DocumentCode
52585
Title
How Well Do You Know Your Personae Non Gratae?
Author
Cleland-Huang, Jane
Author_Institution
DePaul University
Volume
31
Issue
4
fYear
2014
fDate
July-Aug. 2014
Firstpage
28
Lastpage
31
Abstract
Imagine that you´re building a software system that collects healthcare data and financial information from its users. It might seem obvious that this personal information should be protected from prying eyes through access control mechanisms, audit trails, transaction controls, transmission encryption, and so on--in fact, perhaps so obvious that in many cases people perform only a cursory security analysis and produce rather generic security requirements. But is this the right way to build secure software? Are security requirements so similar across projects that we simply don´t need to invest the time to explore product-level needs or to document requirements at an individual level for each project? The Web extra at http://youtu.be/qoocRI-7yRQ is an audio podcast in which author Jane Cleland-Huang discusses the importance of making informed decisions about how much time and effort to invest in analyzing security needs and specifying product-level security requirements.
Keywords
Information services; Medical services; Network security; Productivity; Software development; attackers; cybersecurity; requirements; security; software engineering;
fLanguage
English
Journal_Title
Software, IEEE
Publisher
ieee
ISSN
0740-7459
Type
jour
DOI
10.1109/MS.2014.85
Filename
6834694
Link To Document