Information security has played a great role in supporting security of organizational assets. Computes softwares / information systems developers have taken information security into great consideration particularly during systems/software development. There are several modelling languages that can be used to architect security features of information systems with respect to information system security management domain model(ISSRM). Malicious Activity Diagrams have been widely used by developers to model security features of various information systems as an extension of Unified Modeling Language(UML)[]. However Malicious Activity Diagrams can not cover all the features of ISSRM[]. Due to the limitations of Malicious Activity Diagrams,this study has proposed new additional featers that will enable Malicious Activity Diagrams to cover the remaining security concepts of ISSRM(such as security constraint of the static information/security criterion-figure 6).