|
Step | Members | Strategy | Intake | Outcome |
|
Recognizing system targets | Requirement engineer, client | Interrogation, creative thinking | Aim | System objective |
Recognizing and identifying the Partners | Requirement engineer | Examine | System objective | Partners |
Approved the targets | Requirement engineer, partners | Meeting | System objective | Approved the targets |
Recognizing VR | Requirement engineer, partners | Interrogation | Partners resource | Precious resource |
Examination of security threats | Requirement engineer, security expert | Security attack examining | Precious resource | HP, TP, SP, and RP |
Recognizing and classifying the threat | Requirement engineer | STRIDE examining | HP, TP, SP, and RP | Classified and order of preference |
Hazard valuation and recognizing | Requirement engineer, hazard manager | DREAD risk assessment technology | Classified and order of preference | Threats |
Security requirement evocation | Requirement engineer | Threat dictionary | Threats | Security requirements |
Security requirement certification | Requirement engineer, security expert | Examine | Security requirements | Important security requirement |
Security requirement stipulation record | Requirement engineer | Recording | Important security requirement | Security requirement stipulation record |
|