Security Requirements Exercise Please read the following an

Security Requirements Exercise - Please read the following and based on the information provided, determine the following: A minimum of five security requirements that are associated with the software requirements provided (in the text(. Include the software requirements associated with each security requirement.

Security Requirements Exercise In this exercise, we are going to use the SmurfWare SmurfScanner as the basis for developing both the software systemrequirements as well as the security requirements. The description of SmurfWare SmurfScanner is as follows: the The SmurfWare SmurfScanner is a new biometric authentication device to keep non-Smurfs out of the Smurfland network. The biometric device is being dubbedthe SmurfScanner by Papa Smurf. The SmurfScanner is a hardware device that scans a user\'s skin color for blueness. Since onlySmurfs have that unique Saturday moming cartoon blue color, if the device can successfully identify the unique blue, thenthis will do for making a detemination as to whether or not a person really is a Smurf (or at least we make this assumption for the purposes of this exercise, be based in actual fact or not). The SmurfScanner is attached to a PC running MicroSmurf Windoze X via serial port. Along with an all-blue user manual and a blue SmurfWare coffee mug, the SmurfScanner comes with softwarethat allows it to act as the login screen manager in Windoze. To even get to the login screen, a users Smurfness has to be established by the SmurfScanner. Once calibrated by the manager application, the SmurfScanner retums whether or not a user is sufficiently blue The software architecture of this systemis represented in the diagram on page 2 of this assignment. Each box represents a separate process running on either the PC or the hardware of the SmurfScanner device Based on the SmurfWare SmurfScanner description and architecture, detemine the following: A minimum of five security requirements that are associated with the software requirements provided above. Include the software requirements associated with each security requirement (matrix) As provided in the Security Requirements reading assignment, security requirements should be Specific, Measurable/Testable, Actionable, Realistic, and Timely (SMART). Below is an example and please do not includethe example as one of your five requirements tumed in for this assignment. Req Software Requirements Security Requirements Establish a users Smurfness Implement biometric device that scans a users skin color for blueness

Solution

Based on the above documentation need to provide five Software requirements and associated security requirements

          software Requirements                                                 Security requirements

a.) collect user details including all                                                      Gather all the employee details in excell or contact info                                                                                   and save the info confidentially.

b.) Once collected data got verified                  Maintain the security of the database,          and cross checked save to the data base.    since it was the key to compare with all    collected info.

c.) Give authentication to people who can manage         Admins have to be provided with unique       the data base and granting privelages to the users.    and high privelage login,since admin has    role than the general user.

d.) Assign Master key for the concept to higher official Master key is necessary crosschecking    and can have ultimate privelage over the    system, even above the admins.

5.) Get associated fields like, log, brake detail, attendance    Maintaining log details, attendance and associated details to monitor users.                                                                                                      

Security Requirements Exercise - Please read the following and based on the information provided, determine the following: A minimum of five security requiremen

Get Help Now

Submit a Take Down Notice

Tutor
Tutor: Dr Jack
Most rated tutor on our site