DocumentCode :
892973
Title :
Cost-Effective Security
Author :
Peeters, Johan ; Dyson, Paul
Volume :
5
Issue :
3
fYear :
2007
Firstpage :
85
Lastpage :
87
Abstract :
To be successful, application software needs compelling functionality, availability within the right timeframe, and a reasonable price. But equally critical, teams must get nonfunctional characteristics right - performance, scalability, manageability, maintainability, usability, and, of course, security. The authors introduced misuse or abuse cases as counterparts to use cases and explained that although use cases capture functional requirements, abuse cases describes how users can misuse a svstem with malicious intent, thereby identifying additional security requirements. Another prior installment discussed how to fit misuse and abuse cases into the development process by defining who should write them, when to do so, and how to proceed. In this article, we discuss what abuse cases bring to software development in terms of planning. We don´t assumes fixed budget is assigned to security measure´s but that budgetary constraints apply to the project as a whole. We believe it´s reasonable, and often accessary, to trade funtionality against security, so the question isn´t how to prioritize security requirements but how to prioritize the development effort across both functional and security requirements.
Keywords :
security of data; software development management; cost-effective security; software development; software security; Collaboration; Computer crime; Computer security; Cost function; Feedback; Presses; Privacy; Process design; Process planning; Scalability; abuse cases; security; software development; use cases;
fLanguage :
English
Journal_Title :
Security & Privacy, IEEE
Publisher :
ieee
ISSN :
1540-7993
Type :
jour
DOI :
10.1109/MSP.2007.56
Filename :
4218561
Link To Document :
بازگشت