360 Security Synopsis
360 Security Synopsis
Specification
For
Acknowledgement
This project would not have been possible without the guidance and
support technical and personal of a number of people. I would like to
thank my subject teacher for helping me and guiding me out in this
project and giving me ideas and insights on how to make this project. I
went through many websites and also referred the “360 degree internet
security” official website for this.
-ii-
Software Requirements Specification for <360 Security> - iii -
Table of Contents
1. Introduction
1.1 Purpose
This document describes the software requirements and specification for an antivirus i.e. 360 Total
Securities. It provides a detailed overview of our software product, its parameters and goals. This
document describes the project's target audience and its user interface, hardware and software
requirements. It defines how our client, team and audience see the product and its functionality.
Nonetheless, it helps any designer and developer to assist in software delivery lifecycle (SDLC)
processes. The system can be divided into BOOST, CLEAN & ANTI-VIRUS.
Software Requirements Specification for <360 Total Security > Page 2
1.3 Intended Audience and Reading Suggestions (Intended audience is defined as the group
of people for which a service or product is designed)
The document is intended for all the stakeholders’ customer and the developer (designers, testers,
maintainers). The reader is assumed to have basic knowledge of Malwares, Computer worms and
Trojans required. Knowledge and understanding of antivirus working is also required.
1.4.1 Definitions
It is a free security protection against any virus, malware and computer worms. It is also designed to
provide protection against internet theft and allows the user to boost up device speed and clear junk
files at same time. It is available for various platforms like Windows, IOS and Android.
Antivirus
Antivirus (or anti-virus) software is used to safeguard a computer from malware, including
viruses, computer worms, and Trojan horses. Antivirus software may also remove or
prevent spyware and adware, along with other forms of malicious programs.
Virus
A piece of code which is capable of copying itself and typically has a detrimental effect,
such as corrupting the system or destroying data.
Malware
Software Requirements Specification for <360 Total Security > Page 3
Trojans
It is a program designed to breach the security of a computer system while ostensibly performing
some innocuous function.
Users
A person who uses or operates something. The person who works within the device based operating
environment
Device
A thing made or adapted for a particular purpose, especially a piece of mechanical or
electronic equipment.
1.4.2 Abbreviations
1.4.3 References
1. Wikipedia
3. Youtube
Software Requirements Specification for <360 Total Security > Page 4
This is computer software used to prevent, detect and remove malicious software. Antivirus
software was originally developed to detect and remove computer viruses, hence the name.
However, with the proliferation of other kinds of malware, antivirus software started to provide
protection from other computer threats.
Overall Description
The 360 Total Security does not work independently. It works together with the system Kernel and
the operating system installed in the device.
Communication interface: The 360 Total Security communicate with the service provider via a
communication network.
Software interface: The software will run on any device based on Windows, Android and IOS
User interfaces:
Customer: The customer user interface should be used, such that 99.9% of all new product users
are able to remove and filter the threats without any assistance.
Software Requirements Specification for <360 Total Security > Page 5
Software Security Personnel: Software security personnel are responsible for removing deposits
and adding new updates. There should be a simple interface (e.g., a switch or button) that they can
use to initialize the scan whenever they restock.
Maintainer: The maintainer is responsible for adding new updates to the softwares and servicing
existing version of software. A maintainer should be possible to add a new update to the software
within 1 week.
The 360 Total Security provides real time protection every time. The software identifies a user by a
software version and key. It collects information about a simple account registration details(e.g.,
deposit, withdrawal, transfer, bill payment), communicates the transaction information to the
customers bank, and dispenses cash to the customer. The banks provide their own software for their
own computers. The bank software requires appropriate record keeping and security provisions. The
software must handle concurrent accesses to the same account correctly.
Software Requirements Specification for <360 Total Security > Page 6
Customers are simply members of the general public with no special training.
Maintainers must be experienced network administrators, to be able to get new updates to the
softwares.
The hardware, software and technology used should have following specifications:
Registration
Validate Antivirus:
Validate that the software expiration date is later than today's date
If the software is not genuine, prompt error message, "This version is already in use"
If serial key is blank, prompt error message "Please provide serial key"
If password does not match, prompt error message "Invalid Serial Key"
2. Specific Requirements
The functional requirements are organized in two sections First requirements of the software and
second requirements of the device.
The requirements for 360 Total Security are organized in the following way General requirements,
requirements for authorization, requirements for a validation.
General
Functional requirement 1:
Functional requirement 2:
Description: If no software in the device, the system should display initial display.
Functional requirement 3:
Authorization: The authorization starts after a user has run the software in the device
Software Requirements Specification for <360 Total Security > Page 9
Functional requirement 4:
Description: The software has to check if the entered key is valid serial key.
It is not expired.
Functional requirement 5:
Description: If it is valid, the software should read the serial number and linked address.
Functional requirement 6:
Functional requirement 7:
Description Authorization dialog: The user is requested to enter his serial key. The 360
Total Securities verifies information and password with the service provider.
Processing: Send serial number and password to service provider, receive response from
team.
Software Requirements Specification for <360 Total Security > Page 10
Functional requirement 8:
Description: Different negative answers from service provider for authorization dialog.
- bad bank code” if the serial key is not supported by the service provider.
Processing: If the antivirus gets any of these messages from the bank computer, the software
copy will be terminated and the user will get the relevant error message.
Functional requirement 9:
Description: If password and serial number are ok, the authorization process is finished.
Input: The software gets accept from the team for authorization process.
Description: If a serial key entered more than three times in a row in a software and the
password was wrong each time, a message will be displayed that the customer should call
the team.
Input: Entering a wrong serial key for the fourth time in succession
Processing: Initiate authorization process Response from service provider is to keep the
genuine software.
Output: Display error message that the customer should call the service provider.
Software Requirements Specification for <360 Total Security > Page 11
Functions: These are the requirements for the different functions the 360 Total Security should
provide after authorization.
Authorization
The antivirus gets verified by its developer via internet from anywhere around the world.
Functional requirement 1:
Description: The software provider checks if the antivirus has valid serial key. A serial key
is valid if the software was issued by the developer’s team themselves only.
Input: Request from the software provider to verify software copy (Serial number and
password.)
Functional requirement 2:
Description: If it is not a valid serial key, the 360 Security will send a message to the main
developer team.
Output: The software sends the message “Invalid Serial Key” to the Device.
Functional requirement 3:
Description: The installed software checks if the Serial key is valid for a valid antivirus
copy.
Functional requirement 4:
Description: If it is not a valid serial key, the service provider will send a message to the
device.
Processing: Process message. Update count for invalid key for the account.
Output: The bank computer sends the message “Invalid Serial Key” to the ATM.
Functional requirement 5:
Description: If it is valid software and a valid serial key but there are problems with the
account, the bank will send a message to the device that there are problems.
Functional requirement 6:
Description: If it is valid software with a valid key and there are no problems with the
product the service provider will send a message to the team that everything is ok.
Functional requirement 7:
Output: Updated
Functional requirement 8:
Description: Each software has a limit k for which it can protect the device from any
external threats.
Output: If the validity exceeds the limit, the software will stop protecting device from
threats. .
Functional requirement 9:
Description: The 360 Total Security only provides security for their own computer and their
own devices.
The user interface should be intuitive, such that 99.9% of all new users are able to understand the
software working to scan any drive.
Software Requirements Specification for <360 Total Security > Page 14
The software interfaces are specific to the target protection against any threats.
Software Requirements Specification for <360 Total Security > Page 15
It must be able to perform in adverse conditions like high/low ram usage etc.
Users are advised update the software as soon as the new update is available.
Security
Performance
5.4.1 Availability: The Antivirus should have a real time protection and run behind every process.
Software Requirements Specification for <360 Total Security > Page 16
5.4.2 Security: The antivirus should provide maximal security .In order to make that much more
transparent there are the following requirements:
5.4.3 Maintainability:
Maintain customer profile:
The system shall provide online help, FAQ’s customer support, and sitemap options for customer
support.
The system shall allow user to select the support type he wants.
The system shall allow user to enter the customer and product information for the support.
The system shall display the customer support contact numbers on the screen.
The system shall allow user to enter the contact number for support personnel to call.
The system shall display the online help upon request.
The system shall display the FAQ’s upon request.
Email confirmation:
The system shall maintain customer email information.
The system shall enable user to enter the search text on the screen.
The system shall enable user to select multiple options on the screen to search.
The system shall display all the matching products based on the search
The system shall notify the user when no matching product is found on the search.
Software Requirements Specification for <360 Total Security > Page 17
6. Other Requirements
The 360 Total Security must be able to access the data base in order to get regular updates to
perform action against new threats which tends to affect the working of any device and all the last
scan details.
A data flow diagram (DFD) maps out the flow of information for any process or system. It uses
defined symbols like rectangles, circles and arrows, plus short text labels, to show data inputs,
outputs, storage points and the routes between each destination. Data flowcharts can range from
simple, even hand-drawn process overviews, to in-depth, multi-level DFDs that dig progressively
deeper into how the data is handled. They can be used to analyze an existing system or model a new
one. Like all the best diagrams and charts, a DFD can often visually “say” things that would be hard
to explain in words
Software Requirements Specification for <360 Total Security > Page 18
A class diagram in the Unified Modeling Language (UML) is a type of static structure diagram that
describes the structure of a system by showing the system's classes, their attributes, operations (or
methods), and the relationships among objects.
2. Diagram provides basic notation for other structure diagrams prescribed by UML
4. Business Analysts can use class diagrams to model systems from business perspective
Software Requirements Specification for <360 Total Security > Page 19
A use case diagram at its simplest is a representation of a user's interaction with the system that
shows the relationship between the user and the different use cases in which the user is involved. A
use case diagram can identify the different types of users of a system and the different use cases and
will often be accompanied by other types of diagrams as well.
Software Requirements Specification for <360 Total Security > Page 20
Pre-requisite: Valid user account Description: First a user has to enter a valid e-mail
address and password to login.