Implementation of Square Methods in Analyzing the Security of an Application System

Suhaemi, Suhaemi and Permana, H and Sunarto, A and Murtiningsih, D and Napitupulu, D and Rahim, R (2019) Implementation of Square Methods in Analyzing the Security of an Application System. In: ICASI 2019, 18 July 2019, Banda Aceh, Indonesia.

[thumbnail of PDF]
Preview
Text (PDF)
eai.18-7-2019.2288579.pdf - Published Version

Download (190kB) | Preview

Abstract

An application system connected to a computer network connection and connected to the internet should be concerned about its security issues. Security aspects of an application system such as secured confidentiality, integrity, and availability of data and information stored and processed in an application system is very important to maintain the smooth running of an information system. Therefore, an application system firstly should be analysed its security system for the application system could run well without any threats that interfere with the process of a system. In this review paper, the method used to analyze the security needs of an application system is using square method (System Quality Requirements Engineering). This method consists of nine stages developed for helping to analyze security needs.

Item Type: Conference or Workshop Item (Paper)
Uncontrolled Keywords: square method security system application review
Subjects: T Technology > T Technology (General)
Depositing User: EAI Editor IV
Date Deposited: 10 Sep 2021 13:48
Last Modified: 10 Sep 2021 13:48
URI: https://eprints.eudl.eu/id/eprint/6723

Actions (login required)

View Item
View Item