Cargando…

An Efficient Identification of Security Threats in Requirement Engineering Methodology

Today, we completely rely on Information Technology (IT) applications for every aspect of daily life, including business and online transactions. In addition to using these IT-enabled applications for business purposes, we also use WhatsApp, Facebook, and a variety of other IT applications to commun...

Descripción completa

Detalles Bibliográficos
Autores principales: Subha, R., Haldorai, Anandakumar
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9410943/
https://www.ncbi.nlm.nih.gov/pubmed/36035846
http://dx.doi.org/10.1155/2022/1872079
_version_ 1784775209763471360
author Subha, R.
Haldorai, Anandakumar
author_facet Subha, R.
Haldorai, Anandakumar
author_sort Subha, R.
collection PubMed
description Today, we completely rely on Information Technology (IT) applications for every aspect of daily life, including business and online transactions. In addition to using these IT-enabled applications for business purposes, we also use WhatsApp, Facebook, and a variety of other IT applications to communicate with others. However, there will undoubtedly be a drawback to every benefit. Since everything is linked to the Internet, there are many opportunities for security to be compromised. To address this, we are working to identify security threats early on in the software development process, specifically during the requirements phase. During the requirement engineering process, an engineer can recognize the security specifications in a more structured manner to create threat-free software. In our research work, we suggest the Identification of Security Threats during Requirement Engineering (ISTDRE) technique for detecting security risks throughout the requirement engineering process. The four points that make up this ISTDRE technique are Hack Point (HP), Speculation Point (SP), Trust Point (TP), and Reliable Point (RP). The new ISTDRE methodology will be validated using a case study of an ERP system involving two currently used methodologies: Model Oriented Security Requirements Engineering (MOSRE) and System Quality Requirements Engineering (SQUARE).
format Online
Article
Text
id pubmed-9410943
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher Hindawi
record_format MEDLINE/PubMed
spelling pubmed-94109432022-08-26 An Efficient Identification of Security Threats in Requirement Engineering Methodology Subha, R. Haldorai, Anandakumar Comput Intell Neurosci Research Article Today, we completely rely on Information Technology (IT) applications for every aspect of daily life, including business and online transactions. In addition to using these IT-enabled applications for business purposes, we also use WhatsApp, Facebook, and a variety of other IT applications to communicate with others. However, there will undoubtedly be a drawback to every benefit. Since everything is linked to the Internet, there are many opportunities for security to be compromised. To address this, we are working to identify security threats early on in the software development process, specifically during the requirements phase. During the requirement engineering process, an engineer can recognize the security specifications in a more structured manner to create threat-free software. In our research work, we suggest the Identification of Security Threats during Requirement Engineering (ISTDRE) technique for detecting security risks throughout the requirement engineering process. The four points that make up this ISTDRE technique are Hack Point (HP), Speculation Point (SP), Trust Point (TP), and Reliable Point (RP). The new ISTDRE methodology will be validated using a case study of an ERP system involving two currently used methodologies: Model Oriented Security Requirements Engineering (MOSRE) and System Quality Requirements Engineering (SQUARE). Hindawi 2022-08-18 /pmc/articles/PMC9410943/ /pubmed/36035846 http://dx.doi.org/10.1155/2022/1872079 Text en Copyright © 2022 R. Subha and Anandakumar Haldorai. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
spellingShingle Research Article
Subha, R.
Haldorai, Anandakumar
An Efficient Identification of Security Threats in Requirement Engineering Methodology
title An Efficient Identification of Security Threats in Requirement Engineering Methodology
title_full An Efficient Identification of Security Threats in Requirement Engineering Methodology
title_fullStr An Efficient Identification of Security Threats in Requirement Engineering Methodology
title_full_unstemmed An Efficient Identification of Security Threats in Requirement Engineering Methodology
title_short An Efficient Identification of Security Threats in Requirement Engineering Methodology
title_sort efficient identification of security threats in requirement engineering methodology
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9410943/
https://www.ncbi.nlm.nih.gov/pubmed/36035846
http://dx.doi.org/10.1155/2022/1872079
work_keys_str_mv AT subhar anefficientidentificationofsecuritythreatsinrequirementengineeringmethodology
AT haldoraianandakumar anefficientidentificationofsecuritythreatsinrequirementengineeringmethodology
AT subhar efficientidentificationofsecuritythreatsinrequirementengineeringmethodology
AT haldoraianandakumar efficientidentificationofsecuritythreatsinrequirementengineeringmethodology