cybernetics protector

3
The Great Mind Challenge - Project Scenario Template Note: Already filled information should not be changed 1. Name of the Project Cybernetics Protector 2. Objective/ Vision The Secret Intelligence Agency has always used undercover agents to solve complex cases and dismantle criminal organizations. We are conceptualizing this software as a solution so that Secret Intelligence Agencies and their agents can communicate through this Software for the exchange of evidences in a secure way. 3. Users of the System A. Citizen B. Under Cover Agent C. Secret Intelligence Agency‘s chief D. Ministry of Defence 4. Functional Requirements (Atleast Eight) Secret Agency’s Chief: i. Chief should be able to create/edit/view Agent’s profile ii. Appointing of Agent to a particular case. iii. Secure retrieval of evidences received from Agent. iv. Access to Data Base logs. v. Should be able to trace Agent’s location (using IP addresses) vi. Generate Reports vii. Ability to store data with history (archive cases). viii. Ability to create Digital Signature certificates. Agent: i. Able to view case details. ii. Should be able to encrypt & upload evidence or data to Data Base. iii. Able to view resources from ministry or chief. iv. Generate Report. v. Should be able to view the dynamic map of anywhere in the world. Defense Ministry: i. Should be able to send resources to Secret

Upload: wityamit

Post on 18-Jan-2016

12 views

Category:

Documents


0 download

DESCRIPTION

about Cybernetics Protector

TRANSCRIPT

Page 1: Cybernetics Protector

The Great Mind Challenge - Project Scenario Template

Note: Already filled information should not be changed

1.Name of the Project

Cybernetics Protector

2.Objective/ Vision

The Secret Intelligence Agency has always used undercover agents to solve complex cases and dismantle criminal organizations. We are conceptualizing this software as a solution so that Secret Intelligence Agencies and their agents can communicate through this Software for the exchange of evidences in a secure way.

3.Users of the System

A. CitizenB. Under Cover AgentC. Secret Intelligence Agency‘s chiefD. Ministry of Defence

4.Functional Requirements(Atleast Eight)

Secret Agency’s Chief:i. Chief should be able to create/edit/view Agent’s profileii. Appointing of Agent to a particular case.iii. Secure retrieval of evidences received from Agent.iv. Access to Data Base logs.v. Should be able to trace Agent’s location (using IP addresses)vi. Generate Reportsvii. Ability to store data with history (archive cases).viii. Ability to create Digital Signature certificates.Agent: i. Able to view case details.ii. Should be able to encrypt & upload evidence or data to Data Base.iii. Able to view resources from ministry or chief.iv. Generate Report.v. Should be able to view the dynamic map of anywhere in the world.

Defense Ministry:i. Should be able to send resources to Secret

Agency.ii. Receive reportsiii. Ability to assign cases to the Agency.Citizen:i. Ability to see Success Stories.ii. Chat assistance from Intelligence Agency.iii. Ability to apply for a job in Secret Intelligence Agency.iv. Ability to give tips & suggestion.

.

Page 2: Cybernetics Protector

5.Non-functional requirements (Atleast Four)

i. Secure access of confidential data (user’s details). SSL can be used.ii. 24 X 7 availabilityiii. Better component design to get better performance at peak timeiv. Flexible service based architecture will be highly desirable for future extension

6.Optional features

a. Login using face recognition. b. GPS functionality.c. News Feed facility.

7.User interface priorities

A. Professional look and feelB. Use of AJAX atleast with all registration formsC. Browser testing and support for IE, NN, Mozila, and Firefox.D. Use of Graphical tool like JASPER to show strategic data to adminE. Reports exportable in .XLS, .PDF or any other desirable format

8. Reports

A. Case ReportB. Success ReportC. Report regarding most wanted criminals and bounty information if available.

9.Other important issues

A. Good hashing and encryption techniques to protect information.B. Use of Google Map API (freeware license)

10. Team Size 2 – 4 members

11.Technologies to be used

UML, J2EE, XML, e-Forms, AJAX, Web 2.0, Web-services, SOA

12. Tools to be Used

ROSE/RSA / WebSphere Modeler Eclipse/ RAD / Lotus Forms Designer / Portlet Factory WebSphere Portal/ WAS/ WAS CE / WPS DB2 Express – ‘C’ or DB2 UDB Tivoli CDP/TSM / Tivoli Directory Server Linux will be the preferred OS.

13.Final Deliverable must include

A. Online or offline help to above said users, Application deployment executive and developer

B. Application archive ( .war/.ear ) with source code

C. Database backup and DDL ScriptD. Complete Source code

Page 3: Cybernetics Protector