Research Article
An Efficient Identification of Security Threats in Requirement Engineering Methodology
Table 6
Identified trust point (TP).
| TP ID | Trust point (TP) | Explanation |
| TP1 | Remote user who is not permitted | A user who has connected to the ERP system but has not provided valid credentials yet | TP2 | Remote user who is permitted | User who has certificate and has sign-in information like sign-in ID and password. | TP3 | Admin | Admin uses login information to access and modify the database | TP4 | Hypertext transfer protocol (HTTP) user | Hypertext transfer protocol (HTTP) is used to access the page. | TP5 | Hypertext transfer protocol secure (HTTPS) user | Hypertext transfer protocol secure (HTTPS) is used to access the page. | TP6 | Identification of web server process | Used to validate the web server to the database when saving or recovering information | TP7 | Identification of database server process | Procedure indication is given to the accounts that used to process the DB server. |
|
|