Victoria University: Advanced Project - SPA System Design and Analysis

Verified

Added on  2022/08/26

|6
|817
|20
Project
AI Summary
This project documentation outlines the development of an intelligent SPA system, designed to be controlled remotely via a web interface using a Raspberry Pi. The project encompasses a comprehensive system analysis and design, including the chosen system development approach, functional and non-functional requirements, data requirements, and use case diagrams. The document details the system's architecture, user interface design, and project cost estimation, accompanied by a work breakdown structure and a Gantt chart for project scheduling. Furthermore, the project addresses critical considerations such as system security, including potential hacking, data loss, unauthorized access, network breaches, and the importance of updated security software. The project aims to enhance efficiency and convenience for spa users by automating various functions, such as temperature control and equipment operation, while mitigating potential risks associated with internet connectivity.
Document Page
Running Head: SPA SYSTEM
SPA Controller
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1SPA SYSTEM
Issue needs consideration
As per the designing of the remote-controlled spa, the utilization of web interface and Raspberry
Pi is taken under consideration. The software and electronics of the new generation are used to
develop the next generation’s Jacuzzis and hot tubs connected over the internet. The issue that
needs consideration is:
Hacking of the system- The exploitation of the computer system for fulfilling the illicit
purposes of the hackers is called hacking. As the system is connected through the
internet, the access of the system, as well as the vandalising with the system, becomes
easy for the hackers. Hackers find the loopholes in the system so that they can have
unauthorised access. The hacking is facilitated with several techniques and tools (Hassan
2019). The hackers can access the details of the system through that the Company’s
information can also be linked, as both the system will run on the same network. In 2016,
the attack of SamSam ransomware was observed on US Healthcare Network. The
network was hacked in exchange of ransom of $6 million.
Data Loss- The loss of data is a condition of error in which the information of the system
gets destroyed. This can occur in the processing, storage or transmission of data. As the
total system is based on the internet and every application will be formulated over the
internet too, there is a high chance that data may get lost in the overall process. For the
SPA system, the data behind the coding of the system and the devices are crucial hence
its prevention is required. This prevention can be done by keeping a back-up of the codes,
designing and all the important information of the system.
Unauthorised access- The Unauthorized access to any online-based system has the
single purpose of accessing the important information of that system or company against
Document Page
2SPA SYSTEM
them (Mouton et al. 2014). For the development of intelligent SPA system, if the system
is accessed by unauthorized users then the functionalities of the Jacuzzis and hot tubs can
be altered and cause malfunction of the system. This will eventually lead to the loss of
the client. The unauthorized access to the remote controls of the SPA equipment will give
the hacker to change the temperature of the water in the pool, improper operations of the
remotes, etc.
Network breach- The network that the SPA system, the remotes and the company use
can get compromised. The attacker may attack the overall network of the company and
disable the operation of the SPA systems (Demchenko et al. 2015). The scheduling,
maintenance, temperature control are some of the functions of the developed system and
these can be altered throng the network.
Outdated security software- The transfer of the normal pool to the automated
technology will require high security of the system as well as the software used in that
system. The proper update of the software will keep the system away from any security
issues (Gonzalez-Barahona et al. 2017). As the new versions of the software are always
coded with the protections from the newly developed viruses and possible threats. Hence,
the necessity of update is crucial.
Document Page
3SPA SYSTEM
Project Schedule
Figure 1: Gantt chart
(Source: Created by Author)
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4SPA SYSTEM
Figure 2: Work breakdown Structure
(Source: Created by Author)
Document Page
5SPA SYSTEM
Reference
Demchenko, Y., Filiposka, S., Tuminauskas, R., Mishev, A., Baumann, K., Regvart, D. and
Breach, T., 2015, December. Enabling automated network services provisioning for cloud based
applications using zero touch provisioning. In 2015 IEEE/ACM 8th International Conference on
Utility and Cloud Computing (UCC) (pp. 458-464). IEEE.
Gonzalez-Barahona, J.M., Sherwood, P., Robles, G. and Izquierdo, D., 2017, May. Technical lag
in software compilations: Measuring how outdated a software deployment is. In IFIP
International Conference on Open Source Systems (pp. 182-192). Springer, Cham.
Hassan, N.A., 2019. Ransomware Families. In Ransomware Revealed (pp. 47-68). Apress,
Berkeley, CA.
Mouton, F., Malan, M.M., Leenen, L. and Venter, H.S., 2014, August. Social engineering attack
framework. In 2014 Information Security for South Africa (pp. 1-9). IEEE.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]