STORE: Security Threat Oriented Requirements Engineering Methodology

01/06/2019
by   Md Tarique Jamal Ansari, et al.
0

As we are continuously depending on information technology applications by adopting electronic channels and software applications for our business, online transaction and communication, software security is increasingly becoming a necessity and more advanced concern. Both the functional and non-functional requirements are important and provide the necessary needs at the early phases of the software development process, specifically in the requirement phase. The aim of this research is to identify security threats early in the software development process to help the requirement engineer elicit appropriate security requirements in a more systematic manner throughout the requirement engineering process to ensure a secure and quality software development. This article proposes the STORE methodology for security requirement elicitation based on security threats analysis, which includes the identification of four points: PoA, PoB, PoC and PoD for effective security attack analysis. Further, the proposed STORE methodology is also validated by a case study of an ERP System. We also compare our STORE methodology with two existing techniques, namely, SQUARE and MOSRE. We have shown that more effective and efficient security requirements can be elicited by the STORE methodology and that it helps the security requirement engineer to elicit security requirements in a more organized manner.

READ FULL TEXT

page 5

page 7

page 8

page 9

page 10

page 11

page 12

page 13

research
12/14/2020

Risk Assessment, Threat Modeling and Security Testing in SDLC

The software development process is considered as one of the key guideli...
research
12/24/2020

Implementation of Security Features in Software Development Phases

Security holds an important role in a software. Most people are not awar...
research
09/25/2017

A Methodology for the Selection of Requirement Elicitation Techniques

In this paper, we present an approach to select a subset of requirement ...
research
02/05/2018

A Novel Approach in Calculating Stakeholder priority in Requirements Elicitation

The ultimate goal of any software developer seeking a competitive edge i...
research
11/10/2022

Deep Learning Methods for Software Requirement Classification: A Performance Study on the PURE dataset

Requirement engineering (RE) is the first and the most important step in...
research
04/13/2021

Not All Requirements Prioritization Criteria Are Equal at All Times: A Quantitative Analysis

Requirement prioritization is recognized as an important decision-making...
research
11/11/2022

An Integrity-Focused Threat Model for Software Development Pipelines

In recent years, there has been a growing concern with software integrit...

Please sign up or login with your details

Forgot password? Click here to reset