You are on page 1of 7

Question 1

1) What is Software Engineering? Software engineering is an Engineering disciple that is concerned with all aspects of software production from the early stages of system specification to maintain the system after it has gone into use. Software Engineer develops and maintains software systems that behave reliably and efficiently, which are affordable to develop and maintain. It also has to satisfying all the requirements that the customers have defined for them. A software engineer creates the designs the programmer implements. A software engineer is a licensed professional engineer who is schooled and skilled in the application of engineering discipline to the creation of software. 2) What is the difference between software engineering and system engineering? Software Engineering describes the building of software systems which uses the best practice process to create and maintain software that is so large and complex that they are built by a team or teams of engineers. Subjects and Activities involved with Software Engineer: Configuration Management Project Tracking Software Quality Assurance Risk Management Formal Inspections Project Planning

Systems Engineering is an interdisciplinary field of engineering that focuses on how complex engineering projects should be designed and managed. System engineering is involved in specifying the system architecture and than integrating the different parts to create the finished system. Subjects and Activities involved with System Engineer:

Control Engineering Hardware Development Process Design

Project Management Policy System Deployment

Software Engineering Focus more on n implementing quality software Deals solely on software components A Computer Science or Computer Engineering background

System Engineering focus more on users and domains,

deal with a substantial amount of hardware engineering have a broader education including Engineering, Mathematics and Computer science background

Tell the practicalities of developing and delivering useful software.

Is to identify the roles of hardware, software, people, database and other system elements involved with that system which is going to be developed.

Is a part of system engineering.

Deals with all aspects of computer-based system development.

Question 2

SocioTechnical System

Security System Database Middleware System Application

Smoke Sensor Communication Services Movement Sensor Police Computer Control

Fire Department Operator Console

Door Sensor

>Protection and Distribution >System Authentication and System Authorization >Database Authorization and Database Recovery >Classification Model ---Computer Control--Smoke, Movement, Door Sensor And Video Camera

Security System

---External Communication--Police and Fire Department

---Operator Console--System Status

Question 3

THREAT A threat is a possible danger that might breach security and cause possible harm to your computer.A threat can possibly become dangerous because it has the potential to damage your computer and corrupt information. Examples of threats are Viruses, Trojan Horses, Worms, and Phishing etc. Viruses A virus is a program written to change the way your computer operates without your permission or knowledge. It attaches copies of itself to other files such as program files or documents. A virus is only inactive until you run an infected program or open an infected document. When a virus is activated it may damage or delete files, display messages or erase your hard drive. A virus can easily be spread to other computers through email and instant messenger attachments or infected files on CD-ROMs. Trojan Horses Trojan horses are programs that appear to serve a purpose or provide entertainment, which makes you to run them. It may damage files, place a virus on your computer or allows a hacker to access your computer. More commonly these days, you can be enticed into running a Trojan by clicking a link on a viral web site or in an email. Trojans that allow a hacker to gain access to your machine, called Remote Access Trojans. A Trojan horse is not a virus because it does not replicate and spread like a virus. Worms Worms are programs that replicate, spread and allow hackers to gain access to the computers that they infect. Worms can spread over the Internet and can also spread by copying themselves from disk to disk or by email. Phishing A Phishing Threat is when you are sent an email that asks you to click on a link and re-enter your bank or credit card details. These emails can pretend to be from banks,

Internet service providers, and on-line stores. You can use an anti- virus to detect and remove threats from your computer. A threat doesnt always have to be considered malicious software; it can also be a natural disaster.

ATTACK

An attack is any attempt to destroy or expose authorized access to a computer. There are two types of attacks active and passive:

An active attack - attempts to change system resources or affect the operation.

A passive attack - attempts to learn or make use of information from the system but does not affect system resources.

The Difference between an attack and a threat is that an attack is an act which is in process while a threat is an attack that hasnt happened yet or a possible attack.

Question 4

1. The first step to withdraw cash from the machine requires the customer details, a password to confirm the account number and it checks the balance in your account. 2. The second step will allow the customer to complete the withdrawal slip, the amount to withdraw in your account. 3. The teller verify that the withdrawal amount is valid in your account balance, if not then the amount in insufficient in your balance. 4. It validates transaction and balance. 5. Checks if your balance is in savings or cheque account to validate transaction in customer account. 6. After the transaction is successful, new balance will be stored in your account and then the transaction amount is delivered to the customer.

You might also like