DocumentCode
3480865
Title
Security Requirements Engineering in the Wild: A Survey of Common Practices
Author
Elahi, Golnaz ; Yu, Eric ; Li, Tong ; Liu, Lin
Author_Institution
Dept. of Comput. Sci., Univ. of Toronto, Toronto, ON, Canada
fYear
2011
fDate
18-22 July 2011
Firstpage
314
Lastpage
319
Abstract
Various governmental or academic institutes survey current security trends, and report vulnerabilities, security breaches, and their costs. However, it is unclear whether (and how) practitioners analyze these vulnerabilities and attacks to arrive at security requirements and decide on security solutions. What modeling methods are used for eliciting, analyzing, and documenting security requirements in real-world practice? This paper intends to answer such questions through a survey of security requirements engineering practices. 374 software professionals from 237 International and Chinese firms participated in the survey. The results show businesses often try to consider security from early stages of the development life cycle, however, ultimately, security is left to be built into the system at the implementation phase. We observed that practitioners favour qualitative risk assessment rather than quantitative approaches, and this helps them consider more varieties of factors when comparing alternative security design solutions.
Keywords
formal specification; risk management; security of data; risk assessment; security design solutions; security requirements engineering; Analytical models; Correlation; Risk management; Security; Software; Training; Unified modeling language; Common Security Attacks; Requirements Engineering; Security Requirements; Vulnerabilities;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Software and Applications Conference (COMPSAC), 2011 IEEE 35th Annual
Conference_Location
Munich
ISSN
0730-3157
Print_ISBN
978-1-4577-0544-1
Electronic_ISBN
0730-3157
Type
conf
DOI
10.1109/COMPSAC.2011.48
Filename
6032358
Link To Document