Research Article
Implementation of Square Methods in Analyzing the Security of an Application System
@INPROCEEDINGS{10.4108/eai.18-7-2019.2288579, author={Suhaemi Suhaemi and H Permana and A Sunarto and D Murtiningsih and D Napitupulu and R Rahim}, title={Implementation of Square Methods in Analyzing the Security of an Application System }, proceedings={Proceedings of The 2nd International Conference On Advance And Scientific Innovation, ICASI 2019, 18 July, Banda Aceh, Indonesia}, publisher={EAI}, proceedings_a={ICASI}, year={2019}, month={11}, keywords={square method security system application review}, doi={10.4108/eai.18-7-2019.2288579} }
- Suhaemi Suhaemi
H Permana
A Sunarto
D Murtiningsih
D Napitupulu
R Rahim
Year: 2019
Implementation of Square Methods in Analyzing the Security of an Application System
ICASI
EAI
DOI: 10.4108/eai.18-7-2019.2288579
Abstract
An application system connected to a computer network connection and connected to the internet should be concerned about its security issues. Security aspects of an application system such as secured confidentiality, integrity, and availability of data and information stored and processed in an application system is very important to maintain the smooth running of an information system. Therefore, an application system firstly should be analysed its security system for the application system could run well without any threats that interfere with the process of a system. In this review paper, the method used to analyze the security needs of an application system is using square method (System Quality Requirements Engineering). This method consists of nine stages developed for helping to analyze security needs.