Research Article

An Efficient Identification of Security Threats in Requirement Engineering Methodology

Table 1

ISTDRE technique steps.

StepMembersStrategyIntakeOutcome

Recognizing system targetsRequirement engineer, clientInterrogation, creative thinkingAimSystem objective
Recognizing and identifying the PartnersRequirement engineerExamineSystem objectivePartners
Approved the targetsRequirement engineer, partnersMeetingSystem objectiveApproved the targets
Recognizing VRRequirement engineer, partnersInterrogationPartners resourcePrecious resource
Examination of security threatsRequirement engineer, security expertSecurity attack examiningPrecious resourceHP, TP, SP, and RP
Recognizing and classifying the threatRequirement engineerSTRIDE examiningHP, TP, SP, and RPClassified and order of preference
Hazard valuation and recognizingRequirement engineer, hazard managerDREAD risk assessment technologyClassified and order of preferenceThreats
Security requirement evocationRequirement engineerThreat dictionaryThreatsSecurity requirements
Security requirement certificationRequirement engineer, security expertExamineSecurity requirementsImportant security requirement
Security requirement stipulation recordRequirement engineerRecordingImportant security requirementSecurity requirement stipulation record