Professional Documents
Culture Documents
SRS Project Synopsis
SRS Project Synopsis
Prepared By:
Name : B.Surendranath Reddy Submited To:
Reg.no : 11703551 Ms.Suruchi Talwani
Roll.no : 44 Dept of CSE.
Page | 1
Table of Contents
1. Introduction
1.1 Purpose
1.2 Scope
1.3 Definations,Abbreviations
2. Functional Requirements
2.1 Installation of software
2.2 Installation setup
2.3 License Key
2.4 Validation of license key
2.5 Theme of software
3. Non-Functional Requirements
3.1 Performance Requirements
3.2 Safety Requirements
3.3 Security Requirements
3.4 Software Quality
4. Constraints
5. UML diagram and DFD
Page | 2
1. Introduction:
The introduction of the Software Requirements Specification (SRS) provides an overview of
the entire SRS with purpose, scope, definitions, acronyms, abbreviations, references and
overview of the SRS . . The aim of this document is to gather and analyze and give an in-depth
insight of the complete 360 Security Software System by defining the problem statement in
detail. Nevertheless, it also concentrates on the capabilities required by stakeholders and their
needs while defining high-level product features. The detailed requirements of the 360
Security are provided in this document.
1.1 Purpose
The purpose of the document is to collect and analyze all assorted ideas that have come up to
define the system, its requirements with respect to consumers. Also, we shall predict and sort
out how we hope this product will be used in order to gain a better understanding of the project,
outline concepts that may be developed later, and document ideas that are being considered,
but may be discarded as the product develops.
In short, the purpose of this SRS document is to provide a detailed overview of our software
product, its parameters and goals. This document describes the project's target audience and its
user interface, hardware and software requirements. It defines how our client, team and
audience see the product and its functionality. Nonetheless, it helps any designer and developer
to assist in software delivery lifecycle (SDLC) processes.
1.2 Scope
Antivirus software is a program that is designed to find and neutralize malware and viruses. These programs
are able to scan your computer’s hard drive and identify files that are malicious or suspicious.
The antivirus software can attempt to delete, quarantine, or trigger an alert when it detects files
that are harmful. Additionally, many antivirus software suites also have settings that can prevent your
computer from downloading or executing harmful files in the first place
Page | 3
1.3 Definations
• Computer
• Virus
A computer virus is a program or piece of code that is loaded onto your
computer without your knowledge and runs against your wishes.
• Antivirus
Antivirus (anti-virus) software is a class of program that will prevent, detect and remediate malware
infections on individual computing devices and IT- systems.
• Internet
A means of connecting a computer to any other computer anywhere in the
world via dedicated routers and servers.
• Customer
The person who uses the software. A customer can consist of one or more persons or
corporations,the correspondence is not relevant to this problem.
• Virus Scan
A type of antivirus program that searches a system for virus
signatures that have attached to execute programs and applications.
Page | 4
2. Functional Requirments
The functional requirments are organized in two sections First requirements of the
360 Security antivirus and second requirements for authorization and requirements
for a transaction.
Page | 5
2.4 Validation of license key
Description : If the locense key is valid, the 360 Total Security setup should be installed
properly.
Input : Valid license key
Processing : Installing the setup.
Output : Initiate installation complete dialg.
3. Nonfunctional Requirments
Page | 6
3.4 Software Quality
➢ Security.
➢ Performance
4. Constraints
• Hardware constraints:
The 360 Internet security must be able to access the database in order to get regular
updates to perform action against new threats which tends to affect the working of any
device and all the last scan details.
• Software constraints:
The development of the system will be constrained by the availability of required
software such as web servers, database and development tools.
0
Runs 360 internet
software
security
Page | 7
Level 1
0.1
0.3
360 security system
Web protection
unsecure
0.5
contains checks
unsafe
real time details url address
system
0.4
unsecure 0.6
Real time
scan un-secure Search url
protection
data
0.7
scan url
Scan
Contains all files
Page | 8