Use Cases - USP Flashcards

1
Q

What are non-functional requirements (NFRs)?

A

System qualities describing how well a system performs its functions, e.g., usability, performance, and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How are NFRs related to functional requirements?

A

NFRs describe the system’s design qualities, while functional requirements describe what the system does for users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How are NFRs modeled?

A

By attaching them as comments to relevant functional requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is usability in software design?

A

Design focused on helping users complete tasks with minimal cognitive effort, improving effectiveness, efficiency, and satisfaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the three parts of usability?

A

Effectiveness: Users find what they want; Efficiency: Minimal resources/effort; Satisfaction: Users enjoy the experience.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is performance in software?

A

A measure of latency and reliability, ensuring the system is fast enough to match or exceed users’ cognitive processing speeds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are key considerations for performance?

A

Volume of data, processing at each end, bandwidth, bottlenecks, and interdependencies in hardware/software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the relationship between usability and performance?

A

Better performance increases usability, provided the system doesn’t slow down user tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is security in software?

A

Protecting sensitive data, system integrity, and operation from theft, abuse, or attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are examples of security threats?

A

Unauthorised access, exploitation, denial of service, trojans, eavesdropping, and spoofing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can security be modeled?

A

Through abuse cases and threat analysis, complementing cybersecurity measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the best security for a system?

A

A private, isolated network, though impractical for public use due to networking needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are historical approaches to security?

A

Zones of security, barriers, gateways, and lessons from physical defenses like castles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are modern cybersecurity layers?

A

Firewalls, security zones, encryption, certification, and monitoring to defend against attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the role of a firewall?

A

Hardware/software acting as a barrier between internal and external networks to prevent invasions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are examples of security zones?

A

Levels of access based on public accessibility and the value of secured assets.

17
Q

What is an abuse case?

A

A use case identifying actions of ‘bad actors’ to reduce their reward and increase their effort.

18
Q

What are the five principles of secure system design?

A
  1. Establish context; 2. Make compromise difficult; 3. Make disruption difficult; 4. Detect compromise easily; 5. Reduce impact of compromise.
19
Q

How does cybersecurity balance access and vulnerabilities?

A

More networking increases access but also introduces vulnerabilities; security balances these concerns.

20
Q

What is an example of a real-world cyber attack?

A

A Russian attack on NHS provider Synnovis disrupted services, canceling 10,000+ appointments and postponing operations.