Research Article

Mitigating Software Vulnerabilities through Secure Software Development with a Policy-Driven Waterfall Model

Table 2

Security vulnerabilities and risks for e-travel.

S. No.ComponentTypeSecurity vulnerabilityRisk

1Make reservationProcessTampering, spoofing, repudiation, information disclosure, DoS, elevated accessHigh
2Prepare ticketProcessā€‰Low
3Make paymentProcessSpoofing, repudiationModerate
4Bookings and flight recordsDatabaseInformation disclosure, elevated accessModerate
5Accounting fileDatastoreInformation disclosure, elevated accessModerate