Research Article

An Efficient Identification of Security Threats in Requirement Engineering Methodology

Table 12

Examining Model Oriented Security Requirements Engineering and Identification of Security Threats during Requirement Engineering technique.

System asset-based security requirements evoked by Model Oriented Security Requirements Engineering

SR1During the checking process, we should use protected checking so that it does not send the password over the Internet.
SR2Utilize the protected communication channel.
SR3Utilize the encoding method based on isolated process call.
SR4Install the security system that blocks everything other than the communication ports.

System asset-based security requirements evoked by Identification of Security Threats during Requirement Engineering

SR1Use of entry control, checking, certification, ciphering, integrity control, and backup technique
SR2Motivate user to keep creating strong passwords
SR3Encoding method is used to limit the exposure of the user information
SR4Appropriate technique and firewall is used to grant right to the permitted user