Cybernetics Protector

Embed Size (px)

Citation preview

The Great Mind Challenge - Project Scenario Template Note: Already filled information should not be changed1 Name of the . Project Cybernetics Protector The Secret Intelligence Agency has always used undercover agents to solve complex cases and dismantle criminal organizations. We are conceptualizing this software as a solution so that Secret Intelligence Agencies and their agents can communicate through this Software for the exchange of evidences in a secure way. A. Citizen B. Under Cover Agent C. Secret Intelligence Agencys chief D. Ministry of Defence Secret Agencys Chief:i. ii. iii. iv. Chief should be able to create/edit/view Agents profile Appointing of Agent to a particular case. Secure retrieval of evidences received from Agent. Access to Data Base logs.

2 Objective/ . Vision

3 Users of the . System

4 Functional . Requirements (Atleast Eight)

v. Should be able to trace Agents location (using IP addresses) vi. Generate Reports vii. Ability to store data with history (archive cases).[*] viii. Ability to create Digital Signature certificates.[*] Agent: i. Able to view case details. ii. Should be able to encrypt & upload evidence or data to Data Base. iii. Able to view resources from ministry or chief. iv. Generate Report. v. Should be able to view the dynamic map of anywhere in the world. Defense Ministry: i. Should be able to send resources to Secret Agency. ii. Receive reports iii. Ability to assign cases to the Agency. Citizen: i. Ability to see Success Stories.[to be written by defence min] ii. Chat assistance from Intelligence Agency.[*] iii. Ability to apply for a job in Secret Intelligence Agency.[] iv. Ability to give tips & suggestion.

5 Non-functional . requirements (Atleast Four)

6 Optional . features

i. Secure access of confidential data (users details). SSL can be used. ii. 24 X 7 availability iii. Better component design to get better performance at peak time iv. Flexible service based architecture will be highly desirable for future extension a. Login using face recognition. b. GPS functionality. c. News Feed facility. A. Professional look and feel B. Use of AJAX atleast with all registration forms C. Browser testing and support for IE, NN, Mozila, and Firefox. D. Use of Graphical tool like JASPER to show strategic data to admin E. Reports exportable in .XLS, .PDF or any other desirable format A. Case Report B. Success Report C. Report regarding most wanted criminals and bounty information if available. A. Good hashing and encryption techniques to protectinformation. B. Use of Google Map API (freeware license)

7 User interface . priorities

8 . Reports 9 Other important . issues 1 0 Team Size . 1 1 Technologies to . be used

2 4 members

UML, J2EE, XML, e-Forms, AJAX, Web 2.0, Webservices, SOA ROSE/RSA / WebSphere Modeler

1 2 Tools to be Used .

Eclipse/ RAD / Lotus Forms Designer / Portlet Factory WebSphere Portal/ WAS/ WAS CE / WPS DB2 Express C or DB2 UDB Tivoli CDP/TSM / Tivoli Directory Server Linux will be the preferred OS. A. Online or offline help to above said users, Application deployment executive and developer

1 Final 3 Deliverable . must include

B. Application archive ( .war/.ear ) with source code C. Database backup and DDL Script D. Complete Source code