Security Analysis

Security requirements are nonfunctional requirements that strongly influence the architectural design of software systems.  Security requirements and other requirements can conflict with one another. A common example is that security and usability are often at odds with one another, and a balance between the two must be found. Therefore you have to determine how secure do you…

Security and Privacy

With today’s interconnected apps, security and privacy is on the forefront of people’s minds, especially with several noticeable breaches. “Relying on the government to protect your privacy is like asking a peeping tom to install your window blinds.” John Perry Barlow However, security and privacy have to be weighed both with and against the need…

Security Engineering

With the unprecedented growth of web apps and mobile apps, security in our applications must be taken seriously as consumers are now confronted with potential losses all over – and they demand to be properly taken cared of. Software security is an aspect of software quality assurance.  Security concerns must be considered at the beginning…

Review Types

There are several types of reviews a software company might use. Using one does not prevent you from using others – in fact, the best process is to use a combination of all of them. Informal to catch easy things early on, and ensure compliance with design specifications, formal to more rigidly test and verify,…

Review Techniques

Within the context of the software development, the terms defect and fault are synonymous. Both imply a problem that is discovered after the software has been released to end users. The book makes a distinction between error – a problem found before being released to the end user and defect or fault. However, in the real world,…