Proceedings of The 2nd International Conference On Advance And Scientific Innovation, ICASI 2019, 18 July, Banda Aceh, Indonesia

Research Article

Implementation of Square Methods in Analyzing the Security of an Application System

Download564 downloads
  • @INPROCEEDINGS{10.4108/eai.18-7-2019.2288579,
        author={Suhaemi  Suhaemi and H  Permana and A  Sunarto and D  Murtiningsih and D  Napitupulu and R  Rahim},
        title={Implementation of Square Methods in Analyzing the Security of an Application System },
        proceedings={Proceedings of The 2nd International Conference On Advance And Scientific Innovation, ICASI 2019, 18 July, Banda Aceh,  Indonesia},
        publisher={EAI},
        proceedings_a={ICASI},
        year={2019},
        month={11},
        keywords={square method security system application review},
        doi={10.4108/eai.18-7-2019.2288579}
    }
    
  • Suhaemi Suhaemi
    H Permana
    A Sunarto
    D Murtiningsih
    D Napitupulu
    R Rahim
    Year: 2019
    Implementation of Square Methods in Analyzing the Security of an Application System
    ICASI
    EAI
    DOI: 10.4108/eai.18-7-2019.2288579
Suhaemi Suhaemi1,*, H Permana1, A Sunarto1, D Murtiningsih2, D Napitupulu3, R Rahim4
  • 1: Pasca Sarjana, Universitas Budi Luhur, Jl. Ciledug Raya, Jakarta, Indonesia
  • 2: Fakultas Ekonomi dan Bisnis, Universitas Budi Luhur, Jl. Ciledug Raya, Jakarta, Indonesia
  • 3: Research Center for Quality System & Testing Technology, Indonesian Institute of Sciences, Tangsel, Indonesia
  • 4: School of Computer and Communication Engineering, Universiti Malaysia Perlis, Malaysia
*Contact email: suhaemi.emi@gmail.com

Abstract

An application system connected to a computer network connection and connected to the internet should be concerned about its security issues. Security aspects of an application system such as secured confidentiality, integrity, and availability of data and information stored and processed in an application system is very important to maintain the smooth running of an information system. Therefore, an application system firstly should be analysed its security system for the application system could run well without any threats that interfere with the process of a system. In this review paper, the method used to analyze the security needs of an application system is using square method (System Quality Requirements Engineering). This method consists of nine stages developed for helping to analyze security needs.