Research Article

An Efficient Identification of Security Threats in Requirement Engineering Methodology

Table 7

Identified speculation point (SP).

SP IDSpeculation point (SP)Explanation

SP1e-PaymentIf any responsibility is given to the e-payment, then it should not allow the hacker to hack the security features.
SP2Payment gatewayThe ERP system must co-work with any security standards that may be installed in the future
SP3Encoded messageIf any data or information is included in the ERP system, it should work properly with the encoded standards.