DocumentCode :
3480865
Title :
Security Requirements Engineering in the Wild: A Survey of Common Practices
Author :
Elahi, Golnaz ; Yu, Eric ; Li, Tong ; Liu, Lin
Author_Institution :
Dept. of Comput. Sci., Univ. of Toronto, Toronto, ON, Canada
fYear :
2011
fDate :
18-22 July 2011
Firstpage :
314
Lastpage :
319
Abstract :
Various governmental or academic institutes survey current security trends, and report vulnerabilities, security breaches, and their costs. However, it is unclear whether (and how) practitioners analyze these vulnerabilities and attacks to arrive at security requirements and decide on security solutions. What modeling methods are used for eliciting, analyzing, and documenting security requirements in real-world practice? This paper intends to answer such questions through a survey of security requirements engineering practices. 374 software professionals from 237 International and Chinese firms participated in the survey. The results show businesses often try to consider security from early stages of the development life cycle, however, ultimately, security is left to be built into the system at the implementation phase. We observed that practitioners favour qualitative risk assessment rather than quantitative approaches, and this helps them consider more varieties of factors when comparing alternative security design solutions.
Keywords :
formal specification; risk management; security of data; risk assessment; security design solutions; security requirements engineering; Analytical models; Correlation; Risk management; Security; Software; Training; Unified modeling language; Common Security Attacks; Requirements Engineering; Security Requirements; Vulnerabilities;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Software and Applications Conference (COMPSAC), 2011 IEEE 35th Annual
Conference_Location :
Munich
ISSN :
0730-3157
Print_ISBN :
978-1-4577-0544-1
Electronic_ISBN :
0730-3157
Type :
conf
DOI :
10.1109/COMPSAC.2011.48
Filename :
6032358
Link To Document :
بازگشت