Question: SYSTEM DESCRIPTION Writing Use Cases, Abuse Cases, and Misuse Cases Goal: Learn how to write abuse and misuse cases. System Description: The Internet - based
SYSTEM DESCRIPTION
Writing Use Cases, Abuse Cases, and Misuse Cases
Goal:
Learn how to write abuse and misuse cases.
System Description:
The Internetbased Information Security Lab system consists of several key use cases that outline
interactions between students, administrators, and the system itself. Students, the primary actors,
access the lab remotely to engage in practical security exercises. This process begins with the
Access Lab use case, where students log into the system using secure credentials. Once logged in
students proceed to the Perform Exercise use case, where they follow provided documentation to
complete various security tasks, such as identifying vulnerabilities or implementing defences.
Upon completion, students submit their work through the Submit Solution use case, where their
solutions are evaluated against model answers provided by the instructor.
Administrators, acting as secondary actors, are responsible for the Configure Lab use case, setting
up the lab environment prior to each exercise to ensure that all systems servers sources, and
targets are correctly configured. After students complete their exercises, the administrators
engage in the Restore Lab use case, restoring the lab to a baseline state to prepare for future
activities. Additionally, the system must account for Abuse and Misuse Cases, where potential
security threats are identified and mitigated, ensuring the integrity, availability, and security of the
lab. These use cases collectively ensure a comprehensive, secure and practical learning
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
