R-PMS Requirements : Package . Security Requirements : Requirement
Requirement - Logging Security Violations
link
| Properties |
| Name | Value | ||||||||||
| Description |
The solution shall keep a log of information related to the processes attempted to violate the security protocol including but not limited to the Denial of Service (DOS) attacks, repeated failed log-ins, attempts to insert malicious code, cross-scripting attempts etc. of The solution. The information of such a security violating process that need to be stored shall be defined in The solution design document. |
||||||||||
| Transit To |
|
||||||||||
| Id | R-PMS 17.24 | ||||||||||
| Stereotypes | System Requirements | ||||||||||
| Attributes |
| Name | Type | Value | |||
| Text | Text | ||||
| ID | Text | R-PMS 17.24 | |||
| Source | Text | ||||
| Kind | Ad Hoc Enumeration | Functional | |||
| ReqType | Ad Hoc Enumeration | E-Expected | |||
| Appears In |
| Diagram | |||
|
|
|||