77FTWWj1clk
Facebooktwitterredditlinkedinmail

Author Jane Cleland-Huang provides an audio recording of the Requirements column, in which she discusses how building a secure system requires proactive, rigorous analysis of the threats to which it might be exposed, followed by systematic transformation of those threats into security-related requirements. These requirements can then be tracked throughout the development life cycle. From IEEE Software’s May/June 2016 issue.