Assignment 1CST8333 – ASSIGNMENT 1 – INSTRUCTIONSCST8333 – ASSIGNMENT 1 – INSTRUCTIONSCST8333Assignment 1Project Initiation: Report & PresentationINSTRUCTIONSAll material prepared for...

1 answer below »
Please find attached the assignment instructions as well as examples.










Please note: Do NOT copy the examples provided.













List of project ideas:






https://nevonprojects.com/project-ideas/software-project-ideas/
















Assignment 1 CST8333 – ASSIGNMENT 1 – INSTRUCTIONS CST8333 – ASSIGNMENT 1 – INSTRUCTIONS CST8333 Assignment 1 Project Initiation: Report & Presentation INSTRUCTIONS All material prepared for this assignment was produced by the author. Material from all third parties has been cited and referenced. CST8333 – ASSIGNMENT 1 – INSTRUCTIONS CST8333 PROGRAMMING LANGUAGE RESEARCH PROJECT – ASSIGNMENT 1 2 Table of Contents 1Instructions2 1.1Introduction2 1.1.1Objective2 1.1.2Pre-assignment Instructions2 1.1.3Submission Guidelines2 1.2Report3 1.3Presentation4 2Assignment 1 Grading Rubric6 3References8 4Module 2 Checklist9 5Module 3 Checklist12 6Module 4 Checklist13 7Frequently Asked “What the . . .?!” Questions15 Instructions Introduction This assignment relates to the following Course Learning Requirements (CLR). CLR 1: Investigate programming languages (not already studied in program) and confirm appropriate choice with course professor. CLR 2: Using an identified software methodology, create a plan to accomplish goals and seek approval from professor. CLR 5: Manage time and resources to complete planned project on time and according to goals. Objective Complete and submit a report and a presentation documenting the activities completed during the first phase of a programming research project. Pre-assignment Instructions Through the first weeks of the course you used the detailed checklists included in course modules #2 through #4 to track your completion of the requirements of Assignment 1. Reminder If a checklist item is not applicable to your project, then please provide a brief explanation as to why. For the purposes of Assignment 1 there are two documents that must be submitted and in which the requirements must be captured, as follows. 1. Report 2. Presentation Please Note Please do not include any source code in your Assignment 1 documentation. Source code is required only for Assignment 2 (60%) and Assignment 3 (100%) Please find in the sections below the checklists for each of the two Assignment 1 documents. Use the checklists to validate that you have completed the requirements of the assignment. Submission Guidelines 1. Submit your work in the formats prescribed in section 1.2 Report and 1.3 Presentation of this document. Include the following information on the cover page of your documents. > Your name > Course name > Assignment number > Date submitted > The following statement, “All material prepared for this assignment was produced by the authors, and material from a third parties, including the Internet has been cited and referenced.” 2. Use of External Material Algonquin College has strict policies regarding plagiarism and academic misconduct. While you can research material from the Internet, you cannot use it directly for this assignment. Please ensure that all materials, including external templates, are appropriately cited, and referenced. If unreferenced third-party material is found within your submission, either the offending section will be assessed at zero, or the entire submission will be rejected. The College can impose additional sanctions, if deemed warranted. 3. Late Submissions If a valid reason exists and you cannot submit the assignment on time, you must notify the facilitator at least 24 hours in advance of the due date. Extensions are possible under certain conditions. If an assignment is submitted late without approval, it can be subject to late penalties, as well as being returned with only a grade assessment (without accompanying detailed feedback and comments). 4. Submission Method and File Naming Convention. Electronic submission by uploading your file to Brghtspace by the due date. Please use the following file naming convention. File Naming Convention: FirstName LastName Assignment 1 Report A “Word” document that includes but is not limited to the following high-level sections, requirements, feasibility, and design. Please Note For reference purposes an outline of the Assignment 1 Report, which includes sample content, is provided separately. Please use the checklist, below, to validate that you have completed the requirements of the Report. Table 1: Report Checklist (see Module 5) Activity Completed If “No” Please Explain Completion of Requirement Analysis phase. Yes/No Completion of project related Feasibility Study. Yes/No Completion of Project Design along with your Project Title and definition. Yes/No Submission of Power Point Presentation includes Requirement Analysis, Feasibility Study and Project Design phases of your project. Yes/No Submission of Partially done Project Report [word file], having detailed information about the first three modules of your project. Yes/No Feedback taken from facilitator regarding all your submissions [presentation and report]. Yes/No Discussion between Facilitator and Developer regarding any updates suggested by the facilitator. Yes/No Submit the final presentation and final project report to the facilitator within the given deadline. Yes/No Facilitator approved the final submission-1 and allow you to start next phase of your development. Yes/No Presentation A “Slide Deck” that summarizes the information in your Report and that includes at minimum the following sections, introduction, details, and conclusion. Please Note For reference purposes an outline of the Assignment 1 Presentation, which includes sample content, is provided separately. Please use the checklist, below, to validate that you have completed the requirements of the Presentation. Items applicable to the Assignment 1 Presentation are highlighted in BLUE font. Table 2: Presentation Checklist (see Module 13) Activity Completed If “No” Please Explain Select proper template [should be simple] for your project presentation. Yes/No Your presentation should be separated in three parts: Introduction, Details and Conclusion. Yes/No Is introduction added to the presentation? Yes/No Is project requirement collection information added to the presentation? Yes/No Is feasibility report information added to the presentation? Yes/No Is project design information added to the presentation? Yes/No Graphics, Images, Flowcharts etc. related to your project added to the presentation? Yes/No Are tools and technology related to the project added to the presentation? Yes/No Is the project timeline information added to the presentation? Yes/No Is information regarding project code [You can include a hyperlink in your presentation which opens your code] such as environment and IDE used in project added in the presentation? Yes/No Are workable application screenshots added in the presentation? Yes/No Are advantages of your project added in the presentation? Yes/No Is future possible work for your project added in the presentation? Yes/No Is the conclusion added to the presentation? Yes/No Is your presentation submitted to the facilitator? Yes/No Feedback taken from the facilitator? Yes/No Is the final presentation submitted to the facilitator within the given timeline? Yes/No Assignment 1 Grading Rubric Please find, below, the criteria against which Assignment 1 will be graded. Criteria Excellent 80-100% Good 50-79% Requires Improvement <50% points assignment quality all information offered is accurate all views are clearly expressed and well explained contains original ideas, connections, or applications most information offered is accurate most views are clearly expressed and explained contains mainly original ideas, connections, or applications some or no accurate information offered views are rarely or never clear and require further explanation many non- original ideas, or unclear connections or applications /10 assignment knowledge and skills demonstration clear, concise synthesis of course content to demonstrate understanding of topic all ideas are clearly developed, organized logically, and connected with effective transitions explores ideas, supports points fully using a balance of evidence, and uses effective reasoning to make useful distinctions all relevant course and topic links are made evidence of some synthesis of course content to demonstrate understanding of topic some unified and coherent ideas are developed with effective transitions supports most ideas with effective examples, and/or references, and details, makes key distinctions most relevant course and topic links are made lack of evidence or weakness in the synthesis of course content to demonstrate understanding of topic develops and organizes ideas that are not necessarily connected. some ideas seem illogical and/or unrelated presents ideas in general terms; most ideas are inconsistent/unsupported, and reasoning is flawed or unclear some or no relevant course and topic links are made /10 assignment structure formatted as per assignment details structure and format enhance delivery of the information clear language is used which leads to easy readability correct grammar and spelling are consistently used formatted as per assignment details in most components structure and format fits well with the delivery of the information mostly clear language is used with minor readability issues few or no spelling and/or grammatical errors formatting has not been followed structure and format are unclear and impedes delivery of the information language used is often unclear which impedes readability many spelling and grammatical errors /5 total points /25 references click here to access a helpful citation generator. module 2 checklist please use the checklist, below, to track your completion of assignment requirements. please also note that it is possible that not all the items in the checklist will be applicable to your project. with that said, if you answer “no” in the completed for an item, then please add a brief explanatory note. activity completed if “no” please explain define/refine the requirements (planning). yes/no conduct project planning. yes/no initiate controlling processes. yes/no project approach activity completed if “no” please explain review project approach and validate that the modified waterfall project lifecycle, identify the phases of the project, and define project measures of success. yes/no initiate engagement with dependent areas. this includes operations, training, support services, data, and documentation management. yes/no initiate development of a work breakdown structure. yes/no identify configuration management plan, requirements management process, work products, change control, version control, requirements with status tracking. yes/no review and revise business objectives, scope, and vision from concept phase, document the "as-is" and "to-be" business processes and any process improvement opportunities. yes/no user requirements definition activity completed if “no” please explain identify the project requirements, and decision process. yes/no define approach for requirements definition, documenting, communicating requirements and identify log tool. yes/no develop and prioritize use cases for portions of the software application to be developed. yes/no further define complex use cases (if required) with additional techniques such as data flow diagrams, entity relationship diagrams, state-transition diagrams, and object class and interaction diagrams. yes/no technical requirements definition activity completed if “no” please explain define data requirements. create data models to document, as needed. yes/no identify, define, and document technology, infrastructure, and support requirements. conduct/refine enterprise and data architectural reviews. yes/no define the user documentation deliverable types and the training deliverables needed for the application/system. yes/no elaborate the use cases into the necessary functional requirements. yes/no develop user interface prototype. yes/no develop and evaluate application/system input and output requirements, screens, menus, reports, and forms. yes/no requirements documentation and review activity completed if “no” please explain prioritize features and/or functional requirements. yes/no develop software requirements specification. yes/no plan and conduct requirements walkthrough. gather feedback and approval for the software requirements specification. yes/no plan and conduct user requirements walkthrough. gather feedback and approval for the software requirements specification. yes/no test planning activity completed if “no” please explain begin development of test plan. evaluate test risks to determine an appropriate test strategy. include a high-level test schedule. yes/no develop conceptual test cases. yes/no develop initial draft of user acceptance criteria. yes/no use the test cases to verify use cases, technical requirements, and prototypes. yes/no requirements refinement activity completed if “no” please explain repeat requirements definition steps, as required. refine srs [software requirement analysis], if required. yes/no define/revise the system diagram. yes/no project planning activity completed if “no” please explain refine/validate project approach and project lifecycle yes/no begin development of the project notebook and management approaches yes/no document the project organization. yes/no establish communication strategy. yes/no review the project schedule, budget and srs, sponsors, and other appropriate stakeholders. yes/no prepare project funding deliverables and review with the funding approval authority. yes/no plan for next phase. yes/no planning/funding approval activity completed if “no” please explain baseline requirements, schedule, and budget and place all configurable documents (e.g., srs, project plan, etc.) in the project repository. yes/no document lessons learned. yes/no module 3 checklist please use the checklist, below, to track your completion of assignment requirements. please also note that it is possible that not all the items in the checklist will be applicable to your project. with that said, if you answer “no” in the completed for an item, then please add a brief explanatory note. activity completed if “no” please explain a description of the problem to be solved. yes/no a project evaluation criteria. yes/no a project briefs. yes/no an analysis of potential project sites yes/no is this project plan technically feasible? yes/no analysis of the development options including the “do nothing” option. yes/no cost/benefit and life-cycle cost information for major decisions. yes/no set of conceptual or preliminary drawings (prior to schematic design phase). yes/no is this project plan operationally feasible? yes/no a professionally prepared project budget. yes/no recommendation of the project management process to be used. yes/no a discussion of scheduling constraints and impact on program and budget. yes/no document lessons learned yes/no module 4 checklist please use the checklist, below, to track your completion of assignment requirements. please also note that it is possible that not all the items in the checklist will be applicable to your project. with that said, if points="" assignment="" quality="" all="" information="" offered="" is="" accurate="" all="" views="" are="" clearly="" expressed="" and="" well="" explained="" contains="" original="" ideas,="" connections,="" or="" applications="" most="" information="" offered="" is="" accurate="" most="" views="" are="" clearly="" expressed="" and="" explained="" contains="" mainly="" original="" ideas,="" connections,="" or="" applications="" some="" or="" no="" accurate="" information="" offered="" views="" are="" rarely="" or="" never="" clear="" and="" require="" further="" explanation="" many="" non-="" original="" ideas,="" or="" unclear="" connections="" or="" applications="" 10="" assignment="" knowledge="" and="" skills="" demonstration="" clear,="" concise="" synthesis="" of="" course="" content="" to="" demonstrate="" understanding="" of="" topic="" all="" ideas="" are="" clearly="" developed,="" organized="" logically,="" and="" connected="" with="" effective="" transitions="" explores="" ideas,="" supports="" points="" fully="" using="" a="" balance="" of="" evidence,="" and="" uses="" effective="" reasoning="" to="" make="" useful="" distinctions="" all="" relevant="" course="" and="" topic="" links="" are="" made="" evidence="" of="" some="" synthesis="" of="" course="" content="" to="" demonstrate="" understanding="" of="" topic="" some="" unified="" and="" coherent="" ideas="" are="" developed="" with="" effective="" transitions="" supports="" most="" ideas="" with="" effective="" examples,="" and/or="" references,="" and="" details,="" makes="" key="" distinctions="" most="" relevant="" course="" and="" topic="" links="" are="" made="" lack="" of="" evidence="" or="" weakness="" in="" the="" synthesis="" of="" course="" content="" to="" demonstrate="" understanding="" of="" topic="" develops="" and="" organizes="" ideas="" that="" are="" not="" necessarily="" connected.="" some="" ideas="" seem="" illogical="" and/or="" unrelated="" presents="" ideas="" in="" general="" terms;="" most="" ideas="" are="" inconsistent/unsupported,="" and="" reasoning="" is="" flawed="" or="" unclear="" some="" or="" no="" relevant="" course="" and="" topic="" links="" are="" made="" 10="" assignment="" structure="" formatted="" as="" per="" assignment="" details="" structure="" and="" format="" enhance="" delivery="" of="" the="" information="" clear="" language="" is="" used="" which="" leads="" to="" easy="" readability="" correct="" grammar="" and="" spelling="" are="" consistently="" used="" formatted="" as="" per="" assignment="" details="" in="" most="" components="" structure="" and="" format="" fits="" well="" with="" the="" delivery="" of="" the="" information="" mostly="" clear="" language="" is="" used="" with="" minor="" readability="" issues="" few="" or="" no="" spelling="" and/or="" grammatical="" errors="" formatting="" has="" not="" been="" followed="" structure="" and="" format="" are="" unclear="" and="" impedes="" delivery="" of="" the="" information="" language="" used="" is="" often="" unclear="" which="" impedes="" readability="" many="" spelling="" and="" grammatical="" errors="" 5="" total="" points="" 25="" references="" click="" here="" to="" access="" a="" helpful="" citation="" generator.="" module="" 2="" checklist="" please="" use="" the="" checklist,="" below,="" to="" track="" your="" completion="" of="" assignment="" requirements.="" please="" also="" note="" that="" it="" is="" possible="" that="" not="" all="" the="" items="" in="" the="" checklist="" will="" be="" applicable="" to="" your="" project.="" with="" that="" said,="" if="" you="" answer="" “no”="" in="" the="" completed="" for="" an="" item,="" then="" please="" add="" a="" brief="" explanatory="" note.="" activity="" completed="" if="" “no”="" please="" explain="" define/refine="" the="" requirements="" (planning).="" yes/no="" conduct="" project="" planning.="" yes/no="" initiate="" controlling="" processes.="" yes/no="" project="" approach="" activity="" completed="" if="" “no”="" please="" explain="" review="" project="" approach="" and="" validate="" that="" the="" modified="" waterfall="" project="" lifecycle,="" identify="" the="" phases="" of="" the="" project,="" and="" define="" project="" measures="" of="" success.="" yes/no="" initiate="" engagement="" with="" dependent="" areas.="" this="" includes="" operations,="" training,="" support="" services,="" data,="" and="" documentation="" management.="" yes/no="" initiate="" development="" of="" a="" work="" breakdown="" structure.="" yes/no="" identify="" configuration="" management="" plan,="" requirements="" management="" process,="" work="" products,="" change="" control,="" version="" control,="" requirements="" with="" status="" tracking.="" yes/no="" review="" and="" revise="" business="" objectives,="" scope,="" and="" vision="" from="" concept="" phase,="" document="" the="" "as-is"="" and="" "to-be"="" business="" processes="" and="" any="" process="" improvement="" opportunities.="" yes/no="" user="" requirements="" definition="" activity="" completed="" if="" “no”="" please="" explain="" identify="" the="" project="" requirements,="" and="" decision="" process.="" yes/no="" define="" approach="" for="" requirements="" definition,="" documenting,="" communicating="" requirements="" and="" identify="" log="" tool.="" yes/no="" develop="" and="" prioritize="" use="" cases="" for="" portions="" of="" the="" software="" application="" to="" be="" developed.="" yes/no="" further="" define="" complex="" use="" cases="" (if="" required)="" with="" additional="" techniques="" such="" as="" data="" flow="" diagrams,="" entity="" relationship="" diagrams,="" state-transition="" diagrams,="" and="" object="" class="" and="" interaction="" diagrams.="" yes/no="" technical="" requirements="" definition="" activity="" completed="" if="" “no”="" please="" explain="" define="" data="" requirements.="" create="" data="" models="" to="" document,="" as="" needed.="" yes/no="" identify,="" define,="" and="" document="" technology,="" infrastructure,="" and="" support="" requirements.="" conduct/refine="" enterprise="" and="" data="" architectural="" reviews.="" yes/no="" define="" the="" user="" documentation="" deliverable="" types="" and="" the="" training="" deliverables="" needed="" for="" the="" application/system.="" yes/no="" elaborate="" the="" use="" cases="" into="" the="" necessary="" functional="" requirements.="" yes/no="" develop="" user="" interface="" prototype.="" yes/no="" develop="" and="" evaluate="" application/system="" input="" and="" output="" requirements,="" screens,="" menus,="" reports,="" and="" forms.="" yes/no="" requirements="" documentation="" and="" review="" activity="" completed="" if="" “no”="" please="" explain="" prioritize="" features="" and/or="" functional="" requirements.="" yes/no="" develop="" software="" requirements="" specification.="" yes/no="" plan="" and="" conduct="" requirements="" walkthrough.="" gather="" feedback="" and="" approval="" for="" the="" software="" requirements="" specification.="" yes/no="" plan="" and="" conduct="" user="" requirements="" walkthrough.="" gather="" feedback="" and="" approval="" for="" the="" software="" requirements="" specification.="" yes/no="" test="" planning="" activity="" completed="" if="" “no”="" please="" explain="" begin="" development="" of="" test="" plan.="" evaluate="" test="" risks="" to="" determine="" an="" appropriate="" test="" strategy.="" include="" a="" high-level="" test="" schedule.="" yes/no="" develop="" conceptual="" test="" cases.="" yes/no="" develop="" initial="" draft="" of="" user="" acceptance="" criteria.="" yes/no="" use="" the="" test="" cases="" to="" verify="" use="" cases,="" technical="" requirements,="" and="" prototypes.="" yes/no="" requirements="" refinement="" activity="" completed="" if="" “no”="" please="" explain="" repeat="" requirements="" definition="" steps,="" as="" required.="" refine="" srs="" [software="" requirement="" analysis],="" if="" required.="" yes/no="" define/revise="" the="" system="" diagram.="" yes/no="" project="" planning="" activity="" completed="" if="" “no”="" please="" explain="" refine/validate="" project="" approach="" and="" project="" lifecycle="" yes/no="" begin="" development="" of="" the="" project="" notebook="" and="" management="" approaches="" yes/no="" document="" the="" project="" organization.="" yes/no="" establish="" communication="" strategy.="" yes/no="" review="" the="" project="" schedule,="" budget="" and="" srs,="" sponsors,="" and="" other="" appropriate="" stakeholders.="" yes/no="" prepare="" project="" funding="" deliverables="" and="" review="" with="" the="" funding="" approval="" authority.="" yes/no="" plan="" for="" next="" phase.="" yes/no="" planning/funding="" approval="" activity="" completed="" if="" “no”="" please="" explain="" baseline="" requirements,="" schedule,="" and="" budget="" and="" place="" all="" configurable="" documents="" (e.g.,="" srs,="" project="" plan,="" etc.)="" in="" the="" project="" repository.="" yes/no="" document="" lessons="" learned.="" yes/no="" module="" 3="" checklist="" please="" use="" the="" checklist,="" below,="" to="" track="" your="" completion="" of="" assignment="" requirements.="" please="" also="" note="" that="" it="" is="" possible="" that="" not="" all="" the="" items="" in="" the="" checklist="" will="" be="" applicable="" to="" your="" project.="" with="" that="" said,="" if="" you="" answer="" “no”="" in="" the="" completed="" for="" an="" item,="" then="" please="" add="" a="" brief="" explanatory="" note.="" activity="" completed="" if="" “no”="" please="" explain="" a="" description="" of="" the="" problem="" to="" be="" solved.="" yes/no="" a="" project="" evaluation="" criteria.="" yes/no="" a="" project="" briefs.="" yes/no="" an="" analysis="" of="" potential="" project="" sites="" yes/no="" is="" this="" project="" plan="" technically="" feasible?="" yes/no="" analysis="" of="" the="" development="" options="" including="" the="" “do="" nothing”="" option.="" yes/no="" cost/benefit="" and="" life-cycle="" cost="" information="" for="" major="" decisions.="" yes/no="" set="" of="" conceptual="" or="" preliminary="" drawings="" (prior="" to="" schematic="" design="" phase).="" yes/no="" is="" this="" project="" plan="" operationally="" feasible?="" yes/no="" a="" professionally="" prepared="" project="" budget.="" yes/no="" recommendation="" of="" the="" project="" management="" process="" to="" be="" used.="" yes/no="" a="" discussion="" of="" scheduling="" constraints="" and="" impact="" on="" program="" and="" budget.="" yes/no="" document="" lessons="" learned="" yes/no="" module="" 4="" checklist="" please="" use="" the="" checklist,="" below,="" to="" track="" your="" completion="" of="" assignment="" requirements.="" please="" also="" note="" that="" it="" is="" possible="" that="" not="" all="" the="" items="" in="" the="" checklist="" will="" be="" applicable="" to="" your="" project.="" with="" that="" said,="">
Answered 4 days AfterJan 16, 2023

Answer To: Assignment 1CST8333 – ASSIGNMENT 1 – INSTRUCTIONSCST8333 – ASSIGNMENT 1 –...

Shubham answered on Jan 20 2023
34 Votes
CST8333 Programming Language Research Project – Assignment 1
CST8333
Assignment 1
Three-level password authentication system
Student’s Name
Date
Algonquin College
Table of Contents
Introduction    2
Objectives    2
Scope    2
Timeline    3
Risks    3
Assumptions    4
Technical Constraints    4
Budget    5
Requirements    5
Introduction    5
List of Requirements    6
Use Case Diagram    7
Traceability Matrix    10
Feasibility    11
Introduction    11
Alternative Solutions    11
Recommendation    12
Conclusion    13
Design    13
Introduction    13
System Architecture    14
Package Diagram    14
Class Diagram    15
Entity-Relationship Diagram    16
UI Prototype Models    17
References    18
Checklists    19
Module 2    19
Module 3    21
Module 4    
22
Introduction
Three-level password authentication system is a system that uses three different levels of authentication to verify a user's identity. The three levels typically include something the user knows like the user's password, something the user has (such as a security token or a fingerprint, and something the user have biometric features like a face or voice. This type of system is often considered more secure than systems that use only one or two levels of authentication, as it makes it more difficult for an attacker to gain unauthorized access.
Objectives
The objective of a three-level password authentication system is to provide a higher level of security for the system or service that it is protecting. This requires multiple forms of authentication, such as something the user knows and something the user has, and something the user is, the system makes it more difficult for an unauthorized person to gain access. It can help in reducing the risk of identity theft, financial fraud, and other types of cybercrime (Singh & Singh, 2019). The three-level password authentication system may also be used to comply with industry regulations or to meet the security requirements of a particular organization.
Scope
    The scope includes use of a three-level password authentication system in computer and network that can be used to secure access to computers, servers, and other networked devices. This can include protecting access to individual workstations, as well as to sensitive areas of the network such as the corporate intranet or the data center. This system can also be used to secure access to online services, such as email, cloud storage, and social media (Joseph et al. 2021). The system can be implemented for controlling access to physical locations, such as buildings, rooms, and other secure areas. It provides a high level of security for any system or service that requires authentication and access control.
Timeline
Risks
    The risk with a three-level password authentication system is weak password and it can make it easier for an attacker to gain unauthorized access, even with the added security of the other two levels of authentication. The next risk is that phishing attacks can be used to trick users into giving away their password or security token, which can then be used to gain unauthorized access to the system (Minh & Nguyen, 2019). Another risk is biometric data breach in which biometric data used in the system is compromised; it can be used by an attacker to gain unauthorized access to the system.
Assumptions
    It is assumed that a three-level password authentication system can help in increasing security by multiple forms of authentication, such as something the user knows, something the user has, and something the user is, the system makes it more difficult for an unauthorized person to gain access. It can help in reducing the risk of identity theft, financial fraud, and other types of cybercrime. Users can authenticate themselves in a variety of ways, such as by using a password, a security token, or a biometric feature, which can make the authentication process more convenient and user-friendly.
Technical Constraints
    Technical constraints include complexity, hardware and software compatibility, scalability, user acceptance and privacy concerns. The implementation of a three-level password authentication system can be complex and may require specialized knowledge and expertise. In the process, if the hardware and software used in the system are not compatible with each other, it can cause errors or system failure (Kumacheva & Orlov, 2022). The number of users or the size of the system increases, it can become more difficult to manage and maintain the system. It may happen that users do not understand the importance of the three-level authentication system.
Budget
Requirements
Introduction
    Three-level password authentication system is the type of authentication system that can help in validating users for accessing the system and it can be done with the use of correct input. The three level of authentication includes varieties of password systems. It contains three login from three different password systems. The difficulty of authentication increases with each level and the user can provide input with the correct password fro successful login. It can help in creating technology that emphasizes on creating a simple user interface for providing best possible comfort in solving the level of authentication.
List of Requirements
The list of requirements that is required for implementing three-level password authentication system includes:
Secure storage: It includes use of a system that can be used for storing the authentication data. It includes ensuring that the data is encrypted and it can be protected from unauthorized access.
Authentication method: It includes the use of a system that can be used for supporting multiple forms of authentication. It includes use of password, security token and biometric data.
User Management: The system can be used for user management and it includes components like deletion, creation and management of user accounts (Yang et al. 2022).
Access Control: In this the system should have the access for components that allows it to restrict the access to specific resources that are based on permission and roles.
Auditing and reporting: In this the system can have the capability to log and record user activity and it can provide with the ability for generating reports on access attempts and user activity.
Secure communication: The system required regular update and maintenance for ensuring it is effective and secure to use.
Use Case Diagram
Use Case Scenarios
Use Case Scenario 1
Title: Identification
Primary Actor: User
Brief Description: User provide username
Trigger: Identifies in the system
Relationships: Association – User, Database
Pre-Conditions: User has to provide username
Post-Conditions: The information provided has been identified by the system
Main Flow:
The user provides with user ID
The system verifies with the database
Use Case Scenario 2
Title: Authentication factor 1
Primary Actor: Database
Brief Description: Check password
Trigger: Authenticate with database
Relationships: Association – User,...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here