Académique Documents
Professionnel Documents
Culture Documents
Objective:
The Secret Intelligence Agency has always used undercover agents to solve complex cases and
dismantle criminal organizations. We are conceptualizing this software as a solution so that
Secret Intelligence Agencies and their agents can communicate through this Software for the
exchange of evidences in a secure way.
Existing System:
For a government it is hard task to transfer evidences in a secure way. While dealing with a
particular case several departments can be involved in that to find out the solution. In existing
system there is no secure mechanism to send and receive evidences from one department to
another department. In existing system manual interaction is the process to share the
information while making final reports about any particular case. At the same time citizens of
state do not know complete information about success stories. No suggestions allowing from
citizens in existing system.
Proposed System:
Our software which is calling as cybernetics prodigy Protector is an intelligent tool which
allows secret agency, defense ministry and citizens at one place. The main advantage with our
tool is keeping evidences securely and ensure sharing of evidences among departments with
low expensive cost and time with high secure. Through this software secret agencies and its
clients or agents can communicate to exchange of evidences in a secure way. This tool keeps
the evidences for a long time which can be useful in future.
Functional Requirements:
Secret Agencys Chief:
i.
ii.
iii.
iv.
v.
vi.
vii.
viii.
Agent:
i.
ii.
iii.
iv.
v.
Defense Ministry:
i. Should be able to send resources to Secret Agency.
ii. Receive reports
iii. Ability to assign cases to the Agency.
Citizen:
i.
ii.
iii.
iv.
Nonfunctional Requirements:
i. Secure access of confidential data (users details). SSL can be used.
ii. 24 X 7 availability
iii.Better component design to get better performance at peak time
Users:
A. Citizen
B. Under Cover Agent
C. Secret Intelligence Agencys chief
D. Ministry of Defense
Modules:
1. Authentication Module
2. Agency Chief Activities Module
3. Case Management Module
4. Defense Activities module
5. Citizen Module
6. Report Module
7. Admin Module
Reports:
A. Case Report
B. Success Report
C. Report regarding most wanted criminals and bounty information if available.
Technologies:
Tools:
Web Sphere
Oracle/ MySql