This teaching case introduces students to a relatively simple approach to identifying and documenting security requirements within conceptual models that are commonly taught in systems analysis and design courses. An introduction to information security is provided, followed by a classroom example of a fictitious company, Fun & Fitness, in the process of updating its e-Commerce site for class registrations. The case illustrates how UML class diagrams can be used for information classification, data input validation, and regulatory compliance considerations; how a UML use case diagram can be transformed into a “misuse case” diagram to identify threats and countermeasures to functional use cases; and how a data flow diagram may be used to ana...
Capturing security requirements is a complex process, but it is crucial to the success of a secure s...
Abstract—Teaching requirements analysis to computer science and information system students raises a...
The design of large scale, interacting, software applications is a complex task, with the inclusion ...
This teaching case introduces students to a relatively simple approach to identifying and documentin...
Use cases as part of requirements engineering are often seen as an essential part of systems develop...
Security is an integral part of most software systems but it is not considered as an explicit part i...
The methodology in this paper will let designers specify the security properties defined through the...
Due to several recent highly publicized information breaches, information security has gained a high...
In recent years UML has become a de-facto language for modelling software functional requirements. H...
This paper presents a framework for security requirements elicitation and analysis. The framework is...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
An important aspect of security requirements is the understanding and listing of the possible threat...
Due to several recent highly publicized information breaches, information security has gained a high...
Software security is becoming increasingly invasive in all aspects of a software application but the...
M.Com. (Information systems)This study has its origin in the growing need for information systems to...
Capturing security requirements is a complex process, but it is crucial to the success of a secure s...
Abstract—Teaching requirements analysis to computer science and information system students raises a...
The design of large scale, interacting, software applications is a complex task, with the inclusion ...
This teaching case introduces students to a relatively simple approach to identifying and documentin...
Use cases as part of requirements engineering are often seen as an essential part of systems develop...
Security is an integral part of most software systems but it is not considered as an explicit part i...
The methodology in this paper will let designers specify the security properties defined through the...
Due to several recent highly publicized information breaches, information security has gained a high...
In recent years UML has become a de-facto language for modelling software functional requirements. H...
This paper presents a framework for security requirements elicitation and analysis. The framework is...
As IT-systems become more complex they become more susceptible to suffering of security threats and ...
An important aspect of security requirements is the understanding and listing of the possible threat...
Due to several recent highly publicized information breaches, information security has gained a high...
Software security is becoming increasingly invasive in all aspects of a software application but the...
M.Com. (Information systems)This study has its origin in the growing need for information systems to...
Capturing security requirements is a complex process, but it is crucial to the success of a secure s...
Abstract—Teaching requirements analysis to computer science and information system students raises a...
The design of large scale, interacting, software applications is a complex task, with the inclusion ...