quartz/content/notes/20-SE-in-IA.md
2022-10-10 10:42:45 +13:00

1.5 KiB

title aliases tags
20-SE-in-IA
comp210
lecture

why

  • apps for IoT devices contain security flaws
    • smart home security breaches
    • kindles
    • vulnerable libraries lead to vulnerable devices
  • software helps us to use hardware
    • need to make the software secure

overview

combines computer science, engineering, and maths to make software

  • software engineering coined in 1968-1969 when discussing 'software cirsis'
    • security breaches
    • bugs etc

different from individual programming because of the Audience

  • types
    • generic software
      • stand alone systems e.e.g, word etc
    • customized software
      • designed specifically for a customer
    • generic can transistion to customised

dev process

  • tried to mirror engineering process
  • software is different
    • needs to be flexible

timeline

  • waterfall
  • spiral
  • agile

stages

  • design
    • feasability
      • slide
      • financial, legal, time, etc
    • requirements specification
      • stakeholders
        • anyone affected by the system
        • slide
      • features, requirements
        • slide
        • use vs system reqs
        • functional vs non functional
    • system design
      • slide
      • databse design
        • er model etc
      • architectural design
        • structure of application
  • develop
  • validaion
  • evolution

may go by different names

for Information assurance