Identification of Security Requirements through Misuse-cases
सम्बद्धता: National University of Computer and Emerging Sciencesसमाधान: समूह | अवधि: एक देखि दुई घण्टा
अवलोकन
गोलहरू
to identify the security requirements with the help of misuse cases.
सिक्ने उद्देश्यहरू
- to learn on how to identify misuse cases -to learn on identification of security vulnerabilities in a system t
प्रस्ग
Security is one of the most important requirement or constraint of any system. It is therefore important to identify security requirements in the starting phases of the project. There are many methods to identify the security requirements and we will practice one of them here in this problem i.e. through misuse cases.
पोष्ट गरिएको
सफ्टवेयर ईन्जिनियरिंग
ट्याग गरिएको
दुरुपयोग केस
| वस्तु उन्मुख विश्लेषण र डिजाइन
| सुरक्षा आवश्यकताहरु