KDOT PMS Replacement Project

R-PMS Requirements : Package . Security Requirements : Requirement

Requirement - Logging Security Violations link

Properties
Name Value
Description

The solution shall keep a log of information related to the processes attempted to violate the security protocol including but not limited to the Denial of Service (DOS) attacks, repeated failed log-ins, attempts to insert malicious code, cross-scripting attempts etc. of The solution. The information of such a security violating process that need to be stored shall be defined in The solution design document. 

Transit To
Name
 PMS Modeling Processes : Choreography Sub-Process
 1R Processes : Choreography Task
Id R-PMS 17.24
Stereotypes System Requirements

Attributes
Name Type Value
Text Text
ID Text R-PMS 17.24
Source Text
Kind Ad Hoc Enumeration Functional
ReqType Ad Hoc Enumeration E-Expected

Appears In
Diagram
 R-PMS System - Master Requirements for KDOT Replacement PMS System : Requirement Diagram
KDOT PMS Replacement Project