Analyzing Semantic Data Application Development Requirements

Verified

Added on  2019/12/28

|22
|7036
|384
Report
AI Summary
This report delves into the intricacies of semantic data application development, emphasizing the critical role of requirements analysis. It begins by defining semantic information and its significance in programming design, covering topics like SSL and OpenSSL. The core of the report focuses on the requirements analysis process, including challenges such as miscommunication, difficulties in eliciting information from end-users, and the need to address both current and future system needs. The report then explores various approaches to requirements analysis, including use cases, prototyping, agile development, and interviewing, highlighting the strengths of each method in capturing functional requirements and ensuring that the developed applications meet end-user expectations. The report also mentions the role of business analysts in bridging the gap between end-users and application analysts. The report concludes by summarizing the importance of clear communication, accurate information gathering, and the selection of appropriate methodologies to ensure successful semantic data application development.
Document Page
1
Introduction:
Semantic information demonstrates in programming designing has different implications:
It is a reasonable information display in which semantic data is incorporated. This implies the
model depicts the importance of its occurrences. Such a semantic information model is a
deliberation that characterizes how the put away images (the occurrence information) identify
with the genuine world.
It is a theoretical information demonstrate that incorporates the capacity to express data that
empowers gatherings to the data trade to decipher meaning (semantics) from the cases, without
the need to know the meta-show. Such semantic models are reality situated (instead of question
arranged). Realities are ordinarily communicated by paired relations between information
components, though higher request relations are communicated as accumulations of twofold
relations. Regularly parallel relations have the type of triples: Object-Relation Type-Object. For
instance: the Eiffel Tower <is found in> Paris.
Regularly the occasion information of semantic information models expressly incorporate the
sorts of connections between the different information components, for example, <is found in>.
To translate the significance of the truths from the cases it is required that the importance of the
sorts of relations (connection sorts) be known. Thusly, semantic information models normally
institutionalize such connection sorts. This implies the second sort of semantic information
models empower that the examples express truths that incorporate their own particular
significance. The second sort of semantic information models are typically intended to make
semantic databases. The capacity to incorporate importance in semantic databases encourages
building disseminated databases that empower applications to translate the significance from the
substance. This suggests semantic databases can be incorporated when they utilize the same
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
2
(standard) connection sorts. This likewise suggests all in all they have a more extensive
appropriateness than social or protest arranged databases.
The Internet
The cutting edge web is fueled by an arrangement of conventions (tenets and equations that
portray how to trade information) which PCs use to converse with each other. The Hypertext
Transfer Protocol (HTTP) is the convention that forces sites, it's the manner by which your
program requests a site page and a server some place sends you that page and every one of the
pictures and other stuff you see.
In any case, HTTP is not secure at all in light of the fact that everything is only a group of
content flying around. This obviously won't work for delicate things like managing an account so
a convention called SSL was made that permits PCs to scramble information before sending it to
each other. Joining the SSL convention with HTTP gives us HTTPS.
What Is SSL?
SSL remains for Secure Sockets Layer. It is an encryption convention that gives correspondence
security over the Internet. TLS remains for a Transport Layer Security. SSL is a forerunner of
TLS. Both TLS and SSL are utilizing hilter kilter cryptography for verification of key trade,
symmetric encryption for classification, and message validation codes for message respectability.
How SSL functions
Encryption is finished by utilizing something many refer to as "keys" that come in sets. These are
exceptional documents that can just decode stuff that has been encoded by the other. There's an
open key which your PC gets and a private key that lone the server has. Along these lines just
you and the server can read each other's messages and it can't be captured by any other person.
Document Page
3
OpenSSL
Keep in mind SSL is only a convention so there still must be programming that really utilizes
these tenets and gives PCs a chance to talk. The most well known programming for this is called
OpenSSL, an open-source venture that is utilized on loads of servers (and heaps of gadgets like
your web switch and cell phone).
Semantic data application Development Process:
Requirements analysis plays a crucial role throughout the semantic data application development
process. This paper will thoroughly examine the role of requirements analysis, four traditional
approaches to requirements analysis that an analyst may use and comparing and contrasting these
approaches. In addition, I will discuss some new approaches to requirements analysis that are
currently becoming more commonly used by analysts. After providing this in depth information
of requirements analysis in semantic data application development, I will briefly summarize
what I’ve learned.
Requirements analysis is “the process of analyzing the information needs of the end users, the
organizational environment, and any system presently being used, developing the functional
requirements of a system that can meet the needs of the end users”. These requirements are then
documented in various forms such as email, executable prototypes or documents and are often
referred to throughout the semantic data application development process. Meaning semantic
data application analysts are using these documents as guidelines in order to meet end user
requirements and needs. The semantic data application must entail efficient features such as
reliability, feasibility and speed. In addition analysts need to determine whether too much of the
system’s resources are being utilized in order for it to function properly. These micro features are
essential in enabling end users to use the semantic data application feasibly which would include
Document Page
4
the semantic data application performing an assigned task. Though meeting the end users needs
is vital in developing sufficient semantic data application that is compatible with a system, there
have been many problems using requirements analysis.
Though requirements analysis is a process that facilitates semantic data application analysts
designing sufficient semantic data application for end users, there have been numerous problems
creating semantic data application that is compatible with future systems. According to Tom
DeMarco, he states in his journal “numerous studies have shown that over half of the semantic
data application development projects don’t work.” In other words, when end users are using the
semantic data application, it is not meeting their functionality expectations. This is due to
information not being properly clarified. This is referred to as the requirements elicitation
process, which means there is difficulty obtaining information for requirements out of the end
users. When end users are asked about the kind of processes they would like the semantic data
application to perform, they are able to identify their wants but not their needs. Though semantic
data application analysts are verbally asking direct questions to the end users and are written
down as a guideline for analysts to follow, these requests made by the users are not being
automated. Therefore, when semantic data application analysts are developing semantic data
application for future systems, it will never meet the users needs due to them not accurately
stating what they need. Though analysts may follow the requirements elicitation process
competently, the future system will not meet the user’s needs.
Another posing problem with requirements analysis is that it is difficult to pinpoint
accurate information to the stakeholders. According to Steve McConnell, communication with
end users is very slow, they won’t commit to a set of written requirements and they demand new
requirements once fixed costs have been finalized. Since new changes are being iterated by end
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
5
users consistently during semantic data application development, semantic data application
analysts aren’t able to create new semantic data application that meets the functionality
requirements of the end users. This brings about a time issue when trying to complete semantic
data application development, in addition to requirements not meeting end user expectations.
That is why it is crucial for information to be finalized and made clear to stakeholders
beforehand so the project is completely within a certain time frame. In addition to information
not being properly mentioned to the stakeholders, there are numerous encounters with acquiring
adequate semantic data application analysts who have the necessary experience to devise such
semantic data application. Though semantic data application analysts must have impeccable
technical and language skills, their experience will enable them to excel when ascertaining new
system requirements for end users to follow. In addition, the usage of complex tools and diverse
methods may hinder the completion of semantic data application development while gathering
requirements from end users.
Though these are some existing problems with requirements analysis, there is a strong presence
of miscommunication between semantic data application analysts and end users. This is a result
due to vocabulary difference. Since this language difference is present, it makes is more difficult
for semantic data application analysts to complete a finished product that the end users had
originally agreed upon. At this point, business analysts are brought in to bridge the large gap
between end users and semantic data application analysts by analyzing and documenting the
business processes. As a result, business analysts will propose tentative solutions to rectify the
indistinctive semantic data application. Another issue is that semantic data application analysts
formulate requirements that meet the needs of the current system instead of developing new
requirements that are compatible with a future system. Therefore, the semantic data application
Document Page
6
is not meeting the needs of the end users, which is the main objective. By analysts focusing on
mending the current system, it takes away time for them to devise new system requirements for
the future system. This is significant problem because end users want to use new semantic data
application for a future system, not current semantic data application that has been fixed. In
addition, analysis is being carried out by analysts instead of personnel who have great personable
skills. Due to this factor, the needs of the end users are being misinterpreted and not properly
iterated to the analysts to create semantic data application that is sufficient. This generates more
issues that aren’t needed and leads to poor system functionality.
There are many approaches to facilitate the process of requirements analysis but the approaches
that I will be discussing are use cases, prototyping, agile semantic data application development
and interviewing. All of these approaches allow end users to feasibly identify requirements
needed to develop sufficient semantic data application. Though each of these approaches may be
effective, each approach stands out because of its own prevalent features. In order to comprehend
the various features affiliated with each approach, we will take an in depth look at each
approach. The first approach we will look at will be use cases.
Use cases are utilized for capturing functional requirements of a system by each case providing
one or more scenarios that suggests to the end user how they should interact with the system.
Each use case is focused on portraying how to accomplish a goal or objective, which may entail
the usage of multiple use cases to accept the scope of the new system. Based upon the degree of
formality of a semantic data application project, it will influence the detail level that is
incorporated into each use case. This is important because the more extensive the detail, the
better the functionality of the semantic data application. Though use cases treat the current
system as a black box, this is due to system interactions and responses that must be analyzed in
Document Page
7
order for semantic data application analysts to make the necessary improvements. Due to this
perspective, it compels semantic data application analysts to focus on fixing the issues at hand
and the overall functionality of the future system. In addition, use cases reduces assumptions that
semantic data application analysts may have when creating a system to meet end user needs.
Assumptions will bring about unwarranted issues and the semantic data application will not be of
high quality. By analysts having this perspective, they will not be able to create semantic data
application that functions properly and incorporates the end users wants and needs. In addition, it
enables semantic data application analysts to find flaws with the semantic data application and
rectify the problem by working on it to improve the needs of end users. Use cases are often co-
authored with business analysts and end users to entail that the semantic data application
functions properly. By doing this jointly, it only solidifies that the sufficiency of the semantic
data application and the fulfillment of end users.
Another approach that semantic data application analysts use for requirements analysis is
prototyping. Prototyping is the process of constructing a model of a system. This helps semantic
data application analysts to construct an efficient system that is user friendly and is feasible for
end users. In order for this sufficient system to be constructed, analysts must gather information
about the organizations current procedures and business processes so adequate semantic data
application can be created. Afterwards, they study the current system, conduct interviews and
collect documentation from analyzing their findings and interviews to help distinguish what the
end users want. Once analysts complete their research, they interpret their findings into usable
information to develop semantic data application that will be compatible with the future system.
Semantic data application analysts are then able to convert this complex information into
tangible information by using a limited working model that will meet system requirements. This
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
8
then facilitates the process of semantic data application analysts modifying existing requirements
and devising new ones. Though tangible models are utilized in developing adequate semantic
data application for end users to use, prototyping has some benefits. It is time sufficient and is
very affordable. These are key features that companies look for when spending their money
responsibly, which is why prototyping is heavily favored by prestigious companies. In addition,
prototyping is used to increase interaction between the semantic data application analysts and the
end users. This method has been proven to be effective when developing system requirements
for end users due to the high satisfactory rate. Prototyping encourages end users to participate in
identifying systems requirements which results in end user gratification. In order for end users
high expectations to be fulfilled, there needs to be an adequate amount of semantic data
application analysts involved in the process. These analysts must have prototyping experience to
help facilitate the process of developing system requirements. With their experience, it assists in
their exposure to future system enhancements that help them to ascertain new requirements.
The next approach that I will discuss is agile semantic data application development. This is a
type conceptual framework for undertaking semantic data application projects during semantic
data application development. This approaches attempts to reduce semantic data application risk
by developing it in short increments called iterations. These typically last one to four weeks and
are performing miniature semantic data application projects. By each iteration is performing
these small semantic data application projects that must include all the necessary tasks that meet
new functionality. This incorporates planning, analysis, design, coding, testing and
documentation. Though an iteration may meet semantic data application functionality for end
users, the iterations are suppose to release new semantic data application after it goes through
each stage. Once released, a team of semantic data application analysts reevaluates the project
Document Page
9
objective to make sure they do meet the needs of the end users. By developing the semantic data
application in these small stages, semantic data application analysts are confident in creating the
most sufficient semantic data application and meeting end user satisfaction. Though it may
appear tedious, it is better to be meticulous that careless. In addition, agile semantic data
application development stresses real time communication, where face to face communication is
recommended, over written documents. By semantic data application analysts utilizing this form
of communication, it enables them to finish developing the semantic data application in a timely
fashion. In addition, working semantic data application is highly stressed as the primary measure
of progress. When combined with face to face communication, it leaves ample room for written
documentation to occur. This saves on time and enables semantic data application analysts to
quickly proceed with the semantic data application development process.
The last approach that we will examine is interviewing. The purpose of interviewing end users is
to allow semantic data application analysts to see what types of requirements they are seeking for
a future system. In order for end users to prepare for these interviews, questions must be
prepared in advance by semantic data application analysts to ask end users. During the interview
process, it is recommended that two semantic data application analysts interview one end user at
a time in order to obtain sufficient information to put towards semantic data application
development. One analyst will take notes while the other one ask questions. That way, sufficient
notes are taken during the interview and analysts do not have to interrupt the end user while they
are responding to their questions. Doing this enables semantic data application analysts to keep
track of current and unresolved issues during the interview. After all, the primary objective for
semantic data application analysts is to ascertain technical capabilities that end users desire to
have. In order for the end user to describe the type of capabilities they desire, the semantic data
Document Page
10
application analysts must provide examples. This will enable the end user to generate good ideas
that can lead to the enhancement of a future system while their needs are being met. This will
allow semantic data application analysts to empathize with the end user what their wants and
needs are, in addition to using their suggestions in devising sufficient semantic data application.
In addition, semantic data application analysts are seeking to find resolutions to the issues that
the end users may have. However, by asking the end users why they want a solution to an issue,
this will provide semantic data application analysts with the necessary information when
developing semantic data application. Though interviewing is not a vigorous approach, it is
focusing its attention on end users so that they are satisfied with a future system and system
functionality meets their needs. After all, meeting end user requirements is the goal and
interviewing only facilitates that process.
Since an in depth analysis of use cases, prototyping, agile semantic data application development
and interviewing has been provided, I will compare the four approaches to requirements analysis.
In addition, pros and cons between all four approaches will be mentioned as well. Though
requirements analysis entails analyzing information needs of end users, which is documented for
semantic data application analysts to follow, it is focused on meeting these needs of end users.
The semantic data application’s usage must be feasible, reliable and have speed. Though these
are crucial features in requirements analysis, there is a big miscommunication between semantic
data application analysts and end users. As a result, this leads to the semantic data application not
meeting the functionality of the end users and semantic data application analysts spending more
time developing efficient semantic data application. Though requirements analysis is not the best
method to use when developing semantic data application, use cases can be used. This approach
is best utilized when semantic data application analysts are trying to find semantic data
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
11
application functional requirements. In addition, one or more scenarios are provided that
suggests to end users how they should interact with the system. Some pros with this approach is
it will enable semantic data application analysts to see what requirements are needed so system
functionally is appropriate. Though meeting functionality requirements is crucial, semantic data
application analysts need to focus on repairing the system. Even though this is the primary
objective, it doesn’t guarantee that semantic data application analysts will rectify the system,
come up with new ideas and meet end user needs.
These are all good pros that make up use cases, there are some cons to using use cases. One con
is use cases are not suitable for capturing non-functional requirements of a system. Though this
piece may not be as important, it is still a part that makes up semantic data application that still
needs to be executed. Another con to using use cases are that the templates used to create these
cases does not ensure clarity. Clarity is critical because end users must be able to read the
semantic data application without difficulty and follow the basic fundamentals of it. Though
clarity depends on the writer’s skills, semantic data application analysts should still double check
to make sure that the template is adequate and its functionality is straightforward. Another con
with use cases is the learning curve involved in interpreting the cases correctly for both semantic
data application analysts and end users. Since the given definition is not complete, both end users
and analysts must develop their own interpretation. This is a huge issue because the analyst and
the end user must establish strong communication and work together in order to ensure that the
semantic data application is developed properly. This could be resolved with better
communication and teamwork skills.
As for prototyping and comparing it to requirements analysis, here is where semantic data
application analysts are able to construct a sufficient system that meets user needs and functions
Document Page
12
efficiently. Unlike requirements analysis where semantic data application analysts must
determine the semantic data application’s reliability, feasibility and speed, in addition to analysts
using documentation to improve system requirements, prototyping is focused on time efficiency.
One pro for prototyping is that this approach is time efficient because the process of developing
semantic data application is executed in good time. Another pro to prototyping is that
development costs are affordable. Affordable costs attract many companies, whose main concern
is receiving the most for their dollar. In addition, many other people who desire to use this
approach will be spending their money efficiently. Though time and money are critical success
factors, end user interaction is very vital, for they are the ones that must be satisfied with the new
semantic data application. When prototyping is used, there is a high user satisfaction rate, unlike
requirements analysis where there are many flaws and errors.
Though there are many pros, there are also some cons to prototyping. Using prototyping may
lead to insufficient analysis of information, which may contradict what end users want. This is
bad because the objective is to satisfy the end users, not defy them. Another con is that semantic
data application analysts may become too attached to their prototype. Meaning they may become
too attached to communicating with the end user. Analysts do not want to pester the end users
but talk to them enough times, in order to receive precise information on developing the semantic
data application. In addition to semantic data application analysts becoming attached to their
prototypes, sophistication semantic data application prototypes can reduce time efficiency. Time
is crucial and if that decreases, then the semantic data application will not be developed
sufficiently and analysts will have to devote more time to developing adequate semantic data
application.
Document Page
13
Agile semantic data application development is utilized to reduce semantic data application risk
by creating it in small increments called iterations. Unlike requirements analysis where there are
many flaws with using this approach, agile semantic data application development makes certain
that semantic data application is sufficient and user friendly. Though documentation is enforced
in requirements analysis and assist semantic data application analysts in creating semantic data
application, agile semantic data application developments is making sure that semantic data
application functionality is being met for end users. A pro to agile semantic data application
development are iterations. Here is where semantic data application development is carefully
analyzed and issues found are addressed immediately. Another pro is face to face
communication. This enables the surety of semantic data application analysts to create this
semantic data application to meet end user expectations and satisfy their needs. In addition time
restrictions are easily met. One con to agile semantic data application development is that the
semantic data application may stay too long in the different iterations stages. If this occurs, then
ample details will be overlooked, which can lead to semantic data application development
issues. Another con is that too much time may be allocated when developing the semantic data
application. Semantic data application analysts want to complete devising the semantic data
application for the future system in the shortest period of time. By the semantic data application
being divided into many iterations where one to four weeks may be used to fully develop the
semantic data application, this is hurting semantic data application analysts when they need to
meet user needs.
As for interviewing, it is focused on the end user and ascertaining their wants and needs. By
utilizing this approach, semantic data application analysts will be able to satisfy the end users
needs quickly and easily. In requirements analysis, documents are created and used as guidelines
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
14
for semantic data application analysts. They aren’t asking end users what they are seeking
upfront but are referring to these documents, which may not hold accurate information.
Interviewing is succinct and enables end users to fully express themselves. One pro to this
approach is that it is focused on the end user. This is good because semantic data application
analysts will be able to establish great communicate with the end user and create a workable
relationship. That way they will be able to come up with some good ideas and meet the end users
needs easily. Another pro is that semantic data application are able to ask a variety of questions
and find out what the end users really want. Instead of there being ambiguous responses and the
semantic data application analysts having to guess what the end users wants, interviewing will
clear that up and get right to the point. Another pro to interviewing is that great documentation
will be taken during the process. Meaning, analysts will be able to take great notes and refer back
to them without any questions or concerns. Some cons to interviewing is that the process may
take a long period of time, due to trying to find out specifics. Analysts could use this approach on
every end user, which will take away time from the semantic data application development
process. Though seeking the needs of end users is the objective, there has to be a limit to
interviewing them. Another con is time. Interviewing could allocate a lot of time from the
semantic data application development process, where time needs to be used wisely and
sufficiently. Another con is that analysts may want to find out every little issue that end users
may have. This is tedious and will take up too much time. By focusing on the main issues and
addressing them, analysts will be able to meet the needs of end users while finding excellent
solutions.
Though all of these have advantageous and disadvantageous, some approaches are more
recommended than other. Prototyping will benefit large companies who are trying to budget their
Document Page
15
money and utilize their time wisely. This is due to the fact they have many occurring projects
throughout the year and time is precious within this setting. Another approach that will benefit
large companies is interviewing. This approach is establishing good rapport between end users
and analysts. This will allow the process of semantic data application development to go
smoothly while end users are feeling important. Their needs will be met and hopefully analysts
will be able to ask them more questions in the future. Use cases allow semantic data application
analysts to focus on the functionality of the system and find any errors with it. That way, the
system will meet end users needs and the semantic data application will be more compatible with
a future system. As for agile semantic data application development, this approach is focusing on
the semantic data application itself. This is great because there leaves small room for errors. In
addition, this approach incorporates high end user and semantic data application analyst
interaction, which will increase the overall satisfaction rate of the end user.
Now that I have compared all the approaches to requirements analysis and have listed all their
pros and cons, we now look at some new approaches that semantic data application analysts may
be using. One approach is lightweight semantic processing. In this approach, semantic data
application analysts are able to propose semantic data application requirements analysis based
upon the domain ontology technique. This enables analysts to establish mapping between
semantic data application requirements specifications while the domain ontology represents
semantic components.
Domain ontologies describe the many levels that are integrated to make up great semantic data
application. The first level is the ground level where the foundation of semantic data application
is created. Semantic data application needs a strong foundation to function properly and once
complete, the types of objects are identified with their attributes. This is the most consequential
Document Page
16
part, due to its detailed information and characteristics. Once complete, then analysts will find
out how these attributes are related to one another and complete the semantic process of creating
fine semantic data application. In addition, lightweight semantic processing enables semantic
data application analysts to analyze these requirement specifications by utilizing the semantics of
the application domain. Here is where they can interpret the specifications and use the findings in
the semantic data application development process. In order for the semantic process to run
adequately, there are three steps that help in this process. The first step is for analysts to detect
any inconsistencies or incompleteness included in the requirement specifications. That way,
analysts will be able to rectify these issues so they won’t have to come back to this stage later on.
The second step is for analysts to measure the quality of the specification. That way if the
specification is of poor quality, analysts can increase can improve it so that it is of high quality.
The last step is for analysts to predict requirement changes according to semantic analysis. That
way, analysts will be able to find the best requirement possible and not have to make any last
minute changes when the semantic data application is finished being designed.
Another new approach to requirements analysis that is being utilized by semantic data
application analysts is the qualitative systematic approach. This approach assists semantic data
application analysts in “the analysis of unstructured requirements documents expressed in a
combination of natural language text, tables and diagrams.” With the incorporation of all these
features, it will formulate a good graphical representation of system features. Meaning the
language that makes up the semantic data application and any tables or diagrams that are
incorporated into making this semantic data application will help in the process of formulating
high quality features. In addition, the stakeholders will be able to modify, capture and share their
understanding of documented requirements. Doing so will enable them to produce high quality
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
17
semantic data application that meets end users needs while very little error are found. Using this
strategy also facilitates semantic data application analysts finding errors, which is crucial. Errors
are major setbacks in developing semantic data application and by using qualitative means; these
errors will be found feasibly. Though the qualitative systematic approach focuses on all of these
aspects, it also focuses on ascertaining why end users may have difficulty using the semantic
data application. A study was conducted to see how end users are struggling with new system
requirements and as a result, enables analysts to improve system requirements so it is
manageable for users and user friendly. After undergoing research on requirements analysis and
the many approaches I studied, I learned a lot more about the process of developing semantic
data application. It is a vigorous process and requires great dedication and experience. Though
requirements analysis is not the best approach, there were other approaches that were beneficial
for end users and semantic data application analysts. By utilizing these approaches, rapport
between end users and semantic data application analysts will be established and their needs will
be met accordingly. Though analysts can not meet every need, they can find the most important
need of end users and make sure that it is included in the semantic data application. I must say
that learning about requirements analysis and its many approaches had been mind blowing and I
can honestly say that I have attained a better understanding of the semantic data application
development process.
Information security plays a vital role since most of the organizations use computerized systems
to make their day to day operations efficient. By exploiting vulnerabilities in a computer system,
an attacker can steal information or make the system unavailable to users to cause both financial
and reputational loss to a company. According to Whittaker (2015), thirty six million profiles
which associated with the infamous extramarital website AsheleyMadison.com were stolen by
Document Page
18
hackers and released millions of usernames and passwords to the public in August. Further,
Whittaker (2015), describes that days later more data which includes the internal emails of the
parent company were leaked and a hacker or hacking team identified themselves as “Team
Impact”.According to Thomsen (2015), the company charges from clients to full delete of
profiles for 19$ but the hackers complained that the company still keeps the records of the people
who paid for a full deletion. Further, the hackers threatened to release all customer information
which includes credit card details, real names and addresses of customers. As Hackett (2015)
depicts, since the leaked information contains emails of CEO of the company which was hosted
in a server in Ecatel Ltd, it is wide clear that the attackers accessed the server to steal
information.
According to “The Negative Effects of Hackers” (2016), there are four main negative effects
caused to a computer system of a business or organization by a security breach.
1. Financial Loss
“The Negative Effects of Hackers” (2016), describes that security breach can cause financial
losses to companies because of several reasons including patching vulnerabilities of the system,
paying customers for their losses and even implement a whole new system. If the attackers can
collect credit card and banking information of users, they can make steal money through illegal
transactions. However Hern (2015), depicts that if each user of Ashley Madison website try to
claim £1000 in UK alone, the company will have to pay nearly £1.2 billion in UK alone.
2. Loss of Information
According to “The Negative Effects of Hackers” (2016), an on a computer system of a business
or an organization can cause loss of information by modifying or deleting data of customers and
the business.
Document Page
19
3. Decreased Privacy
According to “The Negative Effects of Hackers” (2016), since attackers can access private and
confidential information of customers and organization, they can use that information for
harmful purposes. Since hackers who breached the system of Ashley Madison accessed all the
accounts on the website, there is a risk of modifying and exposing information of the individuals
who used the website.
4. Damaged Reputation
According to “The Negative Effects of Hackers” (2016), if a company gets hacked, there is high
probability that the people might not share their personal information with the company. Since
Ashely Madison users provide extremely private and sensitive information to the company, the
security breach impacts the company badly. Exposing such information can cause the customers
social and family problems which can destroy their entire lives. Hence, the users of Ashely
Madison might not trust the company with their sensitive information anymore. Another secret
that was revealed by this attack was that even though the company charge for a full deletion of
profiles of requested clients, the company database still consists of information of those clients.
This has caused a massive reputational damage to the company which may result in loss of many
current and future customers.
According to Whittaker (2015), even though the usernames and their corresponding passwords
were leaked by the hackers, all the passwords in the database were hashed using bcrypt. As
Pramanik (2016) describes, hashing is a one way function which is not reversible. Hence, it is
highly unlikely to decrypt a hashed message. However according to Whittaker (2015), after
making efforts to crack the passwords security expert Dean Pierce was able to crack four
thousand passwords which were weak passwords used by the users. Further this process has
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
20
exposed that the most common passwords which exposed in previous security failures have been
used in this case too. Whittaker (2015) lists the ranking of the most common passwords used by
Ashley Madison users as follows.
123456
Password
12345
Qwerty
12345678
Ashley
Even though Ashley Madison used hashing to encrypt the passwords of their users, it is wide
clear that it was not enough to prevent cracking weak passwords used by the clients. Hence, it is
important to advise them to use slightly sophisticated passwords to be safe. When creating user
accounts the website of the company can reject passwords which are weak and ask users use
different characters which include uppercase, lowercase and special characters. It is clear even
though all passwords were encrypted it was not enough to prevent the attack. According to Basu
(2015), penetration testing and vulnerability assessments can be done hiring security experts or
security firms to identify vulnerabilities of the system and patch them.
Document Page
21
References
What is Prototyping? Akers, Gerri. 26 May 1999
http://www.umsl.edu/~sauter/analysis/prototyping/proto.html
Qualitative Systematic Approach to Requirements Analysis. Al-Ani, Ban. August 2004
http://research.it.uts.edu.au/re/research/research_current_project4.html
Semantic data application Analysis and Why it Doesn’t Work. DeMarco, Tom. 12 December
2006. http://jiludwig.com/HCI_Journal_article.html
Ontology Based Requirements Analysis: Lightweight Semantic Processing Approach. Kaiya,
Haruhiko and Saeki, Motoshi. 19-21, September 2005.
http://kaiya.cs.shinshu-u.ac.jp/~kaiya/papers/200509-qsic-saeki.html
Requirement Analysis. No author. No date. http://www.answers.com/topic/requirements-analysis
Ontology. No author. No date. http://en.wikipedia.org/wiki/Strong_ontology
Requirements Interview Tips. No author. 25, February 2006
http://www.jiludwig.com/Interviews.html
Agile Semantic data application Development. No author. No date
http://www.mariosalexandrou.com/methodologies/agile-semantic data application-
development.asp
System Development Life Cycle. No author. No date.
http://gates.comm.virginia.edu/rrn2n/teaching/sdlc.htm
Use Case. No author. No date. http://en.wikipedia.org/wiki/Use_case
Use Case. No author. No date. http://www.answers.com/topic/use-case
Angrum, A. (2013, 10 30).Planetary voyage. Retrieved from
http://voyager.jpl.nasa.gov/science/planetary.html
Document Page
22
Bakich, M. E. (2013). Voyager's "new" solar system. Astronomy, 41(1), Retrieved from
http://search.ebscohost.com.resources.njstatelib.org/login.aspx?
direct=true&db=sch&AN=83817008&site=scirc-live
CROSWELL, K. (2013). Borders define limits -- but not our limitations. Smithsonian, 44(1), 15.
Retrieved from http://search.ebscohost.com.resources.njstatelib.org/login.aspx?
direct=true&db=sch&AN=87000630&site=scirc-live
New infrared telescope eyes Jupiter. (1979). Science News, 115(21), 341. Retrieved from
http://search.ebscohost.com.resources.njstatelib.org/login.aspx?
direct=true&db=sch&AN=7110070&site=scirc-live
chevron_up_icon
1 out of 22
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]