logo

Social Networking Application Development

Develop functionalities for a social networking application, create use case diagrams, sequence diagrams, and class diagrams, develop a secure solution for wireless communication, and incorporate a Business Design Document and a System Design Document into the Capstone project paper.

13 Pages1921 Words33 Views
   

Added on  2022-08-25

Social Networking Application Development

Develop functionalities for a social networking application, create use case diagrams, sequence diagrams, and class diagrams, develop a secure solution for wireless communication, and incorporate a Business Design Document and a System Design Document into the Capstone project paper.

   Added on 2022-08-25

ShareRelated Documents
Running head: SOCIAL NETWORKING APPLICATION DEVELOPMENT
Social Networking Application Development
Name of the Student
Name of the University
Author Note
Social Networking Application Development_1
SOCIAL NETWORKING APPLICATION DEVELOPMENT1
Table of Contents
Introduction................................................................................................................................2
Discussion..................................................................................................................................2
Business Drivers.....................................................................................................................3
Current Process......................................................................................................................5
Proposed Process....................................................................................................................7
Software Detailed Design......................................................................................................7
User-Application Interaction..................................................................................................8
Conclusion................................................................................................................................10
Reference..................................................................................................................................11
Social Networking Application Development_2
SOCIAL NETWORKING APPLICATION DEVELOPMENT2
Introduction
The Internet bubble burst incident caused many dot com company to shut down.
Verbania Inc., one of those affected companies shut down in the year 2001.Now the company
is trying to launch itself once again with a new refreshed set of systems. This section will
discuss about the conceptual model of the application part, behaviour of the system, user-
system interaction, possible network securities for the application side of the system, business
design and system design.
Discussion
The company Verbania Inc. shut down due to the internet bubble burst incident and
now wants to re-launch itself once again, the following security measures can be
implemented in the mobile application side:
- Securing the application code – It can be achieved by developing the application from
scratch (developing the whole app without using any third-party source codes).
- Securing the backend network connection of the application – This will be achieved
by incorporating local database encryption of the app (application) and encrypting the
application connection with the server. Application encryption will be made either by
a secure socket layer (SSL), by using a virtual private network (VPN) incorporated
within the application and by including transport layer security (TLS) while
developing the app (Morera et al., 2016).
- Two-factor authentication - While signing up or logging in, the user will require an
OTP (one-time-password) along with his/ her saved password (Osei, Hayfron-
Acquah, & Kumasi, 2014).
- JSON web tokens will be used for exchanging data in an encrypted manner (El-Aziz
& Kannan, 2014).
Social Networking Application Development_3
SOCIAL NETWORKING APPLICATION DEVELOPMENT3
- Integrating mobile encryption policy – Since the application will be maintaining a
local database, file-level encryption will encrypt the data on a file-by-file basis. As a
result, even if the local database gets inspected by some third-party apps or users, it
cannot be read.
- Sensitive data of the user like passwords and user details will not be stored openly in
mobile devices.
- Software testing – before the final launching of the application, the app will be taken
through penetration testing to point out any possible application vulnerability and fix
them accordingly.
- A remote wipe facility will be included within the application. This facility can be
used to remove sensitive user data (if the user thinks they have any) from any stolen
or lost mobile device.
Business Drivers
Main business drivers for re-establishment of the Verbania Inc. are as follows:
- Account creation and maintaining with utmost security
- Discussion forum and posts
- VOIP (Voice over Internet Protocol) and messaging among friends
- Integration of gaming modules
- Calendar reminder inclusion
- Remote wipe facility
- 24/7 customer support availability
Account creation and maintaining
Registering a user will require the user to enter his/ her phone number and other
details; it will be sent to the database (automatic format checking and validation program
embedded with the database). If all the entered details are in a correct format and have no
Social Networking Application Development_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Security: Remote Access, Interconnecting Devices, and WAN Technologies
|9
|1459
|154

Foundation of Cyber-Security: Information Security Policies and Encrypted E-mail Solutions
|12
|4083
|98

Information Systems and IT Solutions: Theories, Support Systems, Globalisation, Digital Infrastructure, and Risks
|10
|2642
|259

Network Security Fundamentals
|4
|659
|33

IOT In Healthcare | Assignment
|4
|835
|26

How To manage a Web Server
|8
|1578
|15