Professional Documents
Culture Documents
Specification
for
Prepared by
Papunjay Kumar
7/02/2018
Page ii
Table of Contents
Table of Contents .......................................................................................................................... ii
Revision History ............................................................................................................................ ii
1. Introduction ..............................................................................................................................3
1.1 Purpose............................................................................................................................................. 3
1.2 Document Conventions .................................................................................................................... 3
1.3 Intended Audience and Reading Suggestions .................................................................................. 3
1.4 Product Scope .................................................................................................................................. 3
1.5 References ........................................................................................................................................ 4
2. Overall Description ..................................................................................................................4
2.1 Product Perspective.......................................................................................................................... 4
2.2 Product Functions ............................................................................................................................ 4
2.3 User Classes and Characteristics ..................................................................................................... 5
2.4 Operating Environment .................................................................................................................... 5
2.5 Design and Implementation Constraints .......................................................................................... 5
2.6 User Documentation ........................................................................................................................ 5
2.7 Assumptions and Dependencies ...................................................................................................... 5
3. External Interface Requirements ...........................................................................................6
3.1 User Interfaces ................................................................................................................................. 6
3.2 Hardware Interfaces ......................................................................................................................... 6
3.3 Software Interfaces .......................................................................................................................... 7
3.4 Communications Interfaces ............................................................................................................. 7
4. System Features .......................................................................................................................7
4.1 System Feature 1 .............................................................................Error! Bookmark not defined.
4.2 System Feature 2 (and so on) ..........................................................Error! Bookmark not defined.
5. Other Nonfunctional Requirements .....................................................................................16
5.1 Performance Requirements ............................................................................................................ 16
5.2 Safety Requirements ...................................................................................................................... 16
5.3 Security Requirements ................................................................................................................... 16
5.4 Software Quality Attributes ........................................................................................................... 16
5.5 Business Rules ................................................................................Error! Bookmark not defined.
6. Other Requirements ..............................................................................................................16
Appendix A: Glossary...................................................................... Error! Bookmark not defined.
Appendix B: Analysis Models ......................................................... Error! Bookmark not defined.
Appendix C: To Be Determined List .............................................. Error! Bookmark not defined.
Revision History
Name Date Reason For Changes Version
Firewall
Monitor Wi-Fi Networks is not supported on Windows XP 64-bit.
Safe Banking
Safe Banking is not supported on Microsoft Windows 2000, Windows XP 32-bit / 64bit
with when you open safe banking the background downloading , uploading are blocked
only safe banking browser are work.
This software also protects the Ransomware and wannacry most dangerous virus. In this
software some special features like Safe Banking, Child mode, News, vulnerability scan,
pc2mobile scan, Pc-Tuner,
1.5 References
IEEE Std 830-1998 IEEE Recommended Practice for Software Requirements Specification IEEE
Computer Society 1998 ,
2. Overall Description
2.1 Product Perspective
Customer :- this software users are simply member of general public who have no any type of
training require.
Maintainers :-maintainer have experience Ethical hacker and artificial intelligence to be able to add
new features according to requirement of security of the system.
This software is work when the user register with valid key otherwise does not work.
When the software validity is failed then do not provide the security of the system.
Remove Quick Heal completely - If you select this option, Antivirus will be completely
removed from your computer.
Select one of the options and click Next to continue with the uninstall, If you have password-
protected ,Enter your password and click OK.
After the uninstall completion antivirus display two option restart or restart
later , To restart click Restart Now, or click Restart Later to continue working on
the system and restart after some time.
4. System Features
General
Functional requirement 1:
Description: Install Antivirus in the System, If the operating system does not support
Antivirus software an error message is displayed.
Input: Setup is installed.
Processing: The operating system does not support the setup.
Output: Display an error or complete message. When software is abort or installed in
installation process.
Functional requirement 2:
Description: The software has to check if the entered license key is a valid license key.
Input: Customer enters the license key.
Processing: Check if it is a valid license key. It will be valid if
The information on the license key can be read.
Output: if it is invalid, display error message and ask the customer to re-enter the license
key.
Functional requirement 4:
Description: If the license key is valid, Antivirus setup should be installed properly.
Input: Valid license key.
Processing: Installing the setup.
Output: Show term and condition, and also the setup massage in the All the Step.
Functional requirement 5:
Description : The user has different options to use i.e. Full Check, Scan, Speed up, Clean up,
Tool Box, Setting, Child mode, Safe Banking,
Input: The user selects the All design option.
Processing: It scans the full system, speedup the system, cleanup the system and does Wifi
security check. and also take action on the user selected options.
Output: Scan and display the results.
Functional requirement 6:
Scan:-
Full System Scan- in this feature user can scan the whole system at the one click
Custom Scan:- In this feature user can scan our selected file from system.
Memory Scan:- In this feature user can scan our external device memory card etc
Vulnerability Scan :- In this scanner user can scan our computer week point and
poorly constructed parts
Boot Time Scan:- user can scan the virus at the system boot level .
Mobile Scan:- user can scan the all time of mobile through the login same user
id and password
Functional requirement 6:
Folder & Files :- With this feature, you can configure the protection settings for files and folders
in your system. Files & Folders includes the following protection settings.
Scan Settings:- This feature helps you define about how to initiate the scan of your
system and what action should be taken when a virus is detected. However, the default
settings are optimal that ensures the required protection to your system.
Select scan mod
o Automatic
o Advanced
Select action to perform when virus is found
o Repair
o Delete
o Skip
Default
Save change
Cancel
Virus Protection:- It is recommended that you always keep Virus Protection turned
on to keep your system clean and secure from any potential threats. However, Virus
Protection is turned on by default.
Select action to be performed when virus is found
o Repair
o Delete
o Deny access
Check mark
Default
Save change
Cancel
Advance DNA Scan :- DNAScan is an indigenous technology of Quick Heal to
detect and eliminate new and unknown malicious threats in the system. Advance
DNAScan technology successfully traps suspected files with very less false alarms.
Block suspicious packet Files:-Suspicious packed files are malicious programs that
are compressed or packed and encrypted using a variety of methods. These files when
unpacked can cause serious harm to the computer systems. This feature helps you
identify and block such suspicious packed files.
It is recommended that always keep this option enabled to ensure that the
suspicious files are not accessed and thus prevent infection
o Enable
o Disable
Screen Locker Protection:- Malicious programs that lock the screen preventing
access to your computer are known as screen lockers. With Screen Locker Protection,
User can clean-up of your computer and remove such malicious programs.
Set the short key
Ctrl +Alt + Shift
o A
o B
o C
o D
Default
Save change
Cancel
Back to men
Virtual key
My account
Support
Like
Scan Schedule:- Scanning regularly helps user system free from virus and other
types of infections. This feature allows user to define a schedule when to begin
scanning of users system automatically. Users can define multiple numbers of scan
schedules to initiate scan at users convenience.
Configuration scan schedule
o New
Scan frequency
o Scan name
o Frequency
Daily
Weekly
o Start at first boot
o Set start time
Date
Time
Scan option
o Low
o High
o User name
o Password
Edit
Remove
Close
Back to men
Virtual key
My account
Support
Like
Exclude File & Folders :- With this feature, users can decide which files and folders
should not be included during scanning for known viruses, DNAScan, Suspicious
Packed files, and Behavior Detection
Add the file /folder path
Edit
Remove
Save change
Cancel
Quarantine & Backup:- This feature allows you to safely isolate the infected or
suspected files. The suspected files are quarantined in an encrypted format to prevent
from being executed. This helps prevent infection.
Email:- With this feature, you can configure the protection rules for all incoming
emails.
Email Protection
o Enable
Display alert message – yes /no
Select action to be performed when virus is found
Repair
delete
o Disable
o Default
o Save change
o Cancel
Trusted Email Client protection:- it is used as a convenient mode to deliver
malware and other threats
o Enable
o Disable
Spam protection
o Enable
Check mark
Tag subject with next text
Enable email block list
Enable email white list
Enable antispam plugin
Spam protection level
Soft
Moderate
Strict
o Disable
o Default
o Save change
o Cancel
Internet & Network:- This feature allows user to set the protection rules to protect your
system from malicious files that can sneak into users system during online activities such
as banking, shopping, and surfing.
Firewall Protection
o Enable
o Disable
Browsing Protection
o Enable
o Disable
Malware Protection
o Enable
o Disable
Phishing Protection
o Enable
o Disable
Browser Sandbox
o Enable
o Disable
News Alert
o Enable
o Disable
IDS/IPS
o Enable
o Disable
Safe Banking:- whit this feature user can surfing internet safe by the use of given
browser user can add the bookmark and view the bookmark list.
Chrome
Mozilla firefox
Internet explore
Add Bookmark
View bookmark
Personal Control :- Parental Control is a very effective method to control the Internet
access, application access, and computer access by the children and other users. This
feature ensures that the children and other users do not visit inappropriate types of Web
sites, and can only access the allowed applications
Display alert message yes/no
Select whom to apply the settings
o Apply to all users
o Apply to specific users
All Users control :- users can control manually some functions
Default
Save change
Cancel
Virtual key
Support
Like
Settings:- with this features users can set the configuration according to functional
requirement
Automatic update ON/OFF
Internet Settings
Registry Restore
Self Protection ON/OFF
Password Protection ON/OFF
Report Settings
Report Virus Statistics
Remotely manage ON/OFF
Restore Default Settings
Report:- Reports on all activities of the antivirus product are generated. User can use
these reports to verify what all activities are going on such as whether users computer has
been scanned, any malware has been detected, or any blocked website has been visited.
Such reports keep on adding up in the report list. User can set the rule when these reports
should be removed automatically
Virus Protection
Email protection
Scan Scheduler
Update
Memory Scan
Phishing Protection
Boot Time Scanner
Anti Malware Scan
Firewall Protection
Personal Control
IDS/IPS
PC2Mobile
Safe Banking
Anti Keylogger
Child Mode
External Drive & Device :- This feature allows you to set protection rules for external
devices such as CDs, DVDs, and USB-based drives.
Auto run Protection -ON/OFF
Scan External Drives -ON/OFF
Data Theft Protection -ON/OFF
Scan Android & Windows mobile –ON/OFF
HELP:- This feature helps you access the Help topics whenever you want to know about
how to use and configure the Quick Heal antivirus features, how to seek support from the
Quick Heal Technical Support team, how to update the product, and see the license
details of the product
Pc Tuneup:- Quick Heal PCTuner is a tool that helps to clean the computer system. It
helps in improving the performance of your computer and protects your privacy by
eliminating the Internet traces. Regular usage of PCTuner ensures optimal performance
of the system.
o Dashboard.
o Status
o Start Tuneup
o Tools
o Report
o Restore
Speedup:-
Display a message at top of the interface, “It identifies and disable unnecessary
startup programs and background tasks.
It contains Easy speedup, Boot time, Manual, History.
Boot time contains the record of the boot time of the system.
Manual helps the user to enable or disable a software manually.
History holds the record of changes made.
Cleanup:-
Tool Box:- This feature allows user to carry out various activities such as user can clean
and restore your system to its original settings, prevent access to certain drives, and
diagnose the system.
Browser protection
Firewall
Sandbox
System Backup Cleaner
Patch-up
Safe Banking
Child Mode
Security.
Performance.
6. Other Requirements
6.1 Data Base:-
This software able to use several data formats according to the data formats that are provided by
the data bases. Database will keep the record of all the scans and changes made to system.