Table of Contents
Specifying System Security Requirements
PPT Slide
A Security Requirements Roadmap
Part I
What Ownership Means
Whose Requirements Are They?
Audiences and Their Interests
PPT Slide
Consequences
Whose Requirement?
Rules for Requirements Mechanics
Part II
One Person’s Requirement is Another Person’s ...
Security Requirements Relationships
PPT Slide
PPT Slide
What’s Wrong With This Picture?
Security Policy
PPT Slide
The Many Layers of Policy
PPT Slide
Technical Requirements
Technical Requirements (continued)
PPT Slide
PPT Slide
Assurance Requirements
PPT Slide
Assurance Requirements (continued)
PPT Slide
Part III
Collections of Requirements
Stages of Security Definition
Some Spec Fundamentals . . .
Part IV
Should Security Stand Out?
PPT Slide
Some Specification Dimensions
Sensitivity-Driven Analysis
Sensitivity-Driven Structure
Requirement Subtypes
Sensitivity-Driven Approach
Architecture-Driven Analysis
Architecture-Driven Structure
Architecture-Driven Sample
Architecture-Driven Approach
Evolutionary Spec Considerations
PPT Slide
Part V
Syntax and Semantics
As I Was Saying...
Basic Syntax Goals
Syntax Nightmare #1
Syntax Fantasy #1
Syntax Nightmare #2
Syntax Fantasy #2
Basic Semantic Goals
PPT Slide
Semantic Nightmare #1
Semantic Fantasy #1
Semantic Nightmare #2
Semantic Fantasy #2
Before You Sign
Time to Stem the Tide
|