Research Article

An Efficient Identification of Security Threats in Requirement Engineering Methodology

Table 13

Examining results of System Quality Requirements Engineering and Identification of Security Threats during Requirement Engineering technique.

Essential security requirements evoked by System Quality Requirements Engineering technology

SQ1Entry point should have more security
SQ2The framework must have sufficient procedure-driven and intelligent plans to manage which framework components (information, usefulness, and so on) clients can see, adjust, and connect with.
SQ6It is necessary that the framework's system correspondences be secured from unapproved data gathering as well as listening stealthily by encryption and other sensible methods.
SQ7Need of prior approval for any installation to be done in the system.
SQ8It is important to protect the asset management system (even damage due to destruction, terrorism, or acts of God/nature).

Essential security requirements evoked by Identification of Security Threats during Requirement Engineering technique (ISTDRE)

SR1Use of entry control, checking, certification, ciphering, integrity control, and backup technique
SR2Motivate user to keep creating strong passwords
SR3Encoding method is used to limit the exposure of the user information
SR4Appropriate technique and firewall is used to grant right to the permitted user
SR5In order to check the external security, use the HIPAA security standards.