Research Article
An Efficient Identification of Security Threats in Requirement Engineering Methodology
Table 12
Examining Model Oriented Security Requirements Engineering and Identification of Security Threats during Requirement Engineering technique.
| System asset-based security requirements evoked by Model Oriented Security Requirements Engineering |
| SR1 | During the checking process, we should use protected checking so that it does not send the password over the Internet. | SR2 | Utilize the protected communication channel. | SR3 | Utilize the encoding method based on isolated process call. | SR4 | Install the security system that blocks everything other than the communication ports. |
| System asset-based security requirements evoked by Identification of Security Threats during Requirement Engineering |
| SR1 | Use of entry control, checking, certification, ciphering, integrity control, and backup technique | SR2 | Motivate user to keep creating strong passwords | SR3 | Encoding method is used to limit the exposure of the user information | SR4 | Appropriate technique and firewall is used to grant right to the permitted user |
|
|