SEPP methodology results |
Security requirements: |
SR1: Access is granted for the authentic user and access is denied for the Malicious subject |
SR2: Malicious subject should not be able to derive sent data and received data during data transmission |
SR3: Sent data equals Received data or if not, a modification by Malicious subject is detected using Transmitted data |
|
The proposed methodology results |
Security requirements: |
SR1: The security validation state is accepted only if the user using identity is the one he claims to be |
SR2: Transmitted screen data should be not understandable by attackers |
SR3: Any modification to Transmitted screen data should be detected |
SR4: Screen Data should be available for sending and displaying |
SR5: Screen data changing and sending by users should be logged |