Research Article

An Efficient Identification of Security Threats in Requirement Engineering Methodology

Table 11

Security requirement of all the individual threat.

T IDSR IDSecurity requirement

T1SR1Use of developed statements with parameterized queries
T5SR2Use of entry control, checking, certification, ciphering, integrity control, backup technique
T10SR3Recognize the errors and update its version
T4SR4Encoding method is used to limit the exposure of the user information
T8SR5Appropriate technique and firewall is used to grant right to the permitted user
T6SR6Motivate user to keep creating strong passwords
T9SR7Strong passwords should be used for the account which has many failure attempts
T12SR8Virtual private network, secure sockets layer, and firewalls are used
T2SR9Direct Internet access by a firewall is used to protect the ERP system
T7SR10Guarantee the security of simple mail transfer protocol server
T11SR11Hard password and one-time passcode
T3SR12Secure sockets layer/hypertext transfer protocol secure is used to encode the ERP system

Note: T means threat; SR means security requirement.