Professional Documents
Culture Documents
Specification
For
Table of Contents
1. Introduction
1.1 Purpose
1.2 Document Conventions
1.3 Intended Audience and Reading Suggestions
1.4 Definitions, acronyms, abbreviations
1.5 Scope
2. Overall Description
2.1 Product Perspective
2.2 Product Features
2.3 User Classes and Characteristics
2.4 Operating Environment
2.5 Design and Implementation Constraints
2.6 Assumptions and Dependencies
3. Specific Requirements
3.1 FunctionalRequirement
4. External Interface Requirements
4.1 User Interfaces
4.2 Hardware Interfaces
4.3 Software Interfaces
5. Other Nonfunctional Requirements
5.1 Performance Requirements
5.2 Safety Requirements
5.3 Security Requirements
5.4 Software Quality Attributes
6. Other Requirements
SoftwareRequirementsSpecificationfor<360TotalSecurity>
Page1
1. Introduction
1.1 Purpose
This document describes the software requirements and specification for a 360 Total Security
Antivirus.
The document is intended for all the stakeholders customer and the developer (designers, testers,
maintainers). The reader is assumed to have basic knowledge of computer, virus and Anti-Virus.
Knowledge and understanding of UML diagrams is also required.
1.4.1 Definitions
Computer
A computer is a device that accepts information and manipulates it for some result based on a
program or sequence of instructions on how the data is to be processed.
Virus
A computer virus is a program or piece of code that is loaded onto your computer without your
knowledge and runs against your wishes.
Antivirus
Antivirus (anti-virus) software is a class of program that will prevent, detect and remediate malware
infections on individual computing devices and IT systems.
Internet
A means of connecting a computer to any other computer anywhere in the world via dedicated
routers and servers.
SoftwareRequirementsSpecificationfor<360TotalSecurity>
Page2
Customer
The person who uses the software. A customer can consist of one or more persons or corporations,
the correspondence is not relevant to this problem.
Virus Scan
A type of antivirus program that searches a system for virus signatures that have attached to
executable programs and applications.
1.4.2 Abbreviations
Antivirus software is a program that is designed to find and neutralize malware and viruses. These
programs are able to scan your computers hard drive and identify files that are malicious or
suspicious. The antivirus software can attempt to delete, quarantine, or trigger an alert when it
detects files that are harmful. Additionally, many antivirus software suites also have settings that can
prevent your computer from downloading or executing harmful files in the first place.
2. Overall Description
The antivirus works independently. The software carries out essential functions with ease and has a
clean user interface that has a modern, yet simple and intuitive feel.
Software interface: It carry out essential security functions, and it have a clean user interface that
has a modern, yet simple and intuitive feel to it.
Hardware interface: The software will run on a computer.
User interfaces
Customer: The customer user interface should be intuitive, such that 99.9% of all new 360 antivirus
users are able to scan and clean their computers without any assistance.
SoftwareRequirementsSpecificationfor<360TotalSecurity>
Page3
Maintainer:Themaintainerisresponsibleforaddingnewfeaturestothesoftwareandupdating
existing360antivirus.Amaintainershouldbepossibletoupdatethechangesintheexisting360
antivirussoftware.
360 Total Security has a new, enhanced feature set including Real-time Protection to stop viruses and
malware, even before they reach your PC. 360 Total Security can bolster your PC against malware
and other types of malicious attack. It has also been designed help your system be fully optimized
and run more smoothly. 360 Total Security does not slow your PC down with heavy virus definitions.
360 Total Security includes the ability to perform a full system check. For a quality, free security
product that has premium features, including tools to clean up plug-in and junk files, and perform
system performance enhancements, 360 Total Security is a good choice that ticks all the boxes across
the board. It includes Antivirus protection, Browser protection, Download protection, Online
shopping protection, Data hijacking protection, USB Drive protection, Webcam protection, Chat
protection, Superior threat detection, Layered protection, Real-time threat detection Enhanced user
interface, Computer Speedup, Junk Files Cleanup, Wi-Fi Router Protection.
Characteristics: There are several users of the 360 Total Security Antivirus:
Customers are simply members of the general public with no special training.
Maintainers must be experienced Ethical hackers, to be able to add new features to the software
according to requirement of the security of the systems.
The hardware, software and technology used should have following specifications:
Facebook Login
Speedup
Virus scan
Cleanup
Virus Scan:
Display a message at top of the interface, Regular virus scan will help you remove threats
promptly.
If Quick scan is selected then it scans system settings, common apps, running processes,
startup items and system critical files.
If Full scan is selected then it scans all the files of the system.
If Custom scan is selected then it asks the user to select the directories that they want to scan.
Speedup:
SoftwareRequirementsSpecificationfor<360TotalSecurity>
Page5
Display a message at top of the interface, It identifies and disable unnecessary startup
programs and background tasks.
Boot time contains the record of the boot time of the system.
Cleanup:
Tool Box:
360 connect
Browser protection
Firewall
Sandbox
Patch-up
The functional requirements are organized in two sections First requirements of the 360 Total
Security antivirus and second requirements of the System.
The requirements for the 360 Total Security are organized in the following way General
requirements, requirements for authorization, and requirements for a transaction.
General
Functional requirement 1:
Functional requirement 2:
Description: If the operating system does not support 360 Total Security software, an error
message is displayed.
Functional requirement 3:
Description: The software has to check if the entered license key is a valid license key.
Output: Display error message and ask the customer to re-enter the license key if it is
invalid.
SoftwareRequirementsSpecificationfor<360TotalSecurity>
Page7
Functional requirement 4:
Description: If the license key is valid, the 360 Total security setup should be installed
properly.
Functional requirement 5:
Functional requirement 7:
Description : The user has different options to use i.e. Full Check, Virus Scan, Speed up,
Clean up, Tool Box
Processing: It scans the full system, speedup the system, cleanup the system and does Wifi
security check.
Functional requirement 8:
Description: When the user selects Virus Scan then it provides three options quick scan, full
scan, custom scan.
Input: The user selects any one of the quick scan, full scan, custom scan.
Processing: It scans files and folders for the viruses and worms.
Output: Displays the number of viruses found in the system and displays the location of the
file and folder which contains the virus.
SoftwareRequirementsSpecificationfor<360TotalSecurity>
Page8
4. Other Nonfunctional Requirements
Thesoftwaremustnotbecrackedeasily.
Users are advised to scan their system after every few days.
Users are advised to remove the virus from the system which are suggested.
Security.
Performance.
5.4.1 Availability: The 360 Total Security has to be available 24 hours a day.
5.4.2 Security: The 360 Total Security should provide maximal security .In order to make that much
more transparent there are the following requirements:
1. It must be impossible to plug into the software.
SoftwareRequirementsSpecificationfor<360TotalSecurity>
Page9
5.4.3 Maintainability: Only maintainers are allowed to add new features to the 360 Total Security.
5. Other Requirements