Security Requirements Exercise Please read the following an
Security Requirements Exercise - Please read the following and based on the information provided, determine the following: A minimum of five security requirements that are associated with the software requirements provided (in the text(. Include the software requirements associated with each security requirement.
Security Requirements Exercise In this exercise, we are going to use the SmurfWare SmurfScanner as the basis for developing both the software systemrequirements as well as the security requirements. The description of SmurfWare SmurfScanner is as follows: the The SmurfWare SmurfScanner is a new biometric authentication device to keep non-Smurfs out of the Smurfland network. The biometric device is being dubbedthe SmurfScanner by Papa Smurf. The SmurfScanner is a hardware device that scans a user\'s skin color for blueness. Since onlySmurfs have that unique Saturday moming cartoon blue color, if the device can successfully identify the unique blue, thenthis will do for making a detemination as to whether or not a person really is a Smurf (or at least we make this assumption for the purposes of this exercise, be based in actual fact or not). The SmurfScanner is attached to a PC running MicroSmurf Windoze X via serial port. Along with an all-blue user manual and a blue SmurfWare coffee mug, the SmurfScanner comes with softwarethat allows it to act as the login screen manager in Windoze. To even get to the login screen, a users Smurfness has to be established by the SmurfScanner. Once calibrated by the manager application, the SmurfScanner retums whether or not a user is sufficiently blue The software architecture of this systemis represented in the diagram on page 2 of this assignment. Each box represents a separate process running on either the PC or the hardware of the SmurfScanner device Based on the SmurfWare SmurfScanner description and architecture, detemine the following: A minimum of five security requirements that are associated with the software requirements provided above. Include the software requirements associated with each security requirement (matrix) As provided in the Security Requirements reading assignment, security requirements should be Specific, Measurable/Testable, Actionable, Realistic, and Timely (SMART). Below is an example and please do not includethe example as one of your five requirements tumed in for this assignment. Req Software Requirements Security Requirements Establish a users Smurfness Implement biometric device that scans a users skin color for bluenessSolution
Based on the above documentation need to provide five Software requirements and associated security requirements
software Requirements Security requirements
a.) collect user details including all Gather all the employee details in excell or contact info and save the info confidentially.
b.) Once collected data got verified Maintain the security of the database, and cross checked save to the data base. since it was the key to compare with all collected info.
c.) Give authentication to people who can manage Admins have to be provided with unique the data base and granting privelages to the users. and high privelage login,since admin has role than the general user.
d.) Assign Master key for the concept to higher official Master key is necessary crosschecking and can have ultimate privelage over the system, even above the admins.
5.) Get associated fields like, log, brake detail, attendance Maintaining log details, attendance and associated details to monitor users.
