Anda di halaman 1dari 16

Online Exam Management System

Use Case and Misuse Case Diagrams


Mounika Challagundla, Graduate Student Dr. Natarajan Meghanathan, Associate Professor Department of Computer Science Jackson State University, Jackson, MS 39217, USA

use case description


Registration: The register with system use case
describes how a user will use the system to register.

Log on: The use case describes how a user log on into
the system.

Start test: The use case describes how a user will take
a test.

Submit test: The use case describes how a user


submits his test.

View results: The use case describes how a user can


get test result.

Identification of actors
System administrator: System administrator is a person who is
responsible for user account maintenance. System administrator generally audits on accounts to generate reports.

Test administrator: Test administrator is a person who is


responsible for test administering and making changes to availability, questions and other attributes of the system.

Test taker: Test taker is any person registered with the online
exam system for taking tests.

Database: External resource used by the system for user


identification and profile manipulation operation.

Billing system: The billing system is an automated program which


generates, handles and keep track of test purchases by all users of the system.

use case diagram:


Registration

Registration
Log on Test administrator

Start test

Student Submit test

View results Database

Student identification

Misuse case description


Misuser hacks the login details and logins as legitimate user. This can be mitigated by using cryptographic methods. Misuser shows the student identification details and then can enter as a legitimate user. This can be mitigated by using specific verification process. The misuser tries to keep the login session as long as possible. So that the misuser can have more time. This can be mitigated by specific timer algorithms.

Registration:

Student name

Jnumber

Student

Present degree

Administrator

Course details

Login:

Login

Student

Password

Exam Administrator

Login:
Exam admin
Th rea te

Username

ns

<<includes>>

Student password
<<extends>>

at Mitig

es

Hacks user name


Th re at en s

Applies cryptographic methods

Mitigates

Hacks password

Misuser

Misuser activities
Misuser can hack the user name easily so that he can access the information. To eradicate this a password can be used. But a password also can be hacked. Thus some cryptographic methods can be used to provide maximum protection.

Student identification:

Valid verification

Student

Invalid verification

Test Administrator

Student identification:
Threatens

Valid identification

Test administrator Shows false identification

Student Invalid identification

> s> Verification process de lu nc s <i ten < ea hr T

Mit

ig a t es

inc << e lud s> >

Misuser

Misuse case description


The misuser enters into the system by using the false identification. To mitigate this a verification process must be adopted. This verification process can be performed by test administrator.

Logout:
Logout after the test period

Test admin Student Logout before the test period

Logout:
Threatens Logout after the test period
e lud inc << > s>
Mitigates

Intends to extend the logout time Test admin

Timer algorithm

Student

Logout before the test period

Misuser

Misuse case description


Misuser intends to extend the logout time to get more time for the exam. A perfect timer algorithm must be adopted in order to provide perfect time period.

use case Vs Misuse case diagram:


Registration
s Threaten
<<inclu des>>
iti ga tes M

Hacks login details

Log in

Apply cryptographic methods


<< inc

Threatens
lud e s> >
M it s ate ig

Student identification

Test administr ator Shows false identification

Student

Start test

Verification process

Submit test Threatens Logout


<< inc lud es >>

Database Tries for the longer sessions

tes ga iti

Use timer

Anda mungkin juga menyukai