--- title: "20-SE-in-IA" aliases: tags: - comp210 - lecture --- # why - apps for IoT devices contain security flaws - smart home security breaches - kindles - vulnerable libraries lead to vulnerable devices - software helps us to use hardware - need to make the software secure # overview combines computer science, engineering, and maths to make software - software engineering coined in 1968-1969 when discussing 'software cirsis' - security breaches - bugs etc different from individual programming because of the Audience ![](https://i.imgur.com/yuIeXpq.png) - types - generic software - stand alone systems e.e.g, word etc - customized software - designed specifically for a customer - generic can transistion to customised # dev process - tried to mirror engineering process - software is different - needs to be flexible timeline - waterfall - spiral - agile # stages - design - feasability - ![slide](https://i.imgur.com/KD8J4Dr.png) - financial, legal, time, etc - requirements specification - stakeholders - anyone affected by the system - ![slide](https://i.imgur.com/NkMt4q7.png) - features, requirements - ![slide](https://i.imgur.com/ghNmRhj.png) - ![use vs system reqs](https://i.imgur.com/DWSNrSu.png) - ![functional vs non functional](https://i.imgur.com/gWwAWBV.png) - system design - ![slide](https://i.imgur.com/mMBkSp1.png) - databse design - er model etc - architectural design - structure of application - - develop - validaion - evolution may go by different names # for Information assurance