Chapter 4 Design4.1 Study of Existing Solution to Problem· Sinceto what extent we are seeing news where Sites, organizations has been affectedwith a digital assault or a risk from a programmer. It a very basic thing weare listening each day these sorts of news from everywhere throughout theWorld.
· Forinstance, starting from Uber to Equifax it’s a standout amongst its mostconsuming issues of IT world. It’s unrealistic to screen each server claimed bythe organization at a same time.· There’sno such stage accessible to screen the health of sensitive information spreadover all the server. Thus, the DSHM gives an interesting platform to endclient, for example, security expert to see security as quantitative element.· DSHMadditionally gives the functionality of mass import-export of server comprisingcritical information and pick checking monitoring system for every individualserver. What’s more, to decide strength of specific server expert answers thequantitative inquiry with a specific end goal to decide graph for it.4.2 Requirement of New System· Becauseof issue and shortcoming in existing system, our proposed system gives theanswer for every one of the issues in a solitary platform.
DSHM is a platform accessiblefor all client to see the joined health of servers for respective organization.It likewise gives functionality to the analyst for exclusion when server doesn’tcontain critical information to spare resources.4.
3 User Characteristics· User’sRole:· User(basic)register him/her self along with personal detail and with company name. Afterthat he/she will be able to logged in to the system. This user is only able tosee health graph for his/her respective company. · Company’sRole:· Analyst(securityperson) act on behalf of the his/herrespective company.
Analyst is able to perform import of server company wantsto be monitored and also import exclusion of server when it’s no longerpriority.· Inthe import functionality analyst mention server address, company and themonitoring system he wants for the server.· Evaluationof the graph for server is also done by analyst. In which he/she answer the sixquantitative question for every server. The health graph for company will beevaluated by taking average of servers belongs to company.
· Admin’sRole:· Adminis the person of the Castle Venture company who’s able to see the graph ofevery company registered in database. Admin can export the details of serverbeing monitored and excluded from monitoring. 4.4Class Diagram4.5Class Diagram 4.6Activity Diagram4.7 Implementation4.7.
1 System ApplicationDesign· MethodPseudo Code· Logina. Start b. Login Page UserName<-getParameter("UserID"); Password <-getParameter("password"); Company<- getParameter("company");c. Check Usemame and Password andcompany If UserName-username && Password=password &&Company=company Then Redirectto homepage as per user_type; Else Writeappropriate message; Goto Login Page; End ifd. End· ImportItem/Excluded Itema. Startb. Import pagec. Select excel filed.
Success Messagee. End· ExportItem/Excluded Itema. startb.Export pagec. Save filee.
End· EvaluateGrapha. Startb. Evaluation Pagec. Select server Answer the six question d.submit e.Success Message· ViewGrapha.
Startb. Search Company Pagec. Select Companyd. View Graphe. End4.8 Database Design· Databaseoutlining is the way toward delivering, a definite information model of adatabase.
This intelligent information contains all the required logical andphysical outline decisions and physical stockpiling parameters expected toproduce a plan in an information, definition dialect, which would then be ableto be utilized to make a database. A completely credited information displaycontains. Detailed characteristics for every substance. While outlining thedatabase schema, we have broken down various databases.
Before beginning theframework, we have talked about with organization and worked likewise.· Themajor objectives of the software design process are to document insufficient detailsof the software design based on the software requirements and traceability tospecifications. All software design method shares the same goal to transform a setof data processing requirement into a computer program.· Inputdesign is a part of overall system design which requires attention very much.If anerror occurs in the input data thenthe result of that error may lead to unwanted problems.
· Theoutput is the most important direct source of information to the user.Intelligent output design will improve the system relationship with the userand also helps in decision making.4.
9 Logical Description of Data· Thepurpose of this section is to document a logical description of the data being collected.The intent is to provide a single integrated definition of the data that is unbiasedtoward any single application of the data being collected and is independent ofhow the data are physically stored or accessed. The intent is to provide amutual understanding of the data being collected as well as provide a basis forsystems database design and definition of the Physical Data Description. Thelogical data description is a data demonstrate, included both an outline andorganized description (data dictionary) of the data objects, their connectionsand their traits. Although only the data dictionary is mandatory, it isstrongly recommended that the graphical model also be developed to provide acomplete logical description of the inventory data.
4.9.1Database Table Table Name Description User Contains information about users of the system along with login detail Item Contains information about item(server), username, company name, monitoring system and exclusion status Excluded_Item Contains information about item(server), username and company Graph Contains the health result of each server evaluated by analyst.
4.9.2Data Dictionary 18.104.22.168 Users Field Name Type Constraints Description user_ID Int Not Null Auto incremented and auto generated ID user_Name Varchar Primary Key It describes user name of an account user_Fname Varchar Not Null It describes first name of user user_Lname Varchar Not Null It describes last name of user user_Type Varchar Not Null It describes the user type of particular user company Varchar Not Null It describes the company name to whom user belongs user_MobileNo_ Int Not Null It describes the mobile number of user user_Email Varchar Not Null It describes the email of user user_password Varchar Not Null It describes the password of user which will be stored after getting hashed and salted 22.214.171.124 Item Field Name Type Constraints Description server Varchar Primary Key It describes the address(IP) of server user_Name Varchar Foreign Key, Primary Key It is the foreign key from users table and part of composite primary key Company Varchar Foreign Key, Primary Key It is the foreign key from users table and part of composite primary key monitoring_system Varchar Not Null It describes the name of monitoring system for particular server exclusion_status Boolean Not Null It describes the exclusion of particular item form monitoring system which will be update by trigger set in excluded_item table 126.96.36.199 excluded_Item Field Name Type Constraints Description server Varchar Primary Key It describes the address(IP) of server user_Name Varchar Foreign Key, Primary Key It is the foreign key from users table and part of composite primary key Company Varchar Foreign Key, Primary Key It is the foreign key from users table and part of composite primary key 188.8.131.52 graph_value Field Name Type Constraints Description graph_ID Int Not Null Auto incremented and auto generated ID server Varchar Foreign Key, Primary Key It is the foreign key from item table and part of composite primary key user_Name Varchar Foreign Key, Primary Key It is the foreign key from users table and part of composite primary key Company Varchar Foreign Key, Primary Key It is the foreign key from users table and part of composite primary key Value1 Int ———————— It describes the the value for question 1 for respective server Value2 Int ———————— It describes the the value for question 2 for respective server Value3 Int ———————— It describes the the value for question 3 for respective server Value4 Int ———————— It describes the the value for question 4 for respective server Value5 Int ———————— It describes the the value for question 5 for respective server Value6 Int ———————— It describes the the value for question 6 for respective server