Specifying System Security Requirements

10/25/99


Click here to start


Table of Contents

Specifying System Security Requirements

PPT Slide

A Security Requirements Roadmap

Part I

What Ownership Means

Whose Requirements Are They?

Audiences and Their Interests

PPT Slide

Consequences

Whose Requirement?

Rules for Requirements Mechanics

Part II

One Person’s Requirement is Another Person’s ...

Security Requirements Relationships

PPT Slide

PPT Slide

What’s Wrong With This Picture?

Security Policy

PPT Slide

The Many Layers of Policy

PPT Slide

Technical Requirements

Technical Requirements (continued)

PPT Slide

PPT Slide

Assurance Requirements

PPT Slide

Assurance Requirements (continued)

PPT Slide

Part III

Collections of Requirements

Stages of Security Definition

Some Spec Fundamentals . . .

Part IV

Should Security Stand Out?

PPT Slide

Some Specification Dimensions

Sensitivity-Driven Analysis

Sensitivity-Driven Structure

Requirement Subtypes

Sensitivity-Driven Approach

Architecture-Driven Analysis

Architecture-Driven Structure

Architecture-Driven Sample

Architecture-Driven Approach

Evolutionary Spec Considerations

PPT Slide

Part V

Syntax and Semantics

As I Was Saying...

Basic Syntax Goals

Syntax Nightmare #1

Syntax Fantasy #1

Syntax Nightmare #2

Syntax Fantasy #2

Basic Semantic Goals

PPT Slide

Semantic Nightmare #1

Semantic Fantasy #1

Semantic Nightmare #2

Semantic Fantasy #2

Before You Sign

Time to Stem the Tide

Author: Paula Moore