Module 2

Secure Software Development (Computer Science)

Unit 2

UML Modelling to Support Secure System Planning

Learning Outcomes

  • Research the academic literature on software development which follows an agile process and prioritises security.
  • Break down the steps involved in a process so that they may be represented as a flow chart.
  • Reading areas of an ISO/IEC Standard on security and becoming familiar with the language and concepts.

e-Portfolio Component: Collaborative Discussion 1: UML flowchart

  • The discussion started in the previous unit was continued. Link to the discussion forum: here

Unit 2 Seminar: Blog Post

  • A 300-word blog post on how people can be managed to overcome cyber security attacks from the inside was submitted. Two cybersecurity strategies were discussed. Link to blog post: here

Meeting Notes

Meeting 1
  • Date: 12 August 2024
  • Time (UK): 18:00–19:00
  • Venue: Google Meet
  • Attendees: Adriaan Joubert, Hristo Todorov, and Shraddha Gore
  • Agenda:
    • The online retailer was selected for the development team project.
    • Discussed the must-have functionalities of the selected application.
  • Next steps:
    • Hristo Todorov will contact Anupam Mazumdar, the module tutor, to set up a meeting to get clarity on the requirements.
    • The division of responsibilities for the design document will be discussed in the next meeting.

Reflection

  • Unit 2 was relatively less demanding. In addition to the required reading, I conducted independent research on popular cybersecurity attacks like phishing, DDoS, and injection.
  • Our first team meeting was productive. Following brief introductions, we immediately delved into the meeting's agenda.

Phone

-

Address

Mumbai, India