Research Article

An Efficient Identification of Security Threats in Requirement Engineering Methodology

Table 9

Threats of the hospital ERP system.

TIDThreatsExplanationSTRIDEAlleviatedVR
STRIDE

T1User give hostile Structured Query Language (SQL) informationThere is a possibility of using the application by the hacker by including the Structured Query LanguageYesYesNoVR12
T2Exposure of sign-in informationThe information of sign-in details of permitted user is hacked by the hackersYesYesNoVR2, VR3, VR4
T3Hack of session IDThe information of session details of permitted user is hacked by the hackersYesNoVR11
T4Exposing the user informationIn order to raise the privacy issue, the information of the user data will be exposedYesYesNoVR5, VR6
T5Entering the DBDB of hospital ERP system will be attacked by the hackerYesYesYesYesYesVR1-VR6
T6Hacking sign in page of the adminIn the ERP system, the hacker hacks the admin page and then pretends to enter the system as the adminYesYesVR4
T7Notification of message is blockedThe permitted user will never receive any notification about his hack or about stealing any of his information.YesYesVR15
T8Falsification of user informationThe information of the permitted user will be modified by the hackerYesYesYesNoVR5, VR6
T9Removing the account of the userThe account of the permitted user will be deleted by the hackerYesYesYesVR2, VR3
T10ERP system crashingERP web application will be crashed by the hackerYesYesVR8
T11Unpermitted accessHacker hacks the sign-in information of the ERP systemYesYesVR5, VR6
T12Entering without sign inInformation of the permitted person will be hacked without signing inYesNoVR16