Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Security Requirements Engineering
Oleksii Baranovskyi, Ph.D.
CEH, CHFI, CVA, ECIH
Security Requirements describe
functional and non-functional
requirements that need to be
satisfied in order to achieve th...
Security Requirement Engineering
Types of Security Requirements
Immunity
Requirements
Integrity
Requirements
Intrusion Detection
Requirements
Nonrepudiatio...
Types of Security Requirements
Secure Functional
Requirements
Functional Security
Requirements
Secure
Development
Requirem...
Software Requirement Management Methods
SQUARE
Security Quality Requirements Engineering
SREP
The Security Requirements En...
Agree on
definitions
SQUARE
Identify
security
goals
Develop
Artifacts
Perform risk
assessment
Select
elicitation
technique...
Agree on
definitions
SQUARE
Identify
security
goals
Develop
Artifacts
Perform risk
assessment
Select
elicitation
technique...
Software Development Models
Waterfall Agile Iterative Incremental PrototypeSpiral
Security Ambassador VS Application Security Team
Questions?See you next time, have nice day!
Подписывайтесь, ставьте лайк, максимальный репост!
"Security Requirements Engineering", Oleksii Baranovskyi
Upcoming SlideShare
Loading in …5
×

"Security Requirements Engineering", Oleksii Baranovskyi

501 views

Published on

The software security depends largely on how the system was designed, developed and deployed, so at this time it is necessary to take into account the security requirements already at the stage of requirements development and software design. There are some different approaches to security requirements engineering, each of them has its advantages and disadvantages. During the speech, methods of security requirements engineering, identifying parties, identifying and assessing the risks of software assets, tracking implementation of requirements, etc. will be considered.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

"Security Requirements Engineering", Oleksii Baranovskyi

  1. 1. Security Requirements Engineering Oleksii Baranovskyi, Ph.D. CEH, CHFI, CVA, ECIH
  2. 2. Security Requirements describe functional and non-functional requirements that need to be satisfied in order to achieve the security attributes of an system. SR Security Requirements
  3. 3. Security Requirement Engineering
  4. 4. Types of Security Requirements Immunity Requirements Integrity Requirements Intrusion Detection Requirements Nonrepudiation Requirements Privacy Requirements Security Auditing Requirements Identification Requirements Authentication Requirements Authorization Requirements Survivability Requirements Physical Protection Requirements System Maintenance Security Requirements
  5. 5. Types of Security Requirements Secure Functional Requirements Functional Security Requirements Secure Development Requirements Non-Functional Security Requirements
  6. 6. Software Requirement Management Methods SQUARE Security Quality Requirements Engineering SREP The Security Requirements Engineering Process CLASP The Comprehensive, Lightweight Application Security Process Security patterns Moffat Core security requirements artifacts Tropos
  7. 7. Agree on definitions SQUARE Identify security goals Develop Artifacts Perform risk assessment Select elicitation techniques Elicit security requirements Categorize & Prioritize requirements Requirement s inspection Team
  8. 8. Agree on definitions SQUARE Identify security goals Develop Artifacts Perform risk assessment Select elicitation techniques Elicit security requirements Categorize & Prioritize requirements Requirement s inspection Team Step - Input - Techniques – Participants - Output
  9. 9. Software Development Models Waterfall Agile Iterative Incremental PrototypeSpiral
  10. 10. Security Ambassador VS Application Security Team
  11. 11. Questions?See you next time, have nice day! Подписывайтесь, ставьте лайк, максимальный репост!

×