Software Requirement Specification

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

Software Requirement Specification

(Credit Card Saftey Application)

Submitted By:
Tariq Mehmood 8793
Tahir Shabbir 8779
Table of Content:
Table of Contents
Table of Contents...........................................................................................................................ii
Revision History.............................................................................................................................ii
1. Introduction..............................................................................................................................1
1.1 Purpose..............................................................................................................................................1
1.2 Document Conventions.....................................................................................................................1
1.3 Intended Audience and Reading Suggestions...................................................................................1
1.4 Product Scope...................................................................................................................................1
1.5 References.........................................................................................................................................1
2. Overall Description..................................................................................................................2
2.1 Product Perspective...........................................................................................................................2
2.2 Product Functions.............................................................................................................................2
2.3 User Classes and Characteristics......................................................................................................2
2.4 Operating Environment.....................................................................................................................2
2.5 Design and Implementation Constraints...........................................................................................2
2.6 User Documentation.........................................................................................................................2
2.7 Assumptions and Dependencies.......................................................................................................3
3. External Interface Requirements...........................................................................................3
3.1 User Interfaces..................................................................................................................................3
3.2 Hardware Interfaces..........................................................................................................................3
3.3 Software Interfaces...........................................................................................................................3
3.4 Communications Interfaces..............................................................................................................3
4. System Features.......................................................................................................................4
4.1 System Feature 1...............................................................................................................................4
4.2 System Feature 2 (and so on)............................................................................................................4
5. Other Nonfunctional Requirements.......................................................................................4
5.1 Performance Requirements...............................................................................................................4
5.2 Safety Requirements.........................................................................................................................5
5.3 Security Requirements......................................................................................................................5
5.4 Software Quality Attributes..............................................................................................................5
5.5 Business Rules..................................................................................................................................5
6. Other Requirements................................................................................................................5
Appendix A: Glossary....................................................................................................................5
Appendix B: Analysis Models.......................................................................................................5
Appendix C: To Be Determined List............................................................................................6

1.Introduction

1.1 Purpose
The purpose of this document is to specify the requirements of the Credit Card Safety
Application, which will analyze credit card usage patterns to detect fraudulent activity
and enhance credit card security.

1.2 Scope
This SRS document covers the functional, non-functional, and performance
requirements of the Credit Card Safety Application.

1.3 Definitions, Acronyms, and Abbreviations


Provide any definitions, acronyms, or abbreviations used in this document.

1.4 References
List any references used in this document.
2. Overall Description

2.1 Product Perspective


Describe the Credit Card Safety Application's place in the overall system and its
relationship to other systems.

2.2 Product Functions


The Credit Card Safety Application will perform the following functions:

 Continuously analyze credit card usage patterns


 Store location and spending pattern data for future use
 Detect unusual activity and request user verification
 Block the credit card after three incorrect verification attempts

2.3 User Characteristics


Describe the intended users of the Credit Card Safety Application.

2.4 Constraints
List any constraints on the Credit Card Safety Application, such as hardware or software
limitations.

3. External Interface Requirements

3.1 User Interfaces


Describe the user interfaces of the Credit Card Safety Application, including any
graphical user interfaces (GUIs) or command-line interfaces (CLIs).

3.2 Hardware Interfaces


List any hardware interfaces required by the Credit Card Safety Application.

3.3 Software Interfaces


List any software interfaces required by the Credit Card Safety Application.

3.4 Communication Interfaces


List any communication interfaces required by the Credit Card Safety Application.

4. System Features

4.1 Credit Card Usage Analysis


The Credit Card Safety Application will continuously analyze credit card usage patterns
to detect any unusual activity.

4.2 Data Storage


The Credit Card Safety Application will store location and spending pattern data for
future use.

4.3 User Verification


The Credit Card Safety Application will request user verification in case of unusual
activity and block the credit card after three incorrect verification attempts.

5. Other Non-Functional Requirements


5.1 Performance Requirements
Specify any performance requirements for the Credit Card Safety Application, such as
response time or throughput.

5.2 Safety Requirements


Specify any safety requirements for the Credit Card Safety Application.

5.3 Security Requirements


Specify any security requirements for the Credit Card Safety Application, such as data
encryption or user authentication.

5.4 Software Quality Attributes


Specify any software quality attributes for the Credit Card Safety Application, such as
reliability, maintainability, or usability.

6. System Models

6.1 Use Case Diagrams


6.2 State Diagrams
6.3 Data Flow Diagrams
7. Glossary

Provide a glossary of terms used in this document.

8. Appendices
8.1 Requirements Traceability Matrix
Include a requirements traceability matrix to track the status of each requirement.

8.2 Assumptions and Dependencies


List any assumptions or dependencies for the Credit Card Safety Application.

8.3 Open Issues


List any open issues or questions for the Credit Card Safety Application.

You might also like