Title | SRS project synopsis - Srs of cybersecurity |
---|---|
Author | Ajeet Ashish |
Course | Software Engineering |
Institution | Lovely Professional University |
Pages | 8 |
File Size | 314.1 KB |
File Type | |
Total Downloads | 10 |
Total Views | 148 |
Srs of cybersecurity ...
.
.
Software Requirements Specifications
360 Security-Internet Security
Prepared By: Name : B.Surendranath Reddy
Submited To:
Reg.no : 11703551
Ms.Suruchi Talwani
Roll.no : 44
Dept of CSE.
Page | 1
Table of Contents
1. Introduction 1.1 Purpose 1.2 Scope 1.3 Definations,Abbreviations 2. Functional Requirements 2.1 Installation of software 2.2 Installation setup 2.3 License Key 2.4 Validation of license key 2.5 Theme of software 3. Non-Functional Requirements 3.1 Performance Requirements 3.2 Safety Requirements 3.3 Security Requirements 3.4 Software Quality
4. Constraints 5. UML diagram and DFD
Page | 2
1. Introduction: The introduction of the Software Requirements Specification (SRS) provides an overview of the entire SRS with purpose, scope, definitions, acronyms, abbreviations, references and overview of the SRS . . The aim of this document is to gather and analyze and give an in-depth insight of the complete 360 Security Software System by defining the problem statement in detail. Nevertheless, it also concentrates on the capabilities required by stakeholders and their needs while defining high-level product features. The detailed requirements of the 360 Security are provided in this document.
1.1 Purpose The purpose of the document is to collect and analyze all assorted ideas that have come up to define the system, its requirements with respect to consumers. Also, we shall predict and sort out how we hope this product will be used in order to gain a better understanding of the project, outline concepts that may be developed later, and document ideas that are being considered, but may be discarded as the product develops.
In short, the purpose of this SRS document is to provide a detailed overview of our software product, its parameters and goals. This document describes the project's target audience and its user interface, hardware and software requirements. It defines how our client, team and audience see the product and its functionality. Nonetheless, it helps any designer and developer to assist in software delivery lifecycle (SDLC) processes.
1.2 Scope Antivirus software is a program that is designed to find and neutralize malware and viruses. These programs are able to scan your computer’s hard drive and identify files that are malicious or suspicious. The antivirus software can attempt to delete, quarantine, or trigger an alert when it detects files that are harmful. Additionally, many antivirus software suites also have settings that can prevent your computer from downloading or executing harmful files in the first place
Page | 3
1.3 Definations • Computer A computer is a device th at accepts information and manipulates it for some result based on a program or sequence of instructions on how the data is to be processed.
• Virus A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.
• Antivirus Antivirus (anti-virus) software is a class of program that will prevent, detect and remediate malware infections on individual computing devices and IT- systems.
• Internet A means of connecting a computer to any other computer anywhere in the world via dedicated routers and servers.
• Customer The person who uses the software. A customer can consist of one or more persons or corporations,the correspondence is not relevant to this problem.
• Virus Scan A
type of antivir us
program
that searches
a system
for
virus
signatures that have attached to execute programs and applications.
Page | 4
2. Functional Requirments The functional requirments are organized in two sections First requirements of the 360 Security antivirus and second requirements for authorization and requirements for a transaction.
2.1 Installation of Software
Description : Install 360 Total Security in the system. Input : 360 Total Security is installed in the system. Processing : Installing 360 Total Security. Output : 360 Total Security is ready to use.
2.2 Installation Setup Description : If the operating system does not support 360 Total Security Software, an error message displayed.
Input : Setup is installed. Processing : The operating system does not support the setup. Output : Display an error message . Abort installation process.
2.3 License Key Description : The software has to check if the entered license key is valid or not. Input : Customer enters the licence key. Processing : Check if it is a valid license key. It will be valid if information on the license key can be read.
Output : Display error message and ask the customer to re-enter the license key if it is invalid.
Page | 5
2.4 Validation of license key Description : If the locense key is valid, the 360 Total Security setup should be installed properly.
Input : Valid license key Processing : Installing the setup. Output : Initiate installation complete dialg. 2.5 Theme of software Description : The theme is to be selected by the user. Input : The theme is selected by the user. Processing : Applying the theme. Output : Update the theme.
3. Nonfunctional Requirments 3.1 Performance Requirements ➢ It must be able to perform in adverse conditions like high/low temperature etc. ➢ Uniterupted / interrupted conections ➢ High scanning rate
3.2 Safety Requirments ➢ The software must not be cracked easily. ➢ The code of the software must be abstract. ➢ Must have the privacy constraints.
3.3 Security Requirements ➢ Users accessibility is censured in all the ways. ➢ Users are advised to scan their system after every few days. ➢ Users are advised to remove the virus from the system which are suggested.
Page | 6
3.4 Software Quality ➢ Security. ➢ Performance
4. Constraints • Hardware constraints: The 360 Internet security must be able to access the database in order to get regular updates to perform action against new threats which tends to affect the working of any device and all the last scan details.
• Software constraints: The development of the system will be constrained by the availability of required software such as web servers, database and development tools.
5. Data Flow Diagram(DFD)
Level Zero DFD
0 Runs software
user
360 internet security
scans virus
Page | 7
Level 1
0.2
Check
contains
System protection
system
web details
0.1 0.3
360 security
system Web protection
unsecure
0.5
contains
unsafe
real time details
checks url address
system 0.4
unsecure
Real time protection
0.6
scan un-secure
Search url
data 0.7
scan url Scan
Contains all files
Scan files System 0.8 Files
secure
0.9 Safe
Page | 8...