COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...
isms presesntation.pptx
1.
2. Zohaib Hassan 18-Arid-2736
Kashif Siddique 18-Arid-2631
Shoaib Ashraf 18-Arid-2680
PMAS-Arid Agriculture University- Rawalpindi
University Institute of Information Technology
Supervisor : Zeeshan Javed
Information Security
Management System
3. Contents
• Introduction
• Existing System
• Problem Statement
• Problem Solution
• Project Scope
• Project Objective
• Diagrams - Use case, Class, Sequence, Component, Activity, Deployment
• Tools and Technologies
• Task Distribution
• Screenshots
• Future Project Schedule
University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
4. Introduction
• Provide the facility to secure the data of faculty and all data of organization.
• Can suggest a solution for solving the problems in a better way.
• It improves data confidentiality, integrity, and accessibility.
• It lessens the severity of risk and control of highly sensitive assets and data.
• You need only PC to run the application.
University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
5. Existing System
• There exists some existing system related to our project are as follows:
The existing system is present in MS excel sheet there is requirement of
automated system
AIML is a community which uses isms framework for information security purpose
apply all steps of isms framework and done some work on risk management by risk
identification and risk management but system did not fully meet the stander of other
industries.
University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
6. Problem Statement
There is a risk of data security . Every organizations face security problems in recent
years , such as unauthorized access there is a chance of some attacks which may have a
serious impact on the organization. There is requirement of system that can manage risk
related problem the type of risk and describe how much a risk is harmful for assets. There
is no existing system that can identify threats and assign policies regarding that problems
automaticaly.
University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
7. Proposed Solution
• The proposed system is a framework of policies and controls that manage security and
risks systematically. These security controls can follow common security standards or be
more focused on your industry
• It focused on risk assessment and risk management
• Prevents loss, abuse and unauthorized modification of information.
• Ensures information is only accessible to authorized persons
• Assign assets to owner so that they can manage easily
University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
8. Project Scope
• Scope of the Project is three-fold
1. Window form application that Provide data confidentiality, data integrity and data
availability to organization.
2. Implement and operate the ISMS policy, controls, processes and
procedures automatically.
3. Can be implemented by any organization
University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
9. Project Objectives
• It improves information security and allows us to quickly secure all types of data.
Automated completion and auditing
• Create policies and put them in place in the organisation.
• Most occurring problems are properly pointed out and solutions are to be made.
• Our application calculate risk ,threats and vulnerabilities regarding to the asset of
organization
University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
10. Diagrams -Use Case Diagram
University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
13. Diagrams –
University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
Diagrams –Sequence Diagram
14. Tasks Distribution
University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
Group Members Responsibilities
Zohaib Hassan •Creating Database, Defining Tables in Database
•Designing Interfaces- Designing and Coding for Login ,
Admin and Risk Threats
•Connection Establishment
•Documentation
Shoaib Ashraf •Creating Database, Defining Tables in Database
•Designing Interfaces- Designing and Coding for Register Assets ,
Assets View and Risk Assesment
•Connection Establishment
•Documentation
Kashif Siddique •Creating Database, Defining Tables in Database
•Designing Interfaces- Designing and Coding for Policies
•Connection Establishment
•Documentation
20. Future Project Schedule
University Institute of Information Technology, PMAS-Arid Agriculture University- Rawalpindi
Tasks Schedule
Design & Coding of Project 10th February To 30th March 2022
Creating Reports 1st April to 20th April 2022
Testing of Project Module
wise & Finishing the Code
21st April To 30th April 2022
Integrating Project 1st May 2022 To 20th May 2022
Testing of Project 21st May To Finsih Date