Research Article
An Efficient Identification of Security Threats in Requirement Engineering Methodology
Table 2
Recognizing system targets for hospital ERP.
| Target ID | Explanation |
| T1 | All the secret information has to be protected when the hospital ERP system is installed on the web server. | T2 | The next target is to install the hospital ERP safely on the DB server (database). | T3 | We should use the firewall to protect the DB server from unauthorized access through the Internet. | T4 | We should use the firewall to protect the web server from unauthorized access through the Internet. | T5 | For straight entry, hypertext transfer protocol secure and hypertext transfer protocol ports are only to be permitted. | T6 | Transmission between the database server and the web server should take place over a secure network. | T7 | We should use hypertext transfer protocol secure to deploy the hospital management system. |
|
|