Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

I need help with this Assume that you are working on an online shipping system (

ID: 3911326 • Letter: I

Question

I need help with this

Assume that you are working on an online shipping system (similar to fedex.com). You have collected the requirements for the system and now you are working on documenting those requirements.

Specify three examples of security requirements similar to the example below

Type of Requirement System Value Estimates Definition Examples . The system is not mission critical, but a sys- Estimated business value of the system and its data tem outage is estimated to cost $50,000 per hour in lost revenue. . A complete loss of all system data is esti- mated to cost $20 million. Access Control Requirements Limitations on who can access what data . Only department managers will be able to change inventory items within their own department . Telephone operators will be able to read and create items in the customer file but cannot change or delete items. puter to website to provide secure ordering. be required to authenticate. viruses before being saved in the system. Defines what data will be encrypted Where Data will be encrypted from the user's com- Encryption and the Authentication and whether authentication will be needed for user access Requirements . Users logging in from outside the office will Virus Control Requirements to control the spread . All uploaded files will be checked for Requirements of viruses FIGURE 11-16 Security Requirements

Explanation / Answer

Answer)

The example are as follows:

1) Security assurance requirement:

These are the rules, regulations, as well as processes on which the software are being build or being deployed or to be operated.

Example : Software to be build with respect to SOA web services security standard.

2) Security Property Requirements :

This helps to specify the security properties which a software posesses.

Example : Software to ensure integrity, of the customer account informations.

3) Risk Management :

Risks should be identified, defined , managed as well as quantified.

Example : Antivirus proctection against virus,malware etc