Module 2
Secure Software Development (Computer Science)
Unit 2
UML Modelling to Support Secure System Planning
Learning Outcomes
- Research the academic literature on software development which follows an agile process and prioritises security.
- Break down the steps involved in a process so that they may be represented as a flow chart.
- Reading areas of an ISO/IEC Standard on security and becoming familiar with the language and concepts.
e-Portfolio Component: Collaborative Discussion 1: UML flowchart
- The discussion started in the previous unit was continued. Link to the discussion forum: here
Unit 2 Seminar: Blog Post
- A 300-word blog post on how people can be managed to overcome cyber security attacks from the inside was submitted. Two cybersecurity strategies were discussed. Link to blog post: here
Meeting Notes
Meeting 1
- Date: 12 August 2024
- Time (UK): 18:00–19:00
- Venue: Google Meet
- Attendees: Adriaan Joubert, Hristo Todorov, and Shraddha Gore
-
Agenda:
- The online retailer was selected for the development team project.
- Discussed the must-have functionalities of the selected application.
-
Next steps:
- Hristo Todorov will contact Anupam Mazumdar, the module tutor, to set up a meeting to get clarity on the requirements.
- The division of responsibilities for the design document will be discussed in the next meeting.
Reflection
- Unit 2 was relatively less demanding. In addition to the required reading, I conducted independent research on popular cybersecurity attacks like phishing, DDoS, and injection.
- Our first team meeting was productive. Following brief introductions, we immediately delved into the meeting's agenda.