Research Article
Mitigating Software Vulnerabilities through Secure Software Development with a Policy-Driven Waterfall Model
Table 2
Security vulnerabilities and risks for e-travel.
| S. No. | Component | Type | Security vulnerability | Risk |
| 1 | Make reservation | Process | Tampering, spoofing, repudiation, information disclosure, DoS, elevated access | High | 2 | Prepare ticket | Process | ā | Low | 3 | Make payment | Process | Spoofing, repudiation | Moderate | 4 | Bookings and flight records | Database | Information disclosure, elevated access | Moderate | 5 | Accounting file | Datastore | Information disclosure, elevated access | Moderate |
|
|