Research Article

An Efficient Identification of Security Threats in Requirement Engineering Methodology

Table 4

Identified assets of the college ERP system.

Value resource IDNameDescription

VR1Patient, doctor, and adminThe value resource that relates to a patient, doctor, and admin
VR2Patient’s login dataThe patient’s credentials: username and password
VR3Doctor login dataThe doctor’s credentials: username and password
VR4Admin login dataThe admin’s credentials: username and password
VR5Patient’s personal dataThe personal data that the patient enters, such as patient record
VR6Doctor’s personal dataThe personal data that the doctor, such as doctor record and assets
VR7SystemValue resource that relates to the importance of the system
VR8Accessibility of ERP systemIf the hospital ERP system goes down, patient/and doctor cannot request or receive quotes.
VR9ProcedureValue resources that relate to the process of running the web application
VR10RequestValue resources that relate to the web application
VR11LoginThe web session associated with a logged-in patient, doctor, or admin
VR12Backend DB sessionThe ability to interact with the database that stores, patient’s data, doctor’s data, and login credentials
VR13Patient fee detailsThe patient’s fee record must be secure. Manipulation of the data causes loss in data.
VR14Doctor salary detailsThe doctor’s salary record must be secure. Manipulation of the data causes loss in data.
VR15Message notificationThe message notification contains the information for patients and doctors
VR16Audit dataAttackers might try to attack the system without being logged or audited
VR17Access to the recordAuthorized people only able to view the record