You are on page 1of 11

Software Requirements

Specification
For

360 Total Security

Prepared by Abhishek kumar

Lovely Professional University


SoftwareRequirementsSpecificationfor<360TotalSecurity> ii

Table of Contents

1. Introduction
1.1 Purpose
1.2 Document Conventions
1.3 Intended Audience and Reading Suggestions
1.4 Definitions, acronyms, abbreviations
1.5 Scope
2. Overall Description
2.1 Product Perspective
2.2 Product Features
2.3 User Classes and Characteristics
2.4 Operating Environment
2.5 Design and Implementation Constraints
2.6 Assumptions and Dependencies
3. Specific Requirements
3.1 FunctionalRequirement
4. External Interface Requirements
4.1 User Interfaces
4.2 Hardware Interfaces
4.3 Software Interfaces
5. Other Nonfunctional Requirements
5.1 Performance Requirements
5.2 Safety Requirements
5.3 Security Requirements
5.4 Software Quality Attributes
6. Other Requirements
SoftwareRequirementsSpecificationfor<360TotalSecurity>
Page1

1. Introduction

1.1 Purpose

This document describes the software requirements and specification for a 360 Total Security
Antivirus.

1.2 Document Conventions: font: TNR 12

1.3 Intended Audience and Reading Suggestions

The document is intended for all the stakeholders customer and the developer (designers, testers,
maintainers). The reader is assumed to have basic knowledge of computer, virus and Anti-Virus.
Knowledge and understanding of UML diagrams is also required.

1.4 Definitions, abbreviations

1.4.1 Definitions

Computer

A computer is a device that accepts information and manipulates it for some result based on a
program or sequence of instructions on how the data is to be processed.

Virus

A computer virus is a program or piece of code that is loaded onto your computer without your
knowledge and runs against your wishes.

Antivirus

Antivirus (anti-virus) software is a class of program that will prevent, detect and remediate malware
infections on individual computing devices and IT systems.

Internet

A means of connecting a computer to any other computer anywhere in the world via dedicated
routers and servers.
SoftwareRequirementsSpecificationfor<360TotalSecurity>
Page2

Customer

The person who uses the software. A customer can consist of one or more persons or corporations,
the correspondence is not relevant to this problem.

Virus Scan

A type of antivirus program that searches a system for virus signatures that have attached to
executable programs and applications.

1.4.2 Abbreviations

Throughout this document the following abbreviations are used:


apps : Applications.

1.5 Project Scope

Antivirus software is a program that is designed to find and neutralize malware and viruses. These
programs are able to scan your computers hard drive and identify files that are malicious or
suspicious. The antivirus software can attempt to delete, quarantine, or trigger an alert when it
detects files that are harmful. Additionally, many antivirus software suites also have settings that can
prevent your computer from downloading or executing harmful files in the first place.

2. Overall Description

2.1 Product Perspective

The antivirus works independently. The software carries out essential functions with ease and has a
clean user interface that has a modern, yet simple and intuitive feel.
Software interface: It carry out essential security functions, and it have a clean user interface that
has a modern, yet simple and intuitive feel to it.
Hardware interface: The software will run on a computer.

User interfaces

Customer: The customer user interface should be intuitive, such that 99.9% of all new 360 antivirus
users are able to scan and clean their computers without any assistance.
SoftwareRequirementsSpecificationfor<360TotalSecurity>
Page3
Maintainer:Themaintainerisresponsibleforaddingnewfeaturestothesoftwareandupdating
existing360antivirus.Amaintainershouldbepossibletoupdatethechangesintheexisting360
antivirussoftware.

2.2 Product Features

360 Total Security has a new, enhanced feature set including Real-time Protection to stop viruses and
malware, even before they reach your PC. 360 Total Security can bolster your PC against malware
and other types of malicious attack. It has also been designed help your system be fully optimized
and run more smoothly. 360 Total Security does not slow your PC down with heavy virus definitions.
360 Total Security includes the ability to perform a full system check. For a quality, free security
product that has premium features, including tools to clean up plug-in and junk files, and perform
system performance enhancements, 360 Total Security is a good choice that ticks all the boxes across
the board. It includes Antivirus protection, Browser protection, Download protection, Online
shopping protection, Data hijacking protection, USB Drive protection, Webcam protection, Chat
protection, Superior threat detection, Layered protection, Real-time threat detection Enhanced user
interface, Computer Speedup, Junk Files Cleanup, Wi-Fi Router Protection.

2.3 User Classes and Characteristics

Characteristics: There are several users of the 360 Total Security Antivirus:
Customers are simply members of the general public with no special training.
Maintainers must be experienced Ethical hackers, to be able to add new features to the software
according to requirement of the security of the systems.

2.4 Operating Environment

The hardware, software and technology used should have following specifications:

Ability to scan the virus in the computer.

Ability to remove the virus from the computer.


SoftwareRequirementsSpecificationfor<360TotalSecurity>
Page4

Supported by windows (All Versions), MAC, Android.

Ability to cleanup junk files

Ability to speedup computer

Ability to connect to Facebook to compare your checkup with your friends.

Enhanced user interface.

2.5 Design and Implementation Constraints

Facebook Login

Full Check (Check Now):

Check now button runs four scans.

Speedup

Virus scan

Cleanup

Wifi Security Check

Virus Scan:

Display a message at top of the interface, Regular virus scan will help you remove threats
promptly.

Displays the last scan time below the message.

Contains three options Quick scan, Full Scan, Custom scan.

If Quick scan is selected then it scans system settings, common apps, running processes,
startup items and system critical files.

If Full scan is selected then it scans all the files of the system.

If Custom scan is selected then it asks the user to select the directories that they want to scan.

Speedup:
SoftwareRequirementsSpecificationfor<360TotalSecurity>
Page5

Display a message at top of the interface, It identifies and disable unnecessary startup
programs and background tasks.

It contains Easy speedup, Boot time, Manual, History.

Boot time contains the record of the boot time of the system.

Manual helps the user to enable or disable a software manually.

History holds the record of changes made.

Cleanup:

Clean up plug-in and junk file with one click.

It saves disk space and improve the performance of the computer.

Tool Box:

Contains different tools.

360 connect

Browser protection

Firewall

Sandbox

System Backup Cleaner

Patch-up

2.6Assumptions and Dependencies

Hardware never fails

Software does not crashes.

Antivirus is installed in supporting operating system.


SoftwareRequirementsSpecificationfor<360TotalSecurity>
Page6
3. Specific Requirements

3.1 Functional Requirements

The functional requirements are organized in two sections First requirements of the 360 Total
Security antivirus and second requirements of the System.

3.1.1 Requirements of the automated teller machine

The requirements for the 360 Total Security are organized in the following way General
requirements, requirements for authorization, and requirements for a transaction.
General
Functional requirement 1:

Description: Install 360 Total Security in the system.

Input: 360 Total Security is installed in the system.

Processing: Installing 360 Total Security.

Output: 360 Total Security is ready to use.

Functional requirement 2:

Description: If the operating system does not support 360 Total Security software, an error
message is displayed.

Input: Setup is installed.

Processing: The operating system does not support the setup.

Output: Display an error message. Abort installation process.

Functional requirement 3:

Description: The software has to check if the entered license key is a valid license key.

Input: Customer enters the license key.

Processing: Check if it is a valid license key. It will be valid if

The information on the license key can be read.

Output: Display error message and ask the customer to re-enter the license key if it is
invalid.
SoftwareRequirementsSpecificationfor<360TotalSecurity>
Page7
Functional requirement 4:

Description: If the license key is valid, the 360 Total security setup should be installed
properly.

Input: Valid license key.

Processing: Installing the setup.

Output: Initiate installation complete dialog

Functional requirement 5:

Description: The theme is to be selected by the user.

Input: Theme is selected by the user.

Processing: Applying the theme.

Output: Update the theme.

Functional requirement 7:

Description : The user has different options to use i.e. Full Check, Virus Scan, Speed up,
Clean up, Tool Box

Input: The user selects the Full Check option.

Processing: It scans the full system, speedup the system, cleanup the system and does Wifi
security check.

Output: Scan and display the results.

Functional requirement 8:

Description: When the user selects Virus Scan then it provides three options quick scan, full
scan, custom scan.

Input: The user selects any one of the quick scan, full scan, custom scan.

Processing: It scans files and folders for the viruses and worms.

Output: Displays the number of viruses found in the system and displays the location of the
file and folder which contains the virus.
SoftwareRequirementsSpecificationfor<360TotalSecurity>
Page8
4. Other Nonfunctional Requirements

4.1 Performance Requirements

It must be able to perform in adverse conditions like high/low temperature etc.

Uninterrupted interrupted connections

High scanning rate

4.2 Safety Requirements

Thesoftwaremustnotbecrackedeasily.

The code of the software must be abstract.

Must have the privacy constraints.

4.3 Security Requirements

Users accessibility is censured in all the ways

Users are advised to scan their system after every few days.

Users are advised to remove the virus from the system which are suggested.

4.4 Software Quality Attributes

Security.

Performance.

5.4.1 Availability: The 360 Total Security has to be available 24 hours a day.

5.4.2 Security: The 360 Total Security should provide maximal security .In order to make that much
more transparent there are the following requirements:
1. It must be impossible to plug into the software.
SoftwareRequirementsSpecificationfor<360TotalSecurity>
Page9
5.4.3 Maintainability: Only maintainers are allowed to add new features to the 360 Total Security.

5. Other Requirements

6.1 Data Base


The 360 Total Security software must be able to use several data formats according to the data
formats that are provided by the data bases. Database will keep the record of all the scans and
changes made to system.

You might also like