DocumentCode
842799
Title
Defining Misuse within the Development Process
Author
Petersen, G. ; Steven, John
Author_Institution
Arctec Group
Volume
4
Issue
6
fYear
2006
Firstpage
81
Lastpage
84
Abstract
The software development industry often brings in security at the eleventh hour, right before developers throw the code over the wall--that is, deploy it into production--and ask, "Well, is it secure?" At this point, hilarity--for the objective observers, anyhow--ensues as security personnel work feverishly to shove crypto, firewalls, and all the other mechanisms at their disposal into the most egregious risk areas. This article describes how to create useful misuse cases within the development process, thus avoiding the headaches that can arise toward the end of the cycle.
Keywords
Authentication; Authorization; Computer aided software engineering; Computer architecture; Computer security; Data security; Databases; Feedback; Internet; Privacy; misuse cases; software development life cycle; use cases;
fLanguage
English
Journal_Title
Security & Privacy, IEEE
Publisher
ieee
ISSN
1540-7993
Type
jour
DOI
A98FC045-3592-4BC4-8594-082A27164F7C
Filename
4020242
Link To Document