Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

The Great Mind Challenge - Project Scenario Template

Note: Already filled information should not be changed

1. Name of the Software privacy protection


Project

To protect our software from many type of viruses or any type


2. Objective/ Vision of little cyber attacks and for security purpose

a. Admin
b. All Beneficiary
3. Users of the
System
i. Admin will make account detail for employee and for
himself.
ii. Beneficiary will have to create a account .
iii. Beneficiary will have to make payment for the given
account.
iv. After making payment user can now download
the respected software.
Functional
4. v. The software reads your pc mac id.
Requiremen
vi. The system generated a unique user id by
ts (Atleast
applying an algorithm on the acquired mac id.
Eight)
vii. The user may now request for serial key. He
needs to send the user id generated. The key is
generated by applying an encryption on
generated unique user id
viii. Admin applies the encryption to the user id and
sends encrypted key. Even software generates
key by encryption and then matches key
provided by the user and generated key.
ix. If key matches the software works as full version
or is locked down
i. Secure access of confidential data (software privacy
Non- protection details).
5. functional
requirement ii. 24 X 7 availability
s (Atleast iii. Flexible service based architecture will be highly
Four) desirable for future extension
iv. No one can copy the software or share as it requires an
activation code that is different for each individual.
v.
a. Sending Reports through E-mails
b. Check the activity of the virus detecting in your
6. Optional features pc
c. To check the validity for your system protection
d.
7. User interface a. Professional look and feel
priorities
b.Browser testing and support for IE, NN, and Firefox.
8. a. System will generate Monthly Reports and yearly Reports
Reports

a. Beneficiary can’t cancel the subscription once payment get


9. Other important
completed
issues b.
10. Team Size 2
11. Technologies to be
Window7/8/10,css, java script, html, c++, asp.net, ms sql
used
server
 Windows Xp, Windows 7(ultimate, enterprise)
12. Tools to be Used  Sql 2005
 Visual studio 2008


a. The system can be used by any online software dealer.
b. It can also be used by organizations and business owners
13. Final Deliverable to promote their product and at the same time protect
must include their copyright.
c.

You might also like