Академический Документы
Профессиональный Документы
Культура Документы
ECONOMIC FEASIBILITY
Economic analysis is most frequently used for evaluation of the effectiveness of the system. This
part of feasibility study gives the top management the economic justification for the new system.
Designated systems detect and prevent unauthorized attempts to copy or send sensitive data,
intentionally or unintentionally, mainly by personnel who are authorized to access the sensitive
information. In order to classify certain information as sensitive, these use mechanisms, such as
exact data matching, statistical methods, rule and regular expression matching, published
lexicons, conceptual definitions and keywords.
TECHNICAL FEASIBILITY
It is technically feasible, since the whole system is designed into with the latest technologies like
ASP.NET and SQL Server which are the most recent technologies to develop web based systems
and design databases. Network (data in motion) technology is typically installed at network
egress points near the perimeter. It analyzes network traffic to detect sensitive data that is being
sent in violation of information security policies. Multiple security control points may report
activity to be analyzed by a central management server
OPERATIONAL FEASIBILITY
It is Operational feasible, since the system is providing a attractive user interface to the
operator/end user, so he feel very easy to work onto it advanced security measures
employ machine learning and temporal reasoning algorithms for detecting abnormal access to
data (e.g., databases or information retrieval systems) or abnormal email exchange, honey
pots for detecting authorized personnel with malicious intentions and activity-based verification
(e.g., recognition of keystroke dynamics) and user activity monitoring for detecting abnormal
data access.
SYSTEM TESTING
The purpose of testing is to discover errors. Testing is the process of trying to discover every
conceivable fault or weakness in a work product. It provides a way to check the functionality of
components, sub-assemblies, assemblies and/or a finished product It is the process of exercising
software with the intent of ensuring that the
Data Leakage Detection and Prevention system meets its requirements and Distributors and
Agents expectations and does not fail in an unacceptable manner. There are various types of test.
Each test type addresses a specific testing requirement.
UNIT TESTING -Unit testing involves the design of test cases that validate that the internal
program logic is functioning properly, and that program inputs produce valid outputs. All
Distributor login and Registration internal code flow should be validated. It is the testing of
individual software units of the application. Sometimes a data distributor gives sensitive data to one
or more third parties. Sometime later, some of the data is found in an unauthorized place (e.g., on the
web or on a user's laptop). The distributor must then investigate the source of the leak using this
testing.
INTEGRATION TESTING -Integration tests are designed to test integrated software
components to determine if they actually run as one program. Testing is event driven and is
more concerned with the basic outcome of screens or fields for Distributers and Agents. are
trying to leak data and shows normal working activities in deep learning. Second, classify Data
leakage scenario graphs consisting of security log inputted for detecting leakage according to the
type of data leakage scenarios and the personnel information likes position in the enterprise.
FUNCTIONAL TEST -Functional tests the fraction of fake objects. The plot shows that
random allocation will yield an insignificant improvement in our chances of detecting a guilty
agent in the worst case scenario. This was expected, since e-random does not take into
consideration which agents must receive a fake object to differentiate their requests from other
agents.
Testing Results: