Stage 3 .docx - Stage 3 System Design Specifications IFSM...

This preview shows page 1 - 4 out of 20 pages.

Stage 3 – System Design Specifications IFSM 461
STAGE 2 – REQUIREMENTS SPECIFICATION I. FUNCTIONAL REQUIREMENTS For the system to run smoothly and efficiently it must follow a set amount of requirements defined from the aspects the system will include. These requirements follow the of the stakeholders and what the system would need as a whole. It is categorized into output, input and processing requirements each covering different parts of the system’s functions. a. Output requirements i. System shall provide invoices for customers who are being billed. ii. System shall provide complete financial statements. iii. System shall provide Receipts for customers after purchases and after billing. b. Input requirements i. System shall accept customer orders and record them in the statements. ii. Systems shall record transactions made by business and organize them into a sufficient record. iii. System shall store all information into the General Ledger c. Processing requirements i. System shall calculate funds received or lost from sales and purchases ii. System shall process all information put into documents or sent out iii. System shall process sales and purchases to be put in their necessary place. II. TECHNICAL REQUIREMENTS With the functional requirements identified it is crucial that the other basic system requirements are met as well. The system’s technical requirements are classified through the security, system control, performance, and business continuity requirements. Each covers a specific aspect that is crucial to the system. a. Security requirements
i. Firewall – The first line of defense for the system. A firewall shall be used to serve as protection from threats trying to access information. ii. Encryption – Another way to help keep information confidential. The system shall send and receive encrypted data to protect information of customers and the customer. This can be best handled with a Hardware security module (HSM) to keep keys more secure. iii. Anti-virus software – Though it’s not directly included in the system it can fulfil the other security requirements iv. Access control – Restricting information access so only the people needed to access the system’s information are allowed to access it. v. Intrusion Prevention System (IPS) – The IPS is designed specifically to prevent vulnerability so whether it be implemented in the system or not it is crucial to have.

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture