Cybernetics Security Requirements and Reuse for Improving Information Systems Security

Provided by: International Science Congress Association (ISCA)
Topic: Security
Format: PDF
Information systems security issues have usually been considered only after the system has been developed completely, and rarely during its design, coding, testing or deployment. However, the advisability of considering security from the very beginning of the system development has recently begun to be appreciated, and in particular in the system requirements specification phase. The authors present a practical method to elicit and specify the system and software requirements, including a repository containing reusable requirements, a spiral process model, and a set of requirements documents templates.

Find By Topic