JSE_V10_N3_RP1
Requirements Elicitation Approach for Cyber Security Systems
Issa Atoum
Journal on Software Engineering
2230–7168
10
3
1
5
Software Requirement, Requirements Elicitation, Cyber Security Frameworks, Strategic Implementation
Requirements elicitation is considered the most important step in software engineering. There are several techniques to elicit requirements, however they are limited. Most approaches are general qualitative approaches. Thus, they do not suite specific software domain, such as cyber security. This article proposes a new technique to elicit requirements from cyber security strategies. The approach is able to formally define requirements' strengths, and link them with respective analyst's expertise. Consequently, management can easily select the appropriate requirements to be implemented. The use of the proposed approach on a selected cyber security domain showed its applicability on cyber security framework implementations.
January - March 2016
Copyright © 2016 i-manager publications. All rights reserved.
i-manager Publications
http://www.imanagerpublications.com/Article.aspx?ArticleId=4898