diff --git a/report/10_ProjectManagement.tex b/report/10_ProjectManagement.tex index 7614a1a4955641a8024c27cd35bfeb293149f538..f8d4f3245109556f5c4bc6dd090723b2bc2b4781 100644 --- a/report/10_ProjectManagement.tex +++ b/report/10_ProjectManagement.tex @@ -3,12 +3,6 @@ %% ---------------------------------------------------------------- \chapter{PROJECT MANAGEMENT} -% Define your goal -% Do your research -% Ground summary in relevance -% Develop review logically -% Include references/works cited list - \section{Compliance} Compliance is an important, expensive, and complex problem to deal with. \cite{ComplianceGovernance} It relates to the conformance to a set of laws, regulations, policies or best practices. \cite{ComplianceGovernance} These sets of rules are known as standards. Organisations can be required to take steps to put policies and controls in place that ensure conformity with the regulations outlined in their given compliance standard(s), the purpose of which is to safeguard the organisation against security threats. diff --git a/report/12_FutureWork.tex b/report/12_FutureWork.tex new file mode 100644 index 0000000000000000000000000000000000000000..ba592ed4123c596538dd21114043b2fa2eb59d08 --- /dev/null +++ b/report/12_FutureWork.tex @@ -0,0 +1,4 @@ +%% ---------------------------------------------------------------- +%% Conclusions.tex +%% ---------------------------------------------------------------- +\chapter{FUTURE WORK} \label{Chapter: Future Work} diff --git a/report/1_Introduction.tex b/report/1_Introduction.tex index db452cf53ab7da862ebc850bf5a6a3c46eea3890..549e3142b214baac2180b35a5df3363e75a970a8 100644 --- a/report/1_Introduction.tex +++ b/report/1_Introduction.tex @@ -2,15 +2,16 @@ %% 1_Chapter1.tex %% ---------------------------------------------------------------- \chapter{INTRODUCTION} - \section{Overview} - Many businesses require their partners to comply with numberous and varied cyber security compliances, of which there are literally hundreds. Cyber supply chain risk management (CSCRM) differs from cyber security, by gaining a higher degree of governance over the company in question, and over its extended enterprise partners, such as all its suppliers and customers. Whereas cyber security only considers security of a technical nature, CSCRM attempts to encompass both managerial and human factors in preventing risks from disrupting IT systems\textquoteright\ operations. \cite{CSCRM} - Section two will go on to talk about compliance in cyber security, cyber crime, supply chains and the impacts of security breaches on businesses. Section three will look at use cases, requirements, risks and functionality for the proposed application. Section four will give an overview of the work completed so far, and the work remaining. +\section{Overview} + Many businesses require their partners to comply with numberous and varied cyber security compliances, of which there are literally hundreds. Cyber supply chain risk management (CSCRM) differs from cyber security, by gaining a higher degree of governance over the company in question, and over its extended enterprise partners, such as all its suppliers and customers. Whereas cyber security only considers security of a technical nature, CSCRM attempts to encompass both managerial and human factors in preventing risks from disrupting IT systems\textquoteright\ operations. \cite{CSCRM} - \section{Problem} - Keeping track of each company\textquoteright s compliance to a specific standard is a lengthy and potentially expensive task since it can be very difficult to maintain without the use of an external service or consultant. Due to the time and experience level required, it is unlikely to be something a system administrator will be able to do on top of their other responsibilities, and a specialist will, in all likelihood, be too expensive for most SMEs. + Section two will go on to talk about compliance in cyber security, cyber crime, supply chains and the impacts of security breaches on businesses. Section three will look at use cases, requirements, risks and functionality for the proposed application. Section four will give an overview of the work completed so far, and the work remaining. - \section{Aim} - An automatically-generated cyber security compliance engine, could provide a low cost, time efficient solution for businesses that need a flexible, customisable way of tracking their partner\textquoteright s compliance - or their own compliance - with multiple standards. +\section{Problem} + Keeping track of each company\textquoteright s compliance to a specific standard is a lengthy and potentially expensive task since it can be very difficult to maintain without the use of an external service or consultant. Due to the time and experience level required, it is unlikely to be something a system administrator will be able to do on top of their other responsibilities, and a specialist will, in all likelihood, be too expensive for most SMEs. - The goal of this project is to create a client-server system that will generate and store compliance forms for the end-user. The forms will be automatically generated via an interface on the application by a user, and accessible by \textquoteleft partners\textquoteright. Partners will be other users that can be added by the primary user, much like friends or followers on a social media application. Users will be able to update the forms\textquoteright\ parameters, and partners will be able to update their answers to the forms, at a later date. This project is a cloud-based application, and it will deal with cyber security compliance only - no other forms of compliance will be within the scope of this project. \ No newline at end of file +\section{Aim} + An automatically-generated cyber security compliance engine, could provide a low cost, time efficient solution for businesses that need a flexible, customisable way of tracking their partner\textquoteright s compliance - or their own compliance - with multiple standards. + + The goal of this project is to create a client-server system that will generate and store compliance forms for the end-user. The forms will be automatically generated via an interface on the application by a user, and accessible by \textquoteleft partners\textquoteright. Partners will be other users that can be added by the primary user, much like friends or followers on a social media application. Users will be able to update the forms\textquoteright\ parameters, and partners will be able to update their answers to the forms, at a later date. This project is a cloud-based application, and it will deal with cyber security compliance only - no other forms of compliance will be within the scope of this project. \ No newline at end of file diff --git a/report/2_ProjectGoals.tex b/report/2_ProjectGoals.tex index 2cfa291d902ab210b7650d2cdabf211b515fd3bd..c6025dd3fbf4f5fa18536edb5091bd6cf57cec37 100644 --- a/report/2_ProjectGoals.tex +++ b/report/2_ProjectGoals.tex @@ -3,12 +3,6 @@ %% ---------------------------------------------------------------- \chapter{PROJECT GOALS} -% Define your goal -% Do your research -% Ground summary in relevance -% Develop review logically -% Include references/works cited list - \section{Compliance} Compliance is an important, expensive, and complex problem to deal with. \cite{ComplianceGovernance} It relates to the conformance to a set of laws, regulations, policies or best practices. \cite{ComplianceGovernance} These sets of rules are known as standards. Organisations can be required to take steps to put policies and controls in place that ensure conformity with the regulations outlined in their given compliance standard(s), the purpose of which is to safeguard the organisation against security threats. diff --git a/report/3_BackgroundAndLiteratureReview.tex b/report/3_BackgroundAndLiteratureReview.tex index 77122a95aeb24f20eda77e2fd4187c432c96d714..473154d82baf77095041d0cad1f9695524e37983 100644 --- a/report/3_BackgroundAndLiteratureReview.tex +++ b/report/3_BackgroundAndLiteratureReview.tex @@ -3,12 +3,6 @@ %% ---------------------------------------------------------------- \chapter{BACKGROUND AND LITERATURE REVIEW} -% Define your goal -% Do your research -% Ground summary in relevance -% Develop review logically -% Include references/works cited list - \section{Compliance} Compliance is an important, expensive, and complex problem to deal with. \cite{ComplianceGovernance} It relates to the conformance to a set of laws, regulations, policies or best practices. \cite{ComplianceGovernance} These sets of rules are known as standards. Organisations can be required to take steps to put policies and controls in place that ensure conformity with the regulations outlined in their given compliance standard(s), the purpose of which is to safeguard the organisation against security threats. @@ -25,7 +19,7 @@ Supply chain management is a process essential for linking major business actions and behaviours internally and between companies into a capable and effective business model. \cite{CSCRM} It encompasses all logistics management endeavours not to mention manufacturing operations, and it propels coordination of activities across marketing, sales, product design, finance, and IT. \cite{CSCRM} \subsection{Supply Chain Security} - Supply chain security concentrates on the threats linked to an organisation\textquoteright s suppliers of goods and services, many of which potentially have considerable access to assets belonging to the company or to it\textquoteright s customer data. \cite{CombattingCyberRisks} + Supply chain security concentrates on the threats linked to an organisation\textquoteright s suppliers of goods and services, many of which potentially have considerable access to assets belonging to the company or to its customer data. \cite{CombattingCyberRisks} \section{Impacts} Cyber attacks are financially devastating and disrupting to people and businesses. Successful attacks have the potential to expose personal information, leaving the victims of these security breaches vulnerable to fraud. \cite{CyberCrime} Victims are also left vulnerable to further attacks, using the information previously gathered by attackers. diff --git a/report/5_Designs.tex b/report/5_Design.tex similarity index 97% rename from report/5_Designs.tex rename to report/5_Design.tex index 765aff7f69088814e03643b1f1b5a5e580975b3d..a74f1321ce76fd4d505c1f3e298f49f48417de00 100644 --- a/report/5_Designs.tex +++ b/report/5_Design.tex @@ -1,13 +1,7 @@ %% ---------------------------------------------------------------- %% 2_Chapter2.tex %% ---------------------------------------------------------------- -\chapter{DESIGNS} - -% Define your goal -% Do your research -% Ground summary in relevance -% Develop review logically -% Include references/works cited list +\chapter{DESIGN} \section{Compliance} Compliance is an important, expensive, and complex problem to deal with. \cite{ComplianceGovernance} It relates to the conformance to a set of laws, regulations, policies or best practices. \cite{ComplianceGovernance} These sets of rules are known as standards. Organisations can be required to take steps to put policies and controls in place that ensure conformity with the regulations outlined in their given compliance standard(s), the purpose of which is to safeguard the organisation against security threats. diff --git a/report/6_Implementation.tex b/report/6_Implementation.tex index 6197d7e279a89e4faf1dc5152937f76b840b1fae..ab829e3c44e68ddabe6b686dc5c983c54265bd0d 100644 --- a/report/6_Implementation.tex +++ b/report/6_Implementation.tex @@ -3,39 +3,29 @@ %% ---------------------------------------------------------------- \chapter{IMPLEMENTATION} -% Define your goal -% Do your research -% Ground summary in relevance -% Develop review logically -% Include references/works cited list +\section{Project Development Objective} + The objective of this project was to produce a web application that would allow a company to create, store and share compliance forms, in order to reduce the cost of tracking and maintaining compliance to any cyber security standard. + + \subsection{Functionality} + The application, called CompForge, allows a user to create custom forms, which are stored on a serverless database hosted on Google\textquoteright s Firebase. These forms can be shared with partners - other users that are added in a similar fashion to friends or followers on social media. When a form is shared with a partner, that partner is able to complete and return it to the original user, with their answers also being stored in the application\textquoteright s database. -\section{Compliance} - Compliance is an important, expensive, and complex problem to deal with. \cite{ComplianceGovernance} It relates to the conformance to a set of laws, regulations, policies or best practices. \cite{ComplianceGovernance} These sets of rules are known as standards. Organisations can be required to take steps to put policies and controls in place that ensure conformity with the regulations outlined in their given compliance standard(s), the purpose of which is to safeguard the organisation against security threats. +\section{Technologies} + A variety of functionality was required to complete the application and this required the employment of a number of different technologies. Requirements included a fast and flexible frontend framework to reduce loading times and adapt quickly to changes from the backend, a realtime database to send those changes to the frontend, and good out-of-the-box security. - \subsection{Compliance in Cyber Security} - Cyber security is the body of technologies, processes, and practices designed to protect networks, computers, programs, and data from attack, damage, or unauthorized access. \cite{CSCRM} Cyber security standards have existed for a long time, affecting the necessary policies and practices of individuals and organisations over the last several decades. \cite{StanfordConsortium} Various regulations and legislation often struggle to keep up with the latest cyber threats due to the rapid evolution of the field. \cite{GDPR} As a result of the expanding pool of available tools, there is an ever-increasing number of people able to access the world of cyber crime. This makes it all the more crucial that conforming to the latest standards becomes an imperative for every company, regardless of the size of the enterprise. The hope for this project is that it will help to enable organisations to achieve compliance with any given standard in a cost effective manner. + \subsection{React} + React is a JavaScript library specialising in the development of user interfaces, developed and maintained by Facebook. \cite{React} React was chosen as the medium for the frontend due to it's manipulation of the virtual DOM, which reduces loading times; reuseable components to increase development speed, and built-in defence against Cross Site Scripting attacks. Given that the core of the application involves user inputting data to forms, the latter is especially important. - \subsection{Cyber Essentials} - The UK Government worked with the a number of other institutions to develop Cyber Essentials, a set of basic standards to help organisations defend themselves from common security threats online. \cite{CyberEssentials} The scheme is designed to prevent unskilled individuals from being able to find basic vulnerabilities in an organisation by providing advice, and two different levels of certification; \textquotedblleft Cyber Essentials\textquotedblright\ and \textquotedblleft Cyber Essentials Plus\textquotedblright. The former is a self-assessment designed to be light-weight and easy to follow, while in the latter, a certification body carries out the verification of the organisation\textquoteright s cyber security, instead of it being done by the company in question. + \subsubsection{Code Structure} + The structure of the React frontend is heavily influenced by create-react-app - a tool used in this project to get a head start on the setup and configuration of the frontend application. Since there is no recommended way to structure React projects, my opinion on the best way to do this for the remainder source code was to group by page, thereby simplying the process of finding and editing related components. -\section{Crime} - There has been a significant increase in cyber criminal activity in recent years. \cite{GDPR} The methods used by criminals are currently changing as businesses begin to be targeted more frequently than individuals. \cite{GDPR} Cyber crime is growing at a rapid rate, making it increasingly troublesome for regulations and legislation to keep pace, resulting in outdated laws that are often unfit for purpose. \cite{GDPR} + \subsubsection{Single Page Application and Routing} + Another reason for using the create-react-app tool is that it initialises the application as a single-page application (SPA), which further reduces the loading time for users. As an SPA, the entire frontend is loaded when the user enters the application, and it is not necessary to load anything further, even when navigating the app. From there all the routing between the different pages is done by React Router, a library of React components that are used to navigate between pages in an SPA. However, everything in React is a component, including the \textquoteleft pages\textquoteright, and so the beauty of React Router is that it allows redirection between components, and as such, will only need to re-render the relevant component(s) that are being loaded to the screen, as opposed to the entire page. + + \subsection{Google Firebase} + Firebase is Google's mobile application development platform. \cite{Firebase} It is used by many large applications such as Lyft, Venmo and Trivago for its multitude of services including hosting, authentication, database, storage and functions. -\section{Supply Chains} - Supply chain management is an integrating function with primary responsibility for linking major business functions and business processes within and across companies into a cohesive and high-performing business model. \cite{CSCRM} It includes all logistics management activities as well as manufacturing operations, and it drives coordination of processes and activities within and across marketing, sales, product design, finance, and information technology. \cite{CSCRM} - - \subsection{Supply Chain Security} - Supply chain security focuses on the potential threats associated with an organisation\textquoteright s suppliers of goods and services, many of which may have extensive access to resources and assets within the enterprise environment or to an organisation\textquoteright s customer environments - some of which may be sensitive in nature. \cite{CombattingCyberRisks} - -\section{Impacts} - Cyber attacks are financially devastating and disrupting to people and businesses. Successful attacks have the potential to expose personal information, leaving the victims of these security breaches vulnerable to fraud. \cite{CyberCrime} Victims are also left vulnerable to further attacks, using the information previously gathered by attackers. + \subsubsection{Firestore} + The benefit of using Firebase's database (called Firestore) is that data sent to the database is immediately forwarded on to relevant interested instances of the application, so changes made by one user can update another user in close to real time. In addition, you can add multiple apps to the service and they will all share the same database, making maintaining the application across multiple platforms, like Web, iOS and Android far easier. - \subsection{The Effect on Business and Loss of Confidence} - According to a survey by Ping Identity (a company that sells a number of cloud and software identity security solutions), 75\% of people stop engaging with a brand online following a data breach, as well as 59\% saying they were not willing to sign up to use an online service or application that had recently experienced a data breach. \cite{ITGovernance} In spite of this, 56\% said they are not willing to pay anything to application or online service providers for added security to protect their personal information. \cite{ITGovernance} - - \subsection{Legal consequences} - GDPR requires proper management of all the personal information held by an organisation. \cite{BusinessInfo} If this information is compromised, and that organisation has neglected to deploy basic security measures, it is possible they will face fines and regulatory sanctions. \cite{BusinessInfo} - - -\section{Case Study: Pouring Pounds Ltd} - Two cashback sites owned by Pouring Pounds Ltd were found to have leaked two terabytes worth of personally identifiable information and account data. This was made possible because of an unprotected database, which could be accessed through an exposed port on the company's server. The leak occured in October 2019 and has affected approximately 3.5 million individuals. \cite{z6mag} \ No newline at end of file + \subsubsection{Serverless Architecture} + Oohhhh confusing serverless server Architecture... and other misleading nomanclature. \ No newline at end of file diff --git a/report/7_TestingAndSoftwareValidation.tex b/report/7_TestingAndSoftwareValidation.tex index a8d2f16a344ea3687a2ecbfa5307aca93394311e..21ac9bc6150c60ce8c48fb7223bfd55883cef07a 100644 --- a/report/7_TestingAndSoftwareValidation.tex +++ b/report/7_TestingAndSoftwareValidation.tex @@ -3,12 +3,6 @@ %% ---------------------------------------------------------------- \chapter{TESTING AND SOFTWARE VALIDATION} -% Define your goal -% Do your research -% Ground summary in relevance -% Develop review logically -% Include references/works cited list - \section{Compliance} Compliance is an important, expensive, and complex problem to deal with. \cite{ComplianceGovernance} It relates to the conformance to a set of laws, regulations, policies or best practices. \cite{ComplianceGovernance} These sets of rules are known as standards. Organisations can be required to take steps to put policies and controls in place that ensure conformity with the regulations outlined in their given compliance standard(s), the purpose of which is to safeguard the organisation against security threats. diff --git a/report/8_ResultsAndAnalysis.tex b/report/8_ResultsAndAnalysis.tex index b97f0a6d132f64baeac6751ad9c9850cfa6892d1..b897fcf46bd87da6d278aa0ab7c1048887c7027d 100644 --- a/report/8_ResultsAndAnalysis.tex +++ b/report/8_ResultsAndAnalysis.tex @@ -3,12 +3,6 @@ %% ---------------------------------------------------------------- \chapter{RESULTS AND ANALYSIS} -% Define your goal -% Do your research -% Ground summary in relevance -% Develop review logically -% Include references/works cited list - \section{Compliance} Compliance is an important, expensive, and complex problem to deal with. \cite{ComplianceGovernance} It relates to the conformance to a set of laws, regulations, policies or best practices. \cite{ComplianceGovernance} These sets of rules are known as standards. Organisations can be required to take steps to put policies and controls in place that ensure conformity with the regulations outlined in their given compliance standard(s), the purpose of which is to safeguard the organisation against security threats. diff --git a/report/9_Evaluation.tex b/report/9_Evaluation.tex index da11d4afb29b9a171485bb33cf8ecfa6e33514c2..0a9bc195dce74e9523a82c4c32be89935accfb3f 100644 --- a/report/9_Evaluation.tex +++ b/report/9_Evaluation.tex @@ -3,39 +3,26 @@ %% ---------------------------------------------------------------- \chapter{EVALUATION} -% Define your goal -% Do your research -% Ground summary in relevance -% Develop review logically -% Include references/works cited list +\section{Design} -\section{Compliance} - Compliance is an important, expensive, and complex problem to deal with. \cite{ComplianceGovernance} It relates to the conformance to a set of laws, regulations, policies or best practices. \cite{ComplianceGovernance} These sets of rules are known as standards. Organisations can be required to take steps to put policies and controls in place that ensure conformity with the regulations outlined in their given compliance standard(s), the purpose of which is to safeguard the organisation against security threats. + \subsection{Design decisions} - \subsection{Compliance in Cyber Security} - Cyber security is the body of technologies, processes, and practices designed to protect networks, computers, programs, and data from attack, damage, or unauthorized access. \cite{CSCRM} Cyber security standards have existed for a long time, affecting the necessary policies and practices of individuals and organisations over the last several decades. \cite{StanfordConsortium} Various regulations and legislation often struggle to keep up with the latest cyber threats due to the rapid evolution of the field. \cite{GDPR} As a result of the expanding pool of available tools, there is an ever-increasing number of people able to access the world of cyber crime. This makes it all the more crucial that conforming to the latest standards becomes an imperative for every company, regardless of the size of the enterprise. The hope for this project is that it will help to enable organisations to achieve compliance with any given standard in a cost effective manner. - \subsection{Cyber Essentials} - The UK Government worked with the a number of other institutions to develop Cyber Essentials, a set of basic standards to help organisations defend themselves from common security threats online. \cite{CyberEssentials} The scheme is designed to prevent unskilled individuals from being able to find basic vulnerabilities in an organisation by providing advice, and two different levels of certification; \textquotedblleft Cyber Essentials\textquotedblright\ and \textquotedblleft Cyber Essentials Plus\textquotedblright. The former is a self-assessment designed to be light-weight and easy to follow, while in the latter, a certification body carries out the verification of the organisation\textquoteright s cyber security, instead of it being done by the company in question. +\section{Implementation} -\section{Crime} - There has been a significant increase in cyber criminal activity in recent years. \cite{GDPR} The methods used by criminals are currently changing as businesses begin to be targeted more frequently than individuals. \cite{GDPR} Cyber crime is growing at a rapid rate, making it increasingly troublesome for regulations and legislation to keep pace, resulting in outdated laws that are often unfit for purpose. \cite{GDPR} + \subsection{} -\section{Supply Chains} - Supply chain management is an integrating function with primary responsibility for linking major business functions and business processes within and across companies into a cohesive and high-performing business model. \cite{CSCRM} It includes all logistics management activities as well as manufacturing operations, and it drives coordination of processes and activities within and across marketing, sales, product design, finance, and information technology. \cite{CSCRM} - \subsection{Supply Chain Security} - Supply chain security focuses on the potential threats associated with an organisation\textquoteright s suppliers of goods and services, many of which may have extensive access to resources and assets within the enterprise environment or to an organisation\textquoteright s customer environments - some of which may be sensitive in nature. \cite{CombattingCyberRisks} +\section{Testing and Software Validation} -\section{Impacts} - Cyber attacks are financially devastating and disrupting to people and businesses. Successful attacks have the potential to expose personal information, leaving the victims of these security breaches vulnerable to fraud. \cite{CyberCrime} Victims are also left vulnerable to further attacks, using the information previously gathered by attackers. - - \subsection{The Effect on Business and Loss of Confidence} - According to a survey by Ping Identity (a company that sells a number of cloud and software identity security solutions), 75\% of people stop engaging with a brand online following a data breach, as well as 59\% saying they were not willing to sign up to use an online service or application that had recently experienced a data breach. \cite{ITGovernance} In spite of this, 56\% said they are not willing to pay anything to application or online service providers for added security to protect their personal information. \cite{ITGovernance} - \subsection{Legal consequences} - GDPR requires proper management of all the personal information held by an organisation. \cite{BusinessInfo} If this information is compromised, and that organisation has neglected to deploy basic security measures, it is possible they will face fines and regulatory sanctions. \cite{BusinessInfo} +\section{Comparison to Forerunner Projects} + \subsection{Example 1} -\section{Case Study: Pouring Pounds Ltd} - Two cashback sites owned by Pouring Pounds Ltd were found to have leaked two terabytes worth of personally identifiable information and account data. This was made possible because of an unprotected database, which could be accessed through an exposed port on the company's server. The leak occured in October 2019 and has affected approximately 3.5 million individuals. \cite{z6mag} \ No newline at end of file + \subsection{Example 2} + + \subsection{Example 3} + + +\section{Possible Improvement} \ No newline at end of file diff --git a/report/master.bib b/report/master.bib index a0bd83be1c295fb4529841ad6c84f621ff3e94c8..fc0ce54f5a834debc6e8c3ff311643cecc5ec19d 100644 --- a/report/master.bib +++ b/report/master.bib @@ -79,4 +79,14 @@ author = {z6mag}, title = {Two cashback sites leaked data of 3.5 million users}, url = {https://z6mag.com/2019/10/16/two-cashback-sites-leaked-data-of-3-5-million-users/} +} + +@misc{React, + author = {Facebook}, + url = {https://reactjs.org/} +} + +@misc{Firebase, + author = {Google}, + url = {https://firebase.google.com/} } \ No newline at end of file diff --git a/report/master.dvi b/report/master.dvi new file mode 100644 index 0000000000000000000000000000000000000000..5b51653874bf1a4d1e971a8e818b0757e89bdd2e Binary files /dev/null and b/report/master.dvi differ diff --git a/report/master.pdf b/report/master.pdf index 1190267f56b2859874648e8e05962b556d808663..b0641e2be8f209edc3dd1d6bb93789cb66ddac08 100644 Binary files a/report/master.pdf and b/report/master.pdf differ diff --git a/report/master.tex b/report/master.tex index 8a10d0d0c83d0d622a877a36708ac92eafbe9c8d..94d658d33653a869ea3374901b143a28e1d51014 100644 --- a/report/master.tex +++ b/report/master.tex @@ -45,7 +45,7 @@ \include{2_ProjectGoals} \include{3_BackgroundAndLiteratureReview} \include{4_RequirementsAndAnalysis} -\include{5_Designs} +\include{5_Design} \include{6_Implementation} \include{7_TestingAndSoftwareValidation} \include{8_ResultsAndAnalysis} diff --git a/report/report.bat b/report/report.bat new file mode 100644 index 0000000000000000000000000000000000000000..baf9aa8fb28da7e5beeb581664c2d651d6e90205 --- /dev/null +++ b/report/report.bat @@ -0,0 +1,7 @@ +@ECHO OFF +pdflatex master.tex +bibtex master +pdflatex master.tex +pdflatex master.tex + +start master.pdf diff --git a/report/report.sh b/report/report.sh new file mode 100644 index 0000000000000000000000000000000000000000..31c3d32bbc112576272ae96d96b986c374fa7f53 --- /dev/null +++ b/report/report.sh @@ -0,0 +1,3 @@ +#!/bin/bash + +cmd.exe /c report.bat