Question: Question 5 Case Study - Security Requirement Analysis [30 marks] An onboarding process allows customers to get started to use the product/service of a business.
![Question 5 Case Study - Security Requirement Analysis [30 marks] An](https://dsd5zvtm8ll6.cloudfront.net/si.experts.images/questions/2024/09/66f4deb143160_82466f4deb0bdd01.jpg)

Question 5 Case Study - Security Requirement Analysis [30 marks] An onboarding process allows customers to get started to use the product/service of a business. An efficient onboarding process can provide a good customer experience with more engagement and thus better revenue generation. For most fintech applications, onboarding process normally involve "sign-up" steps to have the true identity of the customer verified. Due to the technology, these steps can now be done completely online. In this question, you are going to perform a thorough security requirement analysis on the "sign-up" process and examine what/how software/app available in the market are able to fulfill the security requirements. Write a 1500-word report that includes the followings: 1. An analysis of the security requirements of the "sign-up" process. As a starting point, define the "sign-up" flow and then you may first use the C.I.A. model for your analysis. Then, consider other security requirements that you think important for this feature. [15 marks ] 2. Search online for ONE software/app that has this customer onboarding feature and describe what security mechanisms are adopted and why they are able to fulfil the security requirements you mentioned in 1 . [10 marks ] 3. Comment on the insufficiency(s) of the implementation and propose new requirement(s) and possible security mechanism(s). [5 marks]
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
