Improving Security And Privacy Requirement For Business Registration System (BRS)

Security is about prevention of several difficulties due to the presence of attackers performing malicious activities and software security is definitely a complex task due to several reasons such as rapid development in networking, systems are easily extensible and the rise of system complexity. Security and privacy is one of primary concern and provide a trustworthy for computing environment. Security and privacy is a most essential concept for understanding level of secure software and also to guarantee user satisfaction. Security and privacy is a serious problem in software development, and may become much worse in the future [1]. This is due to millions of dollars in losses are the result of attacks on unsecured system. Realizing security issues during the requirement phase can help to tackle the risks in order to avoid rework, to ensure time and effort consuming for software development. Security and privacy requirement may affect the functional of the system and needed to be satisfied in order to achieve the security attributes of an IT system. Hence, in development of web based application such as e-commerce, hotel reser-vation, health operation system and business registration system should also take consideration on security and privacy matters. Business Registration System (BRS) is an online application available 24 x 7 to facilitate the citizen of Malaysia to register and acquire approval and certifica-tion for their business activities. Despite that this online channel increasingly became very popu-lar, there are few issues regarding security and privacy parameters that need to take into consid-eration such as authentication, encryption, confidentiality, authorization, access control, integrity and availability.

[1]  R. Saranya,et al.  Survey on Security Measures of Software Requirement Engineering , 2014 .

[2]  John Mylopoulos,et al.  Security and privacy requirements analysis within a social setting , 2003, Proceedings. 11th IEEE International Requirements Engineering Conference, 2003..

[3]  Nurlida Basir,et al.  Security metrics to improve misuse case model , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).

[4]  Davor Svetinovic,et al.  Evaluating the effectiveness of the security quality requirements engineering (SQUARE) method: a case study using smart grid advanced metering infrastructure , 2012, Requirements Engineering.

[5]  Michael N. Johnstone Modelling misuse cases as a means of capturing security requirements , 2011 .

[6]  Walid G. Aref,et al.  Security models for web-based applications , 2001, CACM.