...Use Case Description for Acme Video Game Vending Machine System Created by: Quang Tran Date: Oct 11, 2014 Use Case Name: Rent a Game Scenario: Customers rent and return games. Triggering Event: Customers use their Debit/Credit card for games rental, which is charged by Acme’s Bank. Brief Description: Customers enter requirement information and swipe a valid card for games rental. Actors: Customers, Acme’s Bank, and Central computer system of Acme headquarters. Related Use Cases: None. Stakeholders: Security department. Preconditions: System is in stand by mode and ready to perform. Postconditions: System is in performance mode (1 or 2 minutes) before turn to stand by mode. Flow of Events: Actor System 1. Customers choose games through vending machine 2. Customers enter information and pay by a valid card. 3. Acme’s Bank check and charge for rental 4. Acme’s computer system organizes and save customers’ information. 5. Customers return games at vending machine. 6. Customer received a receipt and additional charge via e-mail. 1. Acme’s bank is received customers’ information from vending machine. 2. Acme’s computer system is received customers’ information from vending machine. 3. Vending machine dispended games after customers’ information are approved. 4. Machine received returned games from customers. 5. Information sent to Acme’s bank and Acme’s central computer system. 6. A receipt e-mail to customers for a final charge. Exception...
Words: 260 - Pages: 2
...outdoor activity) RC II-6 Self Concept RC II-7 Emotional Skills/Regulation RC II-8 Social Skills RC II-9 Mathematics Age Group: Preschool 4-5yrs | | | | | RC II | Description: | Intended Goals: | Materials: | Teaching Process: | 1 Science/Sensory | | | | | 2 Language and Literacy | | | | | 3 Creative Arts | | | | | 4 Fine Motor (choose an indoor activity) | Making a necklace: Threading beads on a precut piece of yarn. | Threading at least 10 beads on precut piece of yarn. | Precut yarnSeveral colorful big beads for 3-5yr already in small containers per child | Pre-made necklace for example.Show & tell work. Hold yarn and place bead on yarn.Then continue activity with children. | 5 Gross motor (choose an outdoor activity) | Playing Sam Says, which is the same as Simon says. | To follow directions of what Ms. Sam is saying to do and to listen careful because I will try to trick them. | Open space and Myself. | First, space the children out to give each arm room. 2ndly, I will explain the game and show example. Ex: Ms. Sam says touch your ear and I touch my ear. Then I say Ms. Sam rub her head and I rub my head and I say stop but I keep rubbing my head because I didn’t say Ms. Sam… | 6 Self Concept | | | | | 7 Emotional Skills/Regulation | | | | | 8 Social Skills | | | | | 9 Mathematics | | | | |...
Words: 263 - Pages: 2
...IS4550 Security Policies and Implementation INSTRUCTOR GUIDE Course Revision Table Change Date | Updated Section | Change Description | Change Rationale | Implementation Quarter | 12/20/2011 | All | New curriculum | | June 2012 | | | | | | | | | | | | | | | | | | | | | | | | | | ------------------------------------------------- ------------------------------------------------- Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory, 30 Lab) Prerequisite: IS3110 Risk Management in Information Technology Security or equivalent Corequisite: None Table of Contents Course Overview 5 Course Summary 5 Critical Considerations 5 Instructional Resources 6 Required Resources 6 Additional Resources 6 Course Management 8 Technical Requirements 8 Test Administration and Processing 8 Replacement of Learning Assignments 9 Communication and Student Support 9 Academic Integrity 10 Grading 11 Course Delivery 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 Unit Plans 15 Unit 1: Information Security Policy Management 15 Unit 2: Risk Mitigation and Business Support Processes 25 Unit 3: Policies, Standards, Procedures, and Guidelines 33 Unit 4: Information Systems Security Policy Framework 42 Unit 5: User Policies 50 Unit 6: IT Infrastructure Security Policies 58 Unit 7: Risk Management 66 Unit 8: Incident Response Team Policies 74 Unit 9: Implementing...
Words: 18421 - Pages: 74
...ITT Technical Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas: Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA NT2580 NT2670 Introduction to Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to Security Auditing for Compliance Countermeasures Information Security Email and Web Services NT1230 NT1330 Client-Server Client-Server Networking I Networking II IS3230 IS3350 NT1230 NT1330 Issues Client-Server Client-Server SecurityContext in Legal Access Security Networking I Networking II NT1110...
Words: 2305 - Pages: 10