CO546 Information Systems Analysis

advertisement
CO546 Information Systems Analysis
• Overview
– System Modelling
• Unified Modelling Language (UML)
– Information Systems
• From a business and management point of view
• Assessment (100% coursework)
– 50% UML assessments
– 50% Group assessment
CO600 Project
Dr. Caroline Ling Li
Email: c.li@kent.ac.uk
Introduction
• All Computing students are currently required
to undertake a 30-credit project.
• All Medway Students must take either a
CO600 and a CO650 project as follows:
– Computing students must do CO600 and may chose to take
CO650 as an option
– Computing(Con) must do CO650 and may choose to do CO600
as an option
– IT(SE), IT(Web Apps) and IT(MKC) must do CO600 and cannot do
CO650
– BIT students may do either CO600 or CO650, but not both.
3
Introduction - cont’d
• Groups sizes between 3 and 5 inclusive
allowed; ideally 4, but optimum will depend
on the scope of the project.
• Individual CO600 projects are only allowed
• when arising from an industrial placement (Must have the agreement
of the company particularly if dependent on company data source),
or
• when arising from issues relating to a student’s ILP or when directed
by the examination board
4
Module Generic Learning Outcomes
1. An appreciation of the dynamics of working
in a group
2. Oral presentational skills
3. Ability in writing technical reports
4. Ability to acquire technical knowledge and
understanding in an independent fashion
5. Ability to reflect on and evaluate work
performed.
5
Module Specific Learning Outcomes
1. An in depth understanding of particular technical topics (for
instance, use of a particular programming language, or software
development tool, component architecture or mathematical
technique) beyond that obtainable from the rest of the
programme.
2. An enhanced understanding (gained from practical experience) of
project organisation, implementation and documentation
techniques (as studied in other modules).
3. The ability:
• to specify, design and implement a computer-based system;
• to evaluate and choose between potential solutions to a
technical problem;
• to evaluate and deploy appropriate tools and techniques.
6
Initial Meeting
• Agree a fixed time when weekly supervisory meetings
will take place - mandatory and participation will form
part of the assessment.
• Group should identifies a project leader or at least the
person most likely to communicate with the supervisor
and will distribute messages to the rest of the group.
• Discuss scope of project and look to identify the system
boundaries or other constraints
• Request, as a priority, the group produces a
requirements statement (or identifies the project’s
objectives) and an initial project plan (schedule, maybe
revisited during the project, version control-SVN)
7
Initial Meeting – cont’d
– A group will be provided with a group folder on Raptor (by
cs-syshelp) and that this should be treated as the project
group’s default respository.
•
•
•
to store all documents, source code, etc. relating to the project (throughout
the lifetime of the project)
not to store file on a laptop
from which the final software will be run (unless there are justifiable reasons
why this is not practical)
• Everyone will be assessed individually in each
learning outcome so must involve themselves in all
aspects of the project, e.g. project management,
programming, testing and documentation. This will
not be likely if all the programming is performed by
one or two people in the group.
• Agile method (i.e. paired programming)
8
Initial Meeting – cont’d
• Plagiarism. Not only text, figures, this
includes code, and that, if code from
elsewhere is incorporated, it should be:
•
•
appropriately referenced
delineated
• Assessment
• they will be assessed individually based on their contribution to
supervisory meetings, identified contribution to the project,
evaluation report and viva.
• the module is non-compensable. Failure will almost certainly
result in a student having to repeat a different project over the
following year. If a student fails, then they may be eligible for a
ordinary degree provided they have passed 90 credits at level H.
9
Recommendations
• The group should identify a time when they will meet,
other than supervisory meetings, on a regular basis
• Academics will keep logs of supervisory meetings:
attendance, progress, issues, etc.
• The group should keep log books: attendance,
document/identify tasks to be carried out by particular
members and record agreed delivery dates.
• Academics will not recommend or instruct in approaches
to overcome problems. Merely ask what approaches
have been considered and the difficulties encountered.
10
Categorical
marking
Last Year’s Deadlines – Check moodle for
this year’s deadline – will be released end of this term via moodle
https://forum.cs.kent.ac.uk/forumdisplay.php?50-UndergraduateProjects-2015-16
• Poster and Abstract deadline: 4.00pm of Wednesday Week 19
• Poster Fair: Friday of Week 21 @ Eliot Dining Hall, Canterbury
• Technical report and corpus: 4.00pm on Wed week 23
• Individual report: 4.00pm on Wed of Week 24
• Viva: Summer Term – Do not make travel plans within term time.
Grab a Form and have it signed
CO634: Computer Security and
Cryptography
“The protection afforded to an automated information
system in order to attain the applicable objectives of
preserving the integrity, availability, and confidentiality of
information system resources (includes hardware, software,
firmware, information/ data and telecommunications.)”
Module team at Medway
Part I: Computer Security: Dr Matteo Migliavacca
Part II: Cryptography: Dr Palani Ramaswamy
Both parts run concurrently
Assessments
- 2 hour exam (70%)
Two pieces of coursework: (30%)
- Cryptography practice (15%) - code breaking
- Computer Security (15%) - threat analysis
What is Computer Security and
Computer Security
Cryptography?
• Questions such as "How do I know you are
who you say you are?" and "Why bother?"
are explored throughout the first few
topics
• Later in the course, we’ll look at highprofile attacks that were possible against
internet-connected computers, look at
how web servers are commonly secured,
and at how firewalls work
Cryptography
• Did you buy anything online? Used an
ATM machine?
• You would have used cryptography
(perhaps you didn’t know!)
• We’ll look at methods to encrypt data to
avoid eavesdropping
• (Eg: Avoiding hackers from stealing your
What are the
Why do we need
possible attacks
oncard
this
Security?
Eg: you buy an item from Amazon using a credit
What protocols are
transaction?
Possible security issues
required to
prevent/safeguard
the transaction?
You will study protocols

An adversary could eavesdrop on the
transaction


The attacker could send extra copies of 
your message: replay attack
to detects replays - provide
“originality”

Even with originality guaranteed, an

adversary could intercept your
message and retransmit it with a delay
that detects such delaying provides
“timeliness”

You could be directed to a fake web site 
- Phishing attack
that ensures that you are talking to
whom you think you are talking
provides “authentication”

An attacker could bomb Amazon with a 
big number of requests; customers will
not be served: Denial of Service (DoS)
that ensures a degree of access
provides “availability”
to ensure “confidentiality”
Cryptography example
Approaches to
perform the
encryption will be
studied
Caesar cipher
 Julius Caesar used a cipher in which each letter of the alphabet was replaced by the letter th
 One of the cryptography methods to be studied
 Key here is ‘3 letters onwards alphabetically’
 Example: KHOOR becomes?
HEL L O
Questions about the
course?
Contact either Matteo or Palani
• m.migliavacca@kent.ac.uk (room M3.17)
• r.palani@kent.ac.uk (room M3.14)
CO639 – E-Commerce
option talk
Matteo Migliavacca
Security + IT + Business
• Theory 50%
–
–
–
–
–
Web technology (HTTP(S), cookies)
Security and Vulnerabilities
Payment systems
Laws and frauds
Mobile
• Practice and Business 50%
–
–
–
–
–
Business and Internet
programming in PHP (sessions, PDO, transactions)
Web services and Paypal PHP SDK
Writing secure PHP applications
Impact of Internet on Business practices
Assessment
• 50% exams
– 2 questions on theory, 1 on practice, 1 on
business. Choose 3 out of 4
• 50% coursework, 2 pieces (25% each)
– Group case-study on e-commerce security
– Individual programming in PHP: e-commerce
backend service
co639: snog, marry, avoid ?
• Choose co639 to
– learn a mix of web + security + money + business/law
topics
– understand practical aspects of security
– learn how to develop backend web services (API)
– understand solutions for being paid online
• Avoid co639 if
– not interested in business/payment aspects
– you have done web development (co539) + security
(co634) and do not care about web / payment services
– do not like (a lot of) programming in vanilla PHP
Some comments from students
• Multiple concepts in one module is a bonus,
even if other modules have been taken that
cover them as well
• good range of assessments, both technical
and theoretical
• The second assignment was a great learning
experience
• Learning a new language, which I had no
experience of previously
CO656 – Computational Intelligence
in Business, Economics and Finance
Michael Kampouridis
Outline
• Computational Intelligence
– Nature-inspired computational methodologies to
address complex real-world problems
• Problems come from the fields of business,
economics and finance
– Portfolio optimisation
– Financial forecasting
– Timetabling
– Optimal roll-out of a new service/technology
Requirements
• Java!
• Coursework will include quite a lot of Java
programming for
– Modeling the problem at hand
– Creating and running the CI algorithm to solve the
problem
The Graduates of Tomorrow
Supporting the Businesses of Today
Diagnostics
Identifying areas of
business that could
benefit from
technological innovation.
Guidance
Studies
Identifying
a range of
solutions to tackle realworld business problems.
Websites
Implementing selfmaintained web
solutions for a variety of
client needs.
Become a Student Consultant
• Join a team of Stage 3/MSc students at Canterbury
and Medway
• Become an integral part of the KITC
• Support small- to medium-size enterprises in the
Kent area
• Deal directly with real-world clients
Benefits
• Continue your placement as part of a team, in a
functioning business environment
• Continue to enhance employability skills
• Continue your professional development
• Work on multiple projects instead of just one
Who Can Apply?
• Any Computing student
• CO650 can be taken in place of CO600 (Stage 3 Project)
• Come and speak to us the Poster Fair to apply
• Alternatively, email your CV and cover letter to:
recruitment@kitc-solutions.co.uk
Download