Research Article

An Efficient Identification of Security Threats in Requirement Engineering Methodology

Table 10

Threats are prioritized based on their DREAD risk value.

Threat IDThreatDREAD valueAlleviated

T1User give hostile structure query language (SQL) information10No
T5Entering the DB10Yes
T10ERP system crashing10Yes
T4Exposing the user information9.2No
T8Falsification of user information9.2No
T6Hacking sign in page of the admin7.6Yes
T9Removing the account of the user7.6Yes
T12Entering without sign in7.6No
T2Exposure of sign-in information6.6No
T7Notification of message is blocked6.4Yes
T11Unpermitted access5.2Yes
T3Hack of session ID3.8No