Project: PassLock. The Team George Bell Chris Doty Carey Johnson Luke Kelly.

Slides:



Advertisements
Similar presentations
OWASP Secure Coding Practices Quick Reference Guide
Advertisements

Database Planning, Design, and Administration
Recruitment Booster.
Database Management System MIS 520 – Database Theory Fall 2001 (Day) Lecture 13.
Team members: Van Nguyen, Christopher Waters, and William Tran Client: iapp24 Advisor: Govindarasu.
Preliminary Design: Smart Scheduling Client: Dr. Robert Yoder.
SOCIAL NETWORK INFORMATION CONSOLIDATION Developers:  Klasquin Tomer  Nisimov Yaron  Rabih Erez Advisors:  Academic: Prof. Elovici Yuval  Technical:
Chapter Chapter 13-2 Chapter 13 Data Modeling Introduction An Overview of Databases Steps in Creating a Database Using Rea Creating Database Tables.
Academic Advisor: Prof. Ronen Brafman Team Members: Ran Isenberg Mirit Markovich Noa Aharon Alon Furman.
11 SUPPORTING LOCAL USERS AND GROUPS Chapter 3. Chapter 3: Supporting Local Users and Groups2 SUPPORTING LOCAL USERS AND GROUPS  Explain the difference.
10/27/2006Requirements Specification1 Automated Excel Grading System Welcome Ms. Cotler and Dr. Hunter.
Pear Software e-SATA (The Electronic Spreadsheet Automated Teaching Assistant) Requirements Specification.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 9: Implementing and Using Group Policy.
APPLICATION DEVELOPMENT BY SYED ADNAN ALI.
Chapter 5: Configuring Users and Groups. Windows Vista User Accounts User accounts are the primary means of authentication Built-in Accounts –Administrator:
Chapter 7 Database Auditing Models
11/4/2009 Requirements Specification. Our Client… Dr. Timoth C. Lederman Professor of Computer Science Siena College And To All Other Guests 11/4/2009.
Competitive Algorithm Calculation Testing in a Unified System (C.A.C.T.U.S.) Requirements Specification 11/2/2011 Presented By: ExoNET Solutions 1.
Final Year Project Presentation E-PM: A N O NLINE P ROJECT M ANAGER By: Pankaj Goel.
Web-based Document Management System By Group 3 Xinyi Dong Matthew Downs Joshua Ferguson Sriram Gopinath Sayan Kole.
11 WORKING WITH USER ACCOUNTS Chapter 6. Chapter 6: WORKING WITH USER ACCOUNTS2 CHAPTER OVERVIEW Understand the differences between local user and domain.
Overview What is SQL Server? Creating databases Administration Security Backup.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
MU Bulletin Board Member: Carol Lim Yi Wang Lei Wen Mentor: John Boyer Programmer/Analyst of MSA/ Student Life.
Design for Senior Project December 05, 2007 Raytheon_Design_Review.ppt 1 of 19 Raytheon – Google Earth Roy Daniels, Marc Maciel, Rifina Pierre Department.
How to Backup FNC Files to Corporate Network Using Windows XP Created By: Ricardo G. Mesa, Systems Administrator Date: January 17, 2006.
The University of Akron Dept of Business Technology Computer Information Systems DBMS Functions 2440: 180 Database Concepts Instructor: Enoch E. Damson.
Conference management system Jordanian Renewable Energy Society (JRES) Team members.
DAY 14: ACCESS CHAPTER 1 Tazin Afrin October 03,
Team Members ? ? Chintan Goswami Nirav Tank Project Guide ? ? Mrs. Darshana H. Patel [Internal] Mr. Manish I. Vora [External]
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
Security Planning and Administrative Delegation Lesson 6.
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
Boston University Project Management Association Website Development Group 3 Team3 CS632 Dr. Vijay Kanabar Team Members Mario Soto Emily Ziegler Kevin.
Software Breakdown. Monday, October 26, 2009 CS410 Green Team Fall High Level Architecture.
Requirements Documentation CSCI 5801: Software Engineering.
OPAC Training aid (Library solutions & Library world)
Online Friends’ Community Presented by: Stuart Monaghan HND in Computing th May 2002.
“TK8 Safe” – Easy-to-use, secure password manager Download a free trial copy: Product Info Highlights TK8 Safe is a perfect password manager.
Advanced Software Engineering Association for Computing Machinery High School Competition System Prof: Masoud Sadjadi Fall 2004 First Deliverable By: Prasad.
A Brief Documentation.  Provides basic information about connection, server, and client.
Yarmouk University Department of Computer Information Systems CIS 499 Yarmouk University Department of Computer Information Systems CIS 499 Yarmouk University.
When buying a product in today’s marketplace, an individual is faced with the challenge of remembering an abundance of information about the product that.
Johnson Lab Database Senior Design Project Management II Spring 06 Mark Nelson.
Preliminary Design By Phoenix Tech. Dr. Darren Lim Assistant Professor Department of Computer Science Siena College Mrs. Pauline White Visiting Instructor.
Requirements Engineering Lesson 2. Terminologies:  Software Acquisition is where requirement engineering significantly meets business strategy.  Software.
Connecting with Computer Science2 Objectives Learn how software engineering is used to create applications Learn some of the different software engineering.
D R A T D R A T ABSTRACT Every semester each department at Iowa State University has to assign its faculty members and teaching assistants (TAs) to the.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
SQL Server 2005 Implementation and Maintenance Chapter 6: Security and SQL Server 2005.
Introduction to Databases Dr. Osama AL Rababah. Objectives In this capture you will learn: Some common uses of database systems. The characteristics of.
GCSE ICT 3 rd Edition The system life cycle 18 The system life cycle is a series of stages that are worked through during the development of a new information.
Lecture On Introduction (DBMS) By- Jesmin Akhter Assistant Professor, IIT, Jahangirnagar University.
Chapter 6 Server Management: Domains Workgroup Domain Trust Relationship Examples.
START Application Spencer Johnson Jonathan Barella Cohner Marker.
Advanced Higher Computing Science The Project. Introduction Worth 60% of the total marks for the course Must include: An appropriate interface using input.
House Finding Management Supervisor: Mr. Trần Đình Trí & Avengers Team 1.
Advanced Higher Computing Science
Administrating a Database
Customer & Inventory Management System: CIMS
THE STEPS TO MANAGE THE GRID
Design Unit 26 Design a small or home office network
Web-based Console for Controlling a Wireless Sensor Network (WeConWSN)
Preliminary Design Presentation
Software Requirements Specification (SRS) Template.
Administrating a Database
Lecture 23 CS 507.
Presentation transcript:

Project: PassLock

The Team George Bell Chris Doty Carey Johnson Luke Kelly

PassLock Overview Make it Easier for Users to Control and Maintain Login Information and Passwords Maintain a Secure Database Let Users Share Information When Required

Individual Contributions George Bell – Project manager, assembles and combines the input of each team member Chris Doty – Project Description and Data Requirements Carey Johnson – Information and Interface Requirements Luke Kelly – Tools/Techniques and part of Introduction All - Review and Approve Sections Truly a Team Effort

Background Who is the Client? General Use Product Anyone Who Has Login Information and Needs a Better System to Maintain and Control Their Login Information

Problem Statement Computer Users Have Multiple Login/Password Combinations to Remember Information is Forgotten or Lost Information is Stored Insecurely Users May Have Shared Logins Users May Use Multiple Computers

Goals & Objectives Store and Manage User Passwords Allow for Sharing of Passwords Portable – Can Be Used on Multiple Computers Secure – Files Encrypted Policies Stored – Rules Regarding Passwords Allow Users to Synchronize Information

Scope Primary Design Purpose is to Share Passwords between Users Back-up Database to Prevent Loss of Data Will work for Single User Utilizes a Database

Constraints The scope of PassLock is limited by the following: Users must be able to share passwords Utilize a Database Use VB.Net as programming language

Functional Requirements Securely Input/Store Multiple Login Credentials Multiple Users Can Share/Synchronize Passwords Group Passwords By Access Rights Can Be Run From A USB Drive Copy Usernames or Passwords To Clipboard Top 5 Functional Requirements:

Store And Enforce Password Policies Generate Random Numbers Search For Passwords Hide Passwords From Others Multiple Database On Same Machine Functional Requirements Continued: Functional Requirements

Clickable Hyperlinks Screen Has Timeout Log All Data Changes Backup Password Database Preview/Print Password List Functional Requirements Continued: Functional Requirements

Easy To Use Interface Simple To Synchronize Non-Functional Requirements

Database ERD

User Interface Class Data Flow DataSet Classes Database Providers Encryption Providers Business Entities DataSet Adapters Session Management

Class Data Table

Class Diagram – Business Entities

Business Entity Table

Administrators control the system All users control their own accounts PassLock Use Cases System Scenarios (Level 1)

PassLock Use Cases Administrator Scenarios (Level 2) Administrators manage the PassLock system Administrators assist PassLock users

PassLock Use Cases Common Scenarios (Level 2) All users maintain their own Login Account All users maintain their own Application Profiles

PassLock Event-driven Process Chain (EPC Diagram) Accounts Shared Groups Group Profiles Personal Profiles External / Temporal System Management

PassLock Activity Diagram Securely Login to PassLock Make Personal Application Profiles Share Application Profiles with Groups Create Portable Information

Feasibility Analysis Solutions Considered Password Manager XP –Commercial Application Access Manager – Commercial Application RoboForm – Commercial Application Password Corral – Commercial Application PassLock – Custom Solution

Weighted Feasibility Analysis

PassLock Project Timeline: Requirements Next Milestone: Present Systems Design 4/16/2008 Milestone: Present Requirements 2/27/2008

PassLock Project: System Requirements PassLock Project (CS451 Phase) 67% PassLock Project (CS452 Phase) 0%

PassLock Questions & Answers Thank You

The End Thank You