You are on page 1of 16

Software Requirements

Specification

for

Quick Heal Antivirus

Version 1.0 approved

Prepared by

Papunjay Kumar

Heritage Institute of Technology

7/02/2018
Page ii

Table of Contents
Table of Contents .......................................................................................................................... ii
Revision History ............................................................................................................................ ii
1. Introduction ..............................................................................................................................3
1.1 Purpose............................................................................................................................................. 3
1.2 Document Conventions .................................................................................................................... 3
1.3 Intended Audience and Reading Suggestions .................................................................................. 3
1.4 Product Scope .................................................................................................................................. 3
1.5 References ........................................................................................................................................ 4
2. Overall Description ..................................................................................................................4
2.1 Product Perspective.......................................................................................................................... 4
2.2 Product Functions ............................................................................................................................ 4
2.3 User Classes and Characteristics ..................................................................................................... 5
2.4 Operating Environment .................................................................................................................... 5
2.5 Design and Implementation Constraints .......................................................................................... 5
2.6 User Documentation ........................................................................................................................ 5
2.7 Assumptions and Dependencies ...................................................................................................... 5
3. External Interface Requirements ...........................................................................................6
3.1 User Interfaces ................................................................................................................................. 6
3.2 Hardware Interfaces ......................................................................................................................... 6
3.3 Software Interfaces .......................................................................................................................... 7
3.4 Communications Interfaces ............................................................................................................. 7
4. System Features .......................................................................................................................7
4.1 System Feature 1 .............................................................................Error! Bookmark not defined.
4.2 System Feature 2 (and so on) ..........................................................Error! Bookmark not defined.
5. Other Nonfunctional Requirements .....................................................................................16
5.1 Performance Requirements ............................................................................................................ 16
5.2 Safety Requirements ...................................................................................................................... 16
5.3 Security Requirements ................................................................................................................... 16
5.4 Software Quality Attributes ........................................................................................................... 16
5.5 Business Rules ................................................................................Error! Bookmark not defined.
6. Other Requirements ..............................................................................................................16
Appendix A: Glossary...................................................................... Error! Bookmark not defined.
Appendix B: Analysis Models ......................................................... Error! Bookmark not defined.
Appendix C: To Be Determined List .............................................. Error! Bookmark not defined.

Revision History
Name Date Reason For Changes Version

[Type text] Page ii


1. Introduction
1.1 Purpose
This Software is used to safeguard a Computer and Network from malware, including viruses,
computer worms, and Trojan horses. It’s also Remove or prevent spyware and phishing. This
way your Network stays clean and, with our layered approach to security we can minimize the
chances of infection.

1.2 Document Conventions


Whole SRS is written to the good user interface font and use the bullet mark to identify
the main function ,optional identification or some special features.

 In the SRS Time New Roman is used.


 The size of the front are use 12,14,16,18.
 Important points are written in bullets.

1.3 Intended Audience and Reading Suggestions


This document is intended for the user

 Screen Locker Protection


 Computer reboot is required after Installing to make this feature work.

 Firewall
 Monitor Wi-Fi Networks is not supported on Windows XP 64-bit.

 Antivirus Remote Device Management


 This feature is not supported on Microsoft Windows 2000.
 This feature is supported on chrome, Internet Explorer 9 and later latest version.

 Safe Banking
 Safe Banking is not supported on Microsoft Windows 2000, Windows XP 32-bit / 64bit
with when you open safe banking the background downloading , uploading are blocked
only safe banking browser are work.

 PC and mobile Tuner


 Mobile and Email id are must be registered for the purpose of Tuner
 Tuner is not work in Microsoft windows 2000 and Xp 32 bit and 64 bit
Page 4

1.4 Product Scope


This Software is protects your Computer and Network from virus malware, It’s also Remove or
prevent spyware .Through this software you can scan full system, it’s scan and remove virus
automatically when you enter the external device ,through this you can block the unwanted sites ,

This software also protects the Ransomware and wannacry most dangerous virus. In this
software some special features like Safe Banking, Child mode, News, vulnerability scan,
pc2mobile scan, Pc-Tuner,

1.5 References

IEEE Std 830-1998 IEEE Recommended Practice for Software Requirements Specification IEEE
Computer Society 1998 ,

2. Overall Description
2.1 Product Perspective

 User can protect our system .


 Protect our email
 Protect our whole banking system when user use the safe banking system .
 User know about new virus and hacking news through the news functionality of the virus

2.2 Product Functions


 Registration
 Reactivation
 Renewing folder and file
 Folder and file
 Email security
 Internet and network
 Parental control
 External device and driver
 Scanner
 Pc Tuner
 News
 Setting
 Tools
 Report

[Type text] Page 4


Page 5

2.3 User Classes and Characteristics


Characteristics:- there are several user of this antivirus.

Customer :- this software users are simply member of general public who have no any type of
training require.

Maintainers :-maintainer have experience Ethical hacker and artificial intelligence to be able to add
new features according to requirement of security of the system.

2.4 Operating Environment


 The hardware software and technology are used should following specification
 Ability to scan virus in the computer
 Ability to scan remove virus from the computer
 Ability to cleanup junk file
 Ability to speedup computer
 Ability to safe Banking
 Ability to block sites

2.5 Design and Implementation Constraint

 This software is work when the user register with valid key otherwise does not work.
 When the software validity is failed then do not provide the security of the system.

2.6 User Documentation

TO INSTALL THE ANTIVIRUS:-


Install the antivirus users follows the those Step
 Insert the antivirus CD/DVD in the DVD drive.
 The auto run feature of the CD/DVD is enabled and it will automatically open a screen with
a list of options.
 Click Install to initiate the installation process.
 Select I Agree if you accept the terms and then click Next
 The installation is initiated. When installation is complete, a message appears.
Click Register Now to initiate the activation process or click Register Later to perform
activation later.
TO UNINSTALL ANTIVIRUS:-
TO uninstall the antivirus user have to follows:-

Select Start -> Programs -> antivirus –> Uninstall antivirus.


 Remove Antivirus and keep update definitions files - If you select this option, antivirus will
save license information, all downloaded update definitions,

[Type text] Page 5


Page 6

 Remove Quick Heal completely - If you select this option, Antivirus will be completely
removed from your computer.
Select one of the options and click Next to continue with the uninstall, If you have password-
protected ,Enter your password and click OK.

After the uninstall completion antivirus display two option restart or restart
later , To restart click Restart Now, or click Restart Later to continue working on
the system and restart after some time.

2.7 Assumptions and Dependencies


 Hardware never fails
 Software does not crashes.
 Antivirus is installed in supporting operating system.

3. External Interface Requirements


3.1 User Interfaces:-
 The front view of the software
o Show the system is secure or not
o Show the last date of the activation
o Show the validity date
o Report
o Help
o My account
o Virtual keyboard
o Support
o Like
o To take the option user can also see the below option
 Folder and file scan
 Email scan
 Internet and network scan
 Parental control
 External drive and devices
 Pc tuner
 Scan

3.2 Hardware Interfaces


 This software are use any type of computer

[Type text] Page 6


Page 7

3.3 Software Interfaces


 This software can not be use in windows xp
 This software can also be use in android device

3.4 Communications Interfaces

4. System Features
General

Functional requirement 1:

 Description: Install Antivirus in the System, If the operating system does not support
Antivirus software an error message is displayed.
 Input: Setup is installed.
 Processing: The operating system does not support the setup.
 Output: Display an error or complete message. When software is abort or installed in
installation process.

Functional requirement 2:

 Description: The software has to check if the entered license key is a valid license key.
 Input: Customer enters the license key.
 Processing: Check if it is a valid license key. It will be valid if
 The information on the license key can be read.
 Output: if it is invalid, display error message and ask the customer to re-enter the license
key.

Functional requirement 4:

 Description: If the license key is valid, Antivirus setup should be installed properly.
 Input: Valid license key.
 Processing: Installing the setup.
 Output: Show term and condition, and also the setup massage in the All the Step.

Functional requirement 4:-

 Description: The theme is to be selected by the user.


 Input: Theme is selected by the user.
 Processing: Applying the theme.
 Output: Update the theme.

[Type text] Page 7


Page 8

Functional requirement 5:

 Description : The user has different options to use i.e. Full Check, Scan, Speed up, Clean up,
Tool Box, Setting, Child mode, Safe Banking,
 Input: The user selects the All design option.
 Processing: It scans the full system, speedup the system, cleanup the system and does Wifi
security check. and also take action on the user selected options.
 Output: Scan and display the results.

Functional requirement 6:

 Description: user can select all the design facility.


 Input: The user selects any one of the quick scan, full scan, custom scan.
 Processing: It scans files and folders for the viruses and worms.
 Output: Displays the number of viruses found in the system and displays the location of
the file and folder which contains the virus.

Functional requirement 7:-

 Scan:-
 Full System Scan- in this feature user can scan the whole system at the one click
 Custom Scan:- In this feature user can scan our selected file from system.
 Memory Scan:- In this feature user can scan our external device memory card etc
 Vulnerability Scan :- In this scanner user can scan our computer week point and
poorly constructed parts
 Boot Time Scan:- user can scan the virus at the system boot level .
 Mobile Scan:- user can scan the all time of mobile through the login same user
id and password

Functional requirement 6:

Folder & Files :- With this feature, you can configure the protection settings for files and folders
in your system. Files & Folders includes the following protection settings.

 Scan Settings:- This feature helps you define about how to initiate the scan of your
system and what action should be taken when a virus is detected. However, the default
settings are optimal that ensures the required protection to your system.
 Select scan mod
o Automatic
o Advanced
 Select action to perform when virus is found
o Repair
o Delete
o Skip

[Type text] Page 8


Page 9

Check mark :- Backup before taking action

 Default
 Save change
 Cancel
 Virus Protection:- It is recommended that you always keep Virus Protection turned
on to keep your system clean and secure from any potential threats. However, Virus
Protection is turned on by default.
 Select action to be performed when virus is found
o Repair
o Delete
o Deny access

Check mark

Backup before taking actor

Enable sound when threat is detected

Display alert message

 Default
 Save change
 Cancel
 Advance DNA Scan :- DNAScan is an indigenous technology of Quick Heal to
detect and eliminate new and unknown malicious threats in the system. Advance
DNAScan technology successfully traps suspected files with very less false alarms.

 Enable DNAscan yes/no


 Show notification while submitting files
 Enable Behavior detection System
o High
o Moderate
o Low
 Submit suspicious file
o Do not submit files
o Submit files

 Block suspicious packet Files:-Suspicious packed files are malicious programs that
are compressed or packed and encrypted using a variety of methods. These files when
unpacked can cause serious harm to the computer systems. This feature helps you
identify and block such suspicious packed files.

[Type text] Page 9


Page 10

 It is recommended that always keep this option enabled to ensure that the
suspicious files are not accessed and thus prevent infection
o Enable
o Disable

 Automatic Rogueware Scan:- This feature automatically scans and removes


rogueware and fake anti-virus software. If this feature is enabled, all the files are
scanned for possible rogueware present in a file.
 Check mark
o Enable
o Disable
 Anti-Keylogger
 Keyloggers are malicious programs that record all information typed by user on
the keyboard of your computer or laptop and share that information with the
hackers.
 User may lose confidential information such as usernames, passwords, or PIN to
the hackers. Anti-Keylogger helps user prevent information getting recorded by
keystroke logger malware

 Screen Locker Protection:- Malicious programs that lock the screen preventing
access to your computer are known as screen lockers. With Screen Locker Protection,
User can clean-up of your computer and remove such malicious programs.
 Set the short key
 Ctrl +Alt + Shift
o A
o B
o C
o D
 Default
 Save change
 Cancel
 Back to men
 Virtual key
 My account
 Support
 Like
 Scan Schedule:- Scanning regularly helps user system free from virus and other
types of infections. This feature allows user to define a schedule when to begin

[Type text] Page 10


Page 11

scanning of users system automatically. Users can define multiple numbers of scan
schedules to initiate scan at users convenience.
 Configuration scan schedule
o New
Scan frequency
o Scan name
o Frequency
 Daily
 Weekly
o Start at first boot
o Set start time
 Date
 Time
Scan option
o Low
o High
o User name
o Password
 Edit
 Remove
 Close
 Back to men
 Virtual key
 My account
 Support
 Like
 Exclude File & Folders :- With this feature, users can decide which files and folders
should not be included during scanning for known viruses, DNAScan, Suspicious
Packed files, and Behavior Detection
 Add the file /folder path
 Edit
 Remove
 Save change
 Cancel
 Quarantine & Backup:- This feature allows you to safely isolate the infected or
suspected files. The suspected files are quarantined in an encrypted format to prevent
from being executed. This helps prevent infection.

 Email:- With this feature, you can configure the protection rules for all incoming
emails.

[Type text] Page 11


Page 12

 Email Protection
o Enable
 Display alert message – yes /no
 Select action to be performed when virus is found
 Repair
 delete

backup before taking action –yes or not

o Disable
o Default
o Save change
o Cancel
 Trusted Email Client protection:- it is used as a convenient mode to deliver
malware and other threats
o Enable
o Disable
 Spam protection
o Enable
 Check mark
 Tag subject with next text
 Enable email block list
 Enable email white list
 Enable antispam plugin
 Spam protection level
 Soft
 Moderate
 Strict
o Disable
o Default
o Save change
o Cancel
 Internet & Network:- This feature allows user to set the protection rules to protect your
system from malicious files that can sneak into users system during online activities such
as banking, shopping, and surfing.
 Firewall Protection
o Enable
o Disable
 Browsing Protection
o Enable
o Disable

[Type text] Page 12


Page 13

 Malware Protection
o Enable
o Disable
 Phishing Protection
o Enable
o Disable
 Browser Sandbox
o Enable
o Disable
 News Alert
o Enable
o Disable
 IDS/IPS
o Enable
o Disable
 Safe Banking:- whit this feature user can surfing internet safe by the use of given
browser user can add the bookmark and view the bookmark list.
 Chrome
 Mozilla firefox
 Internet explore
 Add Bookmark
 View bookmark

 Personal Control :- Parental Control is a very effective method to control the Internet
access, application access, and computer access by the children and other users. This
feature ensures that the children and other users do not visit inappropriate types of Web
sites, and can only access the allowed applications
 Display alert message yes/no
 Select whom to apply the settings
o Apply to all users
o Apply to specific users
 All Users control :- users can control manually some functions
 Default
 Save change
 Cancel
 Virtual key
 Support
 Like

[Type text] Page 13


Page 14

 Settings:- with this features users can set the configuration according to functional
requirement
 Automatic update ON/OFF
 Internet Settings
 Registry Restore
 Self Protection ON/OFF
 Password Protection ON/OFF
 Report Settings
 Report Virus Statistics
 Remotely manage ON/OFF
 Restore Default Settings

 Report:- Reports on all activities of the antivirus product are generated. User can use
these reports to verify what all activities are going on such as whether users computer has
been scanned, any malware has been detected, or any blocked website has been visited.
Such reports keep on adding up in the report list. User can set the rule when these reports
should be removed automatically
 Virus Protection
 Email protection
 Scan Scheduler
 Update
 Memory Scan
 Phishing Protection
 Boot Time Scanner
 Anti Malware Scan
 Firewall Protection
 Personal Control
 IDS/IPS
 PC2Mobile
 Safe Banking
 Anti Keylogger
 Child Mode
 External Drive & Device :- This feature allows you to set protection rules for external
devices such as CDs, DVDs, and USB-based drives.
 Auto run Protection -ON/OFF
 Scan External Drives -ON/OFF
 Data Theft Protection -ON/OFF
 Scan Android & Windows mobile –ON/OFF

[Type text] Page 14


Page 15

 HELP:- This feature helps you access the Help topics whenever you want to know about
how to use and configure the Quick Heal antivirus features, how to seek support from the
Quick Heal Technical Support team, how to update the product, and see the license
details of the product

 Pc Tuneup:- Quick Heal PCTuner is a tool that helps to clean the computer system. It
helps in improving the performance of your computer and protects your privacy by
eliminating the Internet traces. Regular usage of PCTuner ensures optimal performance
of the system.

o Dashboard.
o Status
o Start Tuneup
o Tools
o Report
o Restore

 Speedup:-

 Display a message at top of the interface, “It identifies and disable unnecessary
startup programs and background tasks.
 It contains Easy speedup, Boot time, Manual, History.
 Boot time contains the record of the boot time of the system.
 Manual helps the user to enable or disable a software manually.
 History holds the record of changes made.

 Cleanup:-

 Clean up plug-in and junk file with one click.


 It saves disk space and improve the performance of the computer.

 Tool Box:- This feature allows user to carry out various activities such as user can clean
and restore your system to its original settings, prevent access to certain drives, and
diagnose the system.
 Browser protection
 Firewall
 Sandbox
 System Backup Cleaner
 Patch-up
 Safe Banking
 Child Mode

[Type text] Page 15


Page 16

5. Other Nonfunctional Requirements


5.1 Performance Requirements

 It must be able to perform in adverse conditions like high/low temperature etc.


 High scanning rate

5.2 Safety Requirements

 The software must not be cracked easily.


 The code of the software must be abstract.
 Must have the privacy constraints.

5.3 Security Requirements

 Users accessibility is censured in all the ways


 Users are advised to scan their system after every few days.
 Users are advised to remove the virus from the system which are suggested.

5.3 Software Quality Attributes

 Security.
 Performance.

6. Other Requirements
6.1 Data Base:-

This software able to use several data formats according to the data formats that are provided by
the data bases. Database will keep the record of all the scans and changes made to system.

[Type text] Page 16

You might also like