Security Modeling for Web Based Visitor‘s Login System for Pursuance of Security Design Pattern
Yogini C. Kulkarni1, S. D. Joshi2
1Yogini C. Kulkarni*, Information Technology Department , Bharati Vidyapeeth (Deemed To Be University) Pune, India.
2Prof. Dr. S .D. Joshi , Computer Engineering Department Bharati Vidyapeeth (Deemed To Be University) Pune, India.
Manuscript received on October 16, 2019. | Revised Manuscript received on 22 October, 2019. | Manuscript published on November 10, 2019. | PP: 982-991 | Volume-9 Issue-1, November 2019. | Retrieval Number: A4580119119/2019©BEIESP | DOI: 10.35940/ijitee.A4580.119119
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: In recent years because of the widespread use of internet and other communication media security occurrences have broken all the barricades. System gets attacked by malicious attackers and various cyber criminalities. Every system should be built by taking security as a main priority while building a system so as to make it reliable, safety and also it should be enhanced with other quality parameters. Hence since beginning at every phase of software development till the implementation of the software, security aspect is needed to take into consideration before making the final design decision to avoid the expenses which may incur while recovering of the system after the damage. For attainment of this, it is must to integrate the security at each phase of the software development. The software developers insists on incorporating the software safeguards at the design phase which may wind up in identifying the architecture restrictions related with the security which in fact may not be necessary. To reduce this problem, this paper intends a structure for security development activities. These activities consist of security requirements identification and threats analysis which are to be converted into design decisions to lessen the risks to identified important assets. The recognized design parameters are then manually prioritized using VOSREP and CRAMM and accordingly Security design pattern is to be developed to incorporate security in the software. By manually calculating values of assets and prioritizing will help to identify the security requirements at the early stage of the software development life cycle. Accordingly the decisions for developing the security design pattern are to be taken for building the software system
Keywords: Security Engineering process, Security Requirement Elicitation, Security modelin
Scope of the Article: Requirements Engineering