MITS5002 Software Engineering Methodology - Research Report - Assignment Help

Get Expert Help on Report Writing

Introduction

Software architecture is defined as complex structures that make up a software system as well as the discipline needed to come up with such.  It plays a significant role in ensuring that developed systems are sound and flexible. Notably, coming up with a program architecture is not only challenging but also expensive. Thus, it is more preferable to make changes in the process of development rather than wait until a system is complete [1]. Flaws are detected and identified through analysis of architecture. Besides detecting flaws, analysis helps in verifying various system aspects such as level of maintainability, usability, safety as well as ability to resist external and internal attacks.

Today, these attributes can be measured through scenario and metric based architectural analysis methodologies. Scenario based approach depends on a number of scenarios created through a brainstorming session [1]. Conversely, metric based aims at coming up with specific metrics against which attributes are assessed.

Notably, numerous flaws discovered during analysis are related to security. Normally, evaluation of security capabilities of systems is carried out during all phases of systems development. Specifically, architecture security risk scrutiny is done during design stage [1]. The main aim of this process is to detect inconsistencies in system design as well as architecture.

Even though these techniques have greatly aided in early detection of security loopholes, they are insufficient. For instance, they lack automated tools to carry out assessment. Likewise, these techniques are limited in terms of operation environment for systems. This article introduces a new concept to address aforementioned limitations called architectural security analysis schema. Given an attack scenario, a schema will capture numerous details such as pre-conditions, categories, results and signatures. Vulnerability is identified through attack signatures. Any developer can customize their own signatures as long as they understand Object Constraint Language (OCL) [1]. Additionally, OCL is used in designing architectural security metrics for assessing system soundness. Briefly, this paper discusses common scenarios and metrics of architecture security analysis based on OCL, a detailed explanation and implementation of this approach then finalizes with a summary of assessment results. 

Scenarios Analysis

This section highlights a number of common scenarios that have been effectively used in assessing system vulnerability. To begin with, there is man-in-the-middle attack [1]. In this scenario, communication between two elements is intercepted by a foreign object. By intercepting, the signature created is components operating in an insecure environment. 

Ask a New Question
*
*
  • United States+1
  • Afghanistan+93
  • Albania+355
  • Algeria+213
  • American Samoa+1684
  • Andorra+376
  • Angola+244
  • Anguilla+1264
  • Antigua and Barbuda+1268
  • Argentina+54
  • Armenia+374
  • Aruba+297
  • Australia+61
  • Austria+43
  • Azerbaijan+994
  • Bahamas+1242
  • Bahrain+973
  • Bangladesh+880
  • Barbados+1246
  • Belarus+375
  • Belgium+32
  • Belize+501
  • Benin+229
  • Bermuda+1441
  • Bhutan+975
  • Bolivia+591
  • Bosnia and Herzegovina+387
  • Botswana+267
  • Brazil+55
  • British Indian Ocean Territory+246
  • British Virgin Islands+1284
  • Brunei+673
  • Bulgaria+359
  • Burkina Faso+226
  • Burundi+257
  • Cambodia+855
  • Cameroon+237
  • Canada+1
  • Cape Verde+238
  • Caribbean Netherlands+599
  • Cayman Islands+1345
  • Central African Republic+236
  • Chad+235
  • Chile+56
  • China+86
  • Christmas Island+61
  • Cocos (Keeling) Islands+61
  • Colombia+57
  • Comoros+269
  • Congo (DRC) (Jamhuri ya Kidemokrasia ya Kongo)+243
  • Congo (Republic) (Congo-Brazzaville)+242
  • Cook Islands+682
  • Costa Rica+506
  • Cote d'Ivoire+225
  • Croatia+385
  • Cuba+53
  • Curacao+599
  • Cyprus+357
  • Czech Republic+420
  • Denmark+45
  • Djibouti+253
  • Dominica+1767
  • Dominican Republic+1
  • Ecuador+593
  • Egypt+20
  • El Salvador+503
  • Equatorial Guinea+240
  • Eritrea+291
  • Estonia+372
  • Ethiopia+251
  • Falkland Islands+500
  • Faroe Islands+298
  • Fiji+679
  • Finland+358
  • France+33
  • French Guiana+594
  • French Polynesia+689
  • Gabon+241
  • Gambia+220
  • Georgia+995
  • Germany+49
  • Ghana+233
  • Gibraltar+350
  • Greece+30
  • Greenland+299
  • Grenada+1473
  • Guadeloupe+590
  • Guam+1671
  • Guatemala+502
  • Guernsey+44
  • Guinea+224
  • Guinea-Bissau+245
  • Guyana+592
  • Haiti+509
  • Honduras+504
  • Hong Kong+852
  • Hungary+36
  • Iceland+354
  • India+91
  • Indonesia+62
  • Iran+98
  • Iraq+964
  • Ireland+353
  • Isle of Man+44
  • Israel+972
  • Italy+39
  • Jamaica+1876
  • Japan+81
  • Jersey+44
  • Jordan+962
  • Kazakhstan+7
  • Kenya+254
  • Kiribati+686
  • Kosovo+383
  • Kuwait+965
  • Kyrgyzstan+996
  • Laos+856
  • Latvia+371
  • Lebanon+961
  • Lesotho+266
  • Liberia+231
  • Libya+218
  • Liechtenstein+423
  • Lithuania+370
  • Luxembourg+352
  • Macau+853
  • Macedonia+389
  • Madagascar+261
  • Malawi+265
  • Malaysia+60
  • Maldives+960
  • Mali+223
  • Malta+356
  • Marshall Islands+692
  • Martinique+596
  • Mauritania+222
  • Mauritius+230
  • Mayotte+262
  • Mexico+52
  • Micronesia+691
  • Moldova+373
  • Monaco+377
  • Mongolia+976
  • Montenegro+382
  • Montserrat+1664
  • Morocco+212
  • Mozambique+258
  • Myanmar (Burma)+95
  • Namibia+264
  • Nauru+674
  • Nepal+977
  • Netherlands (Nederland)+31
  • New Caledonia+687
  • New Zealand+64
  • Nicaragua+505
  • Niger+227
  • Nigeria+234
  • Niue+683
  • Norfolk Island+672
  • North Korea+850
  • Northern Mariana Islands+1670
  • Norway (Norge)+47
  • Oman+968
  • Pakistan+92
  • Palau+680
  • Palestine+970
  • Panama+507
  • Papua New Guinea+675
  • Paraguay+595
  • Peru+51
  • Philippines+63
  • Poland+48
  • Portugal+351
  • Puerto Rico+1
  • Qatar+974
  • Reunion+262
  • Romania+40
  • Russia+7
  • Rwanda+250
  • Saint Barthelemy+590
  • Saint Helena+290
  • Saint Kitts and Nevis+1869
  • Saint Lucia+1758
  • Saint Martin+590
  • Saint Pierre and Miquelon+508
  • Saint Vincent and the Grenadines+1784
  • Samoa+685
  • San Marino+378
  • Sao Tome and Principe+239
  • Saudi Arabia+966
  • Senegal+221
  • Serbia+381
  • Seychelles+248
  • Sierra Leone+232
  • Singapore+65
  • Sint Maarten+1721
  • Slovakia+421
  • Slovenia+386
  • Solomon Islands+677
  • Somalia+252
  • South Africa+27
  • South Korea+82
  • South Sudan+211
  • Spain+34
  • Sri Lanka+94
  • Sudan+249
  • Suriname+597
  • Svalbard and Jan Mayen+47
  • Swaziland+268
  • Sweden (Sverige)+46
  • Switzerland+41
  • Syria+963
  • Taiwan+886
  • Tajikistan+992
  • Tanzania+255
  • Thailand+66
  • Timor-Leste+670
  • Togo+228
  • Tokelau+690
  • Tonga+676
  • Trinidad and Tobago+1868
  • Tunisia+216
  • Turkey+90
  • Turkmenistan+993
  • Turks and Caicos Islands+1649
  • Tuvalu+688
  • U.S. Virgin Islands+1340
  • Uganda+256
  • Ukraine+380
  • United Arab Emirates+971
  • United Kingdom+44
  • United States+1
  • Uruguay+598
  • Uzbekistan+998
  • Vanuatu+678
  • Vatican City+39
  • Venezuela+58
  • Vietnam+84
  • Wallis and Futuna+681
  • Western Sahara+212
  • Yemen+967
  • Zambia+260
  • Zimbabwe+263
  • Aland Islands+358
*
*
*

Plagiarism Checker

Submit your documents and get Plagiarism report
Check Plagiarism

Chat with our Experts

Want to contact us directly? No Problem. We are always here for you

TOP

Connect on WHATSAPP: +61-416-195006, Uninterrupted Access 24x7, 100% Confidential

X

Your solution is just a click away! Get it Now

PrevNext
MoTuWeThFrSaSu
242526272812
3456789
10111213141516
17181920212223
24252627282930
31123456