Data Management Investigate

Requirements Reuse for Improving Information Systems Security

Download now Free registration required

Executive Summary

Information systems security issues have usually been considered only after the system has been developed completely, and rarely during its design, coding, testing or deployment. However, the advisability of considering security from the very beginning of the system development has recently begun to be appreciated, and in particular in the system requirements specification phase. The authors present a practical method to elicit and specify the system and software requirements, including a repository containing reusable requirements, a spiral process model, and a set of requirements documents templates. Any information system including these security requirements must therefore pass a risk analysis and management study performed with MAGERIT.

  • Format: PDF
  • Size: 249.81 KB