Skip to content

Latest commit

 

History

History
78 lines (57 loc) · 2.42 KB

File metadata and controls

78 lines (57 loc) · 2.42 KB

📘 LMS Software Engineering Case Study (Waterfall SDLC + Jira + UML + Security)

This project simulates a real-world client engagement for developing a Learning Management System (LMS). Our team acted as a software engineering consulting group, working with a “client” to design the system using the Waterfall SDLC model while documenting every stage, from requirements to deployment.

Although this project focused on software engineering, it also introduced foundational cybersecurity concepts such as secure system design, role-based access control, data protection, and security-aware documentation.


🔹 Project Objectives

  • Understand end-to-end software engineering workflow
  • Gather requirements through client-style meetings
  • Document features using SRS and Confluence
  • Design technical architecture and UML diagrams
  • Use Jira for task planning and project management
  • Practice system deployment planning
  • Integrate security considerations into SDLC

🛠 Tools & Technologies

  • Jira – Task management and workflow board
  • Atlassian Confluence – Documentation
  • Zoom – Team meetings & client presentations
  • Lucidchart / Draw.io – UML & Use Case diagrams
  • Waterfall SDLC

📊 Diagrams Included

  • UML Class Diagram
  • Use Case Diagram

These diagrams illustrate roles, permissions, data flow, and system structure—core components of secure system design.


🔐 Cybersecurity Alignment

Although this was a SE project, several components align with cybersecurity:

• Role-Based Access Control (RBAC)

Student, Instructor, Librarian, and Admin roles reflect authorization boundaries.

• Data Flow Understanding

UML + Use Case diagrams help identify attack surfaces and trust boundaries.

• Requirements Gathering → Security Requirements

Consideration for:

  • Authentication
  • Authorization
  • Data integrity
  • Least privilege
  • Secure data handling

• Documentation & SDLC

Security relies on:

  • Change management
  • Requirement traceability
  • Consistent documentation
    All practiced in this project.

This experience translates directly into secure SDLC, AppSec entry roles, and analyst positions.


📄 Documentation Folder Includes:

  • Requirements Gathering Document
  • System Design Document
  • Deployment Planning Document
  • Security considerations

(All located in /Documentation)


📂 Folder Structure