Sunday 1 January 2017

Requirements Elicitation Approach for Cyber Security Systems

Vol. 10  Issue 3
Year:2016
Issue:Jan-Mar 
Title: Requirements Elicitation Approach for Cyber Security Systems
Author Name:Issa Atoum 
Synopsis:
Requirements elicitation is considered the most important step in software engineering. There are several techniques to elicit requirements, however they are limited. Most approaches are general qualitative approaches. Thus, they do not suite specific software domain, such as cyber security. This article proposes a new technique to elicit requirements from cyber security strategies. The approach is able to formally define requirements' strengths, and link them with respective analyst's expertise. Consequently, management can easily select the appropriate requirements to be implemented. The use of the proposed approach on a selected cyber security domain showed its applicability on cyber security framework implementations.

No comments:

Post a Comment