A Taxonomy of Security-Related Requirements
نویسنده
چکیده
Safety and security are closely related subtypes of defensibility, another quality factor in a quality model. The close similarity between these two quality factors implies that a taxonomy of safety-related requirements is a good place to begin when developing an analogous taxonomy of security-related requirements. The resulting taxonomy consists of pure security requirements specifying minimum acceptable amounts of security, security-significant requirements which are non-security requirements with important security ramifications, security system requirements specifying requirements for security architectural components, and security constraints.
منابع مشابه
The Mean Failure Cost Cybersecurity Model toward Security Measures and Associated Mechanisms
This paper presents results of the quantification of security threats of e-learning system using an economic measure abridged by MFC (Mean Failure Cost). We study means to optimize this measure and to make it more precise, more useful in practice. First we develop basic security requirements taxonomy adapted to all context and systems because security requirements lacks a clear basic taxonomy. ...
متن کاملPrivacy and verifiability in electronic voting
Privacy and verifiability refer to fundamental principles of democratic elections and therefore belong to the set of established security requirements which each electronic voting scheme is expected to meet. However, very different ideas and opinions about privacy and verifiability exist in the scientific community, which shows that both properties are not well understood yet. Moreover, althoug...
متن کاملSecurity Requirements Engineering: State of the Art and Practice and Challenges
Security is a property of the system which remains dependable in the face of malice, error, or mischance [3]. In scope of information system, security consists of seven states: confidentiality, integrity, availability, authenticity, accountability, non-repudiation and reliability as defined in ISO/IEC 13335 standard [38]. Introduction of such security goals stem from potential adversaries that ...
متن کاملA Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملTaxonomy of Security Attacks in Sensor Networks and Countermeasures
Ad-hoc sensor networks have become common over the past few years and the domain of their application is increasing widely. However, the security of these networks poses a great challenge due to the fact that they consist of tiny wireless devices which have limited hardware and energy resources. In addition, these networks are generally deployed and then left unattended. These facts coupled tog...
متن کامل