-
Notifications
You must be signed in to change notification settings - Fork 0
3.3. Abuser Stories
Silfer edited this page Apr 18, 2017
·
2 revisions
- As a hacker, I want to access unauthorised content stored in the database through code injection.
- As an authenticated user, I see a string of numbers on the URL, and make changes to it to see what will happen.
- As a student, I join tutorial sessions that I am not a part of to find out the questions that the tutor is asking.
- As a student, I ask my friends in earlier tutorial sessions to find out the questions that the tutor is asking.
- As a student, I ask my friends to log in for me and answer the questions on my behalf.
- As a student, I can contact my friends to ask them for answers to questions.
From the littlest team with big dreams, SOLOQ:
Joey Yeo
Weizheng Lee
Goh Yuan Tat
- Introduction
- Getting Started
- Software Requirements
- 3.1. Functional Requirements
- 3.2. Non-Functional Requirements
- 3.3. Abuser Stories
- Software Design
- 4.1. User Interface
- 4.2. Software Architecture
- 4.3. Database Design
- Usability
- Performance, Robustness and Security
- Project Log
- Archive