logo

System Architecture and Security Requirements

   

Added on  2022-12-18

7 Pages751 Words78 Views
Table of Contents
ER diagram.........................................................................................................2
System architecture................................................................................................2
Security requirements.................................................................................................... 3
Non-functional requirements............................................................................................ 4
Quality metrics.....................................................................................................4
References..........................................................................................................7
1
System Architecture and Security Requirements_1
ER diagram
System architecture
The architecture would be based on a client-server architecture using deployment diagram of
UML notation. A typical client server consists of several clients that connects to the server to
request information. The client systems through an interface access information and perform
functions and actions based on the available inputs provided by the server. The clients may be a
web browser accessing via Desktop computer, a mobile phone, a tablet or even a dedicated
application through the respective client systems.
2
System Architecture and Security Requirements_2
The following components are included in the entire architecture:
Web Server: The web server is primarily meant to handle the HTTP requests made by the
clients and helps in displaying the site’s content as well as the information requested by
the user.
Application Server: The application server on the other hand handles the bulk of the logic
and processing needs for the client (Boehm, Brown & Lipow, 2019).
Database server: The database server is responsible for storage and hosting of the datasets
for the system. So, the bulk of the data would be provided by the database server.
Clients: The clients on the other hand are the end-users who would be connected to the
web-server via browsers or applications on their mobile, tablet or desktop computing
devices.
The web-server would be based on Apache on Linux based server, the application server would
consist of the PHP language which will handle the bulk of the application logic and the database
server on the other hand would consist of MySQL for storage of datasets.
Security requirements
Outdated system: Outdated systems and technologies are a major cause for 0-day exploits
and other exploits that could ultimately disrupt the system, steal data or cause damage.
Firewall: A sever without a firewall system would be more prone to attacks via rogue IPs
either through deliberate or otherwise means.
3
System Architecture and Security Requirements_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Ways of Attacking a Web Application in PHP: SQL Injection, XSS, Session Hijacking, Directory Traversal, and Remote File Inclusion
|9
|1493
|176

System Security : Report
|13
|999
|347

Cyber Defence For Business Analysis Report
|11
|1814
|11

Strong Authentication and Authorization
|4
|803
|52

Assignment Advanced Network Security
|16
|3113
|132

Threat Analysis and Security Controls for Web Applications and Servers
|12
|708
|149