A Personal Data Audit Method through Requirements Engineering Thomas van Eerden.

10
A Personal Data Audit Method through Requirements Engineering Thomas van Eerden

description

Introduction Method that systematizes audit information security systems. Focus: Sensitive data Health Information Systems Information from the Government (about you) Police reports Etc.

Transcript of A Personal Data Audit Method through Requirements Engineering Thomas van Eerden.

Page 1: A Personal Data Audit Method through Requirements Engineering Thomas van Eerden.

A Personal Data Audit Method through Requirements

EngineeringThomas van Eerden

Page 2: A Personal Data Audit Method through Requirements Engineering Thomas van Eerden.

AuthorsMiguel A. Martínez Joaquín LasherasEduardo Fernández-MedinaAmbrosio Toval Mario Piattini

All an academic background in Spain

Page 3: A Personal Data Audit Method through Requirements Engineering Thomas van Eerden.

IntroductionMethod that systematizes audit information

security systems.Focus: Sensitive data

Health Information Systems Information from the Government (about you)Police reportsEtc.

Page 4: A Personal Data Audit Method through Requirements Engineering Thomas van Eerden.

NamePersonal Data Audit Method based on

Requirements Engineering (PDA-RA) It checks requirements

Page 5: A Personal Data Audit Method through Requirements Engineering Thomas van Eerden.

Main Phases & Roles1. Previous analysis of the situation.2. System verification audit.3. System testing.4. Final interview and writing of the final report.

Roles: Audit client Security audit team Security manager

Page 6: A Personal Data Audit Method through Requirements Engineering Thomas van Eerden.

Related literatureBased on Requirement Engineering & CobiTCobiT: a framework to help organizations align

information technology with business goals (Ridley, Young & Carroll, 2004).

Requirements engineering:Developing requirementsAnalysing the problemDocumenting and observingChecking for accuracy.

Page 7: A Personal Data Audit Method through Requirements Engineering Thomas van Eerden.

Related literatureDownside RE:

Non-functional requirements.Requirements can conflict with each other.

You want high performance & You set a low budget.

Page 8: A Personal Data Audit Method through Requirements Engineering Thomas van Eerden.

Process Deliverable Diagram

Page 9: A Personal Data Audit Method through Requirements Engineering Thomas van Eerden.

Process Deliverable Diagram

Page 10: A Personal Data Audit Method through Requirements Engineering Thomas van Eerden.

Example