• DocumentCode
    52585
  • Title

    How Well Do You Know Your Personae Non Gratae?

  • Author

    Cleland-Huang, Jane

  • Author_Institution
    DePaul University
  • Volume
    31
  • Issue
    4
  • fYear
    2014
  • fDate
    July-Aug. 2014
  • Firstpage
    28
  • Lastpage
    31
  • Abstract
    Imagine that you´re building a software system that collects healthcare data and financial information from its users. It might seem obvious that this personal information should be protected from prying eyes through access control mechanisms, audit trails, transaction controls, transmission encryption, and so on--in fact, perhaps so obvious that in many cases people perform only a cursory security analysis and produce rather generic security requirements. But is this the right way to build secure software? Are security requirements so similar across projects that we simply don´t need to invest the time to explore product-level needs or to document requirements at an individual level for each project? The Web extra at http://youtu.be/qoocRI-7yRQ is an audio podcast in which author Jane Cleland-Huang discusses the importance of making informed decisions about how much time and effort to invest in analyzing security needs and specifying product-level security requirements.
  • Keywords
    Information services; Medical services; Network security; Productivity; Software development; attackers; cybersecurity; requirements; security; software engineering;
  • fLanguage
    English
  • Journal_Title
    Software, IEEE
  • Publisher
    ieee
  • ISSN
    0740-7459
  • Type

    jour

  • DOI
    10.1109/MS.2014.85
  • Filename
    6834694