- Practical Internet of Things Security
- Brian Russell Drew Van Duren
- 85字
- 2021-06-10 18:42:35
Security
Calling security requirements non-functional requirements may sound counterintuitive to security engineers, but in the traditional systems engineering sense they are non-functional. Requirements management has to do with the process of gathering requirements, and then analyzing and decomposing those requirements to be fed into a system design. In many cases, this requires derivation of requirements from a source into more system-specific requirements.
Finding the sources of security requirements is a primary objective when handling security non-functional requirements. One of these sources is threat modeling.
推薦閱讀
- Android應(yīng)用安全實戰(zhàn):Frida協(xié)議分析
- Kali Linux CTF Blueprints
- 網(wǎng)絡(luò)安全保障能力研究
- INSTANT Burp Suite Starter
- Testing and Securing Android Studio Applications
- 網(wǎng)絡(luò)安全能力成熟度模型:原理與實踐
- 信息安全等級保護測評與整改指導(dǎo)手冊
- SQL Injection Strategies
- 實用黑客攻防技術(shù)
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- 網(wǎng)絡(luò)攻防實戰(zhàn)研究:MySQL數(shù)據(jù)庫安全
- 聯(lián)邦學(xué)習(xí)原理與算法
- 數(shù)據(jù)恢復(fù)技術(shù)深度揭秘
- Developing Applications with Salesforce Chatter
- 黑客攻防從入門到精通:絕招版(第2版)