Assignment 4
Assignment 4
Framework Configuration Record for Electronic and Apparatus Retail location Site
1. Presentation:
The motivation behind this Framework Configuration Report (SDD) is to give a complete outline
of the electronic and machine retail location site. This archive frames the significant level design,
parts, points of interaction, and conduct of the framework. It fills in as an aide for designers,
analyzers, and partners to grasp the framework's construction, usefulness, and execution.
class Product {
-productid: int
-name: String
-price: float
+get Details (): void
}
class Order {
-orderId: int
-products: List<Product>
-total Amount: float
+process Payment (): void
}
class Admin {
-adminId: int
-username: String
+manage Products (): void
+manage Orders (): void
}
4.3 Security and Control Plan for Electronic and Retail location Site
1. Verification and Approval:
classDiagram
class Client {
-username: String
-secret word: String
-email: String
+login (): Boolean
+logout (): void
+resetPassword (): void
+authorize (role: String): Boolean
}
class Administrator {
-adminId: int
-username: String
-secret word: String
+login (): Boolean
+logout (): void
+resetPassword (): void
+manage Products(): void
+manage Orders(): void
}
2. Information Encryption:
Duplicate code
component Diagram
member Client
member Webserver
member Data set
member PaymentGateway
activity Diagram
begin
on the off chance that (Client Solicitations Access)
on the off chance that (Client is Confirmed)
on the off chance that (Client has Authorization)
log ("User Got to Asset")
// Perform approved activity
else
log ("Unauthorized Access Endeavor")
// Deny access, show mistake
end
else
log ("Unauthenticated Access Endeavor")
// Divert to login page
end
else
log ("Invalid Solicitation")
// Show blunder message
end
stop
This action chart addresses the entrance control process. In the event that a client demands
access, their confirmation and consents are checked. In the event that the client is validated and
has the expected authorizations, the activity is logged, and the approved activity is performed.
On the off chance that the client isn't verified or needs authorizations, access is denied, and the
occasion is logged likewise.
These displaying methods give a visual portrayal of the security and control plan for the
electronic and retail location site, guaranteeing a solid, controlled, and easy to understand
insight. Remember that these models are rearranged, and genuine execution might require extra
safety efforts in light of the particular prerequisites and potential dangers looked by the site.