Security Requirement Gathering in Agile World and Six Sigma

The Security View

Security Requirements are generally categorized in NFR (Non Functional Requirements) during requirement gather phase.
There is Always a dual between Usability/Ease of Use and Security.More Ease of use given to consumer more vulnerability it is Exposed with. With more Secure software many of the vulnerable functionality of ease of use features have to be reduced.
Security-Functionality and Ease of Use triadEach one is correlated when you increase one it will decrease the other. Such as it satisfy property of Triangle

(sum of two side > left over side) then only triangle is possible.
So if Functionality + Ease of Use is increased then the Security has to be downgraded.Read related blog on more Triad detail.
http://blog.infosanity.co.uk/2010/06/12/infosec-triads-securityfunctionalityease-of-use/
In Modern time Security of Software is quite a concern with user information leaks and security attacks coming into picture daily. This means loss of money and creditability of company. The most important…

View original post 231 more words

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s