Muday Web
Muday Web
COLLEGE
By
GROUP
(ET/03/02/00404)
This is to certify that this project has been read and approved as meeting the requirements of the Department of
Computer Science and muday college, Ethiopia, amhara, injibara for the Award of Bachelor of Science degree in
Computer Science.
(Supervisor) Date
This work is dedicated to my late grandfather Mr._______________, for his last words of encouragement to me, may
your beloved soul never cease to rest in perfect peace.
ACKNOWLEDGEMENT
Persian poet Sadie instructed “Have patience, all things are difficult before they become easy”; All glory and honor to
the only wise God, our shalom, our sabots, our provider, our everything for the strength and grace he bestowed on we.
Never will we fail to express my profound appreciation to our project supervisor Mr. Edward Philemon for his
valuable and constructive contribution during the entire process of my undergraduate degree and completion of my
project. His willingness to give his time has been of a great motivation to our, also we would like to express my
gratitude to ___________.the Head, Computer Science Department, and the efforts of our unflagging lecturers in
computer science are highly appreciated. The success of everything is measure by the nature of its output, our family
has been the fuel behind my engine, even when no one believed in our I still remember the sweet warm voice of Mr.
and Mrs. Kalkidan T. thanks for parenting our in this 21st century in love with the fear of the lord, our glad our
achievement as given you a reason to smile and to our lovely siblings tigst fantu, fetlewrki gebeyehu, and fantu kinde
thanks for your support and prayers.
ABSTRACT
The reliability and success of any organization such as academic institution rely on its ability to provide secure,
accurate and timely data about its operations, i.e. managing staff and students’ information Est. While managing
student information in academic institution was done through paper-based information system, where academic
records are documented in several files that are kept in shelves. Several problems are associated with paper-based
information system. Managing information through the manual approach require physical exertion to retrieve, alter,
and re-file the paper records. All this are no value added services results in data inconsistency and redundancy.
Currently several institutions have migrated to the automated web-based student information management system
without considering the security architecture of the web portal.
This project seeks to ameliorates and secure how information is being managed in muday college, Ethiopia, amhara,
injibara through the development of a secured web-based student information management system, which has a
friendly user interface that provides an easy and secure way to manage academic information such as students’
information, staff information, course registration, course materials and results. This project was developed using
Laravel 5.5 PHP Framework to provide a robust secure web-based student information system that is not vulnerable to
2020 OWASP TOP 10 web vulnerabilities.
Table of Contents
IV. Acknowledgements
V. Table of contents
VIII. Abstract
IX. Abbreviations
1. Introduction
2.3 Major functions/activities in the existing system like inputs, processes &outputs
2.6 Bottlenecks of the existing system (using for example PIECES frame Work).
2.6.4 Efficiency
Performance
User Interface
Security and Access permissions
Backup and Recovery
3.1 Introduction
4.1 Introduction
5.1 Introduction
5.5 Training
6.1 Conclusions
6.2 Recommendations
Appendix
References
LIST OF FIGURES
LIST OF TABLE
CHAPTER ONE
1. Introduction
This chapter discuss the critical study of the existing system stating how information have been kept overtime,
juxtaposed with the flaws in the system and provide a solution through the development of a web-based online
information system for muday college.
1.1. Background of the organization (Muday collage)
Related literature will be review in the domain of web application and information security.
Develop a Web Application using the Full-Stack Web Development paradigm which is sub-divided into
Front-end: The Front-end Framework utilized include Laravel Blade Template Engine, HTML 5, Bootstrap
Framework v4.0.0-alpha.6 built on Cascading Style Sheet (CSS), Vue-Js Framework built on JavaScript and
npm package manager for installation of other Front-end libraries.
Back-end: The Back-End Framework utilized includes Laravel 5.5 Framework built on PHP v7.1.7.
Database: - Database back ends that support using raw SQL, the fluent query builder, and the Eloquent ORM
(Object Relational Mapping) approach. Currently, Laravel supports four databases.
o MYSQL
o SQLITE
o PostgreSQL
o SQL Server
MySQL Database was selected for the database management of this system. The Software Development
Methodology adopted in this project is the Object oriented analysis and design (OOAD) OOAD approach
modules a system as a group of interacting objects.
This methodology involves two stages; Object Oriented Analysis, and Object Oriented Design. Unified Modeling
language (UML) notation is the design tool used for modeling in this project. The UML used in this project includes:
Use case diagram, Activity diagram and Class Diagram.
Definition of terms
Information Security (InfoSec):- This is a set of strategies for managing the processes, tools
and policies necessary to prevent, detect, document and counter threats to digital and non-
digital information. (Security, 2016).
Paper-based Information System: - This is used to describe a system that keeps information
on paper rather than on a computer (Cambridge, 2019).
Larval:- This a free, open-source PHP web framework, created by Taylor Orwell and
intended for the development of web applications following the model-view-controller
(MVC) architectural pattern based on Symphony. (Orwell, 2019).
CHATER TWO
Part one:
Description of the Existing System and Requirement Gathering
Introduction of Existing System
Players in the existing system
Major functions/activities in the existing system like inputs, processes &outputs
Business rules
Report generated in the existing system
Bottlenecks of the existing system (using for example PIECES frame Work).
Performance (Response time)
Input (Inaccurate/redundant/flexible) and Output (Inaccurate)
Security and Controls
Efficiency
Proposed solution for the new system
Requirements of the Proposed System
Functional requirements
Performance requirements
Process requirements
Input related requirements
Output related requirements
Storage related requirements
Nonfunctional requirements
Performance
User Interface
Security and Access permissions
Backup and Recovery
Modeling the existing systems
Essential Use Case Modeling
Essential User Interface Prototyping
Essential User Interface Prototyping flow diagrams
Domain modeling with class responsibility collaborator (CRC)
Part two:
LITERATURE REVIEW
2. Introduction
This chapter discusses the history and state of the art of the web, web applications and web
application vulnerabilities, also relevant literatures were review under the domain of information
system security and web application security.
2.1. Web Based
According to (Berners-Lee, 2004), the World-Wide Web is a tangle of information that, through
the implementation of hyperlinks, allows a browser to navigate usually quite randomly from one
website to another. The meaning, context and applicability of the content of each Web page
needs to be interpreted by the human reader. Report from (Murdock, 2018) shows the current
version of the web is Web 2.0, Tim Berners-Lee, director of World Wide Consortium and
inventor of the World Wide Web in 1989. His notion of the “read-write” web is often used to
describe Web 2.0 which as the ability to contribute content and interact with other web users.
Advancement in technology will someday lead us to Web 3.0 or Semantic Web. Berners-Lee’s
goal is for the web to have agents, computer programs that have been written to collect web
content from sources and communicate with other programs, in order to deliver the requested
information to the user (Tim, Handler, & Lassalle, 2001).
2.1.1. Web Based Application
A Web application is a computer program that uses web browsers and web technology to
perform a variety of operations over the internet. Web application use a combination of server-
side scripts (PHP, Python and ASP) to handle the storage and retrieval of the information, and
client-side scripts (JavaScript and HTML) to present information to users. This allows users to
interact with the company using online forms, content management systems, shopping carts and
more. In addition, the applications allow employees to create documents, share information,
collaborate on projects and work on common documents regardless of communication (Hazel,
2018). Figure 2.1 depicts how a client accesses the web.
Figure 2.1: Web application diagram
CHAPTER THREE
DESIGN OF STUDENT INFORMATION MANAGEMENT SYSTEM
3. Introduction
This chapter critically examines the project methodology which entails all the stages of Software
Development Life Cycle (SDLC). Also the interaction between the different component is been
depicted in several Unified Modeling Language (UML) tools such as the class diagram, activity
diagram.
3.1. System Design
Methodology can be defined as consisting of phases which will guide systems developers in their
choice of techniques at each stage of a project, to help in the planning, management, control and
evaluation of the system or project. With respect to information systems, it is a collection of
procedures, techniques, tools and documentation aid which will help the systems developers in
their efforts to implement a new information system. Meanwhile, due to the nature of this
project, the specific methodology used is this project is the Object- Oriented analysis and design
(OOAD).
3.2. Architectural Design
The Software Development Methodology adopted in this project is the Object-oriented analysis
and design (OOAD) OOAD approach modules a system as a group of interacting object. This
methodology involves two stages; Object Oriented Analysis and Object Oriented Design. Object
Modeling is somewhat similar to the traditional approach of system designing, in that it also
follows sequential process of system designing but with different approach. The basic steps of
system designing using Object Modeling may involve:
i. System Analysis.
ii. System Design.
iii. Object Design.
iv. Implementation.
Unified Modeling language (UML) notation is the design tool used for Object modeling in this
project. The UML used in this project includes: use case diagrams, class diagrams, sequence diagrams,
state transition diagrams, and activity diagrams.