Top-Rated Free Essay
Preview

Manuscript for Alibata Browser

Good Essays
7416 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Manuscript for Alibata Browser
ALIBATA WEB BROWSER
ALIBATA WEB BROWSER
A case study submitted to
College of Computer Studies
In partial fulfilment of the requirements
For Software Engineering Course
A case study submitted to
College of Computer Studies
In partial fulfilment of the requirements
For Software Engineering Course

Table of Contents
Title Page1
Table of Contents2
Abstract3
Project Title4
Introduction4
Project Team5
Project Objectives5
Project Conception5
Scope of the Project5 – 7
Project Constraints7
Timeline7
Figure 1.0 – Gantt Chart7
Glossary of Terms8 – 11
Software Engineering Paradigm12
Figure 2.0 – Re-Use Based Development Model12
Activity Diagram (Existing System)13
Figure 3.0 – Existing System13
Fishbone (ISHIKAWA) Diagram14
Figure 4.0 – Problem of Existing System14
Cause and Effect Matrix Table15
Figure 4.1 – Existing System and Solution 15
Stakeholders 16
Use Case Diagram (Proposed System)16
Figure 5.0 – Proposed System16
Use Case Narrative17
Figure 5.1 – 5.5 – Use Case as per Module17 - 21
Use Case Summary22
Figure 5.6 – Summary of Use Cases described22
Non-Functional Requirements22 - 23
Implementation Plan23
Maintenance Plan23

“This is a case study in search for a solution dealing with cybercrime populating the web. Cybersex, hacking, scamming, identity theft, violation of human privacy, fraud, breaking national security, spamming, viruses, malware, adware, spyware and many others, all these happening 24/7 on the web, while at the office, at work, at the school, at the internet cafe or even at home. They are terrifying consumers and on other side being exploited by companies or individuals craving for easy money taking advantage of fast internet browsing.

By careful study, in this manuscript the innovators will know the different facet of web browsing whether online gaming or social networking, security must be implemented with double effort. Activity Diagram and Fishbone Diagram best explain the worst scenario. Using many analytical tools to assure accuracy and reliability so that the solutions found will be updated to the current situation of everyday web browsing. Bringing a Case Diagram will show much of the effort being put here to elaborate the enhanced features being developed for secured web browsing.
Timeline, Implementation and Maintenance Plan are also included to ensure that effort and resources are not being wasted but utilized very well. Part of the maintenance plan is making our Web Browser open source to further the development of our very own Filipino Web Browser.”
“This is a case study in search for a solution dealing with cybercrime populating the web. Cybersex, hacking, scamming, identity theft, violation of human privacy, fraud, breaking national security, spamming, viruses, malware, adware, spyware and many others, all these happening 24/7 on the web, while at the office, at work, at the school, at the internet cafe or even at home. They are terrifying consumers and on other side being exploited by companies or individuals craving for easy money taking advantage of fast internet browsing.

By careful study, in this manuscript the innovators will know the different facet of web browsing whether online gaming or social networking, security must be implemented with double effort. Activity Diagram and Fishbone Diagram best explain the worst scenario. Using many analytical tools to assure accuracy and reliability so that the solutions found will be updated to the current situation of everyday web browsing. Bringing a Case Diagram will show much of the effort being put here to elaborate the enhanced features being developed for secured web browsing.
Timeline, Implementation and Maintenance Plan are also included to ensure that effort and resources are not being wasted but utilized very well. Part of the maintenance plan is making our Web Browser open source to further the development of our very own Filipino Web Browser.”

Project Title: “Alibata” Web Browser

Introduction

Web browsers have come a long way from the days of the first Internet Web browsers, Mosaic and the like. Web browsers today have progressed from being a more internet – exploring tool to being a multi-purposed, multi prolonged application that brings several advantages to the web visitor. The prominent browsers available for personal computers include Microsoft Internet Explorer, Mozilla Firefox, Google Chrome and so on. Today’s Web browsers are easy to download because it is readily available to the market and comes for free. Web browsers allows users to search for specific topics, download files, watch movies online, listen music online, online streaming, chatting, file sharing, send and receive email, playing games, and just about something you could imagine. Through web browsers you can make or access any kind of cybercrime to open malicious files. In web browsers you can easily get viruses, malware, spyware, that can harm your personal computers. The reason for developing the “Alibata” web browser is to lessen such cases and to block malicious content. And also to prevent your personal computers to viruses, malware, spyware, that the user’s can get through internet.

Project Objectives: To develop a safety and more secured web browser.

1. To introduce a web browser with a firewall concept in it. 2. To protect user’s personal information. 3. To promote user-friendliness to web user’s. 4. To build an open-source software with economy and quality. 5. To encourage Filipinos that we can build a better software.

Project Conception:
Learning from experience using different web browsers in connection to millions of cyber-crime happening on the NET, the team decided to build a kind of web browser that is more secured than other web browsers today. The team agreed to build a web browser with the concept of firewall in it, battling against the old yet still annoying viruses.

Scope of the Project:

This study has its specific coverage as to what the system can perform. The following states the scope of this study.

* Web browsing- using a navigation tool running on a personal computer, users can move among the web servers within the internet, selecting information, viewing images or moving pictures and downloading applications. Also example of web browsing is reading documents on the internet.

* Internet security- is a computer security specifically related to the internet. Its objective is to establish rules and measures to use against attack over the internet. The internet represents an unsecure channel for exchanging information leading to a high risk of intrusion or fraud, such as phishing. Different methods have been used to protect the transfer of data including encryption. * Encryption tools- can be used to protect data, such as files on computers and storage device. Encrypting data in transit also helps to secure it as it is often difficult to physically secure all access to networks. * Intranet- private network that uses internet protocol technology to securely share any part of an organizations information or network operation system. It may host multiple private websites and constitute an important component and focal point of internal communication and collaboration. Intranets can help users to locate and view information faster and use applications relevant to their roles and responsibilities. * Bookmark- is a locally stored Uniform Resource Identifier (URI). All modern web browsers include bookmark features. Bookmarks are called favourites or internet shortcuts. * Pop–up Blocker- is a program that prevent pop ups from displaying in a users Web browser. Pop-up blockers work in no. Of ways: some close the window before it appears, some disable command that call the pop-up, and some after the windows source HTML. One problem with pop-up blockers has been that they cannot always differentiate between an unwanted pop-up window and one that is user requested. Programs that can consistently do are sometimes referred to as intelligent pop-up blocker.

* Add-ons- in web browsers, add on are programs that are integrated into your browser application, usually providing additional functionality.

* Search engine- is design to search for information in World Wide Web and FTP servers. The information may consist of web pages, images, information and other types of files.

Project Constraints:

* Multi-language support- this browser doesn’t have the capability to translate and display different dialects. * Login System- as some browsers provide, we did not incorporate login system with the idea that it may weaken the security. * Infected System- basically the security of this browser does not extend to the main desktop system for it is not an anti-virus application.

Timeline:
“Alibata” Web Browser Gantt-Chart
Development and Integration
Development and Integration
System Design w/ Reuse
System Design w/ Reuse
Component Analysis
Component Analysis
Requirement Specification
Requirement Specification
Requirement Definition
Requirement Definition

Figure 1.0

Glossary of Terms

Authentication – the method used to verify the identity of a user, program or computer on the web.

ASP(Active Server Pages) – a technology allowing the insertion of server executable scripts in web pages.

Banner Ad – a advertisement placed on a web page, which acts a hyperlink to an advertiser’s web site.

BBS(Bulletin Board System) – a web based public system for sharing discussions, files, and announcements.

Bookmark – a link to a particular web site, stored (bookmarked) by a web user for future use and easy access.

Browse – term to describe a user’s movement across the web, moving from page to page via hyperlinks, using a web browser.

Cache – A web browser or web server feature which stores copies of web pages on a computer hard disk.

Chat – An online text-based communication between internet users.

CGI(Common Gateway Interfaces) – a set of rules that describes how CGI program communicates with a web server.

CGI Program – A small program that handles input and output from a web server.

Client/Server – The communication and separation of workload between a web client and a web server.

Compressions – A method of reducing the size (compress) of web documents or graphics for faster delivery via the web.

Cookie – information from a web browser, stored on your computer by your web browser. The purpose of a cookie is to provide information about your visit to the web site for use by the server during a later visit.

Domain name – The name that identifies a web site.

Download - to transfer or copy data from one computer to another, or to a disk or peripheral device, or be transferred or copied in this way

E-mail (Electronic Mail) – messages from one person to another via the internet.

E-mail Address – the address used for sending e-mails to a person or an organization.

E-mail Server – a web server dedicated to the task of serving e-mail.

Encryption – to convert data from its original form to a form that can only be read by someone that can reverse the encryption. The purpose of encryption is to prevent unauthorized reading of the data.

Firewall – a software that acts as a security filter that can restrict types of network communication.

Frame – a part of the browser screen displaying a particular content frames are often used to display content from different web pages.

Helper Application – a program helping the browser to display, view, or work with files that the browser cannot handle itself.

Hits – the number of times a web object (page or picture) has been viewed or downloaded.

Home page – the default page displayed when you visit a web site.

Internet - a network that links computer networks all over the world by satellite and telephone, connecting users with service networks such as e-mail and the World Wide Web

Java – mostly for programming web servers and web applets.

Online - attached to or available through a central computer or computer network.

Page hits – the number of times a web page has been visited by a user.

Search Engine – computer program used to search and catalog (index) the millions of pages of available information on the web.

SPAM – the action of sending multiple unwelcome messages to a newsgroup or mailing list.

Spoofing – Addressing a web page or an e-mail with a false referrer. Like a sending an e-mail from a false address.

Spyware – a computer software hidden in a computer with the purpose of collecting information about the use of the computer.

Stream - broadcast video, audio, etc. material via the Internet or a computer network in real time

Tag – notification or commands written into a web document.

Trojan Horse – computer program hidden in another computer program with the purpose of destroying software or collecting information about the use of the computer.

Upload – to transfer a file from a local computer to a remote computer. To transfer a file from a web client to a web browser.

URL (Uniform Resource Locator) – the standard way to address web documents (pages) on the internet.

USENET – a world wide news system accessible over the internet.

Visit – commonly used to describe the activity for one visitor of a website.

Visitor – commonly used to describe a person visiting (viewing) a website.

Web Applet – a program that can be downloaded over the web and run on the user’s computer.

Web Browser - a program used for displaying and viewing pages on the World Wide Web
Web Client – a software program used to access web pages.

Web Host – a web server that “host” services like providing web site space to companies or individuals.

Web Hosting – the action of providing web host services.

Web Page – a document (normally an HTML file) designed to be distributed over the web.

Web Server – a server that delivers web content to web browsers.

Web Server Error – a message from a web server indicating an error. The most common web server error is “404 File not found” error.

Web Services – software components and applications running on web servers. The server provides these services to the other computers, browser or individuals, using standard communication protocols.

Web Site – a collection of related web pages belonging to a company or an individual.

Web spider – a computer program that searches the internet for web pages.

Worm – a computer virus that can make copies of itself and spread to other computers over the internet.

WWW (World Wide Web) – a global network of computers using the internet to exchange web documents.

Software Engineering Paradigm:

Re-Use Based Development (Component-based)

Component Analysis – given the requirements specification a search is made for components to implement that specification.

Requirement Definition – analyze the requirement and the components discovered, modified to reflect the available components.

System Design w/ Reuse – the framework of the system is designed or an existing framework is reused.

Development and Integration – components are integrated to create new system. System integration, in this model, may be part of the development process rather than separate activity.
Component Analysis – given the requirements specification a search is made for components to implement that specification.

Requirement Definition – analyze the requirement and the components discovered, modified to reflect the available components.

System Design w/ Reuse – the framework of the system is designed or an existing framework is reused.

Development and Integration – components are integrated to create new system. System integration, in this model, may be part of the development process rather than separate activity.

Figure 2.0

Most of user’s work will be on the web. And many components are already available for reuse. Open source projects are widely available for code review and for further enhancement. The fact that most web browsers are doing good but can still be improved laid down the framework for future browsers. So the team will use the advantages of open source code for faster and stable development. The team will not waste the hard work of our forerunners in Object Oriented Programming. For such limited time for a thesis, the team will depend on components already built for faster development. And the team can focus on improving the security components of a web browser. So the team choose Reuse based Development Model to ensure that system will not missed the stable and best features of other web browsers nowadays and add on it the best security features then someday will also be available for reuse on future web browsers.

ACTIVITY DIAGRAM (TOP-LEVEL) Existing

Client
Web Browser
Internet
Mal-Server
Server
Request Page
Call Page
Process Page
Process Malicious Content
[alteration/
interception]
Display
Page
View
Page
[mis-clicking]
Send Info to Mal-Server
Send Info to Server
[Another Request]
Process Malware
[no alteration]
[no mis-clicking]
Client
Web Browser
Internet
Mal-Server
Server
Request Page
Call Page
Process Page
Process Malicious Content
[alteration/
interception]
Display
Page
View
Page
[mis-clicking]
Send Info to Mal-Server
Send Info to Server
[Another Request]
Process Malware
[no alteration]
[no mis-clicking]

Figure 3.0

This is the everyday scenario of existing web browser system. The client will request a page by opening the web browser and typing on address bar the url address of a website. The good news, nowadays web browsers are really that fast in displaying such content of web site. The bad news is, Internet, like a highway welcomes different person and open to all business and even monkey business. So even before the request reach the server, malicious content is on the loose penetrating packets for great deal of money. The innocent client not knowing what awaits him/her is a malicious content displayed with the other content in the same page from hard working server waiting to be clicked and trigger the espionage. Then infection and worming starts, spreading behind your toolbars, widgets and applications destroying system registry, unauthorized access, consuming lots of memory and cpu power.

ISHIKAWA (Fishbone) DIAGRAM

Unsecured
Web Browser
Plug-Ins
Web Content
Download Management
Session Management
Pornographic
Scam
Fraud
Malicious Content
Session Crashing
No Download Manager

No Active Guard
No MD5 Checksum Verification
Lack of Content Filter
No Safekeeping of Cookies
Malicious Plug-Ins
User-Dependent Security
Session Leaked
Faulty Plug-ins
Cookies Not Filtered

Unsecured
Web Browser
Plug-Ins
Web Content
Download Management
Session Management
Pornographic
Scam
Fraud
Malicious Content
Session Crashing
No Download Manager

No Active Guard
No MD5 Checksum Verification
Lack of Content Filter
No Safekeeping of Cookies
Malicious Plug-Ins
User-Dependent Security
Session Leaked
Faulty Plug-ins
Cookies Not Filtered

Figure 4.0

There are four factors that affect much of the security of web browser:

1. Web Content - lack of knowledge of the client means prone to malicious content penetration. Pornographic site that promotes sex but working behind to penetrate your system to gather more videos or files of interest for black market. Web sites offering strange business or easy money but working illegal and just want to access your personal info, specially pin number or PayPal accounts. 2. Session Management – the worst thing to happen in a session is when the browser crashes leaving a trace of your info and even cookie-coated malware save your system hardware info then destroy it. 3. Plug-ins – extensions not functioning well means a clutter in the memory usage and an unreliable functions for your secured browsing. 4. Download Management – lots of malware are only gaining access when it is deployed along with downloaded files. Especially those web sites offering free download turns a novice web user into a victim of fraud installer or files.

Cause and Effect Matrix

CAUSE-AND-EFFECT ANALYSIS | SYSTEM IMPROVEMENT OBJECTIVES | Problem | Cause and Effects | System Objective | System Constraint | 1. Unsecured Web Browser | 1. Web page has frame with malicious content, fraud advertisement, ads that promote cybersex, scam mail that might run spyware and adware to get information without your consent also even a malware, virus and bugged software that can harm your system registry, slow down processing and corrupt files. 2. Session and Cookie management has bad handling that might lead to information leaked, cookies not filtered where malware can use to penetrate and when session crash the save session with important information might be laid bare to abusive individuals. 3. Download of files are not filtered or check very well, no active guard for internet purposes that the client might download a file which is corrupt or infected by virus that soon will harm the system client. 4. Though have plug-ins for security but not reliable in securing browsing experience, such faulty plug-ins, lack of content filter and malicious plug-ins might use space but not dependable in securing the system and making the system prone to attack. | 1. Filter contents displayed in each frame of a web page. 2. Get rid of pop-ups containing advertisement. 3. Secure cookies and sessions from uninvited guest. 4. Verify MD5 checksum of every file to be downloaded and no download option for malicious content. 5. Build plug-ins more reliable and fits the security of the browser. 6. Temporarily block pornographic web site for minor users. | 1. System language and keyboard layout must be US English or English. 2. Must have at least Windows XP or Mac OS/X or Linux kernel 2.6.30 operating system. 3. Must have an Internet connection, at least Dial-Up with 56Kbps. 4. Must have an Anti-Virus with Active Guard installed in the system. |

CAUSE-AND-EFFECT ANALYSIS | SYSTEM IMPROVEMENT OBJECTIVES | Problem | Cause and Effects | System Objective | System Constraint | 2. Unsecured Web Browser | 5. Web page has frame with malicious content, fraud advertisement, ads that promote cybersex, scam mail that might run spyware and adware to get information without your consent also even a malware, virus and bugged software that can harm your system registry, slow down processing and corrupt files. 6. Session and Cookie management has bad handling that might lead to information leaked, cookies not filtered where malware can use to penetrate and when session crash the save session with important information might be laid bare to abusive individuals. 7. Download of files are not filtered or check very well, no active guard for internet purposes that the client might download a file which is corrupt or infected by virus that soon will harm the system client. 8. Though have plug-ins for security but not reliable in securing browsing experience, such faulty plug-ins, lack of content filter and malicious plug-ins might use space but not dependable in securing the system and making the system prone to attack. | 7. Filter contents displayed in each frame of a web page. 8. Get rid of pop-ups containing advertisement. 9. Secure cookies and sessions from uninvited guest. 10. Verify MD5 checksum of every file to be downloaded and no download option for malicious content. 11. Build plug-ins more reliable and fits the security of the browser. 12. Temporarily block pornographic web site for minor users. | 5. System language and keyboard layout must be US English or English. 6. Must have at least Windows XP or Mac OS/X or Linux kernel 2.6.30 operating system. 7. Must have an Internet connection, at least Dial-Up with 56Kbps. 8. Must have an Anti-Virus with Active Guard installed in the system. |

Figure 4.1

Stakeholders:
Web Users – an individual with basic knowledge of computing that search and surf the Internet for educational, business, entertainment, social, religious and other purposes. The Web User can be a student, any of the family members, professionals, government entity, clergy and laymen.
Programmers / Developers – future researchers that will also use the other components the team used, such as code sniffets and framework used.

Use Case Diagram

Manage Web Content
Manage Web Content
Install Adds-on
Install Adds-on
Restore Session
Restore Session
Download File
Download File
Request Web Page
Request Web Page
Web User
Web User

Alibata Web Browser System
Alibata Web Browser System

Figure 5.0

Use Case Narrative

Use Case Name: | Request Web Page | Actor(s): | Web User | Description | This use case describes the process of a web user requesting for web page to display. | References: | MSS-1.0 | Typical Course of Events: | Actor: 1. This use case is initiated when a web user request a web page to be displayed. 2. The Web User typed URL address of a web site.9. This use case concludes when the web user view successfully the web page w/ an advisory page displayed on non-certified content’s frame. | System: 3. The web page frames sent by the web server are checked for any non-certified content 4. The non-certified content is verified for any record of harming pc. 5. Non-certified content function that is harmful is automatically blocked. 6. Non-certified content function that is not harmful has an option for display by context menu with the web user consent. 7. Redirect the frame of the non-certified content to advisory page to advise the web user of the non-certified content. 8. Automatically block pop ups appearing on web page. | Alternate Courses: | 2. If the web page requested is actually a pornographic web page from cybersex web site blocked the whole web page. | Pre-condition: | Web page can only be requested with Internet connection. | Post-condition: | Successfully displayed web page URL Address is recorded on history and session. | Assumptions: | None at this moment. |

Use Case Name: | Request Web Page | Actor(s): | Web User | Description | This use case describes the process of a web user requesting for web page to display. | References: | MSS-1.0 | Typical Course of Events: | Actor: 9. This use case is initiated when a web user request a web page to be displayed. 10. The Web User typed URL address of a web site.9. This use case concludes when the web user view successfully the web page w/ an advisory page displayed on non-certified content’s frame. | System: 11. The web page frames sent by the web server are checked for any non-certified content 12. The non-certified content is verified for any record of harming pc. 13. Non-certified content function that is harmful is automatically blocked. 14. Non-certified content function that is not harmful has an option for display by context menu with the web user consent. 15. Redirect the frame of the non-certified content to advisory page to advise the web user of the non-certified content. 16. Automatically block pop ups appearing on web page. | Alternate Courses: | 2. If the web page requested is actually a pornographic web page from cybersex web site blocked the whole web page. | Pre-condition: | Web page can only be requested with Internet connection. | Post-condition: | Successfully displayed web page URL Address is recorded on history and session. | Assumptions: | None at this moment. |

Figure 5.1

Use Case Name: | Download File | Actor(s): | Web User | Description | This use case describes the process of a web user downloading a file from a link. | References: | MSS-2.0 | Typical Course of Events: | Actor: 1. This use case is initiated when a web user download a file from a link on the web page.7. The actor selects an action, is it to open or to save file?9. This use case concludes when the web user successfully downloaded a file and the location of file is shown. | System: 2. The Web User clicked the download link or download button passing request for a file to web server. 3. The file requested is checked for vulnerability. 4. The file requested undergone MD5 Checksum verification. 5. The file that’s not passed the verification automatically cancelled the download process. 6. A dialog box is open up to prompt web user for action, either to open or to save file to specific director | Alternate Courses: | 1. 2. 3. 4. 5. 6. 7. 8. Progress bar is loading till 100% completion of downloading.If the file requested is taking too long the web user can pause the downloading from the download manager pressing pause button and can be continued when web browser runs again by pressing play button. | Pre-condition: | The file can only be downloaded with Internet connection.The file can only be downloaded with enough free disk space. | Post-condition: | Successfully downloaded file URL address is recorded on the history and session. | Assumptions: | None at this moment. |

Use Case Name: | Download File | Actor(s): | Web User | Description | This use case describes the process of a web user downloading a file from a link. | References: | MSS-2.0 | Typical Course of Events: | Actor: 7. This use case is initiated when a web user download a file from a link on the web page.7. The actor selects an action, is it to open or to save file?9. This use case concludes when the web user successfully downloaded a file and the location of file is shown. | System: 8. The Web User clicked the download link or download button passing request for a file to web server. 9. The file requested is checked for vulnerability. 10. The file requested undergone MD5 Checksum verification. 11. The file that’s not passed the verification automatically cancelled the download process. 12. A dialog box is open up to prompt web user for action, either to open or to save file to specific director | Alternate Courses: | 9. 10. 11. 12. 13. 14. 15. 16. Progress bar is loading till 100% completion of downloading.If the file requested is taking too long the web user can pause the downloading from the download manager pressing pause button and can be continued when web browser runs again by pressing play button. | Pre-condition: | The file can only be downloaded with Internet connection.The file can only be downloaded with enough free disk space. | Post-condition: | Successfully downloaded file URL address is recorded on the history and session. | Assumptions: | None at this moment. |

Figure 5.2

Use Case Name: | Restore Session | Actor(s): | Web User | Description | This use case describes the process of a web user resuming from previous session | References: | MSS-3.0 | Typical Course of Events: | Actor: 1. This use case is initiated when a web user choose to restore last session.3. This use case prompted the web user to input password for previous session.7. This use case concludes when the web user saw the message box of confirmation of correct password and clicked the OK button then session restored. | System: 2. The web user will be asked for password to access the previous session. 4. The input password is checked against the saved password for the session access. 5. Incorrect input of password directed the web user to home page. 6. Correct input of password allowed access to previous session. | Alternate Courses: | 2. If the web browser lost Internet connection the web user is prompted for save password.3. If the web browser crashed the web user is also prompted for save password. | Pre-condition: | Restoring session can only be requested with Internet connection.Restoring session can only be accessed with correct password. | Post-condition: | Successfully restored session automatically clears the saved session. | Assumptions: | None at this moment. |

Use Case Name: | Restore Session | Actor(s): | Web User | Description | This use case describes the process of a web user resuming from previous session | References: | MSS-3.0 | Typical Course of Events: | Actor: 3. This use case is initiated when a web user choose to restore last session.3. This use case prompted the web user to input password for previous session.7. This use case concludes when the web user saw the message box of confirmation of correct password and clicked the OK button then session restored. | System: 4. The web user will be asked for password to access the previous session. 7. The input password is checked against the saved password for the session access. 8. Incorrect input of password directed the web user to home page. 9. Correct input of password allowed access to previous session. | Alternate Courses: | 2. If the web browser lost Internet connection the web user is prompted for save password.3. If the web browser crashed the web user is also prompted for save password. | Pre-condition: | Restoring session can only be requested with Internet connection.Restoring session can only be accessed with correct password. | Post-condition: | Successfully restored session automatically clears the saved session. | Assumptions: | None at this moment. |

Figure 5.3

Use Case Name: | Install Adds-On | Actor(s): | Web User | Description | This use case describes the process of a web user installing other plug-ins and adds-on. | References: | MSS-4.0 | Typical Course of Events: | Actor: 1. This use case is initiated when a web user choose to install an adds-on or plug-ins.3. The web user selects the name of the plug-ins or adds-on.5. The web user confirms installation of plug-ins or adds-on.9. The web user entered correctly the save password for Session.11. This use case concludes when the web user selected plug-ins or adds-on is installed. | System: 2. Plug-ins window opened for the web user displaying all the available plug-ins and adds-on.4. As the web user select from the list, the item is highlighted and a tooltip show the description or use of it.6. The web browser starts downloading the said plug-ins or adds-on to Plug-ins folder of the web browser.7. The web user is advised to save password for session then the web browser restart to complete installation.8. The web user is prompted by Session Dialog for password to restore session.10. The web user previous session is restored. | Alternate Courses: | 12. If the web user chooses to uninstall the plug-ins or adds-on, the web user can clicked the Plug-ins button on Main toolbar and select from the list of Plug-ins window then uncheck the checkbox of the plug-ins or adds-on to be uninstall. The web browser restarts to complete the process. | Pre-condition: | Plug-ins or adds-on can only be installed when requirements for plug-ins or adds on is met. | Post-condition: | Successfully installed plug-ins or adds-on displayed with a checkbox checked right beside the plug-ins or adds-on name. | Assumptions: | None at this moment. |

Use Case Name: | Install Adds-On | Actor(s): | Web User | Description | This use case describes the process of a web user installing other plug-ins and adds-on. | References: | MSS-4.0 | Typical Course of Events: | Actor: 3. This use case is initiated when a web user choose to install an adds-on or plug-ins.3. The web user selects the name of the plug-ins or adds-on.5. The web user confirms installation of plug-ins or adds-on.9. The web user entered correctly the save password for Session.11. This use case concludes when the web user selected plug-ins or adds-on is installed. | System: 4. Plug-ins window opened for the web user displaying all the available plug-ins and adds-on.4. As the web user select from the list, the item is highlighted and a tooltip show the description or use of it.6. The web browser starts downloading the said plug-ins or adds-on to Plug-ins folder of the web browser.7. The web user is advised to save password for session then the web browser restart to complete installation.8. The web user is prompted by Session Dialog for password to restore session.10. The web user previous session is restored. | Alternate Courses: | 12. If the web user chooses to uninstall the plug-ins or adds-on, the web user can clicked the Plug-ins button on Main toolbar and select from the list of Plug-ins window then uncheck the checkbox of the plug-ins or adds-on to be uninstall. The web browser restarts to complete the process. | Pre-condition: | Plug-ins or adds-on can only be installed when requirements for plug-ins or adds on is met. | Post-condition: | Successfully installed plug-ins or adds-on displayed with a checkbox checked right beside the plug-ins or adds-on name. | Assumptions: | None at this moment. |

Figure 5.4

Use Case Name: | Manage Web Content | Actor(s): | Web User | Description | This use case describes the process of a web user managing the content of the web page. | References: | MSS-5.0 | Typical Course of Events: | Actor: 1. This use case is initiated when a web user selects an action.10. This use case concludes when the web user manage the content with the desired action. | System: 1. 2. The System performs the selected action. | Alternate Courses: | 3. If the web page has a non-certified content that content cannot be access or manage. 4. If the web user choose to save current web page, the system shows up the Save dialog box. 5. If the web user choose to save images from a web page, the system shows up the Save Image As dialog box. 6. If the web user chooses to print the current / selected content of a web page, the system shows up the Print dialog box. 7. If the web user chooses to view source code of a web page, the system shows up the HTML Code Viewer. 8. If the web user exits the browser, the system shows up the Save Last Session dialog box. 9. If the web user chooses to add the current web page to Bookmark, the system shows up the Bookmark dialog box. | Pre-condition: | Web content can only be managed with Internet connection.Web content can only be managed with certified content and proven trustworthy content.Web content can only be managed with a mouse well functioning. | Post-condition: | The web content’s URL address is saved on the history and session. | Assumptions: | None at this moment. |

Use Case Name: | Manage Web Content | Actor(s): | Web User | Description | This use case describes the process of a web user managing the content of the web page. | References: | MSS-5.0 | Typical Course of Events: | Actor: 2. This use case is initiated when a web user selects an action.10. This use case concludes when the web user manage the content with the desired action. | System: 10. 11. The System performs the selected action. | Alternate Courses: | 12. If the web page has a non-certified content that content cannot be access or manage. 13. If the web user choose to save current web page, the system shows up the Save dialog box. 14. If the web user choose to save images from a web page, the system shows up the Save Image As dialog box. 15. If the web user chooses to print the current / selected content of a web page, the system shows up the Print dialog box. 16. If the web user chooses to view source code of a web page, the system shows up the HTML Code Viewer. 17. If the web user exits the browser, the system shows up the Save Last Session dialog box. 18. If the web user chooses to add the current web page to Bookmark, the system shows up the Bookmark dialog box. | Pre-condition: | Web content can only be managed with Internet connection.Web content can only be managed with certified content and proven trustworthy content.Web content can only be managed with a mouse well functioning. | Post-condition: | The web content’s URL address is saved on the history and session. | Assumptions: | None at this moment. |

Figure 5.5

Use Case Summary Table

Reference | Use Case Name | Description | | | Actor | Input Data | MSS-1.0 | Request Web Page | Web User | URL address of the web site. | MSS-2.0 | Download File | Web User | Files to be downloaded through links. | MSS-3.0 | Restore Session | Web User | Saved pass for restoring the last session. | MSS-4.0 | Install Adds-On | Web User | Selected Adds-On to be install. | MSS-5.0 | Manage Web Content | Web User | Actions selected to manage web content. |

Reference | Use Case Name | Description | | | Actor | Input Data | MSS-1.0 | Request Web Page | Web User | URL address of the web site. | MSS-2.0 | Download File | Web User | Files to be downloaded through links. | MSS-3.0 | Restore Session | Web User | Saved pass for restoring the last session. | MSS-4.0 | Install Adds-On | Web User | Selected Adds-On to be install. | MSS-5.0 | Manage Web Content | Web User | Actions selected to manage web content. |

Figure 5.6

Non-Functional Requirements

To achieve quality software, the team adheres to the following attributes:

1. Simplicity - The quality of a system of being not complex. The browser has simple layout of components and well categorized its functions. 2. Discoverability - The quality of a system of being easy to discover its functions. As the software is simple, it is also easy to find the functions you’re looking for by categories of functions and well define interface of the browser. 3. Upgradability - The capability of the software to be improved in functionality by addition or replacement of components. The browser is open source, and the team is dedicated to share many of the components for improvement of other developers and by getting most commonly used plug-ins to improve browser performance as the need of the user arises. 4. Reusability - The quality of a system of being the code used again for other projects. The team believes that open sourcing is the best way to have software in a high performance and quality level someday. The browser is open source software, open for improvement and modification of other developers. 5. Usability - The capability of the software to be understood, learned, used and liked by the user, when used under specified conditions. The browser is user friendly, even new to web browsing will easily like it as of first-hand experience hovering the mouse cursor showing up tooltip to guide you thru the functions and many other functions that improve browsing experience. 6. Relevance - The capability of the software to relevant or related to the current situation. The browser easily relate to the needs of the web user which is safe browsing. Nowadays more of the attack on the system comes from internet.

7. Compatibility - The ability of a system to execute a given program on different types of computers without modification of the program or the computers. The browser has least requirement in terms of CPU speed, RAM usage and other software apps. So compatibility will not be an issue. 8. Safety - The ability of a system to provide security on system. The browser is not an anti-virus software. It is not a replacement to anti-virus software. The browser help prevent the wide and fast spreading of malware attacks. Prevention is better than cure. The browser acts on security pro-actively, preventing harmful attacks from the internet.

Software Development Tools Qt4 IDE by Nokia (previously Trolltech)

Implementation Plan This document describes the implementation of Alibata Web Browser to your system. 1. Comes with Alibata Web Browser is a guide on how to install on Mac, Unix, Linux, Windows Platform. Just follow the instruction on the Help>Install>(OS System).
You can also visit the web site for videos on how to install. The Alibata Web Browser is cross-platform no need to worry of your OS. 2. Alibata Web Browser is available for download from many most-visited downloading sites aside from the Alibata the Web Browser site. 3. Alibata Web Browser is packed with most usable plug-ins like Flash, WebKit and Adobe Reader just to mention the few so you don’t need to download them from their respective site. 4. Alibata Web Browser also comes with Tutorial on how to use different functions of the web browser. Just visit the Help>Tutorial>Functionality>(Functions). Maintenance Plan 1. Alibata Web Browser is an open source project. The team is willing to work with other developers to further the project to another level. The source code is free for download and for modification to meet future needs of the web user. 2. Alibata the Web Browser site will post from time to time News and Updates of the software and other projects the team is currently working on. The site is also open for post of suggestions, comments, questions, and bugs found. 3. Alibata Web Browser new releases will be available for download from many downloading sites aside from the Alibata the Web Browser site.

4. The team will be available for answering the site’s post, from 9am to 7pm(+8 UTC). Kindly post in English for uniformity and also to be easily understood by the team. 5. In case the web user want a further explanation or the web user is limited by the site’s post max character use, you can email the following email address: alibata_twbrowser@gmail.com. You can email to us such as screenshot or files attached to your email that shows up the bugs and problems you encountered.

You May Also Find These Documents Helpful

  • Good Essays

    Information Technology is advancing and growing by the minute. Without encryption, credentials sent can be easily intercepted and read by hackers, causing "irreparable damage" to the user and the website owner 's reputation (Eugene Teo, senior manager of security response at security software firm Symantec Singapore, 2014). Security will include monitoring internet behavior, login and log on password rules, software update, and privacy of information.…

    • 688 Words
    • 3 Pages
    Good Essays
  • Good Essays

    IS3445 Project Part 4

    • 565 Words
    • 2 Pages

    The security of a web application should become top priority when it comes to ensuring the security of the information that the application contains. When we, as an organization, think of security, we should all think of ways that the attacker would attempt to breach the application in order to gain access to the network, or exploit the vulnerability to his or her own benefits. There are many weaknesses pertaining to web applications, and these weaknesses each have an attack associated with it, with the attacker having his or her own motivation for the attack. The attacker’s motivation deeply depends on the type of attack that has occurred at that time. Listed below is a list of the common weaknesses and attacks associated with e-commerce and social networking applications.…

    • 565 Words
    • 2 Pages
    Good Essays
  • Better Essays

    The last few years have been marked by numerous malicious applications that have increasingly targeted online activities. As the number of online activities continues to grow strong, ease of Internet use and increasing use base has perfected the criminal targets. Therefore, attacks on numerous users can be achieved at a single click. The methods utilized in breaching Internet security vary. However, these methods have increasingly become complicated and sophisticated over time. With the increase in threat levels, stronger legislations are being increasingly issued to prevent further attacks.…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Better Essays

    There has been an increase in global technology over the past few years. The increase in technology allows us to have access to many things from almost anywhere, such as the Internet. People can find information right at their fingertips faster and easier than ever before. However, with this increase in technology comes an increase in cybercrime.…

    • 780 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Over the past twenty years, the Internet’s role in our lives has grown to an everyday necessity. We rely on the Internet to communicate within the scope of our employment and social lives, to conduct our banking and bill paying, we even use it to track our personal property. There is hardly one area of our lives that we can not conduct over the Internet. While the Internet is a convenience that has made our lives easier, it has also opened the door in our lives to a vulnerability that is rapidly being exploited by cyber criminals. Cyber crimes are growing at an exponential rate in the United States and we, the consumers/end users are unaware of the liabilities a simple click on the wrong button can cause. This paper will address the current cybersecurity policy issues for the protection of the Internet infrastructure and recommend new policies that will address the liability for malicious traffic traversing the Internet from the End Users.…

    • 1586 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Each e-commerce have to keep their online data safe such as customers personal details, their bank details and many more and in order to make sure that their data stays safe and secured, they have to be aware of all the frauds that is taking place now days because e-commerce have to deal with payments such as online banking, electronic transactions, using debit cards, credit cards and many other ways and because of these e-commerce’s have more compliance issues as they are at more risk from being targeted than other websites. Data’s can be stolen in many ways such as by hacking and by adding viruses into systems and many other ways.…

    • 646 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Global technology is on the rise and being used by many on a daily basis. Companies all around the world are using technology, as well as individuals for personal use. With the rise of global technology comes the increase of cyber crimes and cyber-related threats. With so much personal information available online criminals are finding it easier than ever to access it.…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    The Internet society believe that the Internet should be used by everyone freely, meaning that the number one objective is to promote the development, security and stability of the World Wide Web. Malicious attacks such as viruses, spams, spyware and other viscous attacks on hardware and software have become well known wide spread through the web. These attacks often result in irreparable damage and abuse the very freedom the Internet principles were based on (Internet security," 2012).…

    • 1786 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Since the beginning of the internet new opportunities for criminal activities have increased significantly. Most of America’s government agencies, businesses, citizens, online businesses activities have been subjects of numerous attacks. America is dependent upon its computer networks to ensure operations of its infrastructure and national security. Many problems can be attributed to international crimes like the attack on the financial networks on September 11, 2008. This caused the fall of the stock market from anonymous people using naked shorts that are considered illegal today which was used to destroy our financial…

    • 3358 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Cyber-crime, also known as e-crime, costs companies billions of dollars every year in stolen assets and lost business. Cyber-crime can thoroughly disrupt a company’s marketing actions. Additionally, when a business falls victim to cyber criminals, which could cause a…

    • 4620 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    Malware Analysis Paper

    • 2168 Words
    • 9 Pages

    The advent of networks and information systems revolutionized the way that individuals and large organizations conduct daily operations. Individuals utilize computers to check electronic mail, surf the internet, pay bills, and even go to school for their degrees. Large organizations do the same things, but in a much larger scale. Additionally, these large organizations utilize information systems to store sensitive data from its clientele and its employees. This information may include social security numbers, credit card information, birth dates, account numbers, and other personal identifiable information. What this amounts to is a gold mine for cyber criminals and motivation for them to breach these information systems to collect that data…

    • 2168 Words
    • 9 Pages
    Powerful Essays
  • Best Essays

    research paper

    • 2972 Words
    • 9 Pages

    Cyber usage has become one of the leading digital infrastructures that run our world. We use these infrastructures through cell phones, TV’s, ATMs, and most importantly computer networking. Internet usage is growing every year, and every year more and more users log on which has become part of our everyday lives. Unfortunately, as we grow with technology so are those who are willing and able to use the internet against us. Cyber attackers/hackers try to use these resources against…

    • 2972 Words
    • 9 Pages
    Best Essays
  • Satisfactory Essays

    Crime Patterns

    • 382 Words
    • 2 Pages

    Now a day in this world cyber crime is on the rise. Everywhere you look everyone uses a computer for messaging, banking, keeping in contact with families, gaming, and many other things. Cyber crime is presenting big problems for criminologists nowadays, 1.) it is rapidly evolving, new things being built every day. 2.) It is difficult to detect through law enforcement channels, 3.) planning or coordinating its control demands technical skills that match those of the perpetrators.…

    • 382 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    CMM Model and its stages - Introduction to PCMM, CMMI and Six Sigma concepts. ISO 9000, ISO 9000 Part3 for software Quality.…

    • 335 Words
    • 2 Pages
    Satisfactory Essays