Вы находитесь на странице: 1из 5

FEASIBILITY STUDY

ECONOMIC FEASIBILITY

Economic analysis is most frequently used for evaluation of the effectiveness of the system. This
part of feasibility study gives the top management the economic justification for the new system.
Designated systems detect and prevent unauthorized attempts to copy or send sensitive data,
intentionally or unintentionally, mainly by personnel who are authorized to access the sensitive
information. In order to classify certain information as sensitive, these use mechanisms, such as
exact data matching, statistical methods, rule and regular expression matching, published
lexicons, conceptual definitions and keywords.

TECHNICAL FEASIBILITY

It is technically feasible, since the whole system is designed into with the latest technologies like
ASP.NET and SQL Server which are the most recent technologies to develop web based systems
and design databases. Network (data in motion) technology is typically installed at network
egress points near the perimeter. It analyzes network traffic to detect sensitive data that is being
sent in violation of information security policies. Multiple security control points may report
activity to be analyzed by a central management server

OPERATIONAL FEASIBILITY

It is Operational feasible, since the system is providing a attractive user interface to the
operator/end user, so he feel very easy to work onto it advanced security measures
employ machine learning and temporal reasoning algorithms for detecting abnormal access to
data (e.g., databases or information retrieval systems) or abnormal email exchange, honey
pots for detecting authorized personnel with malicious intentions and activity-based verification
(e.g., recognition of keystroke dynamics) and user activity monitoring for detecting abnormal
data access.
SYSTEM TESTING

The purpose of testing is to discover errors. Testing is the process of trying to discover every
conceivable fault or weakness in a work product. It provides a way to check the functionality of
components, sub-assemblies, assemblies and/or a finished product It is the process of exercising
software with the intent of ensuring that the

Data Leakage Detection and Prevention system meets its requirements and Distributors and
Agents expectations and does not fail in an unacceptable manner. There are various types of test.
Each test type addresses a specific testing requirement.

8.1 TYPES OF TESTS

UNIT TESTING -Unit testing involves the design of test cases that validate that the internal
program logic is functioning properly, and that program inputs produce valid outputs. All
Distributor login and Registration internal code flow should be validated. It is the testing of
individual software units of the application. Sometimes a data distributor gives sensitive data to one
or more third parties. Sometime later, some of the data is found in an unauthorized place (e.g., on the
web or on a user's laptop). The distributor must then investigate the source of the leak using this
testing.
INTEGRATION TESTING -Integration tests are designed to test integrated software
components to determine if they actually run as one program. Testing is event driven and is
more concerned with the basic outcome of screens or fields for Distributers and Agents. are
trying to leak data and shows normal working activities in deep learning. Second, classify Data
leakage scenario graphs consisting of security log inputted for detecting leakage according to the
type of data leakage scenarios and the personnel information likes position in the enterprise.
FUNCTIONAL TEST -Functional tests the fraction of fake objects. The plot shows that
random allocation will yield an insignificant improvement in our chances of detecting a guilty
agent in the worst case scenario. This was expected, since e-random does not take into
consideration which agents must receive a fake object to differentiate their requests from other
agents.
Testing Results:

Sl.no Input Expected Output Actual Output Status

A page with distributor A page with distributor


01 Welcome Page Pass
login and agent login login and agent login

Login page with user


Login Page with user
02 Distributor Login name and password Pass
name password arrives
arrives

The 4 sub models of The 4 sub models of


03 Distributor Function Pass
distributor login distributor login

A sign up page where A sign up page where the


04 Sign up new agents the user has to enter user has to enter personal Pass
personal details details

A page with a set of


Distribute data via A page with a set of hosts
hosts arrive and can
05 the distributor to arrive and can send data to Pass
send data to various
agents various agents
agents

Before sending data


Before sending data from
from the distributor this
06 Distributor Server the distributor this server Pass
server has to be turned
has to be turned on
on

Return to Welcome A page with distributor A page with distributor


07 Pass
Page login and agent login login and agent login

A page where the agent A page where the agent


08 Login as Agent Pass
enters the agent details enters the agent details
09 Agent Leaking A page where A page where
data to different agent can leak data agent can leak data Pass
agents arrives arrives
10 A page with A page with
Return to
distributor login distributor login Pass
Welcome Page
and agent login and agent login
11 Login page with Login page with
Distributor Login user name and user name and Pass
password arrives password arrives
12 Find Guilty A Page for finding A Page for finding
Pass
Agents guilty agents arrive guilty agents arrive

13 Find probability Find the guilty Find the guilty


Pass
of guilty agent agent agent

14 Show the Graph shown Graph shown


Pass
probability graph

Вам также может понравиться