Research Article
Mitigating Software Vulnerabilities through Secure Software Development with a Policy-Driven Waterfall Model
Table 2
Security vulnerabilities and risks for e-travel.
| | S. No. | Component | Type | Security vulnerability | Risk |
| | 1 | Make reservation | Process | Tampering, spoofing, repudiation, information disclosure, DoS, elevated access | High | | 2 | Prepare ticket | Process | ā | Low | | 3 | Make payment | Process | Spoofing, repudiation | Moderate | | 4 | Bookings and flight records | Database | Information disclosure, elevated access | Moderate | | 5 | Accounting file | Datastore | Information disclosure, elevated access | Moderate |
|
|