An Efficient Identification of Security Threats in Requirement Engineering Methodology
Table 13
Examining results of System Quality Requirements Engineering and Identification of Security Threats during Requirement Engineering technique.
Essential security requirements evoked by System Quality Requirements Engineering technology
SQ1
Entry point should have more security
SQ2
The framework must have sufficient procedure-driven and intelligent plans to manage which framework components (information, usefulness, and so on) clients can see, adjust, and connect with.
SQ6
It is necessary that the framework's system correspondences be secured from unapproved data gathering as well as listening stealthily by encryption and other sensible methods.
SQ7
Need of prior approval for any installation to be done in the system.
SQ8
It is important to protect the asset management system (even damage due to destruction, terrorism, or acts of God/nature).
Essential security requirements evoked by Identification of Security Threats during Requirement Engineering technique (ISTDRE)
SR1
Use of entry control, checking, certification, ciphering, integrity control, and backup technique
SR2
Motivate user to keep creating strong passwords
SR3
Encoding method is used to limit the exposure of the user information
SR4
Appropriate technique and firewall is used to grant right to the permitted user
SR5
In order to check the external security, use the HIPAA security standards.