Introduction
Non- functional requirements are needs that are not specifically concerned about the particular capacities that the system delivers. These requirements may identify with emergent properties, such as response time, store occupancy, and reliability. These specifications delineate system performance, availability, security, and various emergent properties. It implies they are frequently more fundamental compared to individual utilitarian prerequisites. System users often find approaches to working around the function of the system that fails to meet their needs. Notwithstanding, failure to meet non-functional requirements may imply that the entire framework is unusable. Functional requirements required in the proposed internet banking are denoted as performance requirements, security requirements, safety requirements and quality attributes of the system.
Performance Requirements
Enhance Customer Satisfaction
The internet banking system should allow clients to access banking administration 24/7 and throughout the year with limited downtime period for maintenance and backup.
Multiply Product Offerings
The system enables the institution to capture a significant portion of the asset base of customers. The system will offer offices to the bank to provide novel products and services onto its landing page.
Lower Overall Costs
The proposed system will lessen the cost of banking in two basic ways: it limits the cost of processing exchanges and sees a reduction in the number of bank's branches necessary to serve an equivalent number of clients.
Safety Requirements
Backup, Recovery and Business Continuity
Banks ought to guarantee sufficient backup of data as the operations might require. They likewise ought to have well-tested and documented business continuity plans, which address all components of the banking business.
Both software and data ought to be backed up frequently, and the frequency of back-up will depend on the recovery requirements of the applications, and it may be incremental as the needs increase.
Business congruity and recovery measures, in light of criticality of the frameworks, ought to be set up and an archived design with the bank and allocation of responsibilities of the primary decision-making personnel were implemented.
An off-site backup is needed for recovery from major disasters or failure to allow business continuity. Contingent upon criticality, hot sites, and different technologies oriented back up, cold sites or warm sites ought to be available for continuity of business. The plan of business congruity needs to be tested frequently because it is the fail-safe mechanism.
Security Requirements
The engineering team comprehends that nothing is essential than realizing that transactions are secure and private. In this way, the most recent technology is applied in the creation of the security architecture of the Internet Banking system. The ideal approach to comprehend the security engineering within the Internet Banking is to break down the entire process. These security highlights are delineated beneath.
Account-ID and Password (PIN)
Password (PIN) and Account ID protection occur at the first level in the system. For access to the system, clients are required to enter an ID of their account and access is denied when it is not provided. Special characters as password might be imposed by the Bank to allow a higher sense of security. For instance, the accompanying characters can be used as password:/? The bank can impose occasional changes of the password, and when such changes are imposed, clients are informed upon logging into the system.
Auto Timeout Screen
Auto Timeout
Although it is prescribed that clients do not leave the computers unattended to expose financial information while logged onto the system, an integrated security feature is incorporated to lower the risk in such circumstances. Clients are required to take note of the notification presented for purpose of remaining active in the login session. The auto timeout provision cautions clients at regular intervals preceding a pending timeout. When permitted to timeout, the Internet Banking session is stopped and clients are given another opportunity to lo into the system.
Sign-off Button
When end-users are done with the system, they are expected to sign-off button prior to going switching tasks on the web. By signing-off, the session in the system is ended.
Failed Login Attempts
As an extra security feature, access to the internet banking is denied following predetermined frequency of failed log-on. When users have been denied access to the service because of surpassing the pre-determined frequency of log-on attempts, the clients must inform the bank to be reinitialized.
Encryption
Notwithstanding the password protection, engineers ensure server authentication through the use of the most recent data encryption techniques. Data encryption is a type of data translation into an unintelligible form that requires deciphering mechanism for interpretation.
Conclusion
In the section, an analytical study examination for the system of internet banking was addressed. The system ought to be based on special requirements because the functional requirements and the related specifications have been proposed. The general requirements identify the quality of the system although in internet banking they are the most critical requirements. The system security is an integral requirement although it is categorized as a non-functional requirement. Whereas in internet banking it is considered the most fundamental aspect, it is the attribute that determines the success or failure of the system. Proposals for best use of the state requirements have been suggested to identify the system requirements and how best to achieve them.
Cite this page
Engineering Requirements Essay. (2022, May 09). Retrieved from https://proessays.net/essays/engineering-requirements-essay
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- BMW Are the Best Cars
- Annotated Bibliography on Building Information Model
- Peak Oil and Challenges Facing Coal Production and Use in USA Essay
- Critical Infra Protect: Essential for Govt's Success - Essay Sample
- Volkswagen: Unethical Practice of Software Engineering Exposed - Essay Sample
- Exploring Five Possible Futures of Oil Supply and Price Trends - Essay Sample
- Essay Example on Venezuela: Boom-and-Bust Journey of an Oil-Rich Nation