September 22, 2017 | Author: Abhishek Kumar | Category: Antivirus Software, Computer Virus, Malware, Computer Security, Online Safety & Privacy
Share Embed Donate

Short Description

Download srs_360.doc...


Software Requirements Specification For

360 Total Security Prepared by Abhishek kumar

Lovely Professional University

Software Requirements Specification for  

Table of Contents 1. Introduction 1.1 Purpose 1.2 Document Conventions 1.3 Intended Audience and Reading Suggestions 1.4 Definitions, acronyms, abbreviations 1.5 Scope 2. Overall Description 2.1 Product Perspective 2.2 Product Features 2.3 User Classes and Characteristics 2.4 Operating Environment 2.5 Design and Implementation Constraints 2.6 Assumptions and Dependencies 3. Specific Requirements 3.1 Functional Requirement 4. External Interface Requirements 4.1 User Interfaces 4.2 Hardware Interfaces 4.3 Software Interfaces 5. Other Nonfunctional Requirements 5.1 Performance Requirements 5.2 Safety Requirements 5.3 Security Requirements 5.4 Software Quality Attributes 6. Other Requirements

­ ii ­

Software Requirements Specification for 

                     Page 1

1. Introduction 1.1


This document describes the software requirements and specification for a 360 Total Security Antivirus.


Document Conventions: font: TNR 12


Intended Audience and Reading Suggestions

The document is intended for all the stakeholders’ customer and the developer (designers, testers, maintainers). The reader is assumed to have basic knowledge of computer, virus and Anti-Virus. Knowledge and understanding of UML diagrams is also required. 1.4

Definitions, abbreviations

1.4.1 Definitions 


  A computer is a device that accepts information and manipulates it for some result based on a program or sequence of instructions on how the data is to be processed. 


A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. 


Antivirus (anti-virus) software is a class of program that will prevent, detect and remediate malware infections on individual computing devices and IT systems. 


A means of connecting a computer to any other computer anywhere in the world via dedicated routers and servers.

Software Requirements Specification for 

                     Page 2


The person who uses the software. A customer can consist of one or more persons or corporations, the correspondence is not relevant to this problem. 

Virus Scan

A type of antivirus program that searches a system for virus signatures that have attached to executable programs and applications. 1.4.2 Abbreviations Throughout this document the following abbreviations are used:  apps : Applications. 1.5

Project Scope

Antivirus software is a program that is designed to find and neutralize malware and viruses. These programs are able to scan your computer’s hard drive and identify files that are malicious or suspicious. The antivirus software can attempt to delete, quarantine, or trigger an alert when it detects files that are harmful. Additionally, many antivirus software suites also have settings that can prevent your computer from downloading or executing harmful files in the first place.


Overall Description


Product Perspective

The antivirus works independently. The software carries out essential functions with ease and has a clean user interface that has a modern, yet simple and intuitive feel. Software interface: It carry out essential security functions, and it have a clean user interface that has a modern, yet simple and intuitive feel to it. Hardware interface: The software will run on a computer.

User interfaces

Customer: The customer user interface should be intuitive, such that 99.9% of all new 360 antivirus users are able to scan and clean their computers without any assistance.

Software Requirements Specification for 

                     Page 3

Maintainer: The maintainer is responsible for adding new features to the software and updating  existing 360 antivirus. A maintainer should be possible to update the changes in the existing 360  antivirus software. 2.2

Product Features

360 Total Security has a new, enhanced feature set including Real-time Protection to stop viruses and malware, even before they reach your PC. 360 Total Security can bolster your PC against malware and other types of malicious attack. It has also been designed help your system be fully optimized and run more smoothly. 360 Total Security does not slow your PC down with heavy virus definitions. 360 Total Security includes the ability to perform a full system check. For a quality, free security product that has premium features, including tools to clean up plug-in and junk files, and perform system performance enhancements, 360 Total Security is a good choice that ticks all the boxes across the board. It includes Antivirus protection, Browser protection, Download protection, Online shopping protection, Data hijacking protection, USB Drive protection, Webcam protection, Chat protection, Superior threat detection, Layered protection, Real-time threat detection Enhanced user interface, Computer Speedup, Junk Files Cleanup, Wi-Fi Router Protection.


User Classes and Characteristics

Characteristics: There are several users of the 360 Total Security Antivirus: Customers are simply members of the general public with no special training. Maintainers must be experienced Ethical hackers, to be able to add new features to the software according to requirement of the security of the systems. 2.4

Operating Environment

The hardware, software and technology used should have following specifications: 

Ability to scan the virus in the computer.

Ability to remove the virus from the computer.

Software Requirements Specification for 

                     Page 4

Supported by windows (All Versions), MAC, Android.

Ability to cleanup junk files

Ability to speedup computer

Ability to connect to Facebook to compare your checkup with your friends.

Enhanced user interface.


Design and Implementation Constraints 

Facebook Login

Full Check (Check Now): 

Check now button runs four scans.


Virus scan


Wifi Security Check

Virus Scan: 

Display a message at top of the interface, “Regular virus scan will help you remove threats promptly”.

Displays the last scan time below the message.

Contains three options Quick scan, Full Scan, Custom scan.

If Quick scan is selected then it scans system settings, common apps, running processes, startup items and system critical files.

If Full scan is selected then it scans all the files of the system.

If Custom scan is selected then it asks the user to select the directories that they want to scan.


Software Requirements Specification for 

                     Page 5

Display a message at top of the interface, “It identifies and disable unnecessary startup programs and background tasks.”

It contains Easy speedup, Boot time, Manual, History.

Boot time contains the record of the boot time of the system.

Manual helps the user to enable or disable a software manually.

History holds the record of changes made.

Cleanup: 

Clean up plug-in and junk file with one click.

It saves disk space and improve the performance of the computer.

Tool Box: 

Contains different tools.

360 connect

Browser protection



System Backup Cleaner


2.6Assumptions and Dependencies 

Hardware never fails

Software does not crashes.

Antivirus is installed in supporting operating system.

Software Requirements Specification for 


Specific Requirements


Functional Requirements

                     Page 6

The functional requirements are organized in two sections First requirements of the 360 Total Security antivirus and second requirements of the System. 3.1.1

Requirements of the automated teller machine

The requirements for the 360 Total Security are organized in the following way General requirements, requirements for authorization, and requirements for a transaction. General Functional requirement 1: 

Description: Install 360 Total Security in the system.

Input: 360 Total Security is installed in the system.

Processing: Installing 360 Total Security.

Output: 360 Total Security is ready to use.

Functional requirement 2: 

Description: If the operating system does not support 360 Total Security software, an error message is displayed.

Input: Setup is installed.

Processing: The operating system does not support the setup.

Output: Display an error message. Abort installation process.

Functional requirement 3: 

Description: The software has to check if the entered license key is a valid license key.

Input: Customer enters the license key.

Processing: Check if it is a valid license key. It will be valid if

 The information on the license key can be read. 

Output: Display error message and ask the customer to re-enter the license key if it is invalid.

Software Requirements Specification for 

                     Page 7

Functional requirement 4: 

Description: If the license key is valid, the 360 Total security setup should be installed properly.

Input: Valid license key.

Processing: Installing the setup.

Output: Initiate installation complete dialog

Functional requirement 5: 

Description: The theme is to be selected by the user.

Input: Theme is selected by the user.

Processing: Applying the theme.

Output: Update the theme.

Functional requirement 7: 

Description : The user has different options to use i.e. Full Check, Virus Scan, Speed up, Clean up, Tool Box

Input: The user selects the Full Check option.

Processing: It scans the full system, speedup the system, cleanup the system and does Wifi security check.

Output: Scan and display the results.

Functional requirement 8: 

Description: When the user selects Virus Scan then it provides three options quick scan, full scan, custom scan.

Input: The user selects any one of the quick scan, full scan, custom scan.

Processing: It scans files and folders for the viruses and worms.

Output: Displays the number of viruses found in the system and displays the location of the file and folder which contains the virus.

Software Requirements Specification for 


Other Nonfunctional Requirements


Performance Requirements 

It must be able to perform in adverse conditions like high/low temperature etc.

Uninterrupted interrupted connections

High scanning rate


Safety Requirements 

The software must not be cracked easily.

The code of the software must be abstract.

Must have the privacy constraints.



                     Page 8

Security Requirements 

Users accessibility is censured in all the ways

Users are advised to scan their system after every few days.

Users are advised to remove the virus from the system which are suggested.

Software Quality Attributes

           Security.            Performance.

5.4.1 Availability: The 360 Total Security has to be available 24 hours a day.

5.4.2 Security: The 360 Total Security should provide maximal security .In order to make that much more transparent there are the following requirements: 1. It must be impossible to plug into the software.

Software Requirements Specification for 

                     Page 9

5.4.3 Maintainability: Only maintainers are allowed to add new features to the 360 Total Security.


Other Requirements

6.1 Data Base The 360 Total Security software must be able to use several data formats according to the data formats that are provided by the data bases. Database will keep the record of all the scans and changes made to system.

View more...


Copyright ©2017 KUPDF Inc.