Research Article

An Efficient Identification of Security Threats in Requirement Engineering Methodology

Table 5

Identified hack points (HP).

HP IDHack point (HP)Explanation

HP1Hypertext transfer protocol secure (HTTPS)HTTPS port that the web server listens on
HP2Access pagePage for patients or doctor to create an access and perform an access to the site to begin requesting or reviewing records
HP3Create access functionCreates a new patient or doctor access
HP4Access to site functionCompares authorized person login details to those in the DB and if credentials match, create a new session
HP5Entry pageIn this page, doctors’ and patients’ personal data will be entered into the DB.
HP6Recover data functionPermit the allowed person to recover the DB.
HP7Presenting data functionPermit admin to recover the doctor and patient data
HP8Admin evolution pagePermit admin to recover the doctor and patient demand
HP9Recover data functionRecover doctor and patient data
HP10Presenting data functionPresenting any data information for the student or staff
HP11List demand functionLists requests are ready for examination.
HP12DB listening portsPermit the DB to be used remotely by authorized persons
HP13DB stored proceduresRecover and save information in the DB
HP14Access processBuild access page for permitted persons
HP15Removing access processSign out from the hospital ERP system
HP16Store user data procedureUsed to store user data from the entry page of the ERP system
HP17Recover user data procedureRecovers the user’s data and request