SlideShare a Scribd company logo
1 of 21
Zohaib Hassan 18-Arid-2736
Kashif Siddique 18-Arid-2631
Shoaib Ashraf 18-Arid-2680
PMAS-Arid Agriculture University- Rawalpindi
University Institute of Information Technology
Supervisor : Zeeshan Javed
Information Security
Management System
Contents
• Introduction
• Existing System
• Problem Statement
• Problem Solution
• Project Scope
• Project Objective
• Diagrams - Use case, Class, Sequence, Component, Activity, Deployment
• Tools and Technologies
• Task Distribution
• Screenshots
• Future Project Schedule
University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
Introduction
• Provide the facility to secure the data of faculty and all data of organization.
• Can suggest a solution for solving the problems in a better way.
• It improves data confidentiality, integrity, and accessibility.
• It lessens the severity of risk and control of highly sensitive assets and data.
• You need only PC to run the application.
University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
Existing System
• There exists some existing system related to our project are as follows:
 The existing system is present in MS excel sheet there is requirement of
automated system
 AIML is a community which uses isms framework for information security purpose
apply all steps of isms framework and done some work on risk management by risk
identification and risk management but system did not fully meet the stander of other
industries.
University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
Problem Statement
There is a risk of data security . Every organizations face security problems in recent
years , such as unauthorized access there is a chance of some attacks which may have a
serious impact on the organization. There is requirement of system that can manage risk
related problem the type of risk and describe how much a risk is harmful for assets. There
is no existing system that can identify threats and assign policies regarding that problems
automaticaly.
University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
Proposed Solution
• The proposed system is a framework of policies and controls that manage security and
risks systematically. These security controls can follow common security standards or be
more focused on your industry
• It focused on risk assessment and risk management
• Prevents loss, abuse and unauthorized modification of information.
• Ensures information is only accessible to authorized persons
• Assign assets to owner so that they can manage easily
University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
Project Scope
• Scope of the Project is three-fold
1. Window form application that Provide data confidentiality, data integrity and data
availability to organization.
2. Implement and operate the ISMS policy, controls, processes and
procedures automatically.
3. Can be implemented by any organization
University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
Project Objectives
• It improves information security and allows us to quickly secure all types of data.
Automated completion and auditing
• Create policies and put them in place in the organisation.
• Most occurring problems are properly pointed out and solutions are to be made.
• Our application calculate risk ,threats and vulnerabilities regarding to the asset of
organization
University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
Diagrams -Use Case Diagram
University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
Diagrams –Class Diagram
University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
Diagrams –Sequence Diagram
University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
Diagrams –
University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
Diagrams –Sequence Diagram
Tasks Distribution
University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
Group Members Responsibilities
Zohaib Hassan •Creating Database, Defining Tables in Database
•Designing Interfaces- Designing and Coding for Login ,
Admin and Risk Threats
•Connection Establishment
•Documentation
Shoaib Ashraf •Creating Database, Defining Tables in Database
•Designing Interfaces- Designing and Coding for Register Assets ,
Assets View and Risk Assesment
•Connection Establishment
•Documentation
Kashif Siddique •Creating Database, Defining Tables in Database
•Designing Interfaces- Designing and Coding for Policies
•Connection Establishment
•Documentation
Tools & Technologies
University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
Screen Shots
University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
Screen Shots
University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
Screen Shots
University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
Screen Shots
University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
Future Project Schedule
University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
Tasks Schedule
Design & Coding of Project 10th February To 30th March 2022
Creating Reports 1st April to 20th April 2022
Testing of Project Module
wise & Finishing the Code
21st April To 30th April 2022
Integrating Project 1st May 2022 To 20th May 2022
Testing of Project 21st May To Finsih Date
isms presesntation.pptx

More Related Content

Similar to isms presesntation.pptx

Integration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS EnergyIntegration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS EnergyTheAnfieldGroup
 
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS EnergyIntegration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS Energystacybre
 
Privacy Engineering in the Wild
Privacy Engineering in the WildPrivacy Engineering in the Wild
Privacy Engineering in the WildCREST
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchMcKonly & Asbury, LLP
 
Too much data and not enough analytics!
Too much data and not enough analytics!Too much data and not enough analytics!
Too much data and not enough analytics!Emma Kelly
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
 
Web-based Decision Support System
Web-based Decision Support SystemWeb-based Decision Support System
Web-based Decision Support SystemJasour Obeidat
 
Application of mis in textile industry
Application of mis in textile industryApplication of mis in textile industry
Application of mis in textile industryMajharul Islam
 
Sap Security Assessment V3 English
Sap Security Assessment V3 EnglishSap Security Assessment V3 English
Sap Security Assessment V3 Englishguest5bd7a1
 
Welingkar First Year Project- ProjectWeLike
Welingkar First Year Project- ProjectWeLikeWelingkar First Year Project- ProjectWeLike
Welingkar First Year Project- ProjectWeLikePrinceTrivedi4
 
Jisc learning analytics mar2017
Jisc learning analytics mar2017Jisc learning analytics mar2017
Jisc learning analytics mar2017Paul Bailey
 
Healthcare CIO 9th Class Site Visit (March 11, 2019)
Healthcare CIO 9th Class Site Visit (March 11, 2019)Healthcare CIO 9th Class Site Visit (March 11, 2019)
Healthcare CIO 9th Class Site Visit (March 11, 2019)Nawanan Theera-Ampornpunt
 
Faculty of Medicine, Prince of Songkla University Site Visit at Ramathibodi H...
Faculty of Medicine, Prince of Songkla University Site Visit at Ramathibodi H...Faculty of Medicine, Prince of Songkla University Site Visit at Ramathibodi H...
Faculty of Medicine, Prince of Songkla University Site Visit at Ramathibodi H...Nawanan Theera-Ampornpunt
 
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...Why Your Organization Should Leverage Data Science for Risk Intelligence and ...
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...Resolver Inc.
 
City of hope research informatics common data elements
City of hope research informatics common data elementsCity of hope research informatics common data elements
City of hope research informatics common data elementsAbdul-Malik Shakir
 

Similar to isms presesntation.pptx (20)

Sadchap01
Sadchap01Sadchap01
Sadchap01
 
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS EnergyIntegration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
 
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS EnergyIntegration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
 
Privacy Engineering in the Wild
Privacy Engineering in the WildPrivacy Engineering in the Wild
Privacy Engineering in the Wild
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
 
Too much data and not enough analytics!
Too much data and not enough analytics!Too much data and not enough analytics!
Too much data and not enough analytics!
 
RISE's Training Catalog
RISE's Training CatalogRISE's Training Catalog
RISE's Training Catalog
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
Web-based Decision Support System
Web-based Decision Support SystemWeb-based Decision Support System
Web-based Decision Support System
 
Application of mis in textile industry
Application of mis in textile industryApplication of mis in textile industry
Application of mis in textile industry
 
Sap Security Assessment V3 English
Sap Security Assessment V3 EnglishSap Security Assessment V3 English
Sap Security Assessment V3 English
 
Welingkar First Year Project- ProjectWeLike
Welingkar First Year Project- ProjectWeLikeWelingkar First Year Project- ProjectWeLike
Welingkar First Year Project- ProjectWeLike
 
Jisc learning analytics mar2017
Jisc learning analytics mar2017Jisc learning analytics mar2017
Jisc learning analytics mar2017
 
Cybersecurity for Small Business
Cybersecurity for Small BusinessCybersecurity for Small Business
Cybersecurity for Small Business
 
new cv
new cvnew cv
new cv
 
Shruti ppt
Shruti pptShruti ppt
Shruti ppt
 
Healthcare CIO 9th Class Site Visit (March 11, 2019)
Healthcare CIO 9th Class Site Visit (March 11, 2019)Healthcare CIO 9th Class Site Visit (March 11, 2019)
Healthcare CIO 9th Class Site Visit (March 11, 2019)
 
Faculty of Medicine, Prince of Songkla University Site Visit at Ramathibodi H...
Faculty of Medicine, Prince of Songkla University Site Visit at Ramathibodi H...Faculty of Medicine, Prince of Songkla University Site Visit at Ramathibodi H...
Faculty of Medicine, Prince of Songkla University Site Visit at Ramathibodi H...
 
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...Why Your Organization Should Leverage Data Science for Risk Intelligence and ...
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...
 
City of hope research informatics common data elements
City of hope research informatics common data elementsCity of hope research informatics common data elements
City of hope research informatics common data elements
 

Recently uploaded

CERVED e Neo4j su una nuvola, migrazione ed evoluzione di un grafo mission cr...
CERVED e Neo4j su una nuvola, migrazione ed evoluzione di un grafo mission cr...CERVED e Neo4j su una nuvola, migrazione ed evoluzione di un grafo mission cr...
CERVED e Neo4j su una nuvola, migrazione ed evoluzione di un grafo mission cr...Neo4j
 
Test Automation Design Patterns_ A Comprehensive Guide.pdf
Test Automation Design Patterns_ A Comprehensive Guide.pdfTest Automation Design Patterns_ A Comprehensive Guide.pdf
Test Automation Design Patterns_ A Comprehensive Guide.pdfkalichargn70th171
 
Auto Affiliate AI Earns First Commission in 3 Hours..pdf
Auto Affiliate  AI Earns First Commission in 3 Hours..pdfAuto Affiliate  AI Earns First Commission in 3 Hours..pdf
Auto Affiliate AI Earns First Commission in 3 Hours..pdfSelfMade bd
 
Anypoint Code Builder - Munich MuleSoft Meetup - 16th May 2024
Anypoint Code Builder - Munich MuleSoft Meetup - 16th May 2024Anypoint Code Builder - Munich MuleSoft Meetup - 16th May 2024
Anypoint Code Builder - Munich MuleSoft Meetup - 16th May 2024MulesoftMunichMeetup
 
GraphSummit Milan - Neo4j: The Art of the Possible with Graph
GraphSummit Milan - Neo4j: The Art of the Possible with GraphGraphSummit Milan - Neo4j: The Art of the Possible with Graph
GraphSummit Milan - Neo4j: The Art of the Possible with GraphNeo4j
 
Jax, FL Admin Community Group 05.14.2024 Combined Deck
Jax, FL Admin Community Group 05.14.2024 Combined DeckJax, FL Admin Community Group 05.14.2024 Combined Deck
Jax, FL Admin Community Group 05.14.2024 Combined DeckMarc Lester
 
Your Ultimate Web Studio for Streaming Anywhere | Evmux
Your Ultimate Web Studio for Streaming Anywhere | EvmuxYour Ultimate Web Studio for Streaming Anywhere | Evmux
Your Ultimate Web Studio for Streaming Anywhere | Evmuxevmux96
 
Microsoft365_Dev_Security_2024_05_16.pdf
Microsoft365_Dev_Security_2024_05_16.pdfMicrosoft365_Dev_Security_2024_05_16.pdf
Microsoft365_Dev_Security_2024_05_16.pdfMarkus Moeller
 
Prompt Engineering - an Art, a Science, or your next Job Title?
Prompt Engineering - an Art, a Science, or your next Job Title?Prompt Engineering - an Art, a Science, or your next Job Title?
Prompt Engineering - an Art, a Science, or your next Job Title?Maxim Salnikov
 
Transformer Neural Network Use Cases with Links
Transformer Neural Network Use Cases with LinksTransformer Neural Network Use Cases with Links
Transformer Neural Network Use Cases with LinksJinanKordab
 
Community is Just as Important as Code by Andrea Goulet
Community is Just as Important as Code by Andrea GouletCommunity is Just as Important as Code by Andrea Goulet
Community is Just as Important as Code by Andrea GouletAndrea Goulet
 
Workshop: Enabling GenAI Breakthroughs with Knowledge Graphs - GraphSummit Milan
Workshop: Enabling GenAI Breakthroughs with Knowledge Graphs - GraphSummit MilanWorkshop: Enabling GenAI Breakthroughs with Knowledge Graphs - GraphSummit Milan
Workshop: Enabling GenAI Breakthroughs with Knowledge Graphs - GraphSummit MilanNeo4j
 
Effective Strategies for Wix's Scaling challenges - GeeCon
Effective Strategies for Wix's Scaling challenges - GeeConEffective Strategies for Wix's Scaling challenges - GeeCon
Effective Strategies for Wix's Scaling challenges - GeeConNatan Silnitsky
 
architecting-ai-in-the-enterprise-apis-and-applications.pdf
architecting-ai-in-the-enterprise-apis-and-applications.pdfarchitecting-ai-in-the-enterprise-apis-and-applications.pdf
architecting-ai-in-the-enterprise-apis-and-applications.pdfWSO2
 
Rapidoform for Modern Form Building and Insights
Rapidoform for Modern Form Building and InsightsRapidoform for Modern Form Building and Insights
Rapidoform for Modern Form Building and Insightsrapidoform
 
The mythical technical debt. (Brooke, please, forgive me)
The mythical technical debt. (Brooke, please, forgive me)The mythical technical debt. (Brooke, please, forgive me)
The mythical technical debt. (Brooke, please, forgive me)Roberto Bettazzoni
 
Incident handling is a clearly defined set of procedures to manage and respon...
Incident handling is a clearly defined set of procedures to manage and respon...Incident handling is a clearly defined set of procedures to manage and respon...
Incident handling is a clearly defined set of procedures to manage and respon...Varun Mithran
 
COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...
COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...
COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...naitiksharma1124
 

Recently uploaded (20)

CERVED e Neo4j su una nuvola, migrazione ed evoluzione di un grafo mission cr...
CERVED e Neo4j su una nuvola, migrazione ed evoluzione di un grafo mission cr...CERVED e Neo4j su una nuvola, migrazione ed evoluzione di un grafo mission cr...
CERVED e Neo4j su una nuvola, migrazione ed evoluzione di un grafo mission cr...
 
Test Automation Design Patterns_ A Comprehensive Guide.pdf
Test Automation Design Patterns_ A Comprehensive Guide.pdfTest Automation Design Patterns_ A Comprehensive Guide.pdf
Test Automation Design Patterns_ A Comprehensive Guide.pdf
 
Abortion Clinic In Springs ](+27832195400*)[ 🏥 Safe Abortion Pills in Springs...
Abortion Clinic In Springs ](+27832195400*)[ 🏥 Safe Abortion Pills in Springs...Abortion Clinic In Springs ](+27832195400*)[ 🏥 Safe Abortion Pills in Springs...
Abortion Clinic In Springs ](+27832195400*)[ 🏥 Safe Abortion Pills in Springs...
 
Auto Affiliate AI Earns First Commission in 3 Hours..pdf
Auto Affiliate  AI Earns First Commission in 3 Hours..pdfAuto Affiliate  AI Earns First Commission in 3 Hours..pdf
Auto Affiliate AI Earns First Commission in 3 Hours..pdf
 
Anypoint Code Builder - Munich MuleSoft Meetup - 16th May 2024
Anypoint Code Builder - Munich MuleSoft Meetup - 16th May 2024Anypoint Code Builder - Munich MuleSoft Meetup - 16th May 2024
Anypoint Code Builder - Munich MuleSoft Meetup - 16th May 2024
 
GraphSummit Milan - Neo4j: The Art of the Possible with Graph
GraphSummit Milan - Neo4j: The Art of the Possible with GraphGraphSummit Milan - Neo4j: The Art of the Possible with Graph
GraphSummit Milan - Neo4j: The Art of the Possible with Graph
 
Jax, FL Admin Community Group 05.14.2024 Combined Deck
Jax, FL Admin Community Group 05.14.2024 Combined DeckJax, FL Admin Community Group 05.14.2024 Combined Deck
Jax, FL Admin Community Group 05.14.2024 Combined Deck
 
Your Ultimate Web Studio for Streaming Anywhere | Evmux
Your Ultimate Web Studio for Streaming Anywhere | EvmuxYour Ultimate Web Studio for Streaming Anywhere | Evmux
Your Ultimate Web Studio for Streaming Anywhere | Evmux
 
Microsoft365_Dev_Security_2024_05_16.pdf
Microsoft365_Dev_Security_2024_05_16.pdfMicrosoft365_Dev_Security_2024_05_16.pdf
Microsoft365_Dev_Security_2024_05_16.pdf
 
Prompt Engineering - an Art, a Science, or your next Job Title?
Prompt Engineering - an Art, a Science, or your next Job Title?Prompt Engineering - an Art, a Science, or your next Job Title?
Prompt Engineering - an Art, a Science, or your next Job Title?
 
Abortion Clinic In Johannesburg ](+27832195400*)[ 🏥 Safe Abortion Pills in Jo...
Abortion Clinic In Johannesburg ](+27832195400*)[ 🏥 Safe Abortion Pills in Jo...Abortion Clinic In Johannesburg ](+27832195400*)[ 🏥 Safe Abortion Pills in Jo...
Abortion Clinic In Johannesburg ](+27832195400*)[ 🏥 Safe Abortion Pills in Jo...
 
Transformer Neural Network Use Cases with Links
Transformer Neural Network Use Cases with LinksTransformer Neural Network Use Cases with Links
Transformer Neural Network Use Cases with Links
 
Community is Just as Important as Code by Andrea Goulet
Community is Just as Important as Code by Andrea GouletCommunity is Just as Important as Code by Andrea Goulet
Community is Just as Important as Code by Andrea Goulet
 
Workshop: Enabling GenAI Breakthroughs with Knowledge Graphs - GraphSummit Milan
Workshop: Enabling GenAI Breakthroughs with Knowledge Graphs - GraphSummit MilanWorkshop: Enabling GenAI Breakthroughs with Knowledge Graphs - GraphSummit Milan
Workshop: Enabling GenAI Breakthroughs with Knowledge Graphs - GraphSummit Milan
 
Effective Strategies for Wix's Scaling challenges - GeeCon
Effective Strategies for Wix's Scaling challenges - GeeConEffective Strategies for Wix's Scaling challenges - GeeCon
Effective Strategies for Wix's Scaling challenges - GeeCon
 
architecting-ai-in-the-enterprise-apis-and-applications.pdf
architecting-ai-in-the-enterprise-apis-and-applications.pdfarchitecting-ai-in-the-enterprise-apis-and-applications.pdf
architecting-ai-in-the-enterprise-apis-and-applications.pdf
 
Rapidoform for Modern Form Building and Insights
Rapidoform for Modern Form Building and InsightsRapidoform for Modern Form Building and Insights
Rapidoform for Modern Form Building and Insights
 
The mythical technical debt. (Brooke, please, forgive me)
The mythical technical debt. (Brooke, please, forgive me)The mythical technical debt. (Brooke, please, forgive me)
The mythical technical debt. (Brooke, please, forgive me)
 
Incident handling is a clearly defined set of procedures to manage and respon...
Incident handling is a clearly defined set of procedures to manage and respon...Incident handling is a clearly defined set of procedures to manage and respon...
Incident handling is a clearly defined set of procedures to manage and respon...
 
COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...
COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...
COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...
 

isms presesntation.pptx

  • 1.
  • 2. Zohaib Hassan 18-Arid-2736 Kashif Siddique 18-Arid-2631 Shoaib Ashraf 18-Arid-2680 PMAS-Arid Agriculture University- Rawalpindi University Institute of Information Technology Supervisor : Zeeshan Javed Information Security Management System
  • 3. Contents • Introduction • Existing System • Problem Statement • Problem Solution • Project Scope • Project Objective • Diagrams - Use case, Class, Sequence, Component, Activity, Deployment • Tools and Technologies • Task Distribution • Screenshots • Future Project Schedule University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
  • 4. Introduction • Provide the facility to secure the data of faculty and all data of organization. • Can suggest a solution for solving the problems in a better way. • It improves data confidentiality, integrity, and accessibility. • It lessens the severity of risk and control of highly sensitive assets and data. • You need only PC to run the application. University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
  • 5. Existing System • There exists some existing system related to our project are as follows:  The existing system is present in MS excel sheet there is requirement of automated system  AIML is a community which uses isms framework for information security purpose apply all steps of isms framework and done some work on risk management by risk identification and risk management but system did not fully meet the stander of other industries. University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
  • 6. Problem Statement There is a risk of data security . Every organizations face security problems in recent years , such as unauthorized access there is a chance of some attacks which may have a serious impact on the organization. There is requirement of system that can manage risk related problem the type of risk and describe how much a risk is harmful for assets. There is no existing system that can identify threats and assign policies regarding that problems automaticaly. University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
  • 7. Proposed Solution • The proposed system is a framework of policies and controls that manage security and risks systematically. These security controls can follow common security standards or be more focused on your industry • It focused on risk assessment and risk management • Prevents loss, abuse and unauthorized modification of information. • Ensures information is only accessible to authorized persons • Assign assets to owner so that they can manage easily University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
  • 8. Project Scope • Scope of the Project is three-fold 1. Window form application that Provide data confidentiality, data integrity and data availability to organization. 2. Implement and operate the ISMS policy, controls, processes and procedures automatically. 3. Can be implemented by any organization University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
  • 9. Project Objectives • It improves information security and allows us to quickly secure all types of data. Automated completion and auditing • Create policies and put them in place in the organisation. • Most occurring problems are properly pointed out and solutions are to be made. • Our application calculate risk ,threats and vulnerabilities regarding to the asset of organization University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
  • 10. Diagrams -Use Case Diagram University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
  • 11. Diagrams –Class Diagram University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
  • 12. Diagrams –Sequence Diagram University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
  • 13. Diagrams – University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi Diagrams –Sequence Diagram
  • 14. Tasks Distribution University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi Group Members Responsibilities Zohaib Hassan •Creating Database, Defining Tables in Database •Designing Interfaces- Designing and Coding for Login , Admin and Risk Threats •Connection Establishment •Documentation Shoaib Ashraf •Creating Database, Defining Tables in Database •Designing Interfaces- Designing and Coding for Register Assets , Assets View and Risk Assesment •Connection Establishment •Documentation Kashif Siddique •Creating Database, Defining Tables in Database •Designing Interfaces- Designing and Coding for Policies •Connection Establishment •Documentation
  • 15. Tools & Technologies University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
  • 16. Screen Shots University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
  • 17. Screen Shots University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
  • 18. Screen Shots University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
  • 19. Screen Shots University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
  • 20. Future Project Schedule University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi Tasks Schedule Design & Coding of Project 10th February To 30th March 2022 Creating Reports 1st April to 20th April 2022 Testing of Project Module wise & Finishing the Code 21st April To 30th April 2022 Integrating Project 1st May 2022 To 20th May 2022 Testing of Project 21st May To Finsih Date