Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

. .

Software Requirements Specifications

360 Security-Internet Security

Prepared By:
Name : B.Surendranath Reddy Submited To:
Reg.no : 11703551 Ms.Suruchi Talwani
Roll.no : 44 Dept of CSE.

Page | 1
Table of Contents

1. Introduction
1.1 Purpose
1.2 Scope
1.3 Definations,Abbreviations
2. Functional Requirements
2.1 Installation of software
2.2 Installation setup
2.3 License Key
2.4 Validation of license key
2.5 Theme of software
3. Non-Functional Requirements
3.1 Performance Requirements
3.2 Safety Requirements
3.3 Security Requirements
3.4 Software Quality

4. Constraints
5. UML diagram and DFD

Page | 2
1. Introduction:
The introduction of the Software Requirements Specification (SRS) provides an overview of
the entire SRS with purpose, scope, definitions, acronyms, abbreviations, references and
overview of the SRS . . The aim of this document is to gather and analyze and give an in-depth
insight of the complete 360 Security Software System by defining the problem statement in
detail. Nevertheless, it also concentrates on the capabilities required by stakeholders and their
needs while defining high-level product features. The detailed requirements of the 360
Security are provided in this document.

1.1 Purpose

The purpose of the document is to collect and analyze all assorted ideas that have come up to
define the system, its requirements with respect to consumers. Also, we shall predict and sort
out how we hope this product will be used in order to gain a better understanding of the project,
outline concepts that may be developed later, and document ideas that are being considered,
but may be discarded as the product develops.

In short, the purpose of this SRS document is to provide a detailed overview of our software
product, its parameters and goals. This document describes the project's target audience and its
user interface, hardware and software requirements. It defines how our client, team and
audience see the product and its functionality. Nonetheless, it helps any designer and developer
to assist in software delivery lifecycle (SDLC) processes.

1.2 Scope

Antivirus software is a program that is designed to find and neutralize malware and viruses. These programs
are able to scan your computer’s hard drive and identify files that are malicious or suspicious.
The antivirus software can attempt to delete, quarantine, or trigger an alert when it detects files
that are harmful. Additionally, many antivirus software suites also have settings that can prevent your
computer from downloading or executing harmful files in the first place

Page | 3
1.3 Definations
• Computer

A computer is a device that accepts information and manipulates it for some


result based on a program or sequence of instructions on how the data is to be
processed.

• Virus
A computer virus is a program or piece of code that is loaded onto your
computer without your knowledge and runs against your wishes.

• Antivirus
Antivirus (anti-virus) software is a class of program that will prevent, detect and remediate malware
infections on individual computing devices and IT- systems.

• Internet
A means of connecting a computer to any other computer anywhere in the
world via dedicated routers and servers.

• Customer
The person who uses the software. A customer can consist of one or more persons or
corporations,the correspondence is not relevant to this problem.

• Virus Scan
A type of antivirus program that searches a system for virus
signatures that have attached to execute programs and applications.

Page | 4
2. Functional Requirments
The functional requirments are organized in two sections First requirements of the
360 Security antivirus and second requirements for authorization and requirements
for a transaction.

2.1 Installation of Software

Description : Install 360 Total Security in the system.


Input : 360 Total Security is installed in the system.
Processing : Installing 360 Total Security.
Output : 360 Total Security is ready to use.

2.2 Installation Setup


Description : If the operating system does not support 360 Total Security Software,
an error message displayed.
Input : Setup is installed.
Processing : The operating system does not support the setup.
Output : Display an error message . Abort installation process.

2.3 License Key


Description : The software has to check if the entered license key is valid or not.
Input : Customer enters the licence key.
Processing : Check if it is a valid license key. It will be valid if information on the
license key can be read.
Output : Display error message and ask the customer to re-enter the license key if it
is invalid.

Page | 5
2.4 Validation of license key
Description : If the locense key is valid, the 360 Total Security setup should be installed
properly.
Input : Valid license key
Processing : Installing the setup.
Output : Initiate installation complete dialg.

2.5 Theme of software


Description : The theme is to be selected by the user.
Input : The theme is selected by the user.
Processing : Applying the theme.
Output : Update the theme.

3. Nonfunctional Requirments

3.1 Performance Requirements

➢ It must be able to perform in adverse conditions like high/low temperature etc.


➢ Uniterupted / interrupted conections
➢ High scanning rate

3.2 Safety Requirments

➢ The software must not be cracked easily.


➢ The code of the software must be abstract.
➢ Must have the privacy constraints.

3.3 Security Requirements

➢ Users accessibility is censured in all the ways.


➢ Users are advised to scan their system after every few days.
➢ Users are advised to remove the virus from the system which are suggested.

Page | 6
3.4 Software Quality

➢ Security.
➢ Performance

4. Constraints

• Hardware constraints:
The 360 Internet security must be able to access the database in order to get regular
updates to perform action against new threats which tends to affect the working of any
device and all the last scan details.

• Software constraints:
The development of the system will be constrained by the availability of required
software such as web servers, database and development tools.

5. Data Flow Diagram(DFD)

Level Zero DFD

0
Runs 360 internet
software
security

33333 user scans virus

Page | 7
Level 1

Check 0.2 contains


system System web details
protection

0.1
0.3
360 security system
Web protection
unsecure

0.5
contains checks
unsafe
real time details url address

system
0.4
unsecure 0.6
Real time
scan un-secure Search url
protection
data

0.7
scan url
Scan
Contains all files

Scan files url


System 0.9
0.8
secure Safe
Files

Page | 8

You might also like