0% found this document useful (0 votes)
11 views3 pages

BC230203261

Uploaded by

Rashda khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views3 pages

BC230203261

Uploaded by

Rashda khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

BC230203262

ASSIGNMENT #2
CS 507
Flowchart Steps:
1. Start
 Symbol: Oval
 Description: The process begins when a user attempts to log in to the secure
network.
2. Input Credentials
 Symbol: Rectangle
 Description: The user enters their username and password.
3. Check Credentials
 Symbol: Rectangle
 Description: The system checks if the username and password match the records
in the database.
4. Decision: Are Credentials Correct?
 Symbol: Diamond
 Description:
 Yes: Proceed to Two-Factor Authentication (2FA).
 No: Notify the user and allow for retrying or lock the account after
multiple failed attempts.
5. Two-Factor Authentication (2FA)
 Symbol: Rectangle
 Description: The system prompts the user for a second authentication factor
(e.g., SMS code, app-based code, biometric verification).
6. Decision: Is 2FA Verified?
 Symbol: Diamond
 Description:
 Yes: Grant access to the secure network.
 No: Deny access and notify the user.
7. Access Granted
 Symbol: Rectangle
 Description: Once authenticated, the user is granted access to the network.
8. End
 Symbol: Oval
 Description: The process ends after successful authentication and access, or after
denying access due to failed attempts.
Visual Representation
To create the flowchart visually, follow these steps:
1. Start (Oval)
 Connect to Input Credentials (Rectangle).
2. Input Credentials (Rectangle)
 Connect to Check Credentials (Rectangle).
3. Check Credentials (Rectangle)
 Connect to Decision: Are Credentials Correct? (Diamond).
 From the diamond, draw two arrows:
 One arrow labeled "Yes" leading to Two-Factor Authentication
(2FA) (Rectangle).
 Another arrow labeled "No" leading to a process that includes notifying
the user and retrying or locking the account.
4. Two-Factor Authentication (2FA) (Rectangle)
 Connect to Decision: Is 2FA Verified? (Diamond).
 From this diamond, draw two arrows:
 One arrow labeled "Yes" leading to Access Granted (Rectangle).
 Another arrow labeled "No" leading to a process that includes denying
access and notifying the user.
5. Access Granted (Rectangle)
 Connect to End (Oval).
6. End (Oval)
Example Flowchart Layout
Verify Open In Editor Run Copy code
1[Start] --> [Input Credentials] --> [Check Credentials]
2 |
3 v
4 Are Credentials Correct?]
5 | Yes
6 v
7 [Two-Factor Authentication]
8 |
9 v
10 [Is 2FA Verified?]
11 | Yes
12 v
13 [Access Granted] --> [End]
14 |
15 No
16 |
17 [Deny Access] --> [End]

You might also like