DocumentCode :
52585
Title :
How Well Do You Know Your Personae Non Gratae?
Author :
Cleland-Huang, Jane
Author_Institution :
DePaul University
Volume :
31
Issue :
4
fYear :
2014
fDate :
July-Aug. 2014
Firstpage :
28
Lastpage :
31
Abstract :
Imagine that you´re building a software system that collects healthcare data and financial information from its users. It might seem obvious that this personal information should be protected from prying eyes through access control mechanisms, audit trails, transaction controls, transmission encryption, and so on--in fact, perhaps so obvious that in many cases people perform only a cursory security analysis and produce rather generic security requirements. But is this the right way to build secure software? Are security requirements so similar across projects that we simply don´t need to invest the time to explore product-level needs or to document requirements at an individual level for each project? The Web extra at http://youtu.be/qoocRI-7yRQ is an audio podcast in which author Jane Cleland-Huang discusses the importance of making informed decisions about how much time and effort to invest in analyzing security needs and specifying product-level security requirements.
Keywords :
Information services; Medical services; Network security; Productivity; Software development; attackers; cybersecurity; requirements; security; software engineering;
fLanguage :
English
Journal_Title :
Software, IEEE
Publisher :
ieee
ISSN :
0740-7459
Type :
jour
DOI :
10.1109/MS.2014.85
Filename :
6834694
Link To Document :
بازگشت