Research Article

An Efficient Identification of Security Threats in Requirement Engineering Methodology

Table 2

Recognizing system targets for hospital ERP.

Target IDExplanation

T1All the secret information has to be protected when the hospital ERP system is installed on the web server.
T2The next target is to install the hospital ERP safely on the DB server (database).
T3We should use the firewall to protect the DB server from unauthorized access through the Internet.
T4We should use the firewall to protect the web server from unauthorized access through the Internet.
T5For straight entry, hypertext transfer protocol secure and hypertext transfer protocol ports are only to be permitted.
T6Transmission between the database server and the web server should take place over a secure network.
T7We should use hypertext transfer protocol secure to deploy the hospital management system.