98%(98)96 out of 98 people found this document helpful
This preview shows page 1 - 4 out of 20 pages.
Stage 3 – System Design SpecificationsIFSM 461
STAGE 2 – REQUIREMENTS SPECIFICATIONI.FUNCTIONAL REQUIREMENTSFor the system to run smoothly and efficiently it must follow a set amount of requirements defined from the aspects the system will include. These requirements follow the of the stakeholders and what the system would need as a whole. It is categorized into output, input and processing requirements each covering different parts of the system’s functions.a.Output requirementsi.System shall provide invoices for customers who are being billed.ii.System shall provide complete financial statements.iii.System shall provide Receipts for customers after purchases and after billing.b.Input requirementsi.System shall accept customer orders and record them in the statements.ii.Systems shall record transactions made by business and organize them into a sufficient record. iii.System shall store all information into the General Ledgerc.Processing requirementsi.System shall calculate funds received or lost from sales and purchasesii.System shall process all information put into documents or sent outiii.System shall process sales and purchases to be put in their necessary place. II.TECHNICAL REQUIREMENTSWith the functional requirements identified it is crucial that the other basic system requirements are met as well. The system’s technical requirements are classified through the security, system control, performance, and business continuity requirements. Each covers a specific aspect that is crucial to the system. a.Security requirements
i.Firewall – The first line of defense for the system. A firewall shall be used to serve as protection from threats trying to access information. ii.Encryption – Another way to help keep information confidential. The system shallsend and receive encrypted data to protect information of customers and the customer. This can be best handled with a Hardware security module (HSM) to keep keys more secure. iii.Anti-virus software – Though it’s not directly included in the system it can fulfil the other security requirementsiv.Access control – Restricting information access so only the people needed to access the system’s information are allowed to access it. v.Intrusion Prevention System (IPS) – The IPS is designed specifically to prevent vulnerability so whether it be implemented in the system or not it is crucial to have.