SRS project synopsis - Srs of cybersecurity PDF

Title SRS project synopsis - Srs of cybersecurity
Author Ajeet Ashish
Course Software Engineering
Institution Lovely Professional University
Pages 8
File Size 314.1 KB
File Type PDF
Total Downloads 10
Total Views 148

Summary

Srs of cybersecurity ...


Description

.

.

Software Requirements Specifications

360 Security-Internet Security

Prepared By: Name : B.Surendranath Reddy

Submited To:

Reg.no : 11703551

Ms.Suruchi Talwani

Roll.no : 44

Dept of CSE.

Page | 1

Table of Contents

1. Introduction 1.1 Purpose 1.2 Scope 1.3 Definations,Abbreviations 2. Functional Requirements 2.1 Installation of software 2.2 Installation setup 2.3 License Key 2.4 Validation of license key 2.5 Theme of software 3. Non-Functional Requirements 3.1 Performance Requirements 3.2 Safety Requirements 3.3 Security Requirements 3.4 Software Quality

4. Constraints 5. UML diagram and DFD

Page | 2

1. Introduction: The introduction of the Software Requirements Specification (SRS) provides an overview of the entire SRS with purpose, scope, definitions, acronyms, abbreviations, references and overview of the SRS . . The aim of this document is to gather and analyze and give an in-depth insight of the complete 360 Security Software System by defining the problem statement in detail. Nevertheless, it also concentrates on the capabilities required by stakeholders and their needs while defining high-level product features. The detailed requirements of the 360 Security are provided in this document.

1.1 Purpose The purpose of the document is to collect and analyze all assorted ideas that have come up to define the system, its requirements with respect to consumers. Also, we shall predict and sort out how we hope this product will be used in order to gain a better understanding of the project, outline concepts that may be developed later, and document ideas that are being considered, but may be discarded as the product develops.

In short, the purpose of this SRS document is to provide a detailed overview of our software product, its parameters and goals. This document describes the project's target audience and its user interface, hardware and software requirements. It defines how our client, team and audience see the product and its functionality. Nonetheless, it helps any designer and developer to assist in software delivery lifecycle (SDLC) processes.

1.2 Scope Antivirus software is a program that is designed to find and neutralize malware and viruses. These programs are able to scan your computer’s hard drive and identify files that are malicious or suspicious. The antivirus software can attempt to delete, quarantine, or trigger an alert when it detects files that are harmful. Additionally, many antivirus software suites also have settings that can prevent your computer from downloading or executing harmful files in the first place

Page | 3

1.3 Definations • Computer A computer is a device th at accepts information and manipulates it for some result based on a program or sequence of instructions on how the data is to be processed.

• Virus A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.

• Antivirus Antivirus (anti-virus) software is a class of program that will prevent, detect and remediate malware infections on individual computing devices and IT- systems.

• Internet A means of connecting a computer to any other computer anywhere in the world via dedicated routers and servers.

• Customer The person who uses the software. A customer can consist of one or more persons or corporations,the correspondence is not relevant to this problem.

• Virus Scan A

type of antivir us

program

that searches

a system

for

virus

signatures that have attached to execute programs and applications.

Page | 4

2. Functional Requirments The functional requirments are organized in two sections First requirements of the 360 Security antivirus and second requirements for authorization and requirements for a transaction.

2.1 Installation of Software

Description : Install 360 Total Security in the system. Input : 360 Total Security is installed in the system. Processing : Installing 360 Total Security. Output : 360 Total Security is ready to use.

2.2 Installation Setup Description : If the operating system does not support 360 Total Security Software, an error message displayed.

Input : Setup is installed. Processing : The operating system does not support the setup. Output : Display an error message . Abort installation process.

2.3 License Key Description : The software has to check if the entered license key is valid or not. Input : Customer enters the licence key. Processing : Check if it is a valid license key. It will be valid if information on the license key can be read.

Output : Display error message and ask the customer to re-enter the license key if it is invalid.

Page | 5

2.4 Validation of license key Description : If the locense key is valid, the 360 Total Security setup should be installed properly.

Input : Valid license key Processing : Installing the setup. Output : Initiate installation complete dialg. 2.5 Theme of software Description : The theme is to be selected by the user. Input : The theme is selected by the user. Processing : Applying the theme. Output : Update the theme.

3. Nonfunctional Requirments 3.1 Performance Requirements ➢ It must be able to perform in adverse conditions like high/low temperature etc. ➢ Uniterupted / interrupted conections ➢ High scanning rate

3.2 Safety Requirments ➢ The software must not be cracked easily. ➢ The code of the software must be abstract. ➢ Must have the privacy constraints.

3.3 Security Requirements ➢ Users accessibility is censured in all the ways. ➢ Users are advised to scan their system after every few days. ➢ Users are advised to remove the virus from the system which are suggested.

Page | 6

3.4 Software Quality ➢ Security. ➢ Performance

4. Constraints • Hardware constraints: The 360 Internet security must be able to access the database in order to get regular updates to perform action against new threats which tends to affect the working of any device and all the last scan details.

• Software constraints: The development of the system will be constrained by the availability of required software such as web servers, database and development tools.

5. Data Flow Diagram(DFD)

Level Zero DFD

0 Runs software

user

360 internet security

scans virus

Page | 7

Level 1

0.2

Check

contains

System protection

system

web details

0.1 0.3

360 security

system Web protection

unsecure

0.5

contains

unsafe

real time details

checks url address

system 0.4

unsecure

Real time protection

0.6

scan un-secure

Search url

data 0.7

scan url Scan

Contains all files

Scan files System 0.8 Files

secure

0.9 Safe

Page | 8...


Similar Free PDFs