CSIS 643PROJECT OVERVIEW
OVERVIEW
You will architect and program a software application utilizing object-oriented techniques and
graphical user interfaces using Java. Your architecture must be recorded, modeled, and
communicated in sufficient detail that the software application could be coded based upon the
architecture documentation alone. In this course, you are acting as the architect and programmer.
You will choose a new software application for a company with which you are familiar. The
application must be a module of a business system such as a customer relationship management
(CRM) or enterprise resource planning (ERP) system. The scope must be a program with
sufficient depth to architect and model yet that you can still finish coding in 3 modules/weeks.
INSTRUCTIONS
KEY ACTIVITIES
There are 7 key activities that are involved in creating a software architecture, using that
architecture to realize a complete design, and then implementing or managing the software
(Bass, 2013). You will use these activities in development of your project. Below are the
activities, in order, and the modules/weeks in which the activities are covered:
1. Making a business case for the system (Module 2: Week 2 & Module 5: Week5)
2. Understanding the architecturally significant requirements (Modules 2, 3, 4 & 5)
3. Creating or selecting the architecture (Modules 2, 3, 4 & 5)
4. Documenting and communicating the architecture (Module 5: Week 5)
5. Analyzing and evaluating the architecture (Module 6: Week 6)
6. Implementing and testing the system based on the architecture (Module 7: Week 7)
7. Ensuring that the implementation conforms to the architecture (Module 8: Week 8)
PROJECT SCHEDULE
You will build your project throughout the course:
•
The Discussion: Project Definition is designed for you to receive feedback from your
peers on the definition of your project.
•
The Business Case Assignment is due in Module 2: Week 2. You will justify your
project and examine architecturally significant requirements.
•
The Discussion: Modeling is designed for you to receive feedback from your peers on
architecting your project.
•
The Architecture Assignment is due in Module 4: Week 4. You will begin coding your
application.
•
The Threat Model Assignment is due in Module 5: Week 5. You will add threat models
to your architecture.
•
The Implementation Assignment is due in Module 7: Week 7. You will finish coding
your application.
Page 1 of 2
CSIS 643
•
The Discussion: Peer Evaluation is designed for you to receive feedback from your
peers on how well your project conforms to your architecture.
Note: Your assignment will be checked for originality via the Turnitin plagiarism tool.
Page 2 of 2
CSIS 643
THREAT MODEL ASSIGNMENT INSTRUCTIONS
OVERVIEW
Threat modeling is a diagramming technique used to reveal system vulnerabilities. You
will research and create threat models for your architecture.
INSTRUCTIONS
Research threat modeling including this article:
Shevchenko, N., Chick, T.A., O’Raige. P., Scanlon, T.P., & Woody, C. (2018).
Threat Modeling: A Summary of Available Methods.
Create your choice of 3 threat models for your architecture. Justify and communicate your
choice of threat models.
Your submission should meet the following criteria:
•
•
•
•
•
2-3 pages excluding the title page, abstract, models, and reference page.
at least 3 fully developed models
APA Style
At least 2 citations in addition to Shevchenko, et al.
Acceptable citations include scholarly articles.
Note: Your assignment will be checked for originality via the Turnitin plagiarism tool.