Example – developing an enterprise secure system model
Throughout this book, we will build a secure design for an event ticketing system.
Envision a software system that allows a box office or a website to sell tickets to a famous musical concert or theatre event.
We modify our earlier activity diagram by adding swimlanes to separate the partitions in Figure 5.15. Swimlanes are useful in activity diagrams, as you can see when messages cross partition boundaries.
In this example, we have three partitions: the web browser, the web server, and the database server. Vulnerabilities often exist when messages are passed across the partition boundaries.
Figure 5.15 – Activity diagram with swimlanes
In Figure 5.16, we introduce a component model that shows the same three components from the preceding activity diagram swimlanes and a few interfaces supported by the components.
Figure 5.16 – Ticketing system...