Research Article

An Efficient Identification of Security Threats in Requirement Engineering Methodology

Table 6

Identified trust point (TP).

TP IDTrust point (TP)Explanation

TP1Remote user who is not permittedA user who has connected to the ERP system but has not provided valid credentials yet
TP2Remote user who is permittedUser who has certificate and has sign-in information like sign-in ID and password.
TP3AdminAdmin uses login information to access and modify the database
TP4Hypertext transfer protocol (HTTP) userHypertext transfer protocol (HTTP) is used to access the page.
TP5Hypertext transfer protocol secure (HTTPS) userHypertext transfer protocol secure (HTTPS) is used to access the page.
TP6Identification of web server processUsed to validate the web server to the database when saving or recovering information
TP7Identification of database server processProcedure indication is given to the accounts that used to process the DB server.