Software Requirements Specification For
360 Total Security Prepared by Abhishek kumar
Lovely Professional University
Software Requirements Specification for <360 Total Security>
Table of Contents 1. Introduction 1.1 Purpose 1.2 Document Conventions 1.3 Intended Audience and Reading Suggestions 1.4 Definitions, acronyms, abbreviations 1.5 Scope 2. Overall Description 2.1 Product Perspective 2.2 Product Features 2.3 User Classes and Characteristics 2.4 Operating Environment 2.5 Design and Implementation Constraints 2.6 Assumptions and Dependencies 3. Specific Requirements 3.1 Functional Requirement 4. External Interface Requirements 4.1 User Interfaces 4.2 Hardware Interfaces 4.3 Software Interfaces 5. Other Nonfunctional Requirements 5.1 Performance Requirements 5.2 Safety Requirements 5.3 Security Requirements 5.4 Software Quality Attributes 6. Other Requirements
ii
Software Requirements Specification for <360 Total Security >
Page 1
1. Introduction 1.1
Purpose
This document describes the software requirements and specification for a 360 Total Security Antivirus.
1.2
Document Conventions: font: TNR 12
1.3
Intended Audience and Reading Suggestions
The document is intended for all the stakeholders’ customer and the developer (designers, testers, maintainers). The reader is assumed to have basic knowledge of computer, virus and Anti-Virus. Knowledge and understanding of UML diagrams is also required. 1.4
Definitions, abbreviations
1.4.1 Definitions
Computer
A computer is a device that accepts information and manipulates it for some result based on a program or sequence of instructions on how the data is to be processed.
Virus
A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.
Antivirus
Antivirus (anti-virus) software is a class of program that will prevent, detect and remediate malware infections on individual computing devices and IT systems.
Internet
A means of connecting a computer to any other computer anywhere in the world via dedicated routers and servers.
Software Requirements Specification for <360 Total Security >
Page 2
Customer
The person who uses the software. A customer can consist of one or more persons or corporations, the correspondence is not relevant to this problem.
Virus Scan
A type of antivirus program that searches a system for virus signatures that have attached to executable programs and applications. 1.4.2 Abbreviations Throughout this document the following abbreviations are used: apps : Applications. 1.5
Project Scope
Antivirus software is a program that is designed to find and neutralize malware and viruses. These programs are able to scan your computer’s hard drive and identify files that are malicious or suspicious. The antivirus software can attempt to delete, quarantine, or trigger an alert when it detects files that are harmful. Additionally, many antivirus software suites also have settings that can prevent your computer from downloading or executing harmful files in the first place.
2.
Overall Description
2.1
Product Perspective
The antivirus works independently. The software carries out essential functions with ease and has a clean user interface that has a modern, yet simple and intuitive feel. Software interface: It carry out essential security functions, and it have a clean user interface that has a modern, yet simple and intuitive feel to it. Hardware interface: The software will run on a computer.
User interfaces
Customer: The customer user interface should be intuitive, such that 99.9% of all new 360 antivirus users are able to scan and clean their computers without any assistance.
Software Requirements Specification for <360 Total Security >
Page 3
Maintainer: The maintainer is responsible for adding new features to the software and updating existing 360 antivirus. A maintainer should be possible to update the changes in the existing 360 antivirus software. 2.2
Product Features
360 Total Security has a new, enhanced feature set including Real-time Protection to stop viruses and malware, even before they reach your PC. 360 Total Security can bolster your PC against malware and other types of malicious attack. It has also been designed help your system be fully optimized and run more smoothly. 360 Total Security does not slow your PC down with heavy virus definitions. 360 Total Security includes the ability to perform a full system check. For a quality, free security product that has premium features, including tools to clean up plug-in and junk files, and perform system performance enhancements, 360 Total Security is a good choice that ticks all the boxes across the board. It includes Antivirus protection, Browser protection, Download protection, Online shopping protection, Data hijacking protection, USB Drive protection, Webcam protection, Chat protection, Superior threat detection, Layered protection, Real-time threat detection Enhanced user interface, Computer Speedup, Junk Files Cleanup, Wi-Fi Router Protection.
2.3
User Classes and Characteristics
Characteristics: There are several users of the 360 Total Security Antivirus: Customers are simply members of the general public with no special training. Maintainers must be experienced Ethical hackers, to be able to add new features to the software according to requirement of the security of the systems. 2.4
Operating Environment
The hardware, software and technology used should have following specifications:
Ability to scan the virus in the computer.
Ability to remove the virus from the computer.
Software Requirements Specification for <360 Total Security >
Page 4
Supported by windows (All Versions), MAC, Android.
Ability to cleanup junk files
Ability to speedup computer
Ability to connect to Facebook to compare your checkup with your friends.
Enhanced user interface.
2.5
Design and Implementation Constraints
Facebook Login
Full Check (Check Now):
Check now button runs four scans.
Speedup
Virus scan
Cleanup
Wifi Security Check
Virus Scan:
Display a message at top of the interface, “Regular virus scan will help you remove threats promptly”.
Displays the last scan time below the message.
Contains three options Quick scan, Full Scan, Custom scan.
If Quick scan is selected then it scans system settings, common apps, running processes, startup items and system critical files.
If Full scan is selected then it scans all the files of the system.
If Custom scan is selected then it asks the user to select the directories that they want to scan.
Speedup:
Software Requirements Specification for <360 Total Security >
Page 5
Display a message at top of the interface, “It identifies and disable unnecessary startup programs and background tasks.”
It contains Easy speedup, Boot time, Manual, History.
Boot time contains the record of the boot time of the system.
Manual helps the user to enable or disable a software manually.
History holds the record of changes made.
Cleanup:
Clean up plug-in and junk file with one click.
It saves disk space and improve the performance of the computer.
Tool Box:
Contains different tools.
360 connect
Browser protection
Firewall
Sandbox
System Backup Cleaner
Patch-up
2.6Assumptions and Dependencies
Hardware never fails
Software does not crashes.
Antivirus is installed in supporting operating system.
Software Requirements Specification for <360 Total Security >
3.
Specific Requirements
3.1
Functional Requirements
Page 6
The functional requirements are organized in two sections First requirements of the 360 Total Security antivirus and second requirements of the System. 3.1.1
Requirements of the automated teller machine
The requirements for the 360 Total Security are organized in the following way General requirements, requirements for authorization, and requirements for a transaction. General Functional requirement 1:
Description: Install 360 Total Security in the system.
Input: 360 Total Security is installed in the system.
Processing: Installing 360 Total Security.
Output: 360 Total Security is ready to use.
Functional requirement 2:
Description: If the operating system does not support 360 Total Security software, an error message is displayed.
Input: Setup is installed.
Processing: The operating system does not support the setup.
Output: Display an error message. Abort installation process.
Functional requirement 3:
Description: The software has to check if the entered license key is a valid license key.
Input: Customer enters the license key.
Processing: Check if it is a valid license key. It will be valid if
The information on the license key can be read.
Output: Display error message and ask the customer to re-enter the license key if it is invalid.
Software Requirements Specification for <360 Total Security >
Page 7
Functional requirement 4:
Description: If the license key is valid, the 360 Total security setup should be installed properly.
Input: Valid license key.
Processing: Installing the setup.
Output: Initiate installation complete dialog
Functional requirement 5:
Description: The theme is to be selected by the user.
Input: Theme is selected by the user.
Processing: Applying the theme.
Output: Update the theme.
Functional requirement 7:
Description : The user has different options to use i.e. Full Check, Virus Scan, Speed up, Clean up, Tool Box
Input: The user selects the Full Check option.
Processing: It scans the full system, speedup the system, cleanup the system and does Wifi security check.
Output: Scan and display the results.
Functional requirement 8:
Description: When the user selects Virus Scan then it provides three options quick scan, full scan, custom scan.
Input: The user selects any one of the quick scan, full scan, custom scan.
Processing: It scans files and folders for the viruses and worms.
Output: Displays the number of viruses found in the system and displays the location of the file and folder which contains the virus.
Software Requirements Specification for <360 Total Security >
4.
Other Nonfunctional Requirements
4.1
Performance Requirements
It must be able to perform in adverse conditions like high/low temperature etc.
Uninterrupted interrupted connections
High scanning rate
4.2
Safety Requirements
The software must not be cracked easily.
The code of the software must be abstract.
Must have the privacy constraints.
4.3
4.4
Page 8
Security Requirements
Users accessibility is censured in all the ways
Users are advised to scan their system after every few days.
Users are advised to remove the virus from the system which are suggested.
Software Quality Attributes
Security. Performance.
5.4.1 Availability: The 360 Total Security has to be available 24 hours a day.
5.4.2 Security: The 360 Total Security should provide maximal security .In order to make that much more transparent there are the following requirements: 1. It must be impossible to plug into the software.
Software Requirements Specification for <360 Total Security >
Page 9
5.4.3 Maintainability: Only maintainers are allowed to add new features to the 360 Total Security.
5.
Other Requirements
6.1 Data Base The 360 Total Security software must be able to use several data formats according to the data formats that are provided by the data bases. Database will keep the record of all the scans and changes made to system.