system proposed is the Secpod SanerNow which has been designed to eradicate the issues
being faced by the enterprises due to the existing system. This website enables companies to
register and use the facilities of scanning the vulnerabilities nad threats of the system. The proposed
system also helps manage the endpoints.The system provides proper security and threat recognition
interface.
7. Better services.
After doing the project SecPod SanerNOW, study and analyzing all the existing or required
functionalities of the system, the next task is to do the feasibitity study for the project. All projects
are feasible– given an unlimited resources and infinite time.
Feasibility Study includes consideration of all the possible ways to provide a solution to the given
problem. The proposed solution should satisfy all the user requirement and should be flexible
enough so that future changes can be easily done based on the future upcoming requirements. The
various feasibility studies are:
• Technical Feasibility
• Operational Feasibility
• Economic Feasibility
This is very important aspect to be considered by developing a project. We decided the technology
based on minimum possible cost factor.
This includes the study of the function, performance and constraints that may affect the ability to
achieve an acceptable system. For this feasibility study, we studied complete functionality to be
provided in the system, as described in the System Requirement Specification(SRS), and checked
if everything was possible using different type of front end and backend platforms.
Software Requirement
Specification
3.1 Introduction
• The main objective of the endpoint security and management is to scan the company and its users’
details from their respective systems and check for the vulnerabilities and threats,if any.
• It also concentrates upon providing hign performance with searching results in less than a second
• The agents being provided by the platform supports multi compatability.
• This platform also tracks the records of company along with its users and their status.It shows the
alerts regarding different aspects.
The main functionality of the Project on SecPod SanerNOW is to query the system, monitor the
changes, analyze the system for risks and threats and respond to fix the issues.
1. It continuously monitors the system for which the users have been registered.
2. The system accounts for the subscriptions being done by company.
3. It deploys the system immediately to the user’s system.
4. It provides the audit logs containing record of each activity of all users.
5. It facilitates the provision of adding accounts within the company details.
6. The system also shows alerts on various notifications.
The system after careful analysis has been identified to be presented with the following sub-systems
and roles. The sub-systems involved are:
1. User
The user is the company that would request for scanning their system against the threats and
vulnerabilities. The user can either be a for demo purpose or with subscription plans.
2. The internet connection is the major. Since the application fetches the data from the
database over the internet.
3.2.5. Assumptions
1. The code should be free with compilation errors/syntax error
2. The product must have an interface which is simple enough to understand
3.2.6. Dependencies
1. All necessary hardware and software are available for the implementing and use of the tool.
2. The proposed system would be designed, development and implemented based on the SRS
documents.
3. End users should have basic knowledge of computer and we also assure that the users will be
given software training documentation and reference material.
Front End:
• Cascading Style Sheet: - Cascading style sheets are used to format the layout of Web pages. Now
these days it is also used to format the mobile application. They can be used to define text styles,
table sizes, and other aspects of Smart Phone that previously could only be defined in a page's
HTML. CSS describes how HTML elements are to be displayed on screen, paper, or in other media
External style is stored in SCSS files in Ionic project folder.
• Hyper Text Mark-up Language 5: - HTML5 is the latest version of Hypertext Mark up Language,
the code that describes web pages. It's actually three kinds of code: HTML, which provides the
structure; Cascading Style Sheets (CSS), which take care of presentation; and JavaScript, which
makes things, happen. HTML is a mark up language used for structuring and presenting content
on the World Wide Web. It is the fifth and current major version of the HTML standard. HTML5
is the latest and most enhanced version of HTML. Technically, HTML is not a programming
language, but rather a mark up language. HTML5 introduces a number of new elements and
attributes that can help you in building modern websites or Smart phone. Here is a set of some of
the most prominent features introduced in HTML5.
▪ New semantic element-header footer, section
▪ Forms 2.0
▪ Persistent local storage
▪ Micro data
▪ Drag and Drop
• jQuery: - jQuery is a fast and concise JavaScript Library that simplifies HTML document traversing,
event handling, animating, and Ajax interactions for rapid web development. jQuery is designed to
change the way that you write JavaScript.
BACK END:
• Java Server Pages:
Java Server Pages (JSP) is a server-side programming technology that enables the creation of
dynamic, platform-independent method for building Web-based applications. JSP have access to
the entire family of Java APIs, including the JDBC API to access enterprise databases. JSP are
always compiled before they are processed by the server unlike CGI/Perl which requires the server
to load an interpreter and the target script each time the page is requested.
• Apache Tomcat:
Apache Tomcat, also known as Tomcat Server, proves to be a popular choice for web developers
building and maintaining dynamic websites and applications based on the Java software platform.
It’s reportedly called Tomcat because the founder saw it as an animal that could take care of and
fend for itself. Similarly, Apache Tomcat is contributed to by developers all over the world, so it
takes care of itself in that way.
User Interface
The new system shall provide a very intuitive and simple interface to the user and the
administrator, so that the user can easily navigate through pages and the administrator can easily
manage accountants and revoke user permissions.
This sub system is displayed when the user logs into the system and provides dashboard of overall
activities like activated account, number of subscriptions taken, invoice, the services being used,
etc.
This sub-system is provided to get the link for getting agent software being deployed with different
operating systems.
Devices: This component displays the device details which has been recorded into the system.
Create group: It creates the groups of the users along with their host or IP addresses.
The reliability of the overall program depends on the reliability of the separate components.
• Recovery requirements.
• Data backup capabilities of a server.
• Enhanced Validation at the inputs.
• Customer Support Contacts.
3.6.4. Security
• Security to the user from threats and vulnerabilities.
• Control access to the scanned logs from endpoints.
• Maintain sign-in and sign-out.
• Provides threat recognition and solutions to ensure security.
• Custom reports on regular basis to update the logs and system scan.
System Design
4. System Design
4.1. Object Class Model
Object modeling develops the static structure of the software system in terms of objects. It identifies the
objects, the classes into which the objects can be grouped into and the relationships between the objects.
It also identifies the main attributes and operations that characterize each class.
Enter a strong
u_pass varchar(100) 0 to 255
password.
Table: company_details
Enter company
comp_dept varchar(100) 0 to 255
department
Enter company
comp_designation varchar(100) 0 to 255
designation
Table: company_address
Enter company
comp_building varchar(100) 0 to 255
building number
Enter company
comp_state varchar(100) 0 to 255
state
Table: company_finance
Enter if GST
comp_gstAvail varchar(100) 0 to 255
available
Table: provision_tool
Table: user_account
Enter valid
org_name varchar(100) 0 to 255
organization name
Enter total
subscription varchar(100) 0 to 255
subscriptions
Validate the
agent_autoupdate varchar(100) 0 to 255
autoupdate feature
Table: invoice
-2,147,483,648 to
u_id int(11) Get unique user id
2,147,483,647.
Table: audit_logs
-2,147,483,648 to
u_id int(11) Get the user id
2,147,483,647.
-2,147,483,648 to
account_id int(11) Get the account id
2,147,483,647.
Table: alerts
Get the
subscription_status varchar(100) 0 to 255
subscription status
Table: alert-condition
Enter condition
condition_name varchar(100) 0 to 255
name
Table: deployment
Enter deployment
deploy_action varchar(100) 0 to 255
action
Enter deployment
deploy_method varchar(100) 0 to 255
method
Table: device_account
Enter appropriate
host_name varchar(100) 0 to 255
host name
Enter appropriate
operating _system varchar(100) 0 to 255
operating system
Activate saner
saner_enable varchar(100) 0 to 255
enable
Enter appropriate
group_name varchar(100) 0 to 255
group name
Table: group
Enter group
group_desc varchar(100) 0 to 255
description
Table: agent_download
Enter operating
operating_system varchar(100) 0 to 255
system
Enter operating
bit varchar(100) 0 to 255
system bit
Table: mail_setting
-2,147,483,648 to
u_id int(11) Enter unique user id
2,147,483,647.
An object/class relationship is an association that exists between one or more objects/classes. It is defined
by business rules and /or common practices. There are four types of relationships among classes:
Association, generalization, dependency and realization.
-
Association- Main type of relationship describing the possible set of associations among objects of the
associated classes.
l
Secpod SanerNOW
Sign-In
User
Account Group
Deploy agent in
endpoints
Control_panel User
-Login/Logout
-AddAccountDetail
-DeployAgent
- AddUserDetail
-ManageAccounts -AddAccount
-ManageUsers -RegisterUser
-TwoWayAuthentication -Overview
-AuditLogs -CustomReports
-Alerts
Dynamic Modeling After the static behavior of the system is analyzed, its behavior with respect to
time and external changes needs to be examined. This is the purpose of dynamic modeling.
Dynamic Modeling can be defined as “a way of describing how an individual object responds to
events, either internal events triggered by other objects, or external events triggered by the outside
world”.
User
4.2.2. State Diagram
Functional Modeling is the final component of object-oriented analysis. The functional model shows
the processes that are performed within an object and how the data changes
As it moves between methods. It specifies the meaning of the operations of object modeling and the
actions of dynamic modeling. The functional model corresponds to the data flow diagram of
traditional structured analysis.
vii. invoice
viii. audit_logs
ix. alerts
x. alert_condition
xi. deployment
xii. device_account
xiii. group
xiv. agent_download
xv. mail_setting
Description:
i. The user table stores the details of the users being registering themselves with the secpod.
Fields: u_id, u_type, u_email, u_firstname, u_lastname, u_pass, u_confirmPass,
u_company.
Primary key: u_id.
ii. The company_details table stores the details of the company for which the endpoins needs
to get scanned against vulnerabilities and threats.
Fields: comp_id, u_id, comp_name, comp_dept, comp_designation,comp_mob.
Primary key: comp_id
iii. The company_address table stores all the details of the company address.
Fields : comp_id, comp_building, comp_area, comp_city, comp_state, comp_country,
comp_zip, comp_fax
Foreign key: comp_id
iv. The company_finance stores the details of the company related finance.
Fields: comp_id, comp_currencyCode, comp_gstAvail, comp_gstin
Foreign key: comp_id
v. The provision_tool table stores the services upon which the security would be provided
by the platform.
Fields: prov_tool_id, prov_tool_type
Primary key: prov_tool_id.
vi. The user_account table stores the account details added by the user or the company.
Field: account_id , comp_id, prov_tool_id, account_name, org_name, email,
subscription, user_role, acc_image, agent_autoupdate
Primary key: account_id
vii. The invoice table generates a unique invoice no. for the user to extract the billing details.
Field: invoice_no, u_id, date, total_cost, status, view
Primary key: invoice_no
viii. The audit_logs table displays all the log details of the activities being happened by all the
accounts of the user.
Field: job_code, u_id, account_id, audit_date, audit_account, audit_user, audit_message
Foreign keys: u_id, account_id
ix. The alerts table displays the alert warnings for the user regarding the notifications.
Field: prov_tool_id, subscription_status, email, condition_id
Foreign keys: prov_tool_id, condition_id
x. The alert_condition table stores all the conditions regarding the alerts being displayed to
the user.
Field: condition_id,condition_name
Primary key: condition_id
xi. The deployment table stores the ways and actions to be opted by the user for getting secpod
agent within the endpoints.
Field: deploy_action, deploy_method, download_id
xii. The device_account table displays the overview of the device added to the platform being
scanned.
Field: group_id, host_name, ip_address, mac_address, operating_system, saner_enable,
group_name, last_seen, download_id
Foreign keys: group_name, download_id
xiii. The group table stores the basic information of the groups being created in particular
account.
Field: group_id, u_id, group_name, group_desc, group_criteria
Primary key: group_id
xiv. The agent_download table stores the information of the operating system and bit related
links for deployment of the agent into the endpoints.
Field: download_id, operating_system, bit
Primary key: download_id
xv. The mail_setting table stores the details related to email being done to the user regarding
updates.
Field: account_id, u_id, smtp_port, smtp_host, ssl_trust
Foreign key: account_id, u_id
Database Tables:-
i. user
Name Type
u_id int
u_type varchar
u_email varchar
u_firstname varchar
u_lastname varchar
u_pass varchar
u_confirmPass varchar
u_company varchar
ii. company_details
Name Type
comp_id int
u_id int
comp_name varchar
comp_dept varchar
comp_designation varchar
comp_mobile int
iii. company_address
Name Type
comp_id int
comp_building varchar
comp_area varchar
comp_city varchar
comp_state varchar
iv. company_finance
Name Type
comp_id int
comp_currencyCode varchar
comp_gstAvail varchar
comp_gstin varchar
v. provision_tool
Name Type
prov_tool_id int
prov_tool_type varchar
vi. user_account
Name Type
comp_id int
prov_tool_id int
account_id int
account_name varchar
org_name varchar
email_id varchar
subscription varchar
user_role varchar
acc_image varchar
agent_autoupdate varchar
vii. invoice
Name Type
invoice_no int
u_id int
date varchar
total_cost varchar
status varchar
view varchar
viii. audit_logs
Name Type
job_code int
u_id int
account_id int
audit_date varchar
audit_account varchar
audit_user varchar
audit_message varchar
ix. alerts
Name Type
prov_tool_id int
condition_id int
email varchar
subscription_status boolean
x. alert-condition
Name Type
condition_id int
condition_name varchar
xi. deployment
Bhilai Institute of Technology, Durg Department of Computer Applications 2017-2020
34 SecPod SanerNOW
Name Type
deploy_action varchar
deploy_method varchar
download_id int
xii. device_account
Name Type
group_id int
download_id int
host_name varchar
ip_address varchar
mac_address varchar
saner_enable boolean
group_name varchar
last_seen varchar
xiii. group
Name Type
group_id int
u_id int
group_name varchar
group_desc varchar
group_criteria varchar
xiv. agent_download
Name Type
download_id int
operating_system varchar
bit varchar
xv. mail_setting
Name Type
account_id int
u_id int
smtp_port varchar
smtp_host varchar
ssl_trust varchar
IMPLEMENTATION
5. Implementations
• Windows, which is an operating system for computers. It is more reliable, compatible and fast. It
is user friendly too.
• There's absolutely nothing to do with operating system. I have worked in Windows; Mac and
Linux .It was all same.
• You get different tools to run your pages in local host. And that can be the difference.
• But in window easy to install the XAMPP in windows and start the apache service is easy
compared to Linux.
• Windows for developing - simply because it's my main OS and most popular OS.
1. HTML : HTML (HyperText Markup Language) is the most basic building block of the Web.
It defines the meaning and structure of web content. Other technologies besides HTML are
generally used to describe a web page's appearance/presentation (CSS) or
functionality/behavior (JavaScript).
3. Bootstrap : Bootstrap is the most popular HTML, CSS, and JavaScript framework for
developing responsive, mobile-first websites. Bootstrap is a free and open-source CSS
framework directed at responsive,mobile-first front-end web development. It contains CSS
4. AJAX: AJAX tutorial covers concepts and examples of AJAX technology for beginners and
professionals.AJAX is an acronym for Asynchronous JavaScript and XML. It is a group
of inter-related technologies like JavaScript, DOM, XML, HTML/XHTML, CSS,
XMLHttpRequest, etc.AJAX allows us to send and receive data asynchronously without
reloading the web page. So it is fast.AJAX allows us to send only important information to
the server not the entire page. So only valuable data from the client side is routed to the server
side. It makes your application interactive and faster.
1. JSP: Java Server Pages (JSP) is a Java standard technology that enables you to write dynamic, data-
driven pages for your Java web applications. JSP is built on top of the Java Servlet specification.
The two technologies typically work together, especially in older Java web applications. From a
coding perspective, the most obvious difference between them is that with servlets you write Java
code and then embed client-side markup (like HTML) into that code, whereas with JSP you start
with the client-side script or markup, then embed JSP tags to connect your page to the Java
backend.
2. MySQL: MySql is a database, widely used for accessing querying, updating, and managing data in
databases.
3. Apache Tomcat: Apache Tomcat, also known as Tomcat Server, proves to be a popular
choice for web developers building and maintaining dynamic websites and applications
based on the Java software platform. It’s reportedly called Tomcat because the founder saw
it as an animal that could take care of an d fend for itself. Similarly, Apache Tomcat is
contributed to by developers all over the world, so it takes care of itself in that way.
This is an RDBMS based project which is currently using MySQL for all the transaction
statements. MySQL is an open source RDBMS System.
• RDBMS have become a predominant choice for the storage of information in new databases
used for financial records, manufacturing and logistics information, personnel data, and much
more.
• Relational database have often replaced legacy hierarchical databases and network databases
because they are easier t understand and use.
• However, relational databases have been challenged by object databases, which were
introduced in an attempt t address the object-relational impedance mismatch in relational
database, and XML databases.
Class.forName("com.mysql.jdbc.Driver");
Connection conn =
DriverManager.getConnection("jdbc:mysql://localhost:3306/feemanagement", "root", "");
Statement st=conn.createStatement();
Tables: user
• company_details
• company_address
• company_finance
• provision_tool
• user_account
• invoice
• audit_logs
• alerts
• alert_condition
• deployment
• device_account
• group
• agent_download
• mail_setting
Subsystem 1 : User
546
955
• Sign in
• Overview
• SanerNOW
• Control
• Audit Logs
• Reports
SOFTWARE
TESTING
6. Software Testing
6.1. Software Testing Tools Used(If any)
6.2. Black Box Testing
This method enables the software engineer to device set of input techniques that fully exercise all
functional requirements for a program . Black Box tests the input, the output and the external data. It
checks whether the input data is correct and whether we are getting the desired output.
TEST CASES:
i) Purpose:
The main purpose of test cases is that the system should flow as it has been made, even if capture incorrect
data from the invoice it will indicate us with yellow or red colour. If we get data in field with yellow colour
indicate that the data which is captured by the system may be incorrect.
And data in field with red colour indicate that the data which is captured by the system is incorrect. The
flow of the system should go as it is defined by the developer.
Each module is considered independently. It focuses on each unit of software as implemented in the source
code. It is white box testing.
01 tryforfree.jsp No Yes
02 index.jsp Yes No
04 sanernow.jsp No No
07 auditlog.jsp Yes No
08 manage.jsp No Yes
Estimation of Effort:
Calculations –
1. BASIC MODEL :-
E=a*(KLOC)b
The above formula is used for the cost estimation for the basic COCOMO model, and
also is used in the subsequent models. The constant values a and b for the Basic Model
for the different categories of system:
Software Projects a b
Organic 2.4 1.05
Semi Detached 3.0 1.12
Embedded 3.6 1.20
The effort is measured in Person-Months and as evident from the formula is dependent
on Kilo-Lines of code. These formulas are used as such in the Basic Model calculations,
as not much consideration of different factors such as reliability, expertise is taken into
account, henceforth the estimate is rough.
So for our project “ SecPod SanerNOW ” the value of KLOC is 7.4040 and Project
type is Semi Detached so the value of a and b is 3.0 and 1.12 respectively.
tryforfree.jsp 386
index.jsp 546
overview.jsp 1850
sanernow.jsp 1954
control.jsp 458
CRcontrol.jsp 684
auditlog.jsp 420
manage.jsp 955
KLOC= 7.273
Estimating Effort :
Estimating Time :
Time = 2.5(27.689).38
So the cost estimation for the basic COCOMO model is 8.83 Person-Month.
External Input 15
External Output 10
External Enquiry 2
External Input 3 4 6
External Output 4 5 7
External Enquiry 3 4 6
UFP= 254
n= 5+0+5+3+5+3+5+3+3+2+2+3+4+0
n=43
CAF=1.08
DFP=CAF * UFP
DFP= 274.32
8. Limitations
Although we have put our best efforts to make the software flexible, easy to operate but
limitations cannot be ruled out even by us. Though the software presents a broad range of options
to its users some intricate options could not be covered into it; partly because of logistic and partly
due to lack of sophistication. Lack of time was also major constraint, thus it was not possible to
make the software fulproof and dynamic. Lack of time also compelled us to ignore some parts.
Considerable efforts have made the software easy to operate even for the people
not related to field of computers but it is acknowledged that a layman may find it a bit problematic
at the first instance. The user is provided help at each step for his convenience in working with
the software.
Future Enhancement:
The admin requirements always change according to the time. So, the system needs some
enhancement according to the requirements.There are the Future Enhancements we are going to
do in our system. And may be some other kind future changes will be possible in our system also:
1. We think that not a single project is ever considered as complete forever because our mind
is always thinking something new and our necessities also are growing day by day.
2. We always want something more than what we have.We can give more advance software
for SecPod SanerNOW including more facilities.
3. We always want something more than what we have.
4. Integrated multiple load balancers to distribute the loads of the system.
The above mentioned points are the enhancements which can be done to increase applicability and
usage of this project. Here we can maintain the records of SanerNOW application of a particular
system.
Conclusions
9. Conclusions
Development of the project on the topic “Secpod SanerNOW” has been aimed to provide a feasible
and user-friendly environment to the enterprises with the purpose of scanning vulnerabilities
and threats. It enables the company to add all the endpoints to a single platform i.e Secpod SanerNOW to
protect them from the threats and external risks in cost-effective manner.
An eye has been kept on making the platform as one of architectured and the fastest scanning as well as
monitoring interface.The mission of this platform is to provide security assurance to every connected
endpoint in the world. The focus is upon building an ecosystem where devices are connected without
worrying about security concerns.
Secpod SanerNOW is a platform of tools, rather than many point products, would more
effectively handle tasks. With such a platform, all use cases around managing and securing endpoints
can be addressed with a single solution.
10. Bibliography
During the Development of our System, We have taken the Reference from Books and Journals, Which
we would like to mention in this section.
3. A Beginner's Guide to Programming Interactive Web Applications with PHP by Alan Forbes
Websites Referred:
i. www.w3schools.com
ii. www.wikipedia.com
iii. www.javatpoint.com
iv. www.studentstutorials.com
v. www.stackoverflow.com