An Efficient Identification of Security Threats in Requirement Engineering Methodology

Author:

Subha R.1ORCID,Haldorai Anandakumar1ORCID

Affiliation:

1. Department of Computer Science and Engineering, Sri Eshwar College of Engineering, Coimbatore, Tamil Nadu, India

Abstract

Today, we completely rely on Information Technology (IT) applications for every aspect of daily life, including business and online transactions. In addition to using these IT-enabled applications for business purposes, we also use WhatsApp, Facebook, and a variety of other IT applications to communicate with others. However, there will undoubtedly be a drawback to every benefit. Since everything is linked to the Internet, there are many opportunities for security to be compromised. To address this, we are working to identify security threats early on in the software development process, specifically during the requirements phase. During the requirement engineering process, an engineer can recognize the security specifications in a more structured manner to create threat-free software. In our research work, we suggest the Identification of Security Threats during Requirement Engineering (ISTDRE) technique for detecting security risks throughout the requirement engineering process. The four points that make up this ISTDRE technique are Hack Point (HP), Speculation Point (SP), Trust Point (TP), and Reliable Point (RP). The new ISTDRE methodology will be validated using a case study of an ERP system involving two currently used methodologies: Model Oriented Security Requirements Engineering (MOSRE) and System Quality Requirements Engineering (SQUARE).

Publisher

Hindawi Limited

Subject

General Mathematics,General Medicine,General Neuroscience,General Computer Science

Reference32 articles.

1. Software security engineering: toward unifying software engineering and security engineering;M. Zulkernine,2016

2. The Trouble with Security Requirements

3. Software engineering for security

4. Requirements engineering in the year 00

5. A framework for security requirements engineering

Cited by 5 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Analysis of Missing Health Care Data by Effective Adaptive DASO Based Naive Bayesian Model;Journal of Machine and Computing;2023-10-05

2. Record Suppression with Personalized Security System;2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS);2023-03-17

3. An Emerging Era of Artificial Intelligence Research in Agriculture;Journal of Robotics Spectrum;2023-02-18

4. A Review of Artificial Intelligence and its Application in Business;Journal of Enterprise and Business Intelligence;2023-01-05

5. Adaptive fuzzy logic inspired path longevity factor-based forecasting model reliable routing in MANETs;Sensors International;2022

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3