• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Sys & Infrast Lifecycle Mngt 1

Information Technology Audit and Cybersecurity, Temple University

Sys & Infrast Lifecycle Mngt 1

MIS 5203.001 ■ Spring 2021 ■ Wade Mackey
  • Home
  • Syllabus
    • Gradebook
  • Announcements
  • Course Work
    • 1 – Intro/SDLC
    • Planning
      • 2 – Prjct Mngmt & Governance
      • 3 – Business Case & Feasibility
    • Analysis
      • 4 – Requirements Determination
      • 5 – Process Modeling
      • 6 – Data Modeling
      • 7 -Test One
    • Design
      • 10 – HCI (UI)
      • 8 – Database
      • 9 – Software
      • 11 – Test Two
    • Implementation
      • 12 – Architecture
      • 13 – Development & Testing
      • 14 – Migration & Deployment
      • Test 3: Implementation
  • Projects
    • Project 1: Business Case Development
    • Project 2: SDLC
    • Project 3: Systems Design
    • Project 4: Process Re-engineering
    • Project 5: Controls

Week 4 Types of Security Requirements- Prince Patel

May 4, 2021 Leave a Comment

Here are three types of information security requirements:

Functional requirements describe what a system has to do. So functional security requirements describe functional behavior that enforces security. Functional requirements can be directly tested and observed. Requirements related to access control, data integrity, authentication, and wrong password lockouts fall under functional requirements.

Nonfunctional requirements describe what a system has to be. These are statements that support auditability and uptime. Nonfunctional security requirements are statements such as “Audit logs shall be verbose enough to support forensics.” Supporting auditability is not a direct functionality requirement, but it supports auditability requirements from regulations that might apply.

Derived requirements are inspired by the functional and nonfunctional requirements. For example, if a system has a user ID and PIN functional requirement, a derived requirement might define the number of allowable incorrect PIN guesses before an account is locked out. For audit logs, a derived requirement might support the integrity of the logs, such as log injection prevention.

-Prince 

ref-https://www.synopsys.com/blogs/software-security/software-security-requirements/

 

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

RECENT ANNOUNCEMENTS

Week 14 Implementation Plan Risks – Prince Patel

What Are the Risks of an Implementation Plan? As is the case with any … [More...] about Week 14 Implementation Plan Risks – Prince Patel

Week 13 Smoke Testing- Prince Patel

Smoke Testing Smoke testing is performed on the ‘new’ build given by … [More...] about Week 13 Smoke Testing- Prince Patel

Week 12 (FaaS) Function as a Service! – Prince Patel

You all must have heard IaaS, PaaS & SaaS. But let me introduce you to … [More...] about Week 12 (FaaS) Function as a Service! – Prince Patel

Week 10 What is Guerrilla Usability Testing? – Prince Patel

Guerrilla testing In guerrilla testing, test subjects are chosen … [More...] about Week 10 What is Guerrilla Usability Testing? – Prince Patel

Week 9 Dev-ops Software Development Methodology – Prince Patel

DevOps development methodology DevOps is not just a development … [More...] about Week 9 Dev-ops Software Development Methodology – Prince Patel

Week 8 Database Design Steps – Prince Patel

How to Design Database: Steps of Designing Database Database designing … [More...] about Week 8 Database Design Steps – Prince Patel

[More Announcements...]

Copyright © 2025 · Department of Management Information Systems · Fox School of Business · Temple University