0% found this document useful (0 votes)
12 views14 pages

Object Oriented

Object oriented system development (OOSD) uses object oriented programming concepts to design, develop, and implement software systems. The OOSD life cycle consists of three main processes: object oriented analysis, object oriented design, and object oriented implementation. Security is a critical aspect of system development and involves identifying threats, evaluating risks, and implementing controls like secure coding and authentication to minimize risks and protect sensitive data throughout the development life cycle. The goal is to create resilient systems that maintain confidentiality, integrity, and availability of data against security threats.

Uploaded by

Uzumaki Namikaze
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views14 pages

Object Oriented

Object oriented system development (OOSD) uses object oriented programming concepts to design, develop, and implement software systems. The OOSD life cycle consists of three main processes: object oriented analysis, object oriented design, and object oriented implementation. Security is a critical aspect of system development and involves identifying threats, evaluating risks, and implementing controls like secure coding and authentication to minimize risks and protect sensitive data throughout the development life cycle. The goal is to create resilient systems that maintain confidentiality, integrity, and availability of data against security threats.

Uploaded by

Uzumaki Namikaze
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

object oriented system development life cycle object-oriented system development (oosd) is a software

development approach that uses object oriented programming (oop) concepts to design, develop, and
implement software systems, oop is a programming paradigm thatfocuses on the creation of objects
that contain data andfunctionality, and interact with each other to perform tasks

software development process

• software development can be viewed as a process

• development is a process of change, refinement, transformation or addition to existing product each


process can be divided into small, interacting sub-process.

• must be defined in such a way that each activity be performed as independently as possible from
other sub-processes

• each sub-process must have the following

description in terms of how it works

specification of input required for the process

specification of the output to be product • software development process can be viewed as a series of
transformation,

where the output of one transformation become the input of subsequent transformation

transformation analysis)

• translate user's need into system's requirements & responsibilities •how they use system can give
insight into requirements

transformation 2(design)

• begins with problems statement ends with details design that can be

transformed into operational system


• includes development activity definition on how to build software its

development its testing

⚫ also include design description programs and testing materials

transformation 3(implementation)

refines detailed design into system deployment that will satisfy users needs

represent how to embed software product within its operational environment

why waterfall model fails

assumes requirements are known before design begins assumes requirements remain static over
development cycle

• assumes sufficient design knowledge to build product

problem, if environment changes

building high quality software

high quality products

• must have user's need and expectations


⚫ this should be attained with

*minimal or no defence

*concentrate on improving the product (or service) prior to delivery rather

than correcting after delivery.

‫ ہار‬to achieve high quality software we need to be able to answer the following questions

• how do we determine when the system is ready for use?

• is it an operational system that satisfies users needs?

is it correct and operating as we thought it should 7

• does it pass an evaluation process?

four quality measures (by blum)

correspondences measures how the delivered system matches the needs of the operational
environment as described in the original requirements statement

• validation am i building the right product


• correctness: measures the consistency of the product requirements with respect to design
specification.

• verification exercise of determining correctness

am building the product right?

object oriented systems development, use case driven approach

object oriented software development life cycle(sdlc) consists of three

macro process object oriented analysis

• object oriented design

⚫ object oriented implementation

oosdlc

obiect oriented system development includes the following activities

• object oriented analysis-use case driven

• object oriented design

• prototype
• component based development

incremental testing

object oriented analysis-use case driven

concerned with determining the system requirements and identifying classes

and their relationship to other classes in the problem domain

user need

system needs object & classes.

scenarios can be used to help analyst understand requirements • jacobson's concept of use case can be
used to describe the user computer

system interaction

⚫ to understand system requirements need to identify

o who are the actor?

how do they use system?


use case model represents the users view of the system or user needs

• developing use cases is iterative

• documentation must also be varied out it should be short possible

object-oriented design

goal is to design the classes identified during the analysis phase and the

user interface

• additional objects and classes that support implementation of the requirements are also identified and
defined

• first build the object model based on objects and their relationships, then

literate and refine the model:

design and ferne classes design and refine method

9 design and refine structures

o design and refine associations

• guidelines to us oo design
reuse rather than build a new class design a large no of simple classes rather than a small no of complex
glasses,

• fully understand what you have proposed if possible go back & refine the classes

‫ہیں‬

prototyping

a prototype is a version of a software product developed in the early stages

of the product's life cycle for specific, experimental purpose

categories prototype

horizontal prototype is a simulation of the interface but contains functionality

advantages

0 quick to implement

o provides a good overall feel of the system

© allows user to evaluate the interface on the basis of their normal.

expected perception of the system vertical prototype is a subset of the system features with complete
functionality

advantages

o few implemented function ca pe tested in greater depth.

the prototype can be viewed by end user and management members purpose of view

to demonstrate that the prototype has been developed according to the specification and that the final
specification is appropriate

d to collect information about errors or other problems in the system.

• to give management and everyone connected with the project the glimpse of what the technology can
provide

implementations

• move from custom development to assembly from prefabricated components.

• can produce large market low cost high quality products

moving values & oifferentiation gained by rapid customization to targeted customers

software components
functional units of programs building block offering collection of reusable services

15

can request service form another component or deliver its own services on request delivery of service is
independent components work together to accomplish task

components may depends on one another without interfering with each other

each components is unaware of contextinner workings of other components

implementation component based development

• industrialized approach to system development. move from custom development

to assembly of pre-built, pre-tested relisable software components that operate with each other

idea of cbd

• application development improved significantly if application assembled quickly from prefabricated


software components

⚫ increasingly large collection of interpretable software components could be

made available to developers in both general & specialist catalogues


incremental testing

• after each phase carry out the testing process to detect bugs if any this reduces the overall time and
cost

reusability

major benefit of do system development

for object to be reusable, much effort must be spent in designing itself

effectively evaluate existing software components for reuse

o has my problem been solved?

has my problem been partially solved?

what has been done before to solve problem similar to this one?

benefits

increased reliability

reduced time and cost for development


improved consistency

⚫ information hiding

reuse strategy

conformance to naming standards

creation & administration of an objects repository

⚫ encouragement by strategic management of reuse as opposed to constant redevelopment

establish target for percentage of the objects in the projece to be reused

security is a critical aspect of any system development process in today's digital world, systems are
increasingly vulnerable to a wide range of security threats, such as cyber attacks. data breaches, and
other malicious activities therefore, ensuring the security of systems throughout their development life
cycle is essential to prevent potential threats and protect sensitive information

security system development is the process of designing building, and implementing a system that is
secure and protects against potential security threats. this process involves integrating security
measures into the development process from the early stages to ensure that security s embedded into
the systems design, implementation, and maintenance
security system development involves identifying potential security threats and vulnerabilities
evaluating the risk associated with each threat, and implementing appropriate security controls to
minimize the risk these controls can include secure coding practices, secure communication protocols,
authentication and authorization, data privacy and protection. security testing, security monitoring and
detection, incident response planning, and disaster recovery planning

‫ ہاں‬the goal of security system development is to create a system that is resilient against potential
security threats, maintains the confidentiality. integrity and availability of data, and protects sensitive
information from unauthorized access, modification, or destruction by incorporating security measures
into the development process, organizations can ensure that their systems remain secure and can
prevent potential security incidents from occurring

the importance of security in system development cannot be overstated as technology continues to


advance the number of potential security threats also increases a security breach can result in severe
consequences, such as financial loss, damage to reputation, and legal liabilities therefore, incorporating
security measures throughout the system development process is crucial to minimize the risk of security
incidents

security is a critical component in every stage of the sdlc security measures should be implemented
early in the sdlc process to ensure that security requirements are properly integrated into the design
and development of the system additionally ongoing security testing and monitoring must be performed
to ensure that the system remains secure throughout its lifecycle by incorporating security into the sdlc,
organizations can minimize the risk of security breaches and protect sensitive data

security system development is used to design, build, and implement secure systems that protect
against potential security threats, the process of security system development involves integrating
security measures into the development process from the early stages to ensure that security is
embedded into the systems design implementation, and maintenance here are some ways that security
system development is used

19
design secure systems: security system development is used to design systems that are secure by design
this means that security is considered from the beginning of the development process and security
controls are integrated into the systems architecture and design

dentify and mitigate security risks: security system development is used to dentify potential security
risks and vulnerabilities in a system and implement appropriate security controls to mitigate the risks.
this includes measures such as secure coding practices, encryption, authentication and authorization.
intrusion detection and prevention, and regular security testing and monitoring

compliance with regulations and standards, many industries and jurisdictions have regulations and
standards that require organizations to implement security measures to protect sensitive information
security system development is used to ensure that organizations comply with these regulations and
standards

protect sensitive information: security system development is used to protect sensitive information
from unauthorized access, modification or destruction this includes personal information, financial
information, and other sensitive data that, if compromised, can cause significant harm to individuals and
organizations.

• maintain business continuity security system development is used to ensure that systems remain
operational and available in the face of potential security incidents. this helps protect business
continuity and minimizes the impact of security incidents on organizations

21

examples of security systems and development

• firewall a firewall is a security system that is designed to protect a network from unauthorized access,
it is a network security device that monitors and controls incoming and outgoing network traffic based
on predetermined security rules
• secure coding practices secure coding practices are a set of guidelines and best practices that software
developers follow to prevent common security vulnerabilities in software this includes practices such as
input validation data sanitization, and error handling.

You might also like