FYP Proposal 2024
FYP Proposal 2024
By
XYZ 2016-GCUF-071948
XYZ 2016-GCUF-071938
XYZ 2016-GCUF-071944
BACHELOR OF SCIENCE
IN
COMPUTER SCIENCE
2021
Table of Contents
Table Of Content........................................................................................................................ ii
Revision History ........................................................................................................................ iii
1. Introduction ............................................................................................................................. 1
1.1 General Information ....................................................................................................................... 1
1.2 Purpose ......................................................................................................................................... 1
1.3 Document Conventions .................................................................................................................. 1
1.4 Project Objective ............................................................................................................................ 1
1.5 Intended Audience and Reading Suggestions ................................................................................ 2
1.6 Project Scope ................................................................................................................................ 2
2. Overall Description ................................................................................................................. 2
2.1 Product Perspective ....................................................................................................................... 2
2.2 Product Features ........................................................................................................................... 3
2.3 User Classes and Characteristics................................................................................................... 3
2.4 Operating Environment .................................................................................................................. 3
2.5 Design and Implementation Constraints ......................................................................................... 3
2.6 User Documentation ...................................................................................................................... 3
2.7 Assumptions and Dependencies .................................................................................................... 3
3. System Features ..................................................................................................................... 4
3.1 System Feature 1 .......................................................................................................................... 4
3.2 System Feature 2 (and so on) ........................................................................................................ 5
4. External Interface Requirements ........................................................................................... 5
4.1 User Interfaces .............................................................................................................................. 5
4.2 Hardware Interfaces ....................................................................................................................... 5
4.3 Software Interfaces ........................................................................................................................ 5
4.4 Communications Interfaces ............................................................................................................ 5
5. Other Nonfunctional Requirements ....................................................................................... 6
5.1 Performance Requirements ........................................................................................................... 6
5.2 Safety Requirements ..................................................................................................................... 6
5.3 Security Requirements ................................................................................................................... 6
5.4 Software Quality Attributes ............................................................................................................. 6
6. WBS Project Management ...................................................................................................... 7
7. Analysis model........................................................................................................................ 7
7.1 Use Case Diagram......................................................................................................................... 7
7.2 Class Diagram ............................................................................................................................... 7
7.3 Object Diagram .............................................................................................................................. 7
7.4 Sequence Diagram ........................................................................................................................ 7
7.5 Activity Diagram ............................................................................................................................. 7
7.6 Collaboration Diagram ................................................................................................................... 7
7.7 State Transition Diagram................................................................................................................ 7
7.8 ERD ................................................................................................................................................ 7
8. Tools & Technologies ............................................................................................................. 7
8.1 Programming Languages ............................................................................................................... 7
8.2 Databases/Data storages............................................................................................................... 7
8.3 Operating System .......................................................................................................................... 7
Appendix A: Glossary ................................................................................................................ 8
Appendix B: Check List ............................................................................................................. 9
Appendix C: Supervisory Committee ..................................................................................... 10
Revision History
Name Date Reason For Changes Version
Government College University Faisalabad Page 4
1. Introduction
1.2 Purpose
The purpose of this document is to specify the software requirements for the development of a
cybersecurity website. This project, intended as a final year project, aims to provide comprehensive
information and resources on various aspects of cybersecurity, including threat identification,
protection measures, and best practices for securing digital assets. The website will be developed
using HTML, CSS, and JavaScript to ensure a responsive and interactive user experience.
This Software Requirements Specification (SRS) document will cover the entire scope of the
cybersecurity website, detailing the features, functionalities, and user interactions expected in the
final product. It will encompass the following key components of the website:
• Home Page: An introduction to the website with an overview of cybersecurity, latest news,
and updates in the field.
• Threat Identification: A section dedicated to common cybersecurity threats, their
characteristics, and how they can be identified.
• Protection Measures: Guidelines and strategies for protecting against cybersecurity threats,
including tools and software recommendations.
• Best Practices: A comprehensive list of best practices for individuals and organizations to
follow to enhance their cybersecurity posture.
• Resources: Links to additional resources, such as articles, whitepapers, and tutorials, for
further learning.
This Software Requirements Specification (SRS) document follows a set of standards and
typographical conventions to ensure clarity and consistency throughout. The conventions used in this
document are as follows:
By adhering to these conventions, this SRS aims to provide a clear, organized, and easily navigable
document for all stakeholders involved in the development of the cybersecurity website.
This section defines the objectives of the cybersecurity website project as they relate to the strategic
goals of the organization. Projects inherently involve uncertainty, so an initial risk assessment will be
conducted as part of this charter to identify, quantify, and establish mitigation responses to high-level
risk events that could adversely affect the project outcome.
The project will support the following organizational strategic goals. For each goal, specific project
objectives are identified. The project plan developed as a result of this project charter will:
The external oversight committee must approve the project performance measurement plan.
Government College University Faisalabad Page 6
This document is intended for a variety of readers who have a vested interest in the development and
implementation of the cybersecurity website. The intended audience includes:
• Developers: Responsible for coding and implementing the website features. Developers
should focus on the detailed functional requirements, system architecture, and design
specifications.
• Project Managers: Oversee the project timeline, resources, and deliverables. Project
managers should start with the project overview, goals, objectives, and the project
performance measurement plan.
• Marketing Staff: Plan and execute the promotional strategies for the website. Marketing staff
should read the sections on user experience and interface design to understand how the
website will meet user needs.
• Users: The end-users who will utilize the website for cybersecurity information and resources.
Users can refer to the use case scenarios and user interface design sections to understand
how to navigate and benefit from the website.
• Testers: Ensure the website meets the specified requirements and functions correctly.
Testers should focus on the sections detailing functional and non-functional requirements, as
well as the testing plan and procedures.
• Documentation Writers: Create user manuals, help guides, and other supporting documents.
Documentation writers should read the entire SRS to fully understand the website's features
and how to document them effectively.
1. Introduction:
Government College University Faisalabad Page 7
o Purpose
o Document Conventions
o Intended Audience and Reading Suggestions
o Project Scope
o References
2. Overall Description:
o Product Perspective
o Product Functions
o User Classes and Characteristics
o Operating Environment
o Design and Implementation Constraints
o Assumptions and Dependencies
3. System Features:
o Detailed descriptions of each feature
4. External Interface Requirements:
o User Interfaces
o Hardware Interfaces
o Software Interfaces
o Communication Interfaces
5. System Requirements:
o Functional Requirements
o Non-functional Requirements
o System Attributes
o Other Requirements
6. Appendices:
o Glossary
o Acronyms and Abbreviations
Reading Suggestions:
• Overview Sections: All readers should start with the Introduction to get a high-level
understanding of the project's purpose, scope, and objectives.
• Project Managers and Stakeholders: Proceed to the Overall Description and Project
Objectives sections to understand the strategic alignment and high-level requirements.
• Developers and Testers: Focus on the System Features and System Requirements sections
for detailed technical specifications and requirements.
• Marketing Staff and Documentation Writers: Read the User Interfaces and System
Features sections to understand the user experience and interface design.
• Users: Refer to the User Classes and Characteristics and User Interfaces sections for an
overview of how to navigate and utilize the website.
The cybersecurity website project aims to develop a comprehensive online platform that provides
vital information, resources, and tools related to cybersecurity. This project is intended as a final year
project for a student and will utilize HTML, CSS, and JavaScript to ensure a modern, responsive, and
user-friendly experience.
Purpose: The primary purpose of the cybersecurity website is to educate and inform users about
various aspects of cybersecurity, including threat identification, protection measures, and best
Government College University Faisalabad Page 8
practices. The website will serve as a centralized hub for cybersecurity knowledge, making it
accessible to a wide audience ranging from beginners to advanced users.
Benefits:
• Educate Users: Increase awareness and understanding of cybersecurity threats and best
practices.
• Provide Resources: Offer tools, guidelines, and links to additional resources for further
learning.
• Improve User Experience: Design an intuitive and engaging user interface to facilitate easy
access to information.
• Support Corporate Goals: Align with corporate strategies to enhance cybersecurity
awareness and promote best practices within the organization.
Relation to Corporate Goals: The development of this cybersecurity website aligns with broader
corporate goals by promoting cybersecurity awareness and education. By providing a centralized
resource for cybersecurity information, the website supports the organization's strategic objective of
enhancing digital security and protecting sensitive information. The project contributes to the
corporate mission of fostering a secure and informed digital environment.
2. Overall Description
The cybersecurity website project is a new, self-contained product developed as part of a final year
project for a student. It aims to provide comprehensive information and resources on cybersecurity,
focusing on threat identification, protection measures, and best practices. The following sections
describe the context, origin, and relationship of this product to other systems.
• New Development: This cybersecurity website is being developed from the ground up, with
no predecessors. It is tailored specifically for educational and informational purposes within
the cybersecurity domain.
• Academic Project: The project is conceived as an academic exercise to showcase the
student's proficiency in web development using HTML, CSS, and JavaScript, while addressing
the critical topic of cybersecurity.
Product Classification:
Government College University Faisalabad Page 9
• Standalone Product: The cybersecurity website is a standalone system and does not form
part of a larger product family. It is designed to operate independently, without dependencies
on other systems.
• No Replacement: This website is not intended to replace any existing platforms or tools.
Instead, it aims to create a unique and focused resource for cybersecurity education.
Diagram of Major Components: Below is a simple diagram illustrating the major components of the
cybersecurity website and their interconnections:
Functional Relationships:
• Home Page: Acts as the entry point, providing an overview and navigation to other sections.
• Threat Identification: Describes various cybersecurity threats, linking to detailed information
pages.
• Protection Measures: Offers guidelines and strategies for mitigating cybersecurity risks, with
links to tools and resources.
• Best Practices: Lists recommended practices for enhancing cybersecurity, with detailed
explanations.
• Resources Section: Provides external links and references for further reading and learning.
Government College University Faisalabad Page 10
The cybersecurity website is designed to serve as an educational platform, providing users with
essential information and tools related to cybersecurity. Below is a summary of the major features
that the website will offer:
1. Home Page
• Overview and Introduction: The home page will provide an introduction to the website, highlighting its
purpose and the importance of cybersecurity.
• Navigation Menu: A user-friendly navigation menu will allow users to easily access different sections
of the website.
2. Threat Identification
• Threat Categories: This section will categorize and describe various cybersecurity threats such as
malware, phishing, ransomware, and more.
• Detailed Descriptions: Users will be able to access detailed descriptions of each threat, including
examples and potential impact.
• Recent Threats: A subsection dedicated to the latest cybersecurity threats, providing up-to-date
information on emerging risks.
3. Protection Measures
• Preventive Strategies: This section will outline strategies to prevent cybersecurity breaches, including
password management, encryption, and firewalls.
• Tools and Software: Information on various cybersecurity tools and software that users can
implement to protect themselves from threats.
• Step-by-Step Guides: Detailed guides on how to implement different protection measures, tailored for
users with varying levels of expertise.
4. Best Practices
• Security Guidelines: A comprehensive list of best practices for maintaining cybersecurity, both at an
individual and organizational level.
• Regular Updates: Advice on keeping software and systems up to date to prevent vulnerabilities.
• Case Studies: Real-world examples of successful cybersecurity implementations and lessons learned.
5. Resources
• External Links: A curated list of external resources, such as articles, whitepapers, tutorials, and
cybersecurity organizations.
• Downloadable Materials: Users can download guides, checklists, and other educational materials.
• Glossary: A glossary of common cybersecurity terms and acronyms to help users understand
technical language.
Below is a simplified diagram illustrating the relationship between the major features of the
cybersecurity website:
• Pertinent Characteristics: This group values clear explanations, visual aids, and practical examples.
Content should be accessible and educational, focusing on building foundational knowledge.
2.3.2 IT Professionals
• Description: Individuals working in IT or related fields who require up-to-date information on
cybersecurity threats and protection measures.
• Frequency of Use: Frequent
• Subset of Product Functions Used: Detailed threat identification, protection measures, and
resources sections.
• Technical Expertise: High
• Security or Privilege Levels: May require higher access for advanced resources or tools.
• Educational Level: College degree in IT or a related field
• Experience: Experienced professionals with significant hands-on experience in cybersecurity.
• Pertinent Characteristics: This group demands in-depth, technical content and up-to-date
information. They may also require access to advanced tools and resources to implement protection
measures effectively.
2.3.3 Educators and Trainers
• Description: Teachers, professors, and trainers who incorporate cybersecurity topics into their
curriculum or training programs.
• Frequency of Use: Regular to Frequent
• Subset of Product Functions Used: Educational content, best practices, and resources for
instructional purposes.
• Technical Expertise: Medium to High
• Security or Privilege Levels: General access with potential for higher access for educational
resources.
• Educational Level: College degree or higher, often in education or IT-related fields
• Experience: Varied experience, but generally knowledgeable about cybersecurity basics.
• Pertinent Characteristics: This group requires structured and credible content that can be easily
integrated into teaching materials. They value downloadable resources, case studies, and clear
explanations of concepts.
2.3.4 Business Executives
• Description: Decision-makers in organizations who need to understand cybersecurity risks and
implement strategies to mitigate them.
• Frequency of Use: Occasional
• Subset of Product Functions Used: Overview sections, best practices, and protection measures with
a focus on strategic implementation.
• Technical Expertise: Low to Medium
• Security or Privilege Levels: May require access to strategic content and decision-making tools.
• Educational Level: College degree, often in business or management
• Experience: Experienced in management but may have limited technical cybersecurity knowledge.
Government College University Faisalabad Page 13
• Pertinent Characteristics: This group prioritizes high-level content that links cybersecurity to business
strategy. They value executive summaries, risk assessment tools, and case studies demonstrating ROI
on cybersecurity investments.
2.3.5 Students
• Description: High school or college students studying cybersecurity or related fields.
• Frequency of Use: Regular
• Subset of Product Functions Used: Educational content, best practices, and resources for
assignments or projects.
• Technical Expertise: Low to Medium
• Security or Privilege Levels: General access
• Educational Level: High school to college level
• Experience: Limited, primarily theoretical knowledge with some practical exposure through
coursework.
• Pertinent Characteristics: This group needs accessible, educational content that supports their
studies. Interactive elements like quizzes and simulations can enhance their learning experience.
2.3.6 General Public
• Description: Individuals with a general interest in cybersecurity, often concerned with personal online
safety.
• Frequency of Use: Occasional
• Subset of Product Functions Used: Home page, basic threat identification, and protection measures.
• Technical Expertise: Low
• Security or Privilege Levels: General access
• Educational Level: Varied, typically high school or lower
• Experience: Minimal technical experience; basic understanding of online safety.
• Pertinent Characteristics: This group requires simple, non-technical explanations and easy-to-follow
guidelines. Visual aids and step-by-step instructions are essential for ensuring comprehension.
This section describes the operating environment in which the cybersecurity website, built using
HTML, CSS, and JavaScript, will operate. It outlines the hardware, software, and relevant system
components necessary for the website's proper functioning.
• IDE/Editors:
o Visual Studio Code (latest version)
o Sublime Text (latest version)
o Atom (latest version)
• Version Control:
o Git (optional, for version tracking)
This section outlines the constraints that will affect the design and implementation of the
cybersecurity website. These constraints define the boundaries within which the development
process must occur, limiting the options available to the developers.
This section outlines the user documentation that will accompany the cybersecurity website. The
documentation will be designed to assist users in understanding and effectively using the website's
features.
2.6.3 Tutorials
This section identifies the assumptions made during the development of the cybersecurity website
and the dependencies that could impact the project if they change or prove incorrect.
2.7.1 Assumptions
• Stable Operating Environment: It is assumed that the users will access the website in a stable
operating environment with modern web browsers and up-to-date operating systems. This includes the
assumption that users have a reliable internet connection.
• Browser Compatibility: It is assumed that the website will be compatible with all major web browsers
that adhere to standard web technologies (HTML5, CSS3, JavaScript ES6+).
• User Technical Expertise: The primary users are assumed to have a basic understanding of
navigating websites, and minimal training will be required to use the website effectively.
• Security Protocols: It is assumed that the web hosting environment will have proper security
protocols (e.g., SSL/TLS) already in place to ensure secure communication between the client and
server.
2.7.2 Dependencies
• Third-Party Libraries and Frameworks: The project may depend on third-party JavaScript libraries
(e.g., jQuery, Bootstrap) to enhance functionality and design. Any updates or deprecations of these
libraries could impact the website's performance or compatibility.
Government College University Faisalabad Page 17
• Hosting Service: The availability and performance of the website are dependent on the selected web
hosting service. Any changes or disruptions to the hosting service could affect website accessibility.
• Compliance with Web Standards: The website's development is dependent on adherence to current
web standards. Any significant changes to these standards could require adjustments to the website's
codebase.
• Security Updates: The project depends on timely updates to address any security vulnerabilities in the
technologies used (HTML, CSS, JavaScript). Failure to apply these updates could expose the website
to security risks.
• User Devices and Browsers: The website's performance and appearance may vary based on the
user's device, browser, and screen resolution. It is assumed that users will not be using outdated or
unsupported browsers or devices.
3. System Features
This section details the functional requirements of the cybersecurity website by organizing them
according to key system features. Each feature includes a description, priority level, user interaction
sequences, and the associated functional requirements necessary to achieve the desired
functionality.
The Home Page is the primary entry point to the cybersecurity website. It introduces users to the
site's purpose and provides easy navigation to other sections. The priority of this feature is High due
to its critical role in user engagement and navigation.
• Benefit: 9
• Penalty: 8
• Cost: 5
• Risk: 4
The Threat Identification section categorizes and provides detailed information about various
cybersecurity threats. The priority is High because it is a core component of the educational purpose
of the website.
• Benefit: 9
• Penalty: 8
• Cost: 6
• Risk: 3
The Protection Measures section offers guidelines and tools for preventing cybersecurity threats.
This feature is of Medium priority, as it provides practical resources for users to implement security
measures.
• Benefit: 8
• Penalty: 7
• Cost: 5
• Risk: 4
The Best Practices section outlines recommended actions to maintain cybersecurity. This feature is
of Medium priority, focusing on reinforcing good habits and protocols.
• Benefit: 7
• Penalty: 6
• Cost: 4
• Risk: 3
3.5 Resources
3.5.1 Description and Priority
The Resources section offers external links, downloadable materials, and a glossary of terms. This
feature is of Low priority but adds value by expanding the scope of the site's educational content.
• Benefit: 5
• Penalty: 4
• Cost: 3
• Risk: 2
This section outlines the logical characteristics of the user interfaces for the cybersecurity website. It
includes descriptions of the interface elements, layout guidelines, and standards that will be followed
to ensure a consistent and user-friendly experience.
This section describes the logical and physical characteristics of the interfaces between the
cybersecurity website and the hardware components of the system. Since the website is built with
HTML, CSS, and JavaScript and does not involve backend systems or specialized hardware, this
section will focus on the interaction with standard user devices.
• Data Input:
o Interaction: Users will interact with the website through standard input devices such as
keyboards, mice, and touchscreens. Form inputs, search queries, and navigation actions will be
handled through standard HTML form elements and JavaScript event handlers.
o Data Handling: All user inputs will be processed on the client side. Data validation and user
feedback will be managed using JavaScript.
• Display Output:
o Interaction: The website will render content to the user’s screen using standard web
technologies (HTML, CSS). Display output will include text, images, videos, and interactive
elements.
o Rendering: CSS media queries and responsive design techniques will ensure that the website
displays correctly across various device sizes and orientations.
• Printers:
o Characteristics: Users may need to print content from the website.
o Interaction: The website will include standard print-friendly styles and functionality to ensure
that printed content is formatted correctly.
• Scanners:
o Characteristics: While not directly interfacing with the website, users might scan documents or
images for use with the website.
o Interaction: Users will need to upload scanned documents or images through standard file
input fields on the website.
This section describes the connections between the cybersecurity website and other software
components, considering that the project only involves HTML, CSS, and JavaScript without any
external libraries or frameworks.
• Input Data:
o Purpose: Includes user inputs from forms, search fields, and other interactive elements.
o Data Flow: Data is handled entirely on the client side. JavaScript processes user inputs to
provide feedback or update the interface without server-side communication.
• Output Data:
o Purpose: Includes content dynamically generated or updated based on user interactions.
o Data Flow: Content is rendered and updated in the browser using JavaScript to manipulate the
DOM directly.
• Form Handling:
o Purpose: Manages user input from forms, including validation and feedback.
o Data Flow: Handled with plain JavaScript. Validation and user feedback occur on the client
side without server-side interactions.
• Error Handling:
o Purpose: Manages and displays error messages related to user inputs or interactions.
o Data Flow: Errors are captured and displayed using JavaScript directly in the user interface.
• Client-Side Storage:
o Purpose: Stores user preferences or temporary data in the browser.
o Data Flow: Uses browser storage mechanisms such as localStorage or sessionStorage to
maintain state across page reloads or sessions.
• Global Variables:
o Purpose: Shares data or maintains state across different scripts or components within the
page.
o Data Flow: Variables are defined in the global scope and accessed by JavaScript functions to
ensure consistent data availability.
This section outlines the communication requirements for the cybersecurity website, given that it is
developed using only HTML, CSS, and JavaScript. This will focus on the web-based interactions and
protocols used in the absence of backend services.
• Form Data:
o Format: Data entered into forms will be collected and formatted in a manner that is consistent
with HTML form submission standards.
o Details: When submitting forms, data is formatted according to standard URL-encoded or
multipart form-data formats.
• Error Messages:
o Format: Errors and validation messages will be displayed directly on the web page using
JavaScript. They will be formatted in plain text or styled using CSS.
• HTTP/HTTPS Protocols:
o Standards: Conforms to standard HTTP/HTTPS communication protocols for data transfer and
secure transactions.
• Data Transfer Rates:
o Considerations: Since the website operates in a browser environment, performance should be
optimized for minimal data transfer rates and fast load times. Efficient use of JavaScript and
CSS will help maintain performance.
• Encryption and Security:
o Purpose: To ensure the security of data transmitted between the user’s browser and the
website.
o Standards: HTTPS should be used to encrypt data during transmission, protecting it from
interception and tampering.
• Synchronization Mechanisms:
o Considerations: For static websites without backend interaction, synchronization is not
applicable. However, JavaScript can be used to manage client-side state and interactions
dynamically.
Government College University Faisalabad Page 25
o Requirement: Animations and transitions should run at 60 frames per second (FPS) to appear
smooth and fluid.
o Rationale: Maintains high visual quality and user satisfaction by providing smooth visual
effects.
5.1.5 Error Handling and Feedback
• Error Display:
o Requirement: Error messages should be displayed within 200 milliseconds of an error
occurring.
o Rationale: Provides users with prompt feedback to correct issues without significant delay.
• Loading Indicators:
o Requirement: Loading indicators should appear immediately when an operation is in progress
and disappear once the operation completes.
o Rationale: Informs users that an action is being processed, improving overall user experience
and reducing uncertainty.
5.1.6 Data Handling
• Client-Side Storage Access:
o Requirement: Access and manipulation of client-side storage (e.g., localStorage or
sessionStorage) should occur without noticeable delay.
o Rationale: Ensures that data operations do not impact user interactions or performance.
• Data Handling:
o Requirement: Avoid storing sensitive user information directly in client-side storage. Use
secure tokens or identifiers for session management if needed.
o Rationale: Reduces the risk of exposing sensitive data through browser storage mechanisms.
5.3.2 User Authentication
• Authentication:
o Requirement: If user authentication is required, implement secure client-side mechanisms for
user login and session management, such as using secure tokens or cookies with the HttpOnly
and Secure flags.
o Rationale: Ensures that user authentication processes are handled securely and reduces the
risk of session hijacking.
• User Privacy:
o Requirement: Do not collect or store unnecessary personal data from users. Provide clear
information on data collection and usage practices in a privacy policy.
o Rationale: Protects user privacy and complies with data protection regulations by minimizing
the amount of personal data collected and stored.
5.3.3 External Policies and Regulations
• Compliance:
o Requirement: Adhere to relevant data protection regulations, such as the General Data
Protection Regulation (GDPR) or the California Consumer Privacy Act (CCPA), where
applicable.
o Rationale: Ensures that the website complies with legal requirements for data protection and
privacy, reducing the risk of legal issues.
• Security Standards:
o Requirement: Follow industry best practices for web security, including OWASP
recommendations for securing web applications.
o Rationale: Aligns with established security standards to safeguard against common web
vulnerabilities and threats.
5.3.4 Security and Privacy Certifications
• Certification:
o Requirement: If applicable, obtain relevant security or privacy certifications, such as ISO/IEC
27001 for information security management.
o Rationale: Demonstrates a commitment to security and privacy best practices and enhances
trust with users and stakeholders.
5.3.5 Incident Response
• Incident Handling:
o Requirement: Establish procedures for responding to security incidents, including detecting,
reporting, and mitigating breaches.
o Rationale: Ensures prompt and effective action in case of a security incident, minimizing
potential damage and maintaining user trust.
Government College University Faisalabad Page 28
7. Analysis model
7.7 ERD
Government College University Faisalabad Page 34
8. Tools & Technologies
Overview: For the cybersecurity website project, the primary programming languages used are
HTML, CSS, and JavaScript. Each of these languages plays a crucial role in the development of the
front-end of the website.
• Purpose:
o Structure: HTML provides the fundamental structure of the website. It defines the content and
layout of web pages using elements and tags.
o Content: It includes text, images, links, forms, and other content that users interact with.
• Key Features:
o Elements and Tags: Defines the building blocks of the web page (e.g., <header>, <nav>,
<section>, <footer>).
o Attributes: Provides additional information about elements (e.g., id, class, src, href).
o Semantic HTML: Uses elements that convey meaning (e.g., <article>, <aside>, <main>).
• Purpose:
o Styling: CSS is used to control the visual appearance of the HTML elements. It allows for
customization of colors, fonts, layouts, and overall design.
o Layout and Design: Manages layout techniques like flexbox and grid, positioning, and
responsive design.
• Key Features:
o Selectors: Targets specific HTML elements to apply styles (e.g., class selectors .classname, ID
selectors #idname).
o Properties and Values: Defines styles such as color, font-size, margin, padding, and border.
o Responsive Design: Uses media queries to adapt the layout to different screen sizes and
devices.
JavaScript
• Purpose:
o Interactivity: JavaScript adds interactivity and dynamic functionality to the website. It enables
user interactions, animations, and data manipulation.
o Client-Side Scripting: Runs in the user's browser to provide a responsive and interactive
experience.
• Key Features:
o DOM Manipulation: Allows for dynamic changes to the content and structure of the web page
(e.g., adding, removing, or updating elements).
o Event Handling: Responds to user actions such as clicks, form submissions, and keyboard
inputs.
o AJAX: Facilitates asynchronous data loading and interaction with server-side resources without
refreshing the page.
Integration:
Overview: The operating system used for developing and hosting the cybersecurity website will
influence the development environment, tools, and deployment process. Since the project is focused
on front-end development with HTML, CSS, and JavaScript, the operating system choice will impact
the development workflow, compatibility with development tools, and hosting options.
1. Windows
o Development:
▪ Supports a wide range of development tools and IDEs (e.g., Visual Studio Code,
Sublime Text, and Adobe Creative Suite).
▪ Compatible with local server environments (e.g., XAMPP, WAMP) for testing
web pages.
o Deployment:
▪ Websites can be hosted on IIS (Internet Information Services) or third-party
hosting services.
o Advantages:
▪ Broad support for various software and tools.
▪ User-friendly interface with extensive community and technical support.
2. macOS
o Development:
▪ Preferred by many developers for its Unix-based environment, which is
conducive to web development.
▪ Tools such as Visual Studio Code, Atom, and Sketch are popular.
▪ Local server environments like MAMP are available for testing.
o Deployment:
▪ Websites can be hosted on macOS servers or third-party hosting services.
o Advantages:
▪ Unix-based system provides a robust development environment.
▪ Good compatibility with modern web development tools.
3. Linux
o Development:
▪ Popular among developers for its open-source nature and powerful command-
line tools.
▪ Tools like Visual Studio Code, Atom, and GIMP are widely used.
▪ Local server environments (e.g., LAMP stack) are commonly used for
development and testing.
o Deployment:
▪ Ideal for hosting on various Linux-based web servers (e.g., Apache, Nginx).
o Advantages:
▪ High level of customization and control.
▪ Strong support for web technologies and server-side scripting.
• Development Environment:
o The choice of OS may depend on the developer’s familiarity and comfort level with the
operating system.
Government College University Faisalabad Page 36
o Each OS provides tools and environments suitable for front-end development with
HTML, CSS, and JavaScript.
• Testing and Deployment:
o The OS used for development should be compatible with the chosen hosting
environment for a smooth transition from local development to production.
• Recommendations:
o Windows: Ideal for developers who prefer a GUI-based environment with a broad
range of tools.
o macOS: Suitable for developers who prefer a Unix-based system with modern
development tools.
o Linux: Best for developers who want a high degree of control and customization,
particularly for server-side testing and deployment.
Appendix A: Glossary
This glossary defines key terms, acronyms, and abbreviations used in the Software Requirements
Specification (SRS) for the cybersecurity website project. It aims to ensure clarity and consistency in
the interpretation of the document.
Terms:
1. Cybersecurity:
o Definition: The practice of protecting systems, networks, and data from digital attacks,
unauthorized access, and damage.
2. HTML (HyperText Markup Language):
o Definition: A standard markup language used to create and structure content on the web. It
defines elements such as headings, paragraphs, links, and images.
3. CSS (Cascading Style Sheets):
o Definition: A style sheet language used to describe the presentation of a document written in
HTML or XML. It controls the layout, colors, fonts, and other visual aspects of web pages.
4. JavaScript:
o Definition: A high-level, interpreted programming language used to create interactive and
dynamic content on web pages. It allows for manipulation of HTML and CSS, handling events,
and performing asynchronous operations.
5. Front-End Development:
o Definition: The part of web development focused on the user interface and user experience of
a website. It involves the use of HTML, CSS, and JavaScript to build the visual and interactive
aspects of a website.
6. User Interface (UI):
o Definition: The visual part of a website or application that users interact with. It includes
elements such as buttons, forms, and navigation menus.
7. User Experience (UX):
o Definition: The overall experience and satisfaction a user has when interacting with a website
or application. It encompasses usability, accessibility, and the design of the user interface.
8. Responsive Design:
o Definition: An approach to web design that ensures a website's layout and content adapt to
different screen sizes and devices, providing an optimal viewing experience.
9. DOM (Document Object Model):
o Definition: A programming interface for web documents that represents the structure of a
document as a tree of objects. JavaScript can interact with and manipulate the DOM to change
the content and structure of a web page.
10. Web Application:
Government College University Faisalabad Page 37
o Definition: A software application that runs on a web server and can be accessed through a
web browser. It typically involves client-side (front-end) and server-side (back-end)
components.
11. Security Threat:
o Definition: An occurrence or potential occurrence that could exploit vulnerabilities to
compromise the integrity, confidentiality, or availability of information or systems.
12. Protection Measure:
o Definition: Strategies and tools implemented to mitigate security risks and protect systems and
data from potential threats.
13. Best Practices:
o Definition: Recommended guidelines and methods that are widely accepted as effective in
improving security, performance, and overall quality.
14. Resources Section:
o Definition: A section of the website that provides additional tools, references, and links related
to cybersecurity for further learning and exploration.
V. Interface Requirements ✅
VII. WBS ✅
Name: _ _. Name: _ _.
Designation: _ . Designation: _ .
Comments:_ Comments:_
_ _
_ _
_ _
_ _
Signature: _ Signature: _
---------------------------------------------------------------------
Government College University Faisalabad Page 39
Date:
□ Rejected
Remarks:
Project Coordinator