Research Article
An Efficient Identification of Security Threats in Requirement Engineering Methodology
Table 11
Security requirement of all the individual threat.
| T ID | SR ID | Security requirement |
| T1 | SR1 | Use of developed statements with parameterized queries | T5 | SR2 | Use of entry control, checking, certification, ciphering, integrity control, backup technique | T10 | SR3 | Recognize the errors and update its version | T4 | SR4 | Encoding method is used to limit the exposure of the user information | T8 | SR5 | Appropriate technique and firewall is used to grant right to the permitted user | T6 | SR6 | Motivate user to keep creating strong passwords | T9 | SR7 | Strong passwords should be used for the account which has many failure attempts | T12 | SR8 | Virtual private network, secure sockets layer, and firewalls are used | T2 | SR9 | Direct Internet access by a firewall is used to protect the ERP system | T7 | SR10 | Guarantee the security of simple mail transfer protocol server | T11 | SR11 | Hard password and one-time passcode | T3 | SR12 | Secure sockets layer/hypertext transfer protocol secure is used to encode the ERP system |
|
|
Note: T means threat; SR means security requirement. |